Estratto del documento

have

the scale

Over sophi

and

rapidly

cyber-attacks

· =

in scope

grown

years ,

,

stication .

We define four and

different threat

overlapping categories

· can :

Threats

-

Terroris

Cyler e

Cyber War Cybercrime

Espionage

Cyber Cyber Vandalism

The term cybersecurity and

Wide aimed at

activities

of

· preventing

covers a range

cyber-threate

mitigating . Cybersecurity

and

Network fight against defense

cyber

information se. cybercrime

curity

We need to

1

. ensure :

confidentiality disclosure

unauthorized of

of information

prevention

: .

that

the

integrity that the

guarantee sent the

is is receive

message

: same as message

ed and altered

the

that transit

not

is in

message .

that the

availability available

information be

will timely

to

guarantee in

user

: un

a

interrupted the

needed regardless location

when of

it the

of

is users

manner .

but

Cybersecurity focuses data

of

only the

the

not also

protection

· on

on ,

the

and of public

the and sector

networks private

systems .

Any

2 law both the

effective will

cybersecurity and

public

to sector

seek

regime secure

. sector

private . lead

laws whereas laws

Coercive to inadeguate cybersecurity

3

. cooperative

that for invest

and

provide to

incentives government agencies in

companies

cybersecurity .

There for approach

forward

4

. need looking

is a

a .

It's harm

three

focus

- types that

distinct cybersecurity

of

important to on

. law least

should avoid at mitigate

to

seek :

or

Harm to individuals

· .

business

Harm to interests

· .

national

Harm to security

· .

features

More rilevant

· are :

Flexibility adaptibility

and of measures .

human

Importance factor

of .

changing

Update vis-a risks

vis

and sharing.

Cooperation information the shall

Under limits

Union

conferral

the the

only

of

principle within

act

,

the the

Member Treaties

states

conferred and

the

by

of competences it in

upon ,

therein

the

order set

objectives

attain

to out

in .

Art

. that

· 4 says : by the

Following the Treaties

explicity to

Art not EU

5 given

any powers rema

. ,

Member States

the

with

in .

The Member

EU respect

must States

all under law It

equally al

must

EU .

each and

country's identity consti

respect their political

national unique

so meaning

,

including

tutional local

regional structures

systems and government .

In functions

essential

the

addition the the

not

must interfere with of

EU

, law

territorial

like and

state integrity and

maintaining order especially na

,

, ,

fully national control

which shared

tional security not

it's with

under

remains

,

the EU . legislation

which

articles legal for

The basis

the Cybersecurity

EU

· are

are : internal

Art market

TFEU

114 :

. .

53(1)

and freedom

and

right establishment

of of

Art TFEU

62 service

: .

. 132(1)

127(2) <mooth

Art operation of systems

payment

TFEU : .

. ,

83(1) freedom

Art and

of Justice

security

TFEU area

: .

. ,

the

coordination

. level

at

Art TFEU EU

74 : .

In do fall

that exclusive

not the the

within the principle

of

competence Union

· areas ,

subsidiatry observed.

of be

must

According .

to

· 5

art :

5(3)

(art

Subsidiatey .

In where

policy the have exclusive

doesn't act

EU it

. power

aress on

can

i ,

by achieved

the effectively

goals of by Member

action cannot Sta

be

if the level) chieved

(national and

tes letter

local be

would at

regional or a

,

,

,

level scale

due action's

to

EU the .

impact

or

limits action

This shared competences

EU

· in .

check

National subsidiatiy respected

that described

parliaments the

· in

is as

,

Protocol Subsidiatry and Proportionality

on .

(art 5(4)

Proportionality .

the

by beyond

not What

Any action Treaties'

must to

EU the

meet

i is

go go

necessary

. .

als

The laws

and form

content needed

limited What's

to

be

of EU

· must no overrea

ch

This governed Protocol

by

also the .

· is same

ProtectEU Internal Strategy

European Security

: a

The EU by

hybrid

to threats

strengthen resilience against

· aims :

Protecting critical infrastructure .

Enhacing cybersecurity

.

Securing habs and ports

transport .

threats

Fighting online .

Because hybrid

malicious breader

often

activity and

cyber persistent of

part

· is

threats EU-level

constant attention

it needs .

,

The has already

EU laws

· adopted Key cybersecurity :

Directive

NISE cyber sectores

resilience essential

improves in

: .

Resilience

Cyber digital

strengthens product

Act security

. .

preparedness

Cybere incident

Solidarity and

for

provides

Act support response

: .

hospital prepared

for detection

Action to

Cybersecurity

Plan

2025 Aims improve

: ,

and healthcare

in

crisis

ness response .

,

Future actions focus

must

· on :

Information sharing.

chain

Supply protection .

Fighting and cyberattacks

.

ransomware

Enhancing technological sovereighty . hand

Cybersecurity technological hand

and sovereignty

· in

go :

reduce foreign

reliance lead

The must of

and development

tech the

EU

· on

technologies (e

strategic ...

edge computing

Al JoT

g.

. . ,

, like

The will promote the

Commission initiatives the AI continent Plan

Action

· ,

Quantum Strategy ecc .

,

The modern

deployment

EU the

support

will protocols

internet

of to

· ensure secure

a ,

,

and efficient internet

scalable Europe

across .

, Decentralized structure

Network Cyber defense

Cybercrime

and Security

Information European Defence Agency

European

ENISA Cybercrime military staff

(E(3) and

(DEA) EU

Center

functions

Joint Main

Cyber Unit

The supports following

Cyber the

participants

Joint Unit

· in areasi

Inventory capabilities operational

technical

of Cyber

EU +

Cybersecurity Includes threat

vide and intel

incident

situation reports EV

s

NiSE)

based

Crisis I Coordinates

plan incident

EU

s response

response on

(MoUS)

Memoranda Understanding For help

of cooperation and mutual

. .

Cybersecurity Mobilised

Rapid incidents

Reaction Teams of serious

in

. case

Information bodies and

sharing and actors

agreement Among EU

cooperation .

complex the

The cyber-attacks needed

become cooperation

public-private

· is

more

more .

,

Information detect/

sharing respond effectively

to

to threats

essential

· is

Private structured

involvement considering

should be :

( responsability

traditionally function

security public

state

a

:

technical hands of

expertise: private actores

the

mainly in .

Authorities to share

firms data

try While

by to

security asking private

· improve pri

voluntarily

reclutant share

actors often

vate info

to

are

The (PPs)

partnerships

Public-private

solution is partnership

public defined

be

A private can as :

-

↑ Long-term and provide's

between

contract public entity public

to

private company

a a based

I responsabilities

where and

the private

asset/service paid

party takes risks is

on

, "

performance

on .

The lavel

nature each

of private collaboration

of

the

sectors affects public

limited authorized

Companies infrastructure interaction with

managing : .

closer

Firms and stricter with

cooperation

offering institutions

to public

services users : (PPPs

for

models Partnerships

Coperative Public Private

Is ENISA

study by goals

and

made

· its

a are :

Provide data

and

status analysing

collecting

of PPP Europe

in

overview

an .

,

Identify of and

between public

models cooperation private actors

main .

challenges faced

Highlight during development

the and

setup of PPPs

for

Propose recommendations PPPs Europe

improving across .

We said that

already long

Partnership

Public- Private term public

agreement between

is

a a

which

and shared

coordination responsibi

actores and

involves collaboration sometimes

private ,

lities .

Developed limited

time but

public

not

and private

policy

sectors to

is

areas

across

over many

includes

also :

Private cooperation

private .

Public cooperation

public .

driving for

faces the

The creation of PPP

· are :

Economic interests .

requirements

Regulatory .

Social interests .

Public relations .

Other reasons.

the

But level

objective the

of PPPs to of the

cybersecurity EU

. is increase

main in .

Private Publici benefits

vs

Private

· :

Access funding

to public .

Influence national and standards

laws

on .

Anteprima
Vedrai una selezione di 6 pagine su 24
Appunti Information and technology law (parte 1) Pag. 1 Appunti Information and technology law (parte 1) Pag. 2
Anteprima di 6 pagg. su 24.
Scarica il documento per vederlo tutto.
Appunti Information and technology law (parte 1) Pag. 6
Anteprima di 6 pagg. su 24.
Scarica il documento per vederlo tutto.
Appunti Information and technology law (parte 1) Pag. 11
Anteprima di 6 pagg. su 24.
Scarica il documento per vederlo tutto.
Appunti Information and technology law (parte 1) Pag. 16
Anteprima di 6 pagg. su 24.
Scarica il documento per vederlo tutto.
Appunti Information and technology law (parte 1) Pag. 21
1 su 24
D/illustrazione/soddisfatti o rimborsati
Acquista con carta o PayPal
Scarica i documenti tutte le volte che vuoi
Dettagli
SSD
Scienze giuridiche IUS/09 Istituzioni di diritto pubblico

I contenuti di questa pagina costituiscono rielaborazioni personali del Publisher ingchiaretta98 di informazioni apprese con la frequenza delle lezioni di Information and technology law e studio autonomo di eventuali libri di riferimento in preparazione dell'esame finale o della tesi. Non devono intendersi come materiale ufficiale dell'università Università degli Studi di Pisa o del prof Niccolini Federico.
Appunti correlati Invia appunti e guadagna

Domande e risposte

Hai bisogno di aiuto?
Chiedi alla community