Cybersecurity Assessment of the Public Sector in Greece

被引:0
|
作者
Drivas, George [1 ,2 ]
Maglaras, Leandros [1 ,3 ]
Janicke, Helge [3 ]
Loannidis, Sotiris [4 ]
机构
[1] Minist Digital Policy Telecommun & Media, Natl Cyber Secur Author Greece, Gen Secretariat Digital Policy, Kallithea, Greece
[2] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
[3] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[4] Fdn Res & Technol, Athens, Greece
基金
欧盟地平线“2020”;
关键词
cyber security; public sector; national critical infrastructures;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations have to manage new risks, sometimes proactively, sometimes by being constrained by regulations such as GDPR or the NIS directive. To cope with new threats, it is essential to develop or reinforce a real culture of cybersecurity at the organizational level. Before putting anything in place, we must start by assessing the new risks to which we are exposed. The new regulations that the EU is issuing, invite organizations and member states to follow these approaches. National Cyber Security Authority of Greece (NCSA) is responsible for coordinating the public sector and the National Critical Infrastructures (NCIs) of Greece, in order to take all necessary steps towards a secure Greek Cyberspace. Its main objective is to shield the Nation from external threats and to provide a secure digital environment for all citizens of Greece. One important action is the enhancement of digital skills and the development of a strong public and private security culture, exploiting the potential of the academic community and public and private sector actors. NCSA is following a PDCA-cycle approach with strong cooperation of all relevant stakeholders for securing NCIs. NCSA is planning a series of audits for the entire public sector and for NCIs. The assessment of the central governmental ICT structures was selected as an initial phase. For this purpose, NCSA sent structured questionnaires aiming in capturing the general picture of the security situation of central ICT infrastructures. Data collected during this phase are processed and will be used to design the next steps of deepening and expanding of such assessments but also to institute regular and / or emergency control procedures on a permanent basis. The information that has been gathered is analyzed in order to reveal major threats, capacity building priorities, current situation in terms of procedures, security measures and policies and established incident response plans.
引用
收藏
页码:162 / 171
页数:10
相关论文
共 50 条