Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The quest to cyber superiority : cybersecurity regulations, frameworks, and strategies of major economies
Kshetri N., Springer International Publishing, New York, NY, 2016. 240 pp. Type: Book (978-3-319405-53-7)
Date Reviewed: Jul 13 2017

Computer systems are not only central to the successful operation of business and the economy, but also critical national infrastructure such as hospitals, communications, and electricity distribution systems. Cybersecurity threats are, therefore, increasingly being taken seriously by national governments. While it is difficult to differentiate between real facts and exaggerations by self-interested parties such as security companies and news media, it is nonetheless obvious from recent events that an increased focus on cybersecurity by governments is warranted. Kshetri visits the issue of cybersecurity from an international perspective and provides an assessment of the current international cybersecurity preparedness, illustrating his assessment with examples from several major countries and regions.

In chapter 1, Kshetri defines cybersecurity terms, discusses the major cybersecurity threats around the globe, and introduces the main elements of a cybersecurity strategy, including vulnerabilities, weaknesses, and opportunities. Chapter 2 examines the impact that cybersecurity concerns are having with respect to cloud and big data strategies. The complex issues involved in developing regulatory frameworks and the consequences of physical location of data and data analytics for jurisdiction and regulation are discussed. In particular, the impact that security and privacy concerns are having in constraining the growth of cloud solutions is considered. Chapter 3 extends the discussion to international relations and national security, examining concerns over cyberwarfare and what that term may mean. International treaties such as the Council of Europe (CoE) Convention on Cybercrime are discussed, as well as the reservations that some nations have in ratifying multilateral treaties and how this stands in the way of a wider adoption of international frameworks.

Chapter 4 looks at the impact of cybersecurity issues on international commerce. The impact on trade and investment as a consequence of different levels of legislated cybersecurity and privacy controls in host and home countries is considered. Also discussed are restrictions imposed on business activity between countries by governments in reaction to their internal national security policies and assessments.

Nine chapters (5 through 13) go into detail for each of nine particular countries or regions. The US, EU, China, India, Japan, South Korea, Brazil, Russia, and the Gulf States (specifically, the six member states of the Gulf Cooperation Council) are covered. Each chapter reviews the current cybersecurity threats facing the country and discusses the current legislation, policies, and frameworks in place within that country/region. Comparisons with other countries and the international issues potentially impacting the country/region are also discussed. The reader can develop a good bird’s-eye view of the general international position by simply reading the discussion and concluding remarks sections of these nine chapters.

Lastly, chapter 14 summarizes the current status of international cybersecurity, the implications for the general public, and the need for action by national governments, regulators, and major industries.

Each chapter is well structured with an introduction, a summary of concluding remarks, and a thorough list of references. There is a detailed table of contents, but no index. Although there are many other books that cover cybersecurity threats, most seem to focus on advice for protecting businesses and organizations, with some also considering general international issues. Kshetri differs from these by focusing on the national security responsibilities of governments, providing an up-to-date assessment of the cybersecurity threats in several developed and developing nations as well as an appraisal of their cybersecurity strategies and preparedness. Senior public servants and those involved in national security endeavors should find this book an interesting read.

Reviewer:  David B. Henderson Review #: CR145424 (1709-0610)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Organizational Impacts (K.4.3 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy