have
the scale
Over sophi
and
rapidly
cyber-attacks
· =
in scope
grown
years ,
,
stication .
We define four and
different threat
overlapping categories
· can :
Threats
-
Terroris
Cyler e
Cyber War Cybercrime
Espionage
Cyber Cyber Vandalism
The term cybersecurity and
Wide aimed at
activities
of
· preventing
covers a range
cyber-threate
mitigating . Cybersecurity
and
Network fight against defense
cyber
information se. cybercrime
curity
We need to
1
. ensure :
confidentiality disclosure
unauthorized of
of information
prevention
: .
that
the
integrity that the
guarantee sent the
is is receive
message
: same as message
ed and altered
the
that transit
not
is in
message .
that the
availability available
information be
will timely
to
guarantee in
user
: un
a
interrupted the
needed regardless location
when of
it the
of
is users
manner .
but
Cybersecurity focuses data
of
only the
the
not also
protection
· on
on ,
the
and of public
the and sector
networks private
systems .
Any
2 law both the
effective will
cybersecurity and
public
to sector
seek
regime secure
. sector
private . lead
laws whereas laws
Coercive to inadeguate cybersecurity
3
. cooperative
that for invest
and
provide to
incentives government agencies in
companies
cybersecurity .
There for approach
forward
4
. need looking
is a
a .
It's harm
three
focus
- types that
distinct cybersecurity
of
important to on
. law least
should avoid at mitigate
to
seek :
or
Harm to individuals
· .
business
Harm to interests
· .
national
Harm to security
· .
features
More rilevant
· are :
Flexibility adaptibility
and of measures .
human
Importance factor
of .
changing
Update vis-a risks
vis
and sharing.
Cooperation information the shall
Under limits
Union
conferral
the the
only
of
principle within
act
,
the the
Member Treaties
states
conferred and
the
by
of competences it in
upon ,
therein
the
order set
objectives
attain
to out
in .
Art
. that
· 4 says : by the
Following the Treaties
explicity to
Art not EU
5 given
any powers rema
. ,
Member States
the
with
in .
The Member
EU respect
must States
all under law It
equally al
must
EU .
each and
country's identity consti
respect their political
national unique
so meaning
,
including
tutional local
regional structures
systems and government .
In functions
essential
the
addition the the
not
must interfere with of
EU
, law
territorial
like and
state integrity and
maintaining order especially na
,
, ,
fully national control
which shared
tional security not
it's with
under
remains
,
the EU . legislation
which
articles legal for
The basis
the Cybersecurity
EU
· are
are : internal
Art market
TFEU
114 :
. .
53(1)
and freedom
and
right establishment
of of
Art TFEU
62 service
: .
. 132(1)
127(2) <mooth
Art operation of systems
payment
TFEU : .
. ,
83(1) freedom
Art and
of Justice
security
TFEU area
: .
. ,
the
coordination
. level
at
Art TFEU EU
74 : .
In do fall
that exclusive
not the the
within the principle
of
competence Union
· areas ,
subsidiatry observed.
of be
must
According .
to
· 5
art :
5(3)
(art
Subsidiatey .
In where
policy the have exclusive
doesn't act
EU it
. power
aress on
can
i ,
by achieved
the effectively
goals of by Member
action cannot Sta
be
if the level) chieved
(national and
tes letter
local be
would at
regional or a
,
,
,
level scale
due action's
to
EU the .
impact
or
limits action
This shared competences
EU
· in .
check
National subsidiatiy respected
that described
parliaments the
· in
is as
,
Protocol Subsidiatry and Proportionality
on .
(art 5(4)
Proportionality .
the
by beyond
not What
Any action Treaties'
must to
EU the
meet
i is
go go
necessary
. .
als
The laws
and form
content needed
limited What's
to
be
of EU
· must no overrea
ch
This governed Protocol
by
also the .
· is same
ProtectEU Internal Strategy
European Security
: a
The EU by
hybrid
to threats
strengthen resilience against
· aims :
Protecting critical infrastructure .
Enhacing cybersecurity
.
Securing habs and ports
transport .
threats
Fighting online .
Because hybrid
malicious breader
often
activity and
cyber persistent of
part
· is
threats EU-level
constant attention
it needs .
,
The has already
EU laws
· adopted Key cybersecurity :
Directive
NISE cyber sectores
resilience essential
improves in
: .
Resilience
Cyber digital
strengthens product
Act security
. .
preparedness
Cybere incident
Solidarity and
for
provides
Act support response
: .
hospital prepared
for detection
Action to
Cybersecurity
Plan
2025 Aims improve
: ,
and healthcare
in
crisis
ness response .
,
Future actions focus
must
· on :
Information sharing.
chain
Supply protection .
Fighting and cyberattacks
.
ransomware
Enhancing technological sovereighty . hand
Cybersecurity technological hand
and sovereignty
· in
go :
reduce foreign
reliance lead
The must of
and development
tech the
EU
· on
technologies (e
strategic ...
edge computing
Al JoT
g.
. . ,
, like
The will promote the
Commission initiatives the AI continent Plan
Action
· ,
Quantum Strategy ecc .
,
The modern
deployment
EU the
support
will protocols
internet
of to
· ensure secure
a ,
,
and efficient internet
scalable Europe
across .
, Decentralized structure
Network Cyber defense
Cybercrime
and Security
Information European Defence Agency
European
ENISA Cybercrime military staff
(E(3) and
(DEA) EU
Center
functions
Joint Main
Cyber Unit
The supports following
Cyber the
participants
Joint Unit
· in areasi
Inventory capabilities operational
technical
of Cyber
EU +
Cybersecurity Includes threat
vide and intel
incident
situation reports EV
s
NiSE)
based
Crisis I Coordinates
plan incident
EU
s response
response on
(MoUS)
Memoranda Understanding For help
of cooperation and mutual
. .
Cybersecurity Mobilised
Rapid incidents
Reaction Teams of serious
in
. case
Information bodies and
sharing and actors
agreement Among EU
cooperation .
complex the
The cyber-attacks needed
become cooperation
public-private
· is
more
more .
,
Information detect/
sharing respond effectively
to
to threats
essential
· is
Private structured
involvement considering
should be :
( responsability
traditionally function
security public
state
a
:
technical hands of
expertise: private actores
the
mainly in .
Authorities to share
firms data
try While
by to
security asking private
· improve pri
voluntarily
reclutant share
actors often
vate info
to
are
The (PPs)
partnerships
Public-private
solution is partnership
public defined
be
A private can as :
-
↑ Long-term and provide's
between
contract public entity public
to
private company
a a based
I responsabilities
where and
the private
asset/service paid
party takes risks is
on
, "
performance
on .
The lavel
nature each
of private collaboration
of
the
sectors affects public
limited authorized
Companies infrastructure interaction with
managing : .
closer
Firms and stricter with
cooperation
offering institutions
to public
services users : (PPPs
for
models Partnerships
Coperative Public Private
Is ENISA
study by goals
and
made
· its
a are :
Provide data
and
status analysing
collecting
of PPP Europe
in
overview
an .
,
Identify of and
between public
models cooperation private actors
main .
challenges faced
Highlight during development
the and
setup of PPPs
for
Propose recommendations PPPs Europe
improving across .
We said that
already long
Partnership
Public- Private term public
agreement between
is
a a
which
and shared
coordination responsibi
actores and
involves collaboration sometimes
private ,
lities .
Developed limited
time but
public
not
and private
policy
sectors to
is
areas
across
over many
includes
also :
Private cooperation
private .
Public cooperation
public .
driving for
faces the
The creation of PPP
· are :
Economic interests .
requirements
Regulatory .
Social interests .
Public relations .
Other reasons.
the
But level
objective the
of PPPs to of the
cybersecurity EU
. is increase
main in .
Private Publici benefits
vs
Private
· :
Access funding
to public .
Influence national and standards
laws
on .
Scarica il documento per vederlo tutto.
Scarica il documento per vederlo tutto.
Scarica il documento per vederlo tutto.
Scarica il documento per vederlo tutto.
-
Appunti Information and technology law (parte 1)
-
Appunti Information and technology law (parte 2)
-
Appunti Information and technology law (parte 3)
-
Appunti Information and technology law (parte 2)