Skip main navigation

International Cyber Security Policy

Let us now consider the policy perspective of international cyber security. There are key policy documents on cyber security for different countries on a national level.
© Coventry University. CC BY-NC 4.0

Let us now consider the policy perspective of international cyber security.

There are key policy documents on cyber security for different countries on a national level.

Girl in white shirt reading many textbooks on table with many high stacking

The cyber security policy making report by the OECD (2012) provides a table of the key policy documents for numerous countries (see pages 66–70).

International Cyber Security Policies

There are also intergovernmental agreements to tackle cyber war. Two examples are given below.

North Atlantic Treaty Organization

As Choucri, Madnick, and Ferwerda (2014) analyse, a key initiative has been demonstrated by NATO. Given the coordinated cyber attacks against Estonia (a NATO member) in 2007, NATO established a response. The Cooperative Cyber Defence Centre of Excellence (CCDCOE) is responsible for training NATO member states, conducting attack exercises, and supporting NATO in the event of an international cyber attack (Choucri, Madnick, and Ferwerda 2014).

However, not all NATO states have joined the CCDCOE program. There is no strong evidence that all members of NATO want to engage in a mutual approach to cyber security, perhaps because they are developing their own strategies for cyber warfare (Choucri, Madnick, and Ferwerda 2014).

European Network and Information Security Agency

Although the EU has published numerous resolutions on cyber crime, and the European Police Office (EUROPOL) is involved in investigations, the EU has created the European Network and Information Security Agency (ENISA) ‘to enhance the capability of the European Union … to prevent, address and respond to network and information security problems’ (Europa 2009 cited in Choucri, Madnick, and Ferwerda 2014).

Your task

Read pages 66–70 of the 2012 OECD report, which outline the key policy documents and cyber security strategies.
Browse the legislation on cyber security in your own country. Focus on the strengths and weaknesses of such legislation.
Having looked at the different types of legislation, which do you consider to be the most effective and why?


Choucri, N., Madnick, S., and Ferwerda, J. (2014) ‘Institutions for Cyber Security: International Responses and Global Imperatives’. Information Technology for Development 20 (2), 96-121

OECD (2012) Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies [online] available from [5 September 2019]

© Coventry University. CC BY-NC 4.0
This article is from the free online

Introduction to Network Security and Defence

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education