Image
Locks Imposed On Motherboard

The Czech Republic responds to growing threats.

Reducing Risk

January 2018, Number 09.01

“Damage to the Czech Republic’s critical information infrastructure (CII) has the potential to impact national security by affecting basic living conditions, people’s health or the state’s economy. The country’s National Cyber Security Strategy for 2015-2020, its Security Information Service’s 2015 Annual Report, and the National Security Audit all identify fundamental threats in this area. As revealed in these documents, cyber espionage is a serious CII threat. However, it is not the only threat. Unverified and unsecured hardware and software supply chains, ransomware and cyber terrorism also pose significant dangers.

CYBER ESPIONAGE
Cyber espionage seeks to obtain strategically sensitive or important information from individuals or organizations by using or targeting a means of communication. Cyber spies can gain political, economic or military advantage, posing a considerable threat to national security.

According to the Czech Republic's Security Information Service’s 2015 report, the country faced major cyber espionage threats from Russia and China.That year a Russian cyber espionage campaign targeted two Czech ministries. Those two countries are not new to cyber espionage
and their campaigns also target CII. In this area, for example, advanced nanotechnology
research in the Czech Republic — a field for which the country is recognized — could become a target...”

Excerpt from Veronika Netolická and Martin Konečný, “Reducing Risks,” per Concordiam: Journal of European Security Defense Issues 9, No. 1, 2018: 30-35.

Veronika Netolická, a graduate of PCSS 20-02, serves as the Head, National Strategy & Policy Unit Czech Republic National Cyber and Information Security Agency

Martin Konečný is an analyst in the National Cyber and Information Security Agency of the Czech Republic, where he is responsible for the Department of Regulation and Audits. He received his master’s degree from Brno University of Technology. His expertise is in information security management systems.

This article reflects the views of the author and are not necessarily the official policy of the United States, Germany, or any other governments.