The opportunity to regulate cybersecurity in the EU (and the world) : recommendations for the Cybersecurity Resilience Act
Rosager Ludvigsen, Kaspar and Nagaraja, Shishir (2022) The opportunity to regulate cybersecurity in the EU (and the world) : recommendations for the Cybersecurity Resilience Act. Other. arXiv.org, Ithaca, NY. (https://doi.org/10.48550/arXiv.2205.13196)
Preview |
Text.
Filename: Ludvigsen_Nagaraja_arXiv_2022_The_opportunity_to_regulate_cybersecurity_in_the_EU_and_the_world.pdf
Preprint License: Download (746kB)| Preview |
Abstract
Safety is becoming cybersecurity under most circumstances. This should be reflected in the Cybersecurity Resilience Act whenever it is proposed and agreed upon in the European Union. In this paper, we define a range of principles which this future Act should build upon, a structure and argue why it should be as all encompassing as possible. We do this on the basis of what the cybersecurity research community for long have asked for, and on what constitutes clear hard legal rules instead of soft. Important areas such as cybersecurity should be taken seriously, by regulating it in the same way we see other types of critical infrastructure and physical structures, and be uncompromising and logical, to encompass the risks and potential for chaos which its ubiquitous nature entails. We find that principles which regulate cybersecurity systems' life-cycles in detail are needed, as is clearly stating what technology is being used, due to Kirkhoffs principle, and dismissing the idea of technosolutionism. Furthermore, carefully analysing risks is always necessary, but so is understanding when and how the systems manufacturers make fail or almost fail, all of these details must be expected and detailed. We do this through the following principles: Ex ante and Ex post assessment, Safety and Security by Design, Denial of Obscurity, Dismissal of Infallibility, Systems Acknowledgement, Full Transparency, Movement towards a Zero-trust Security Model, Cybersecurity Resilience, Enforced Circular Risk Management, Dependability, Hazard Analysis and mitigation or limitation, liability, A Clear Reporting Regime, Enforcement of Certification and Standards, Mandated Verification of Security and Continuous Servicing. To this, we suggest that the Act employs similar authorities and mechanisms as the GDPR, and create strong national authorities to coordinate inspection and enforcement in each Member State, with ENISA being the top and coordinating organ.
ORCID iDs
Rosager Ludvigsen, Kaspar ORCID: https://orcid.org/0000-0001-7243-2548 and Nagaraja, Shishir;-
-
Item type: Monograph(Other) ID code: 81107 Dates: DateEvent26 May 2022Published26 May 2022SubmittedSubjects: Law
Science > Mathematics > Electronic computers. Computer scienceDepartment: Faculty of Science > Computer and Information Sciences Depositing user: Pure Administrator Date deposited: 14 Jun 2022 13:50 Last modified: 15 Dec 2024 01:12 URI: https://strathprints.strath.ac.uk/id/eprint/81107