ŠAVŠ/TAČR Digital Czechia in a Digital Europe
146
Hamilton 68 project) already work, for example, with regard to information warfare – where in real time, for example, false comments or other types of interaction are monitored (e.g. sharing, likes, etc.) by fake accounts. To create a platform focused on monitoring cyber threats in the Czech environment, where there would be active in sharing information between the public and private sectors, cyber security in the Czech Republic could significantly help in the ability to respond quickly and effectively to potential attacks. In cooperation with the private sector, the Czech Republic should in no way underestimate the role of domestic startups and other small and medium-sized enterprises (SMEs) since they very often generate new solutions and innovations. The United Kingdom, which decided to invest approximately CZK 19.5 billion in the National Cyber Security Program between 2011 and 2015, promoting the priorities of “The UK Cyber Security Strategy”, has also decided that at least 25% of the value all contracts awarded during this period and from this amount must be reserved for SMEs. 20 Support for Czech SMEs and startups as platforms for innovative solutions to cyber threats should therefore be part of the Czech strategy. It is undoubtedly worth noting that the United Kingdom is actively pursuing a more comprehensive strategy in this regard – i.e. generally seeking to promote and support, both at home and abroad, its cyber security private sector and to ensure its continued growth. The intention thus remains to make the domestic companies of the United Kingdom the world leader in cyber security, which would create ideal conditions for ensuring cyber security at the state level. At the same time, this would ensure a sufficient supply of ICT experts and specialists. In addition to traditional cyber threats, several other factors – characteristic especially for the public administration – significantly undermine cyber security. The first such aspect is the lack of security against cyberattacks due to the acquisition of inadequate security systems. The phenomenon of incorrect acquisitions is very often associated with the acquisition staff who are in charge of the area but are not familiar enough with the issue of cyber security to select the appropriate products. 21 Therefore, in matters related to cyber security, the public administration (whether at the state, regional or very local level) should always seek internal expert opinion when purchasing ICT products. Institute, 26/01/2017, see http://www.aei.org/publication/improving-cybersecurity-through-cooperation-not- regulation/. 20 The UK Cyber Security Strategy Protecting and promoting the UK in a digital world. 21 Charlet Katherine, Government in the Crosshairs: Recommendations for Federal Cybersecurity, Carnegie Endowment for International Peace, 12/04/2018, see https://carnegieendowment. org/2018/04/12/ government-in-crosshairs-recommendations-for-federal-cybersecurity-pub-76022. SPECIFIC THREATS AND SPECIFIC AIMS
Made with FlippingBook Publishing Software