Skip to main content

Cybersecurity for Everyone

  • Chapter
  • First Online:
Cybersecurity Best Practices

Abstract

The rapid development of cyberspace in the recent two decades has introduced the new term cybersecurity as a follow-up of information security or IT security. Despite the rapid adoption of this new term, there exists a lot of confusion about its precise meaning, while – due the societal importance of it – there is a high need for a common understanding of what cybersecurity entails. This paper discusses a new framework of thinking where (i) cyberspace is being defined as the space of cyber activities (i.e., IT-enabled activities) and (ii) cybersecurity as the multidisciplinary (cyber) risk management challenge of securing cyberspace. As is argued, this new holistic conceptualization enables a common understanding and participation of all stakeholders in the current cybersecurity challenge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 74.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://en.wikipedia.org/wiki/Information_security#cite_note-1 (last access April 10, 2017)

  2. BSI, Information Technology – Code of Practice for Information Security Management. BS7799, part 1 (1995) and part 2 (1999).

    Google Scholar 

  3. ISO/IEC 27k-series: for an overview see Gary Hinson: http://www.iso27001security.com/ISO27k_Standards_listing.docx.

  4. E-commerce, the dot,com bubble: see https://en.wikipedia.org/wiki/Dot-com_bubble (last access April 14, 2017)

  5. https://en.wikipedia.org/wiki/History_of_mobile_phones (last access April 14, 2017)

  6. Larry D. Welsch, Cyberspace the fifth operational domain, IDA Research Notes, 2011.

    Google Scholar 

  7. U. Beck, Risk Society: Towards a New Modernity, New Delhi, Sage, 1992.

    Google Scholar 

  8. Internet of Things (IoT): https://en.wikipedia.org/wiki/Internet_of_things, (last access April 14, 2017)

  9. Kaspersky Labs’ Global Research & Analysis Team (GReAT),. The Great Bank Robbery: the Carbanak APT., 2015.

    Google Scholar 

  10. NCSC, ISAC’s, https://www.ncsc.nl/english/Cooperation/isacs.html (last access April 14, 2017)

  11. Socio-technical system: https://en.wikipedia.org/wiki/Sociotechnical_system (last access April 14, 2017)

  12. Cyberspace as ecosystem: http://itlaw.wikia.com/wiki/Cyber_ecosystem (last access April 14, 2017)

  13. ISO 31000 series of risk management: https://en.wikipedia.org/wiki/ISO_31000 (last access April 14, 2017)

  14. The Bowtie Method: https://www.cgerisk.com/support-a-downloads/support/bowtie-method-support/56-the-bowtie-method (last access April 14, 2017)

  15. Fault tree analysis: https://en.wikipedia.org/wiki/Fault_tree_analysis (last access April 14, 2017)

  16. Attack tree: https://en.wikipedia.org/wiki/Attack_tree (last access April 14, 2017)

  17. Bayesian network: https://en.wikipedia.org/wiki/Bayesian_network (last access April 14, 2017)

  18. Event tree analysis: https://en.wikipedia.org/wiki/Event_tree_analysis (last access April 14, 2017)

  19. Stuxnet: https://en.wikipedia.org/wiki/Stuxnet (last access April 14, 2017)

  20. L. Lessig, The Law of the Horse: What Cyberlaw Might Teach, 1999.

    Google Scholar 

  21. R. Anderson, Security Engineering, a guide to building dependable distributed systems, 2nd edition, Wiley, 2008.

    Google Scholar 

  22. Jajodia et al., Cyber Situational Awareness, Springer, 2010.

    Google Scholar 

  23. Executive MSc Program Cyber Security: https://www.csacademy.nl/en/education/education (last access April 14, 2017)

  24. Jan van den Berg, Jacqueline van Zoggel, Mireille Snels, Mark van Leeuwen, Sergei Boeke, Leo van de Koppen, Jan van der Lubbe, Bibi van den Berg and Tony de Bos, On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education, Proceedings of the NATO STO/IST-122 symposium in Tallinn, October 13–14 2014. (winner best conference paper award)

    Google Scholar 

Download references

Acknowledgments

Many thanks go to my colleagues and students at TUDelft, Leiden University, and the Cyber Security Academy The Hague with whom I had so many discussions on the fascinating subject of cybersecurity. I’m very grateful to all of you.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan van den Berg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

van den Berg, J. (2018). Cybersecurity for Everyone. In: Bartsch, M., Frey, S. (eds) Cybersecurity Best Practices. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-21655-9_40

Download citation

Publish with us

Policies and ethics