A Comprehensive Cyber Security Approach - The Finnish Model
A Comprehensive Cyber Security Approach - The Finnish Model
A Comprehensive Cyber Security Approach - The Finnish Model
1. Table of Content
2. Introduction
9. Situational Awareness
9.1 The Tasks of the Cyber Security Centre
18. Summary
2.Introduction
The Cyber space is evolving quickly and becoming a growing challenge for nations, as well
as the international community. The key question is how to improve the preparedness of
modern societies and how to build new capacities in the cyber space. Knowledge is crucial
for to further development, as the weakest links in the chain are the users, be they
individuals, companies or governments.
Cyber threats are now receiving special attention in national security planning circles. This
is particularly true in countries that face a current or potential adversary with the necessary
capabilities to run hybrid operations. Even further attention should be placed on cyber
security if there are major fault lines among the population that can be taken advantage of
by the aggressor.
Because of the very whole of society nature of cyber threats, preparing for and addressing
them requires strong measures. Multiple countries may enjoy unrivalled power in many of
the areas of cyber security, offensive uses included, but may lack the tools necessary to
identify in a timely manner threats that nimbly cross all the neat categories and carefully
guarded bureaucratic silos. Smaller countries with less power may have potential in some of
the areas of cyber security, such as cyber and information warfare, and key areas of the
critical infrastructure like energy, banking etc.
However, regardless of their size, all countries can shore up their security against cyber
threats. The key in this process is a comprehensive security approach, which aims at
intrasocietal security planning instead of settling with a classic intergovernmental approach.
The comprehensive security approach demands political leadership, as the whole society
should be engaged in security and defensive efforts. This approach needs to be combined
with clearheaded vulnerability analysis to understand the potential pressure points in one’s
own society, access to reliable intelligence, and robust counter-intelligence efforts.
While strong and developed autocratic nations may have an advantage on the offensive
side of cyber operations, all countries regardless of their position in the international order
have an opportunity to organise their cyber security and defences. A credible defensive
posture against cyber threats cannot be based solely on military forces and other security
providers, because the targets can be located anywhere in society depending on each
country’s individual vulnerabilities. Thus, cyber defences must be built as a joint action of all
stakeholders in society, also including representation from civil society and the private
sector. This model is called a comprehensive security approach.
The idea behind a comprehensive security approach is that society’s security does not rest
on the prowess of traditional security providers such as police and military alone, but all the
key sectors of society have been included in the security planning and implementation
process. This whole-of-society aspect of a comprehensive security approach makes the
political leadership particularly important. Including a wide range of society’s players in the
security planning and implementation process aims both at increasing capabilities to
respond to a wide range of threats, such as cyber threats, that cross sectoral boundaries,
and securing the vital functions of society that usually demand tight collaboration between
several sectors. This efficient collaboration allows wide and efficient mobilisation of society’s
resources.
Ensuring the security of society is the key task of every government and the vital functions
of our societies must be secured in all situations. As an information society Finland relies on
information networks and systems and, consequently, is extremely vulnerable to
disturbances which affect their functioning. An international term for this interdependent,
multipurpose electronic data processing environment is the cyber domain.
Society’s growing information intensity, the increase of foreign ownership and outsourcing,
integration between information and communications technologies, the use of open
networks as well as the growing reliance on electricity have set totally new requirements for
securing society’s vital functions in normal conditions, during serious disturbances in normal
conditions and in emergency conditions.
In Finland, the cybersecurity strategy follows the main principles of the National Security
Strategy and the cybersecurity strategy does not change the tasks defined in the Security
Strategy for Society. Those strategies are government resolutions, which means that the
government has the main responsibility to improve cybersecurity arrangements in Finland –
the-Whole-of-Government Approach is applicable also in cybersecurity. All ministries have
their own role and responsibilities. The Security Committee closely cooperates with other
collaborative bodies that coordinate cybersecurity-related issues as part of their duties. The
Cyber Security Centre supports and assists cybersecurity actors within the scope of its
tasking.
Nevertheless, the cyber domain should be an opportunity and a resource. A safe cyber
domain makes it easier for both individuals and businesses to plan and conduct their
activities, which in turn boosts the economic activity. A properly working environment also
improves Finland’s appeal for international investors. In addition to these, cyber security
itself is a relatively new and strengthening business area. In addition to the increasing job
opportunities and tax revenue, society accrues benefits from this strengthening business
sector in many ways. National cyber security is strongly interconnected with the success of
Finnish well-being.
3.The Cyber
World from the
Finnish
Perspective
All collaboration is based on trust and at the moment it appears that genuine
globe-spanning trust in cyber matters is lacking. While this will naturally
slow down processes to achieve truly international consensus e.g. on cyber
norms, it should not limit more rapid advances taking place in unofficial and
official alliances, nor bilateral partnerships.
The goals for these advances are clear: to increase transparency and build
trust among the partners, improve the exchange of information, and to
support finding shared goals and agree on common activities to the set
goals.
Strategy process
Political Country
mandate Analysis
Vision Strategy
Implementation
- Action plan
- Managing a Cyber crisis
Continuous process
Figure4: Phases of the Strategy Process
17.1 Country Analysis
17.2 Planning
The cyber space is evolving quickly, it is becoming a growing challenge for nations and the
international community. The key question is how to improve the preparedness of modern societies
and how to build new capacities in cyber space. The functioning of the modern and strongly
interconnected global economy is based on an unhindered access to information, energy, and
financial flows etc. Unintentional, or in the worst case, intentional disruptions to these flows impact
negatively not only the states subjected to the disruptions, but the global order as a whole.
Moreover, as these flows are intertwined, disrupting one of the flows will have a damaging effect on
the others, potentially leading to a cascading failure endangering the whole system dependant on
the flows.
The vulnerabilities of modern societies are the main targets of cyber-attacks. In the cyber context
vulnerability is commonly defined as weaknesses related to information technology. The European
Union Agency for Network and Information Security (ENISA) specifies vulnerability as” The
existence of a weakness, design, or implementation error that can lead to an unexpected,
undesirable event compromising of the security of the computer system, network, application, or
protocol involved”. Merriam-Webster describes vulnerability in more general terms as ”the quality or
state of having little resistance to some outside agent” or ”the state of being left without shelter or
protection against something harmful”.
The security of a modern society underlines the need to define vulnerabilities and risks in all levels
of the whole ecosystem covering people, processes, technology, data, and additionally,
governance, where the prerequisite for success or failure is initially laid down. Identifying the need
for a common understanding of existing threats, regulations, standards, risks and complexities are
essential for securing critical infrastructure and services in the future. It is very much up to the
national authorities to decide who is overlooking the security of critical infrastructures and services.
Comprehensive situational awareness and understanding, as well as a credible and well-trained
action plan are needed to be able to prevent and defend against cyber-attacks.
Summary
Cybercrime has been the trending motivation behind attacks, with hacktivism and cyber espionage
being next major motivations. This trend has also continued this year. It is interesting to note that a
human factor seems to have a much greater role in cyber breaches in industry. This may indicate
problems in security policy compliance, lack of security awareness and training, or simply it may
show how strong the existing organisational culture and attitudes in resisting these changes are in
the private sector. One can even argue that people are the biggest vulnerability and risk in the
critical infrastructure and services ecosystems.
One of the main points is the urgent need for collaboration and
need to have coherent governance across the modern societies
creating circumstances to support a viable and secure platform for
a digital future. It must be clear who is overlooking the cyber
arrangements comprehensively.
Data is the focal point now and even more in the future in
digitalised societies with an advanced utilization of Big Data and
Artificial Intelligence (AI). This will require a new approach to data
privacy and confidentiality.
Cyber risks, threat landscapes and vulnerabilities may seem occasionally overwhelming, but well-
designed cyber security is most of all an enabler of reliable and innovative digital
environments for people and organisations.
Cyber space is a key domain of hybrid war and one could even say that without modern cyber
capabilities a full-scale hybrid war would not be possible. Cyber power is indeed a global game
changer. It brings along new asymmetries to power politics. All aspects of our lives and functions of
our societies will be transformed by all-pervasive and hyper-connected digitalisation.
The building of a more resilient society should not be viewed only as an extra burden for already
economically struggling Western societies; it is also a wonderful opportunity. The structures that
allow a society to respond in an agile manner to hybrid threats also support better understanding
and coping with the complex underlying interrelations that make our modern societies fragile. These
defensive structures also help to make our societies more functional, as decision-making processes
become more transparent and inclusive.
Mr. Aapo Cederberg
is the CEO and
Founder of
Cyberwatch Finland
CYBERWATCH
FINLAND
www.cyberwatchfinland.fi