National Cybersecurity Strategy Framework
This work is licensed under a Creative Commons Attribution 4.0 International License.
The copyright to this article is transferred to the University of Public Service Budapest, Hungary (for U.S. government employees: to the extent transferable) effective if and when the article is accepted for publication. The copyright transfer covers the exclusive right to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or any other reproductions of similar nature.
The author warrants that this contribution is original and that he/she has full power to make this grant. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.
An author may make an article published by University of Public Service available on a personal home page provided the source of the published article is cited and University of Public Service is mentioned as copyright holder
Cyberspace and its services and the digital-based processes affect all segments of our lives. These effects are felt in the economy, politics, culture, but also in individual elements of our private life and in people’s relationships, as well. Accordingly, one of the biggest challenges for cyber security is that we highly depend on these services. Most of the countries have realised that today cyber security is one of the essential parts of their national security. Its reason is twofold. Firstly, the digital ecosystem is vital for a nation and this ecosystem cannot work properly without cyber security, secondly there is no alternatives to avoid the aforementioned dependence. As a result, cyberspace and its security are of decisive importance to countries with advanced information infrastructures. However, national cyber security strategies, whether they are made by big powers or small countries, have different answers to the challenges of cyberspace. At first, this paper focuses on these challenges and then tries to identify some unified elements which could be the main pillars of an effective national cyber security strategy.