Budapest Post

Cum Deo pro Patria et Libertate
Budapest, Europe and world news

Four Takeaways From the New UK Cybersecurity Strategy

Four Takeaways From the New UK Cybersecurity Strategy

Two weeks ago, with much fanfare, the United Kingdom released a new strategy that sets out UK government’s approach to improving the country’s cybersecurity over the next five years.
It follows the UK’s previous effort dating back to 2011, and allocates £1.9 billion ($2.36 billion) over five years, doubling the previous investment of £860 million ($1 billion). This newest five year plan has the usual fare. It identifies the threats and vulnerabilities facing the UK, creates three pillars using alliteration (defend, deter and develop), and is filled with government-speak that could have been ripped from The Thick of It or Veep ("we need to invest in proofing ourselves against future threats").

The threats the UK identifies are not surprising. It singles out Russian-language organized cybercrime, state-sponsored threats, terrorist groups (although it caveats that terrorist groups are likely to prefer physical attacks over digital ones for the time being), hacktivists, and oddly, script kiddies. The strategy also points out the UK’s vulnerabilities, such as the proliferation of insecure internet of things devices, poor cyber hygiene, legacy and unpatched systems, and the availability of off-the-shelf hacking resources. These threats and vulnerabilities are not unique to the UK--every country connected to the internet faces identical or similar challenges.

There are four takeaways from the new strategy.

First, there seems to be an inherent tension between market incentives to spur better cybersecurity and regulation throughout the document. There’s a heavy emphasis placed on the importance of using a mix of intelligence sharing, incentives to spur the creation of cybersecurity products like certification schemes or incentives to create software that is "secure by default," and using the government as a test case for cybersecurity approaches with the hopes that they cascade into the private sector. However, the strategy recognizes that much of these same efforts were undertaken in the previous iteration of the strategy, with somewhat limited effect. The strategy leaves the door open to regulation but doesn’t elaborate on what that could look like. There’s also no mention of the EU network and information security directive, which the UK is still technically required to implement until it formally leaves the European Union.

Second, the strategy places heavy emphasis on taking "active cyber defense" measures to protect the UK. Generally, the term active cyber defense has been synonymous with hacking back, whereby companies and other non-government actors are allowed to retaliate in cyberspace and is controversial. In its strategy, that’s not what the UK is advocating. Instead, active cyber defense is defined as a series of technical measures, taken by government in cooperation with industry (mostly communications service providers), to make it "significantly harder to attack UK internet services and users." The technical measures include DNS filtering, coordinating botnet take-downs, DMARC and other methods to curtail phishing, man-in-the-middle attacks, and Border Gateway Protocol hijacks. If you’re technically-minded, you can read more about the UK active defense approach here.

Third, the UK, like many other countries, seems to be more open about resorting to the use of offensive cyber operations to protect and defend its interests. Five years ago, countries were loathe to openly talk about offensive cyber capabilities, with many only referencing defensive capabilities in what could be gleaned from official doctrine. Now, the UK is open about the need to invest in its National Offensive Cyber Program to ensure that UK capabilities "can be deployed at a time and place" of its choosing.

The strategy also makes clear that the UK will attribute state-sponsored cyber incidents publicly when "we judge it in the national interest to do so." Unlike the United States, Germany, Canada, South Korea, and others, the UK has yet to publicly accuse a state of being behind a specific cyber incident. Perhaps the new strategy signals that UK officials will be more open to naming and shaming as part of their cyber deterrence efforts.

Fourth the strategy makes explicit the UK’s desire to develop sovereign cryptographic capabilities, "developed in the UK, by British nationals." This raises a bunch of questions. Does the UK not trust crypto advocated by its other Five Eyes partners or in standardization bodies? Is it a response to the NSA’s alleged undermining of a widely used crypto standard that came to light as a result of Edward Snowden? Is the UK trying to stimulate the development of crypto that can be decrypted by law enforcement to fix the "going dark" problem?

As with any government strategy document, its implementation will determine its effectiveness. Much of the strategy rests on developing government capabilities with the hope that the UK private sector shamelessly pilfers the best ideas and approaches. Cybersecurity is probably one of the few areas where plagiarism is celebrated, not frowned upon.
AI Disclaimer: An advanced artificial intelligence (AI) system generated the content of this page on its own. This innovative technology conducts extensive research from a variety of reliable sources, performs rigorous fact-checking and verification, cleans up and balances biased or manipulated content, and presents a minimal factual summary that is just enough yet essential for you to function as an informed and educated citizen. Please keep in mind, however, that this system is an evolving technology, and as a result, the article may contain accidental inaccuracies or errors. We urge you to help us improve our site by reporting any inaccuracies you find using the "Contact Us" link at the bottom of this page. Your helpful feedback helps us improve our system and deliver more precise content. When you find an article of interest here, please look for the full and extensive coverage of this topic in traditional news sources, as they are written by professional journalists that we try to support, not replace. We appreciate your understanding and assistance.
Newsletter

Related Articles

0:00
0:00
Close
Emails Leaked: How Passenger Luggage Became a Side Income for Airport Workers
Polish MEP: “Dear Leftists - China is laughing at you, Russia is laughing, India is laughing”
Western Europe Records Hottest June on Record
BRICS Expands Membership with Indonesia and Ten New Partner Countries
Elon Musk Founds a Party Following a Poll on X: "You Wanted It – You Got It!"
China’s Central Bank Consults European Peers on Low-Rate Strategies
France Requests Airlines to Cut Flights at Paris Airports Amid Planned Air Traffic Controller Strike
Poland Implements Border Checks Amid Growing Migration Tensions
Emirates Airline Expands Market Share with New $20 Million Campaign
Amazon Reaches Milestone with Deployment of One Millionth Robot
Yulia Putintseva Calls for Spectator Ejection at Wimbledon Over Safety Concerns
House Oversight Committee Subpoenas Former Jill Biden Aide Amid Investigation into Alleged Concealment of President Biden's Cognitive Health
Amazon Reaches Major Automation Milestone with Over One Million Robots
Extreme Heat Wave Sweeps Across Europe, Hitting Record Temperatures
Meta Announces Formation of Ambitious AI Unit, Meta Superintelligence Labs
Robots Compete in Football Tournament in China Amid Injuries
China Unveils Miniature Insect-Like Surveillance Drone
Marc Marquez Claims Victory at Dutch Grand Prix Amidst Family Misfortune
Germany Votes to Suspend Family Reunification for Asylum Seekers
Budapest Pride Parade Draws 200,000 Participants Amid Government Ban
Southern Europe Experiences Extreme Heat
Xiaomi's YU7 SUV Launch Garners Record Pre-Orders Amid Market Challenges
Jeff Bezos and Lauren Sanchez's Lavish Wedding in Venice
Russia Launches Largest Air Assault on Ukraine Since Invasion
Massive Anti-Government Protests Erupt in Belgrade
Iran Executes Alleged Israeli Spies and Arrests Hundreds Amid Post-War Crackdown
Hungary's Prime Minister Criticizes NATO's Role in Ukraine
EU TO HUNGARY: LET THEM PRIDE OR PREP FOR SHADE. ORBÁN TO EU: STAY IN YOUR LANE AND FIX YOUR OWN MESS.
Hungarian Scientist to Conduct 30 Research Experiments on the International Space Station
NATO Members Agree to 5% Defense Spending Target by 2035
NATO Leaders Endorse Plan for Increased Defence Spending
U.S. Crude Oil Prices Drop Below $65 Amid Market Volatility
International Astronaut Team Launched to Space Station
Macron and Merz: Europe must arm itself in an unstable world
Germany and Italy Under Pressure to Repatriate $245bn of Gold from US Vaults
Iran Intensifies Crackdown on Alleged Mossad Operatives After Sabotage Claims
Trump Praises Iran’s ‘Very Weak’ Response After U.S. Strikes and Presses Israel to Pursue Peace
Oil Prices Set to Surge After US Strikes Iran
BA and Singapore Airlines Cancel Dubai Flights Amid Middle East Tensions
Trump Faces Backlash from MAGA Base Over Iran Strikes
Meta Bets $14 B on Alexandr Wang to Drive AI Ambitions
FedEx Founder Fred Smith, ‘Heart and Soul’ of the Company, Dies at 80
Chinese Factories Shift Away from U.S. Amid Trump‑Era Tariffs
Pimco Seizes Opportunity in Japan’s Dislocated Bond Market
Labubu Doll Drives Pop Mart to Status as China’s Most Valuable Toy Maker
Global Coal Demand Defies Paris Accord Goals
United States Conducts Precision Strikes on Iran’s Nuclear Sites
US strikes Iran nuclear sites, Trump says
Telegram Founder: I Will Leave My Fortune to Over 100 of My Children
16 Billion Login Credentials Leaked in Unprecedented Cybersecurity Breach
×