Abstract

Although the Czech Republic belongs to the most “internetised” countries in the world, its information and communication security policy (as well as the protection of the critical information infrastructure) lagged behind for a relatively long time, when compared to most of the remaining European countries. Building the hierarchy regarding the umbrella teams of the Cybernetic Emergency Response Teams (CERT) and Computer Security Incident Response Teams (CSIRT) type (regardless of whether we call them governmental, national or otherwise) was unthinkable without the contribution of the private sector that substituted many functions of the state in this field. The whole process can be understood as an interaction of international and national pressures appealing to the solution of the situation.

Highlights

  • The integral part of the preventive and active protection of cyberspace is a consistent and effective solution of security incidents, including the elimination of their causes and consequences

  • The services provided by the Cybernetic Emergency Response Teams (CERT)/Computer Security Incident Response Teams (CSIRT) teams can include both reactive and proactive services

  • The umbrella CERT/CSIRT team in each country is a focal point for the individual users to address with a specific problem

Read more

Summary

Pilot Teams and its Competitors

In 2006 and 2007, the process of building the National CERT/CSIRT team continued through the Consortium, which won the tender of the Security Research Project of the Ministry of the Interior of the Czech Republic for the period 2007–2010 (project called Cyber Threats in the Security Interests of the Czech Republic).4 [48]. A certain blind alley in this regard was the parallel activity of the private firm Relsie, which concluded in a Memorandum of Understanding with the Ministry of the Interior of the Czech Republic in February 2007 (describing the vision to build a CERT/CSIRT facility, called CERT.ORG). This company was, an unknown player for foreign partners, so it cannot reach its goals. It is no wonder that these delays caused embarrassment in the domestic expert community. [14] [32]

Overcoming the Competence Vacuum
Proposal of the Modified Institutional Framework
Conclusion
Proposals regarding cybersecurity issues
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.