{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:38:40Z","timestamp":1768423120573,"version":"3.49.0"},"reference-count":27,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.<\/p>","DOI":"10.4018\/ijcwt.2013070101","type":"journal-article","created":{"date-parts":[[2014,3,31]],"date-time":"2014-03-31T18:09:19Z","timestamp":1396289359000},"page":"1-18","source":"Crossref","is-referenced-by-count":8,"title":["The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies"],"prefix":"10.4018","volume":"3","author":[{"given":"Martti","family":"Lehto","sequence":"first","affiliation":[{"name":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"}]}],"member":"2432","reference":[{"key":"ijcwt.2013070101-0","unstructured":"Ashenden, D. (2011). Cyber security: Time for engagement and debate. In Proceedings of the 10th ECIW Conference, Tallinn, Estonia (pp. 15)."},{"key":"ijcwt.2013070101-1","unstructured":"Australian cyber security strategy. (2009)."},{"key":"ijcwt.2013070101-2","unstructured":"Beggs, C. (2006). Proposed risk minimization measures for cyber-terrorism and SCADA networks in Australia. In Proceedings of the 5th ECIW Conference, Helsinki, Finland (pp. 9-18)."},{"key":"ijcwt.2013070101-3","unstructured":"Canada\u2019s cyber security strategy. (2010)."},{"key":"ijcwt.2013070101-4","unstructured":"Czech Republic Cyber Security Strategy. (2011). DCSINT handbook No. 1.02: Cyber operations and cyber terrorism. (2005)."},{"key":"ijcwt.2013070101-5","author":"M.Dunn Cavelty","year":"2010","journal-title":"The reality and future of cyber war"},{"key":"ijcwt.2013070101-6","unstructured":"ENISA. (2012a). National cyber security strategies. Practical guide on development and execution."},{"key":"ijcwt.2013070101-7","unstructured":"ENISA. (2012b). Threat landscape, responding to the evolving threat environment."},{"key":"ijcwt.2013070101-8","unstructured":"Estonia cyber security strategy. (2008)."},{"key":"ijcwt.2013070101-9","unstructured":"Finland\u00b4s cyber security strategy. (2013)."},{"key":"ijcwt.2013070101-10","unstructured":"Germany cyber security strategy. (2011)."},{"key":"ijcwt.2013070101-11","author":"W.Gibson","year":"1984","journal-title":"Neuromancer"},{"key":"ijcwt.2013070101-12","unstructured":"Grobler, M., van Vuuren, J. J., & Zaaiman, J. (n.d.). Evaluating cyber security awareness in South Africa. In Proceedings of the 10th ECIW Conference, Tallinn, Estonia (pp. 114-115)."},{"key":"ijcwt.2013070101-13","unstructured":"Internet Security Glossary (RFC 2828). (2000)."},{"key":"ijcwt.2013070101-14","first-page":"2005","volume":"15408","year":"2005","journal-title":"IEC"},{"key":"ijcwt.2013070101-15","year":"2011","journal-title":"ITU national cybersecurity strategy guide"},{"key":"ijcwt.2013070101-16","unstructured":"Kiravuo, T., S\u00e4rel\u00e4, M. J. M. J. (2013). Aalto-yliopisto, Kybersodan taistelukent\u00e4t, Sotilasaikakauslehti 3\/2013."},{"key":"ijcwt.2013070101-17","doi-asserted-by":"crossref","unstructured":"Kuusisto, R. (2012). KYBER \u2013 miten se voitaisiinkaan m\u00e4\u00e4ritell\u00e4? lecture 10.10.2012. Helsinki.","DOI":"10.1155\/2012\/351879"},{"key":"ijcwt.2013070101-18","unstructured":"Liaropoulos, A. (2010). War and ethics in cyberspace: Cyber-conflict and just war theory. In Proceedings of the 9th ECIW Conference, Thessaloniki, Greece (pp. 177-182)."},{"key":"ijcwt.2013070101-19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804250"},{"key":"ijcwt.2013070101-20","unstructured":"NATO CCD COE. (2012). National cyber security framework manual."},{"key":"ijcwt.2013070101-21","author":"A.Porter","year":"1969","journal-title":"Cybernetics simplified"},{"key":"ijcwt.2013070101-22","unstructured":"Rain, O. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In Proceedings of the 7th European Conference on Information Warfare and Security, University of Plymouth, UK."},{"key":"ijcwt.2013070101-23","unstructured":"St\u00e5hle, P. (2004). Itseuudistumisen dynamiikka - systeemiajattelu kehitysprosessien ymm\u00e4rt\u00e4misen perustana, verkkodokumentti."},{"key":"ijcwt.2013070101-24","doi-asserted-by":"crossref","unstructured":"The National cyber security strategy. (2011). Netherlands.","DOI":"10.1016\/S1361-3723(11)70119-1"},{"key":"ijcwt.2013070101-25","doi-asserted-by":"crossref","unstructured":"The national strategy to secure cyberspace. (2003). United States of America. UK cyber security strategy. (2011).","DOI":"10.1016\/S1361-3723(11)70119-1"},{"key":"ijcwt.2013070101-26","unstructured":"US Joint Publication 3-13 (Information Operations 2012). (2012)."}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=104520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:00:41Z","timestamp":1654113641000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013070101","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}