Skip to main content

Advertisement

Log in

European strategy and legislation for cybersecurity: implications for Portugal

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

“Cyber-attacks can be more dangerous than guns and tanks”. This statement was made by Junker in his speech in the EU “State of the Union” in 2017 and reflects the extreme importance of this phenomenon. The increasing variety of devices that can access to Internet has contributed to the overall growth of internet users, in all kinds of places and circumstances. These devices are now part of our lives and we use it for everything. As the number of devices and tasks that we do with it are growing, more prone we are to cyber-attacks. As well, as the number of user’s victim of these attacks are increasing, the general concerns about cybercrime are growing too. The growing list of cybercrimes includes crimes that have been made possible by computers, such as network intrusions and the dissemination of computer viruses, as well as computer-based variations of existing crimes, such as identity theft and terrorism which have become as major problem to people and nations. In this context, the European Union is leading the effort to regulate the defence against cyber-threats in both normative/legal and strategic levels. This reality is also very present in Portugal, where there is a sense of lack of control and capacity to combat this kind of threats. In this article, we present the European Strategy and Legislation for Cybersecurity and how this strategy applies and involves Portugal.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)

    Article  MathSciNet  Google Scholar 

  2. Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. Online (2005). https://doi.org/10.1109/MDSO.2005.53

    Article  Google Scholar 

  3. Comission, E.: Europeans attitudes towards cyber security. Special Eurobarometer 464a (2017)

  4. Commission, E.: Cyber security. Special Eurobarometer 423 (2015)

  5. Commission, E.: Cyber security. Special Eurobarometer 390 (2012)

  6. Barros, G., A Cibersegurança em Portugal. Gabinete de Estratégia e Estudos: Estudos Económicos (2018)

  7. Carvalho, J.V., et al.: Portuguese Concerns and Experience of Specific Cybercrimes: a Benchmarking with European Citizens. Micrads’19: Multidisciplinary International Conference of Research Applied to Defence and Security, Rio de Janeiro, Brazil (2019)

  8. ENISA. Enisa - Glossary. https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/risk-management-inventory/glossary#G51 (2019). Accessed 18 Mar 2019

  9. CPNI. Center for the Protection of National Infrastructure: Cyber. https://www.cpni.gov.uk/cyber (2019). Accessed 20 Oct 2019

  10. NCSS. National Cyber Security Strategy. Presidency of the Government, Spain (2013)

  11. Commission, E.: Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace (2013)

  12. European, C.: Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. European, Commission: Joint Communication to the European Parliament, the Council, The European Economic and social Committee and the Committee of the Regions (2013)

  13. Juncker, J.-C.: State of the Union 2017 (2017)

  14. GDPR. Regulation (EU) 2016/679 of the European Parliament and of the Council 2016, Official Journal of the European Union (2016)

  15. GDPR. Art. 99 GDPR: Entry into force and application 2016, Official Journal of the European Union (2016)

  16. EU. Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), 2015. Council of the European Union, Brussels (2015)

  17. Blackmer, W.S.: GDPR: Getting ready for the new EU General Data Protection Regulation. https://web.archive.org/web/20180514111300/https://www.infolawgroup.com/2016/05/articles/gdpr/gdpr-getting-ready-for-the-new-eu-general-data-protection-regulation/ (2016). Accessed Apr 2019

  18. ENISA. ENISA - European Union Agency for Network and Information Security European Union. https://www.enisa.europa.eu (2019). Accessed Apr 2019

  19. DR. Diário da República, 1.ª série — N.º 155 — 13 de agosto de 2018. https://dre.pt/application/conteudo/116029384 (2018). Accessed Apr 2018

  20. WISER. WISER Cartography: EU National Strategies. https://cyberwiser.eu/cartography (2019). Accessed Apr 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to João Vidal Carvalho.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Carvalho, J.V., Carvalho, S. & Rocha, Á. European strategy and legislation for cybersecurity: implications for Portugal. Cluster Comput 23, 1845–1854 (2020). https://doi.org/10.1007/s10586-020-03052-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-020-03052-y

Keywords

Navigation