SlideShare a Scribd company logo
INTERNATIONAL STRATEGY FOR CYBERSPACE
                   Prosperity, Security, and Openness in a Networked World


    The U.S. International Strategy for Cyberspace outlines our vision for the future of
 cyberspace, and sets an agenda for partnering with other nations and peoples to realize it.


We live in a rare historical moment with an opportunity to build on cyberspace’s successes and
help secure its future—for the United States, and the global community.

Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research
communities, strong militaries, transparent governments, and free societies. The reach of networked
technology is pervasive and global. To realize fully the benefits that networked technology promises
the world, these systems must function reliably and securely. Assuring the free flow of information,
the security and privacy of data, and the integrity of the interconnected networks themselves are all
essential to American and global economic prosperity, security, and the promotion of universal rights.


                                      Strategic Approach
The United States’ approach to international cyberspace issues is founded on the belief that
networked technologies hold immense potential for our Nation, and for the world. The United
States will pursue an international cyberspace policy that stokes the innovation that drives our
economy and improves lives here and abroad.

Our strategic approach builds on successes, recognizes the challenges to our national and economic
security, and is always grounded by our unshakable commitments to fundamental freedoms of
expression and association, privacy, and the free flow of information.


                                     The Future We Seek
The cyberspace environment that we seek rewards innovation and empowers entrepreneurs; it
connects individuals and strengthens communities; it builds better governments and expands
accountability; it safeguards fundamental freedoms and enhances personal privacy; it builds
understanding, clarifies norms of behavior, and enhances national and international security. This
cyberspace is defined by four key characteristics:
   • Open to innovation                                • Secure enough to earn people’s trust
   • Interoperable the world over                      • Reliable enough to support their work

To realize this vision, we will build and sustain an environment in which norms of responsible
behavior guide states’ actions, sustain partnerships, and support the rule of law. These norms
include:
    • Upholding Fundamental Freedoms                     • Global Interoperability
    • Respect for Property                               • Network Stability
    • Valuing Privacy                                    • Reliable Access
    • Protection from Crime                              • Multi-stakeholder Governance
    • Right of Self-Defense                              • Cybersecurity Due Diligence
INTERNATIONAL STRATEGY FOR CYBERSPACE




   To realize this future, the United States will combine diplomacy, defense, and development to
     enhance prosperity, security, and openness so all can benefit from networked technology.


Diplomacy: Strengthening Partnerships
The United States will work to create incentives for, and build consensus around, an international
environment in which states – recognizing the intrinsic value of an open, interoperable, secure, and
reliable cyberspace – work together and act as responsible stakeholders. Through our international
relationships and affiliations, we will seek to ensure that as many stakeholders as possible are
included in this vision of cyberspace precisely because of its economic, social, political, and security
benefits.

Distributed systems require unified action because no single institution, document, arrangement, or
instrument could suffice in addressing the needs of our networked world. From end-users, private-
sector hardware and software vendors, and Internet service providers, to regional, multilateral, and
multi-stakeholder organizations – all are important in helping cyberspace meet its full potential.

Defense: Dissuading and Deterring
The United States will, along with other nations, encourage responsible behavior and oppose those
who would seek to disrupt networks and systems, thereby dissuading and deterring malicious actors,
while reserving the right to defend these vital national assets as necessary and appropriate. The
United States will continue to strengthen our network defenses and our ability to withstand and
recover from disruptions and other attacks. For those more sophisticated attacks that do create
damage, we will act on well-developed response plans to isolate and mitigate disruption to our
machines, limiting effects on our networks, and potential cascade effects beyond them.


When warranted, the United States will respond to hostile acts in cyberspace as we would to any other
threat to our country. We reserve the right to use all necessary means – diplomatic, informational,
military, and economic – as appropriate and consistent with applicable international law, in order to
defend our Nation, our allies, our partners, and our interests. In so doing, we will exhaust all options
before military force whenever we can; will carefully weigh the costs and risks of action against the
costs of inaction; and will act in a way that reflects our values and strengthens our legitimacy, seeking
broad international support whenever possible.

Development: Building Prosperity and Security
We believe the benefits of a connected world are universal. The virtues of an open, interoperable,
secure, and reliable cyberspace should be more available than they are today, and as the world’s
leading information economy, the United States is committed to ensuring others benefit from our
technical resources and expertise.

Our Nation can and will play an active role in providing the knowledge and capacity to build and
secure new and existing digital systems. The United States’ capacity-building assistance is envisioned
as an investment, a commitment, and an important opportunity for dialogue and partnership. As
countries develop a stake in cyberspace issues, we intend our dialogues to mature from capacity-
building to active economic, technical, law enforcement, defense and diplomatic collaboration on
issues of mutual concern.
INTERNATIONAL STRATEGY FOR CYBERSPACE




                                           Policy Priorities

This strategy is an invitation to other states and peoples to join us in realizing this vision of prosperity,
security, and openness in our networked world. It is a call to the private sector, civil society, and end-
users to reinforce these efforts through partnership, awareness, and action. It is also a roadmap
allowing the United States Government’s departments and agencies to better define and coordinate
their role in our international cyberspace policy, to execute a specific way forward, and to plan for
future implementation.


  The United States Government organizes its activities across seven interdependent areas of activity,
   each demanding collaboration within our government, with international partners, and with the
       private sector. Taken as a whole, they form the action lines of our strategic framework.


Economy: Promoting International Standards and Innovative, Open Markets
To ensure that cyberspace continues to serve the needs of our economies and innovators, we will:
    • Sustain a free-trade environment that encourages technological innovation on accessible,
        globally linked networks.
    • Protect intellectual property, including commercial trade secrets, from theft.
    • Ensure the primacy of interoperable and secure technical standards, determined by technical
        experts.


Protecting Our Networks: Enhancing Security, Reliability, and Resiliency
Because strong cybersecurity is critical to national and economic security in the broadest sense, we will:
    • Promote cyberspace cooperation, particularly on norms of behavior for states and
        cybersecurity, bilaterally and in a range of multilateral organizations and multinational
        partnerships.
    • Reduce intrusions into and disruptions of U.S. networks.
    • Ensure robust incident management, resiliency, and recovery capabilities for information
        infrastructure.
    • Improve the security of the high-tech supply chain, in consultation with industry.


Law Enforcement: Extending Collaboration and the Rule of Law
To enhance confidence in cyberspace and pursue those who would exploit online systems, we will:
    • Participate fully in international cybercrime policy development.
    • Harmonize cybercrime laws internationally by expanding accession to the Budapest
        Convention.
    • Focus cybercrime laws on combating illegal activities, not restricting access to the Internet.
    • Deny terrorists and other criminals the ability to exploit the Internet for operational planning,
        financing, or attacks.
INTERNATIONAL STRATEGY FOR CYBERSPACE



Military: Preparing for 21st Century Security Challenges
Since our commitment to defend our citizens, allies, and interests extends to wherever they might be threatened,
we will:
    • Recognize and adapt to the military’s increasing need for reliable and secure networks.
    • Build and enhance existing military alliances to confront potential threats in cyberspace.
    • Expand cyberspace cooperation with allies and partners to increase collective security.


Internet Governance: Promoting Effective and Inclusive Structures
To promote Internet governance structures that effectively serve the needs of all Internet users, we will:
    • Prioritize openness and innovation on the Internet.
    • Preserve global network security and stability, including the domain name system (DNS).
    • Promote and enhance multi-stakeholder venues for the discussion of Internet Governance
       issues.


International Development: Building Capacity, Security, and Prosperity
To promote the benefits of networked technology globally, enhance the reliability of our shared networks, and
build the community of responsible stakeholders in cyberspace, we will:
    • Provide the necessary knowledge, training, and other resources to countries seeking to build
         technical and cybersecurity capacity.
    • Continually develop and regularly share international cybersecurity best practices.
    • Enhance states’ ability to fight cybercrime – including training for law enforcement, forensic
         specialists, jurists, and legislators.
    • Develop relationships with policymakers to enhance technical capacity building, providing
         regular and ongoing contact with experts and their United States Government counterparts.


Internet Freedom: Supporting Fundamental Freedoms and Privacy
To help secure fundamental freedoms as well as privacy in cyberspace, we will:
    • Support civil society actors in achieving reliable, secure, and safe platforms for freedoms of
         expression and association.
    • Collaborate with civil society and nongovernment organizations to establish safeguards
         protecting their Internet activity from unlawful digital intrusions.
    • Encourage international cooperation for effective commercial data privacy protections.
    • Ensure the end-to-end interoperability of an Internet accessible to all.


These ideals are central to preserving the cyberspace we know, and to creating, together, the future
we seek.

More Related Content

What's hot

CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter
Doug DePeppe, Esq.
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
Dominic Karunesudas
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
Department of Defense
 

What's hot (20)

CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - Congress
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
 
Beyond Boundaries: East Africa
Beyond Boundaries: East AfricaBeyond Boundaries: East Africa
Beyond Boundaries: East Africa
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
Welcome Address by Director General of Informatic Application Ministry of Com...
Welcome Address by Director General of Informatic Application Ministry of Com...Welcome Address by Director General of Informatic Application Ministry of Com...
Welcome Address by Director General of Informatic Application Ministry of Com...
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency Management
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
R41674
R41674R41674
R41674
 

Viewers also liked

Viewers also liked (9)

Synopsis reverby 'normal exposure'
Synopsis reverby 'normal exposure'Synopsis reverby 'normal exposure'
Synopsis reverby 'normal exposure'
 
Kebab composition
Kebab compositionKebab composition
Kebab composition
 
World press freedom index 2010
World press freedom index 2010World press freedom index 2010
World press freedom index 2010
 
Clowning around charity
Clowning around charityClowning around charity
Clowning around charity
 
Helen caldicott
Helen caldicottHelen caldicott
Helen caldicott
 
Fao 2011
Fao 2011Fao 2011
Fao 2011
 
Anonplus project plan
Anonplus project planAnonplus project plan
Anonplus project plan
 
Lista partecipanti
Lista partecipantiLista partecipanti
Lista partecipanti
 
Peter Lindemann
Peter LindemannPeter Lindemann
Peter Lindemann
 

Similar to International strategy cyberspace_factsheet

CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
segughana
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
Petar Radanliev
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
jasonuchiha2
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 

Similar to International strategy cyberspace_factsheet (20)

CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 
Corporate Social Responsibility microsoft
Corporate Social Responsibility microsoftCorporate Social Responsibility microsoft
Corporate Social Responsibility microsoft
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS OverviewCentre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Why Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdfWhy Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdf
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User Trust
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
Cyber Diplomacy
Cyber DiplomacyCyber Diplomacy
Cyber Diplomacy
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
2014 04 24 NetMundial Multistakeholder Statement
2014 04 24 NetMundial Multistakeholder Statement2014 04 24 NetMundial Multistakeholder Statement
2014 04 24 NetMundial Multistakeholder Statement
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
D20110714cyber
D20110714cyberD20110714cyber
D20110714cyber
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 

More from bueno buono good

Complete patents nikola_tesla
Complete patents nikola_teslaComplete patents nikola_tesla
Complete patents nikola_tesla
bueno buono good
 
Wikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapterWikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapter
bueno buono good
 

More from bueno buono good (20)

Privacy facebook 2015
Privacy facebook 2015Privacy facebook 2015
Privacy facebook 2015
 
LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014
 
Inceneration and health
Inceneration and healthInceneration and health
Inceneration and health
 
Informe del Relator Especial sobre los derechos de los pueblos indígenas, Ja...
Informe del Relator Especial sobre los derechos de los  pueblos indígenas, Ja...Informe del Relator Especial sobre los derechos de los  pueblos indígenas, Ja...
Informe del Relator Especial sobre los derechos de los pueblos indígenas, Ja...
 
Galline libere guida
Galline libere guidaGalline libere guida
Galline libere guida
 
Water resourcers group
Water resourcers groupWater resourcers group
Water resourcers group
 
NkpPS
NkpPSNkpPS
NkpPS
 
Tesla confid
Tesla confidTesla confid
Tesla confid
 
Complete patents nikola_tesla
Complete patents nikola_teslaComplete patents nikola_tesla
Complete patents nikola_tesla
 
Global energy transmittion tesla tower 2014
Global energy transmittion tesla tower 2014Global energy transmittion tesla tower 2014
Global energy transmittion tesla tower 2014
 
Wikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapterWikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapter
 
Ttip draft
Ttip draftTtip draft
Ttip draft
 
2013 cpi brochure_en
2013 cpi brochure_en2013 cpi brochure_en
2013 cpi brochure_en
 
Farmaci coinvolti traffici_illegali_14.08.2014
Farmaci coinvolti traffici_illegali_14.08.2014Farmaci coinvolti traffici_illegali_14.08.2014
Farmaci coinvolti traffici_illegali_14.08.2014
 
Country reports on_terrorism_2013-7
Country reports on_terrorism_2013-7Country reports on_terrorism_2013-7
Country reports on_terrorism_2013-7
 
Doc 10502 290_en
Doc 10502 290_enDoc 10502 290_en
Doc 10502 290_en
 
Sipri yearbook 2013
Sipri yearbook 2013Sipri yearbook 2013
Sipri yearbook 2013
 
Bohemian grove-members-list 2010
Bohemian grove-members-list 2010Bohemian grove-members-list 2010
Bohemian grove-members-list 2010
 
Bohemian grove-and-other-retreats1
Bohemian grove-and-other-retreats1Bohemian grove-and-other-retreats1
Bohemian grove-and-other-retreats1
 
Cremation of care traduzione italiano
Cremation of care traduzione italianoCremation of care traduzione italiano
Cremation of care traduzione italiano
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 

International strategy cyberspace_factsheet

  • 1. INTERNATIONAL STRATEGY FOR CYBERSPACE Prosperity, Security, and Openness in a Networked World The U.S. International Strategy for Cyberspace outlines our vision for the future of cyberspace, and sets an agenda for partnering with other nations and peoples to realize it. We live in a rare historical moment with an opportunity to build on cyberspace’s successes and help secure its future—for the United States, and the global community. Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies. The reach of networked technology is pervasive and global. To realize fully the benefits that networked technology promises the world, these systems must function reliably and securely. Assuring the free flow of information, the security and privacy of data, and the integrity of the interconnected networks themselves are all essential to American and global economic prosperity, security, and the promotion of universal rights. Strategic Approach The United States’ approach to international cyberspace issues is founded on the belief that networked technologies hold immense potential for our Nation, and for the world. The United States will pursue an international cyberspace policy that stokes the innovation that drives our economy and improves lives here and abroad. Our strategic approach builds on successes, recognizes the challenges to our national and economic security, and is always grounded by our unshakable commitments to fundamental freedoms of expression and association, privacy, and the free flow of information. The Future We Seek The cyberspace environment that we seek rewards innovation and empowers entrepreneurs; it connects individuals and strengthens communities; it builds better governments and expands accountability; it safeguards fundamental freedoms and enhances personal privacy; it builds understanding, clarifies norms of behavior, and enhances national and international security. This cyberspace is defined by four key characteristics: • Open to innovation • Secure enough to earn people’s trust • Interoperable the world over • Reliable enough to support their work To realize this vision, we will build and sustain an environment in which norms of responsible behavior guide states’ actions, sustain partnerships, and support the rule of law. These norms include: • Upholding Fundamental Freedoms • Global Interoperability • Respect for Property • Network Stability • Valuing Privacy • Reliable Access • Protection from Crime • Multi-stakeholder Governance • Right of Self-Defense • Cybersecurity Due Diligence
  • 2. INTERNATIONAL STRATEGY FOR CYBERSPACE To realize this future, the United States will combine diplomacy, defense, and development to enhance prosperity, security, and openness so all can benefit from networked technology. Diplomacy: Strengthening Partnerships The United States will work to create incentives for, and build consensus around, an international environment in which states – recognizing the intrinsic value of an open, interoperable, secure, and reliable cyberspace – work together and act as responsible stakeholders. Through our international relationships and affiliations, we will seek to ensure that as many stakeholders as possible are included in this vision of cyberspace precisely because of its economic, social, political, and security benefits. Distributed systems require unified action because no single institution, document, arrangement, or instrument could suffice in addressing the needs of our networked world. From end-users, private- sector hardware and software vendors, and Internet service providers, to regional, multilateral, and multi-stakeholder organizations – all are important in helping cyberspace meet its full potential. Defense: Dissuading and Deterring The United States will, along with other nations, encourage responsible behavior and oppose those who would seek to disrupt networks and systems, thereby dissuading and deterring malicious actors, while reserving the right to defend these vital national assets as necessary and appropriate. The United States will continue to strengthen our network defenses and our ability to withstand and recover from disruptions and other attacks. For those more sophisticated attacks that do create damage, we will act on well-developed response plans to isolate and mitigate disruption to our machines, limiting effects on our networks, and potential cascade effects beyond them. When warranted, the United States will respond to hostile acts in cyberspace as we would to any other threat to our country. We reserve the right to use all necessary means – diplomatic, informational, military, and economic – as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests. In so doing, we will exhaust all options before military force whenever we can; will carefully weigh the costs and risks of action against the costs of inaction; and will act in a way that reflects our values and strengthens our legitimacy, seeking broad international support whenever possible. Development: Building Prosperity and Security We believe the benefits of a connected world are universal. The virtues of an open, interoperable, secure, and reliable cyberspace should be more available than they are today, and as the world’s leading information economy, the United States is committed to ensuring others benefit from our technical resources and expertise. Our Nation can and will play an active role in providing the knowledge and capacity to build and secure new and existing digital systems. The United States’ capacity-building assistance is envisioned as an investment, a commitment, and an important opportunity for dialogue and partnership. As countries develop a stake in cyberspace issues, we intend our dialogues to mature from capacity- building to active economic, technical, law enforcement, defense and diplomatic collaboration on issues of mutual concern.
  • 3. INTERNATIONAL STRATEGY FOR CYBERSPACE Policy Priorities This strategy is an invitation to other states and peoples to join us in realizing this vision of prosperity, security, and openness in our networked world. It is a call to the private sector, civil society, and end- users to reinforce these efforts through partnership, awareness, and action. It is also a roadmap allowing the United States Government’s departments and agencies to better define and coordinate their role in our international cyberspace policy, to execute a specific way forward, and to plan for future implementation. The United States Government organizes its activities across seven interdependent areas of activity, each demanding collaboration within our government, with international partners, and with the private sector. Taken as a whole, they form the action lines of our strategic framework. Economy: Promoting International Standards and Innovative, Open Markets To ensure that cyberspace continues to serve the needs of our economies and innovators, we will: • Sustain a free-trade environment that encourages technological innovation on accessible, globally linked networks. • Protect intellectual property, including commercial trade secrets, from theft. • Ensure the primacy of interoperable and secure technical standards, determined by technical experts. Protecting Our Networks: Enhancing Security, Reliability, and Resiliency Because strong cybersecurity is critical to national and economic security in the broadest sense, we will: • Promote cyberspace cooperation, particularly on norms of behavior for states and cybersecurity, bilaterally and in a range of multilateral organizations and multinational partnerships. • Reduce intrusions into and disruptions of U.S. networks. • Ensure robust incident management, resiliency, and recovery capabilities for information infrastructure. • Improve the security of the high-tech supply chain, in consultation with industry. Law Enforcement: Extending Collaboration and the Rule of Law To enhance confidence in cyberspace and pursue those who would exploit online systems, we will: • Participate fully in international cybercrime policy development. • Harmonize cybercrime laws internationally by expanding accession to the Budapest Convention. • Focus cybercrime laws on combating illegal activities, not restricting access to the Internet. • Deny terrorists and other criminals the ability to exploit the Internet for operational planning, financing, or attacks.
  • 4. INTERNATIONAL STRATEGY FOR CYBERSPACE Military: Preparing for 21st Century Security Challenges Since our commitment to defend our citizens, allies, and interests extends to wherever they might be threatened, we will: • Recognize and adapt to the military’s increasing need for reliable and secure networks. • Build and enhance existing military alliances to confront potential threats in cyberspace. • Expand cyberspace cooperation with allies and partners to increase collective security. Internet Governance: Promoting Effective and Inclusive Structures To promote Internet governance structures that effectively serve the needs of all Internet users, we will: • Prioritize openness and innovation on the Internet. • Preserve global network security and stability, including the domain name system (DNS). • Promote and enhance multi-stakeholder venues for the discussion of Internet Governance issues. International Development: Building Capacity, Security, and Prosperity To promote the benefits of networked technology globally, enhance the reliability of our shared networks, and build the community of responsible stakeholders in cyberspace, we will: • Provide the necessary knowledge, training, and other resources to countries seeking to build technical and cybersecurity capacity. • Continually develop and regularly share international cybersecurity best practices. • Enhance states’ ability to fight cybercrime – including training for law enforcement, forensic specialists, jurists, and legislators. • Develop relationships with policymakers to enhance technical capacity building, providing regular and ongoing contact with experts and their United States Government counterparts. Internet Freedom: Supporting Fundamental Freedoms and Privacy To help secure fundamental freedoms as well as privacy in cyberspace, we will: • Support civil society actors in achieving reliable, secure, and safe platforms for freedoms of expression and association. • Collaborate with civil society and nongovernment organizations to establish safeguards protecting their Internet activity from unlawful digital intrusions. • Encourage international cooperation for effective commercial data privacy protections. • Ensure the end-to-end interoperability of an Internet accessible to all. These ideals are central to preserving the cyberspace we know, and to creating, together, the future we seek.