July 2015
Information & Security;2015, Vol. 33 Issue 1, p13
Academic Journal
The changing security environment has led to the development of comprehensive security approaches, strategies and policies. The 'Holistic approach' has become an academic and practical mantra. This paper argues, however, that comprehensive security approaches face serious obstacles to their practical implementation. The critical evaluation of several examples confirms that the implementation phase is a weakness of comprehensive approaches and that a truly comprehensive and holistic approach seems to be beyond the implemental capacities of our security systems. Multi-sectoral and multi-level comprehensive approaches become less comprehensive when implemented in practice or even cannot be implemented due to existing narrow perceptions of security or narrow and short-term interests. The trans-sectoral second-, third- and fourth-order effects of proposed security measures are hardly considered or not considered at all. There is no consensus on what exactly comprehensive means, while prioritisation of some areas in the national security policy leads to de-prioritisation of other areas and new vulnerabilities, inter-organisational and cross-sectoral cooperation faces serious limits, threat, risk and vulnerability assessments are not really comprehensive, etc. This paper finishes with recommendations on what to do about these serious limits on the implementation of comprehensive security.


Related Articles

  • Cyber plan's future bleak. Fisher, Dennis // eWeek;2/24/2003, Vol. 20 Issue 8, p1 

    Reports on problems within the U.S. federal government's security community that prohibits the implementation of the initiatives suggested by the National Strategy to Secure Cyberspace. Unlikely implementation in the overall state of network security due to the obstacles; Need for people with...

  • DEFENDING CYBERSPACE. Graves, Brad // San Diego Business Journal;3/19/2012, Vol. 33 Issue 12, p1 

    The article discusses the efforts in San Diego, California to defend its cyberspace from hackers, including the increase by San Diego State University and University of California (UC) San Diego of the area's computer security talent.

  • NEWS BRIEFS.  // SC Magazine: For IT Security Professionals (15476693);Feb2014, Vol. 25 Issue 2, p12 

    This section offers news briefs related to cyber security in the U.S. as of February 2014, including the announcement by retail company Target that it may have compromised around 40 million credit and debit card accounts due to cyber attack, and the findings by German researchers on the...

  • Over 2 mln Romanian IPs involved in cyber security incidents.  // Regional Today;3/12/2014, p2 

    The article reports on the data received by the Romanian National Computer Security Incident Response Team concerning cyber security alerts in 2013.

  • Cybersecurity Threat Grows. Investor's Business Daily // Investors Business Daily;12/31/2014, pA01 

    2 Attacks at

  • A critical problem.  // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2015, p5 

    An introduction is presented in which the editor discusses various reports within the issue on topics including the attacks on utilities and the threat of high-level attack on critical infrastructure, the keys to securing control systems or cyber-security, and the use of threat intelligence.

  • APCO speaker outlines potential PSAP cybersecurity strategies in heightened threat environment. Toone, Stephanie // Urgent Communications Exclusive Insight;11/19/2015, p1 

    The article offers public-safety answering points (PSAP) cybersecurity strategies.

  • ASSESSING COMPREHENSIVE SECURITY APPROACHES IN ACTION: AN INTRODUCTION. Sweijs, Tim; Jovanovic, Milos // Information & Security;2015, Vol. 33 Issue 1, p1 

    The article presents an introduction to the journal on assessing comprehensive security approach.

  • Reduce the risk of cybersecurity breach. Ireland, Ben; Coren, Benjamin // Travel Weekly (UK);5/23/2019, Issue 2476, p11 

    The article reports that Advantage Travel Partnership members were urged to beef up their cybersecurity to help reduce the risk of their websites being cloned or customers' data being stolen.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics