TABLE OF CONTENTS 1. INTRODUCTION ........................................................................................................................... 3 2. PRINCIPLES................................................................................................................................... 6 3. GENERAL GOALS OF THE STRATEGY ................................................................................... 7 4. SECTORS OF THE SOCIETY AND FORMS OF COOPERATION OF CYBER SECURITY STAKEHOLDERS .................................................................................................................................. 8 5. CYBER SECURITY AREAS ......................................................................................................... 9 5.1 Electronic communication and information infrastructure and services ....................................... 9 5.1.1 Public electronic communications (A) ................................................................................... 9 5.1.2 E-Government (B) ................................................................................................................ 11 5.1.3 Electronic financial services (C) .......................................................................................... 12 5.2 Critical communication and information infrastructure and cyber crisis management (D) ........ 13 5.3 Cybercrime (E) ............................................................................................................................ 16 6. INTERRELATIONS OF THE AREAS OF CYBER SECURITY ............................................... 18 6.1 Protection of information (F)....................................................................................................... 18 6.2 Technical coordination in the treatment of computer security incidents (G) .............................. 21 6.3 International cooperation (H) ...................................................................................................... 22 6.4 Education, research, development and raising security awareness in cyberspace (I).................. 24 7. IMPLEMENTATION OF THE STRATEGY............................................................................... 27 APPENDIX: TERMS AND ACRONYMS........................................................................................... 29 Terms ................................................................................................................................................. 29 Acronyms .......................................................................................................................................... 31 2 of 31

Select target paragraph3