skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Cybersecurity in Germany Preview this item
ClosePreview this item
Checking...

Cybersecurity in Germany

Author: Martin Schallbruch; Isabel Skierka
Publisher: Cham, Switzerland : Springer, 2018.
Series: SpringerBriefs in cybersecurity.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users' agency. For many years, Germany has followed/adopted a preventive and engineering approach to cybersecurity, which emphasizes technological control of security threats in cyberspace over political, diplomatic and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Schallbruch, Martin.
Cybersecurity in Germany.
Cham, Switzerland : Springer, 2018
(OCoLC)1029207552
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Martin Schallbruch; Isabel Skierka
ISBN: 9783319900148 3319900145
OCLC Number: 1045629787
Description: 1 online resource
Contents: Intro; Foreword; Contents; 1 Introduction; 1.1 On Terminology; 1.2 Approach; 1.3 Peculiarities oftheGerman Political System; 1.4 Structure; References; 2 The German View onCybersecurity; 2.1 The Public Perception ofCyber Issues; 2.2 Political andRegulatory Concepts; 2.3 Snowden andtheEmerging Discussion About Technological Sovereignty; 2.4 Combining aGerman Data Protection andEngineering Approach withHolistic Cyber Debates; 2.5 Advantages andDisadvantages oftheGerman Approach-APreliminary Balance; References; 3 The Evolution ofGerman Cybersecurity Strategy; 3.1 Introduction 3.2 Phase 1, 1991-2011: IT Security andCritical Infrastructure Protection3.3 Phase 2: 2011-2016: Building aCivilian Cybersecurity Strategy; 3.3.1 The First National Cybersecurity Strategy forGermany; 3.3.2 The IT Security Law; 3.3.3 The Snowden Revelations; 3.4 Phase 3, 2016-2018: Consolidating aComprehensive Civilian-Military Approach toCybersecurity; 3.4.1 The 2016 White Paper onGerman Security Policy andtheFuture oftheBundeswehr; 3.4.2 The 2016Second National Cybersecurity Strategy; 3.4.3 Taking Stock ofPast Developments forFuture Cybersecurity Strategies; References 4 The Organisation ofCybersecurityinGermany4.1 Particularities ofGerman Law Enforcement, Intelligence, andPublic Security Organisations; 4.2 TheGerman Military's Role intheCyber Realm; 4.3 Cooperation andConflict Between Agencies; 4.4 Public-Private Cybersecurity Cooperation; References; 5 Current Priorities andGaps inGerman National Cybersecurity, Future Trends; 5.1 Introduction; 5.2 Legal, Technical andPractical Development ofActive Cyber Defence; 5.3 Cybersecurity Architecture-Roles andResponsibilities ofAgencies; 5.4 Towards aGovernmentalVulnerability Handling Strategy 5.5 Implementing aComprehensive IT Security Industry Policy5.6 Finding aCoherent Legal Concept forSafety andSecurity; 5.7 International Cooperation; References; 6 Conclusion
Series Title: SpringerBriefs in cybersecurity.
Responsibility: Martin Schallbruch, Isabel Skierka.

Abstract:

In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1045629787<\/a>> # Cybersecurity in Germany<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1045629787<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Place\/germany<\/a>> ; # Germany.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/public_administration<\/a>> ; # Public administration<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/ethical_&_social_aspects_of_it<\/a>> ; # Ethical & social aspects of IT<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/computers_security_general<\/a>> ; # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/computer_security_germany<\/a>> ; # Computer security--Germany<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Person\/skierka_isabel<\/a>> ; # Isabel Skierka<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Person\/schallbruch_martin<\/a>> ; # Martin Schallbruch<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Intro; Foreword; Contents; 1 Introduction; 1.1 On Terminology; 1.2 Approach; 1.3 Peculiarities oftheGerman Political System; 1.4 Structure; References; 2 The German View onCybersecurity; 2.1 The Public Perception ofCyber Issues; 2.2 Political andRegulatory Concepts; 2.3 Snowden andtheEmerging Discussion About Technological Sovereignty; 2.4 Combining aGerman Data Protection andEngineering Approach withHolistic Cyber Debates; 2.5 Advantages andDisadvantages oftheGerman Approach-APreliminary Balance; References; 3 The Evolution ofGerman Cybersecurity Strategy; 3.1 Introduction<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"In 2016, Germany\'s government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users\' agency. For many years, Germany has followed\/adopted a preventive and engineering approach to cybersecurity, which emphasizes technological control of security threats in cyberspace over political, diplomatic and military approaches. Accordingly, the technically oriented Federal Office for Information Security (BSI) has played a leading role in Germany\'s national cybersecurity architecture. Only in 2016 did the military expand and reorganize its cyber defence capabilities. Moreover, cybersecurity is inextricably linked to data protection, which is particularly emphasised in Germany and has gained high public attention since Edward Snowden\'s revelations. On the basis of official documents and their insights from many years of experience in cybersecurity policy, the two authors describe cyber security in Germany in the light of these German peculiarities. They explain the public perception of cybersecurity, its strong link with data protection in Germany, the evolution of Germany\'s cybersecurity strategies, and the current organisation of cybersecurity across the government and industry. The Brief takes stock of past developments and works out the present and future gaps and priorities in Germany\'s cybersecurity policy and strategy, which will be decisive for Germany\'s political role in Europe and beyond. This includes the cybersecurity priorities formulated by the current German government which took office in the spring of 2018.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5351409412<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Series\/springerbriefs_in_cybersecurity<\/a>> ; # SpringerBriefs in cybersecurity.<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Series\/springer_briefs_in_cybersecurity<\/a>> ; # Springer briefs in cybersecurity<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1029207552<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cybersecurity in Germany<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1045629787<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-3-319-90014-8<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/link.springer.com\/book\/10.1007\/978-3-319-90014-8<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5471150<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9783319900148<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1855109<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783319900148<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1007\/978-3-319-90014-8<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB8J4872<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1045629787<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dx.doi.org\/10.1007\/978-3-319-90014-8<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Person\/schallbruch_martin<\/a>> # Martin Schallbruch<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Schallbruch<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Martin<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Martin Schallbruch<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Person\/skierka_isabel<\/a>> # Isabel Skierka<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Skierka<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Isabel<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Isabel Skierka<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Place\/germany<\/a>> # Germany.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Germany.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Series\/springer_briefs_in_cybersecurity<\/a>> # Springer briefs in cybersecurity<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1045629787<\/a>> ; # Cybersecurity in Germany<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Springer briefs in cybersecurity<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Series\/springerbriefs_in_cybersecurity<\/a>> # SpringerBriefs in cybersecurity.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1045629787<\/a>> ; # Cybersecurity in Germany<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"SpringerBriefs in cybersecurity.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/computer_security_germany<\/a>> # Computer security--Germany<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security--Germany<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/computers_security_general<\/a>> # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/ethical_&_social_aspects_of_it<\/a>> # Ethical & social aspects of IT<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Ethical & social aspects of IT<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5351409412#Topic\/public_administration<\/a>> # Public administration<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Public administration<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"sz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783319900148<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3319900145<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783319900148<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/1029207552<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Cybersecurity in Germany.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1045629787<\/a>> ; # Cybersecurity in Germany<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n