TABLE OF CONTENTS
1.
INTRODUCTION ........................................................................................................................... 3
2.
PRINCIPLES................................................................................................................................... 6
3.
GENERAL GOALS OF THE STRATEGY ................................................................................... 7
4.
SECTORS OF THE SOCIETY AND FORMS OF COOPERATION OF CYBER SECURITY
STAKEHOLDERS .................................................................................................................................. 8
5.
CYBER SECURITY AREAS ......................................................................................................... 9
5.1 Electronic communication and information infrastructure and services ....................................... 9
5.1.1 Public electronic communications (A) ................................................................................... 9
5.1.2 E-Government (B) ................................................................................................................ 11
5.1.3 Electronic financial services (C) .......................................................................................... 12
5.2 Critical communication and information infrastructure and cyber crisis management (D) ........ 13
5.3 Cybercrime (E) ............................................................................................................................ 16
6.
INTERRELATIONS OF THE AREAS OF CYBER SECURITY ............................................... 18
6.1 Protection of information (F)....................................................................................................... 18
6.2 Technical coordination in the treatment of computer security incidents (G) .............................. 21
6.3 International cooperation (H) ...................................................................................................... 22
6.4 Education, research, development and raising security awareness in cyberspace (I).................. 24
7.
IMPLEMENTATION OF THE STRATEGY............................................................................... 27
APPENDIX: TERMS AND ACRONYMS........................................................................................... 29
Terms ................................................................................................................................................. 29
Acronyms .......................................................................................................................................... 31
2 of 31