European strategy and legislation for cybersecurity: implications for Portugal
- PDF / 539,955 Bytes
- 10 Pages / 595.276 x 790.866 pts Page_size
- 14 Downloads / 231 Views
(0123456789().,-volV) (0123456789().,-volV)
European strategy and legislation for cybersecurity: implications for Portugal Joa˜o Vidal Carvalho1
•
Sandro Carvalho2 • A´lvaro Rocha3
Received: 19 September 2019 / Revised: 6 January 2020 / Accepted: 13 January 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract ‘‘Cyber-attacks can be more dangerous than guns and tanks’’. This statement was made by Junker in his speech in the EU ‘‘State of the Union’’ in 2017 and reflects the extreme importance of this phenomenon. The increasing variety of devices that can access to Internet has contributed to the overall growth of internet users, in all kinds of places and circumstances. These devices are now part of our lives and we use it for everything. As the number of devices and tasks that we do with it are growing, more prone we are to cyber-attacks. As well, as the number of user’s victim of these attacks are increasing, the general concerns about cybercrime are growing too. The growing list of cybercrimes includes crimes that have been made possible by computers, such as network intrusions and the dissemination of computer viruses, as well as computer-based variations of existing crimes, such as identity theft and terrorism which have become as major problem to people and nations. In this context, the European Union is leading the effort to regulate the defence against cyber-threats in both normative/legal and strategic levels. This reality is also very present in Portugal, where there is a sense of lack of control and capacity to combat this kind of threats. In this article, we present the European Strategy and Legislation for Cybersecurity and how this strategy applies and involves Portugal. Keywords Cybersecurity Cybercrime Cyber-attacks Cyber-threats Information security Cyberdefence Cyber extortion
1 Introduction It is consensual that the introduction of the information and communications technology (ICT) in all social activities significantly increase the efficiency and effectiveness of each person or organization. All the processes and services provided by ICT enhances the quality of life of an individual, through the ability to access, from any place and at any time, to essential information. However, the consequent concentration of data in databases, required to feed information systems of public administration and other business entities, inevitably lead to the possibility of
& Joa˜o Vidal Carvalho [email protected] 1
Polytechnic Institute of Porto, ISCAP, S. Mamede de Infesta, Portugal
2
Polytechnic Institute of Ca´vado and Ave, Barcelos, Portugal
3
University of Coimbra, Coimbra, Portugal
malicious activities. Additionally, ‘‘growing threats have been found in emerging technologies, such as social media, cloud computing, smartphone technology and critical infrastructure, often taking advantage of their unique characteristics’’ [1]. Another important issue is the privacy of the citizen’s information. The number of devices with access to internet is growing
Data Loading...