Professional Documents
Culture Documents
STRATEGY 2016-2021
Contents
FOREWORD ...................................................................................................6
PREFACE........................................................................................................7
2 INTRODUCTION ..........................................................................................12
3 STRATEGIC CONTEXT................................................................................16
Threats ..........................................................................................................17
Terrorists ..................................................................................................19
Hacktivists................................................................................................19
Vulnerabilities ................................................................................................22
Conclusions...................................................................................................23
Principles.......................................................................................................25
Individuals ................................................................................................26
Government..............................................................................................26
5 DEFEND........................................................................................................32
5.4. Protecting our critical national infrastructure and other priority sectors....39
6 DETER ..........................................................................................................46
7 DEVELOP......................................................................................................54
9 METRICS ......................................................................................................66
Annex 2: Glossary........................................................................................74
FOREWORD
FOREWORD
The UK is one of the worlds leading The new National Cyber Security Centre will
digital nations. Much of our prosperity provide a hub of world-class, user-friendly
now depends on our ability to secure our expertise for businesses and individuals, as
technology, data and networks from the well as rapid response to major incidents.
many threats we face.
Government has a clear leadership role,
Yet cyber attacks are growing more but we will also foster a wider commercial
frequent, sophisticated and damaging when ecosystem, recognising where industry
they succeed. So we are taking decisive can innovate faster than us. This includes
action to protect both our economy and the a drive to get the best young minds into
privacy of UK citizens. cyber security.
Our National Cyber Security Strategy sets out The cyber threat impacts the whole of our
our plan to make Britain confident, capable society, so we want to make very clear
and resilient in a fast-moving digital world. that everyone has a part to play in our
national response. Its why this strategy is
Over the lifetime of this five-year strategy, an unprecedented exercise in transparency.
we will invest 1.9 billion in defending We can no longer afford to have this
our systems and infrastructure, deterring discussion behind closed doors.
our adversaries, and developing a whole-
society capability from the biggest Ultimately, this is a threat that cannot be
companies to the individual citizen. completely eliminated. Digital technology
works because it is open, and that
From the most basic cyber hygiene, to the openness brings with it risk. What we
most sophisticated deterrence, we need a can do is reduce the threat to a level that
comprehensive response. ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach The Rt Hon Philip Hammond MP,
into every profession. Chancellor of the Exchequer
PREFACE
PREFACE
Our primary responsibility is to keep As Minister for the Cabinet Office with
the nation safe and deliver competent responsibility for cyber security and
government. This strategy reflects these government security, I am determined
duties. It is a bold and ambitious approach to to see this strategy implemented in full.
tackling the many threats our country faces in I will work closely with colleagues across
cyberspace. Managing and mitigating those Government and with partners in the
threats is a task for us all but the Government Devolved Administrations, the wider public
recognises its special responsibility to lead sector, industry and academia to ensure we
the national effort required. achieve that ambition.
Section 1
EXECUTIVE SUMMARY
1. EXECUTIVE
SUMMARY
Section 1
EXECUTIVE SUMMARY
1.1. The future of the UKs security and DETER The UK will be a
prosperity rests on digital foundations. hard target for all forms of
The challenge of our generation is to build aggression in cyberspace.
a flourishing digital society that is both We detect, understand,
resilient to cyber threats, and equipped with investigate and disrupt
the knowledge and capabilities required to hostile action taken against us,
maximise opportunities and manage risks. pursuing and prosecuting offenders.
We have the means to take offensive
1.2. We are critically dependent on the action in cyberspace, should we
Internet. However, it is inherently insecure choose to do so.
and there will always be attempts to exploit
weaknesses to launch cyber attacks. This DEVELOP We have
threat cannot be eliminated completely, but an innovative, growing
the risk can be greatly reduced to a level cyber security industry,
that allows society to continue to prosper, underpinned by world-
and benefit from the huge opportunities leading scientific
that digital technology brings. research and development. We have
a self-sustaining pipeline of talent
1.3. The 2011 National Cyber Security providing the skills to meet our national
Strategy, underpinned by the British needs across the public and private
Governments 860m National Cyber sectors. Our cutting-edge analysis
Security Programme, has delivered and expertise will enable the UK to
substantial improvements to UK cyber meet and overcome future threats
security. It achieved important outcomes and challenges.
by looking to the market to drive secure
cyber behaviours. But this approach has 1.6. Underpinning these objectives, we
not achieved the scale and pace of change will pursue INTERNATIONAL ACTION
required to stay ahead of the fast moving and exert our influence by investing in
threat. We now need to go further. partnerships that shape the global evolution
of cyberspace in a manner that advances
1.4. Our vision for 2021 is that our wider economic and security interests.
the UK is secure and resilient to We will deepen existing links with our
cyber threats, prosperous and closest international partners, recognising
confident in the digital world. that this enhances our collective security.
We will also develop relationships with new
1.5. To realise this vision we will partners to build their levels of cyber security
work to achieve the following objectives: and protect UK interests overseas. We will
do this both bilaterally and multilaterally,
DEFEND We have the including through the EU, NATO and the
means to defend the UK UN. We will deliver clear messages about
against evolving cyber consequences to adversaries who threaten
threats, to respond to harm our interests, or those of our allies,
effectively to incidents, to in cyberspace.
ensure UK networks, data and systems
are protected and resilient. Citizens, 1.7. To achieve these outcomes over
businesses and the public sector the next five years, the UK Government
have the knowledge and ability to intends to intervene more actively and use
defend themselves. increased investment, while continuing
Section 1
EXECUTIVE SUMMARY
to support market forces to raise cyber 1.11. We will have the means to respond
security standards across the UK. The to cyber attacks in the same way as
UK Government, in partnership with the we respond to any other attack, using
Devolved Administrations of Scotland, whichever capability is most appropriate,
Wales and Northern Ireland, will work with including an offensive cyber capability.
the private and public sectors to ensure that
individuals, businesses and organisations 1.12. We will use the authority and
adopt the behaviours required to stay safe influence of the UK Government to invest
on the Internet. We will have measures in in programmes to address the shortage of
place to intervene (where necessary and cyber security skills in the UK, from schools
within the scope of our powers) to drive to universities and across the workforce.
improvements that are in the national
interest, particularly in relation to the cyber 1.13. We will launch two new cyber
security of our critical national infrastructure. innovation centres to drive the development
of cutting-edge cyber products and
1.8. The UK Government will draw on dynamic new cyber security companies.
its capabilities and those of industry to We will also allocate a proportion of the
develop and apply active cyber defence 165m Defence and Cyber Innovation
measures to significantly enhance the levels Fund to support innovative procurement in
of cyber security across UK networks. defence and security.
These measures include minimising the
most common forms of phishing attacks, 1.14. We will invest a total of 1.9 billion
filtering known bad IP addresses, and over the next five years to transform
actively blocking malicious online activity. significantly the UKs cyber security.
Improvements in basic cyber security
will raise the UKs resilience to the most
commonly deployed cyber threats.
1
Understanding the threats to networks, and then devising and implementing measures to proactively combat or defend
against those threats. See Glossary for an explanation of all technical terms.
Section 1
EXECUTIVE SUMMARY
12
Section 2
INTRODUCTION
2. INTRODUCTION
Section 2
INTRODUCTION
2.3. Much of the hardware and 2.7. These are sound foundations.
software originally developed to facilitate But the persistence and ingenuity of those
this interconnected digital environment who would threaten us, the prevalence
has prioritised efficiency, cost and the of our vulnerabilities and gaps in our
convenience of the user, but has not always capabilities and defences mean we need
had security designed in from the start. to work even harder to keep pace with
Malicious actors hostile states, criminal the threat. A comprehensive approach is
or terrorist organisations and individuals required if we are to effectively secure our
can exploit the gap between convenience cyber interests. Our resolution to make
and security. Narrowing that gap is a further investment and interventions is
national priority. based on the following assessments:
2.4. The expansion of the Internet the scale and dynamic nature of cyber
beyond computers and mobile phones threats, and our vulnerability and
into other cyber-physical or smart dependency, mean that maintaining
systems is extending the threat of remote the current approach will not in itself
exploitation to a whole host of new be sufficient to keep us safe;
technologies. Systems and technologies a market based approach to
that underpin our daily lives such as the promotion of cyber hygiene has
power grids, air traffic control systems, not produced the required pace and
satellites, medical technologies, industrial scale of change; therefore, Government
plants and traffic lights are connected has to lead the way and intervene
to the Internet and, therefore, potentially more directly by bringing its influence
vulnerable to interference. and resources to bear to address
cyber threats;
2.5. The 2015 National Security the Government alone cannot provide
Strategy (NSS) reaffirmed the cyber for all aspects of the nations cyber
threat as a Tier One risk to UK interests. security. An embedded and
The NSS set out the Governments sustainable approach is needed
Section 2
INTRODUCTION
where citizens, industry and other all parts of the UK, recognising that, to
partners in society and government, the extent that it touches on devolved
play their full part in securing our matters, we will work closely with the
networks, services and data; devolved Governments on its application
the UK needs a vibrant cyber security to Scotland, Wales and Northern
sector and supporting skills base that Ireland (respecting the three separate
can keep pace with and get ahead of legal jurisdictions, and four education
the changing threat. systems, that exist in the UK). Where
proposals set out in the strategy relate to
THE SCOPE OF THE STRATEGY devolved matters, their implementation
will be agreed as appropriate with those
2.8. This strategy is intended to shape Governments in accordance with the
the Governments policy, while also offering devolution settlements.
a coherent and compelling vision to share
with the public and private sector, civil 2.10. The strategy sets out proposed
society, academia and the wider population. or recommended actions aimed at all
sectors of the economy and society,
2.9. The strategy covers the whole of from central government departments, to
the UK. The UK Government will seek to leaders across industry and the individual
ensure the strategy is implemented for citizen. The strategy aims to increase
Section 2
INTRODUCTION
cyber security at all levels for our collective our updated assessment of the
benefit and will be the basis on which the strategic context, including the current
UK engages internationally to promote and evolving threats: who poses the
good internet governance. most serious threat to our interests,
and the tools at their disposal;
2.11. In this strategy, cyber security a review of vulnerabilities and how these
refers to the protection of information have developed over the last five years;
systems (hardware, software and the Governments vision for cyber
associated infrastructure), the data on security in 2021 and the key objectives
them, and the services they provide, to achieve that goal, including guiding
from unauthorised access, harm or misuse. principles, roles and responsibilities,
This includes harm caused intentionally and how and where government
by the operator of the system, or intervention will make a difference;
accidentally, as a result of failing to how we intend to put our policy
follow security procedures. into practice: setting out where the
Government will lead and where we
2.12. Consistent with our assessment of expect to work in partnership with
the challenge we face and building on the others; and
achievements of the 2011 strategy, this how we intend to assess our progress
document sets out: towards our objectives.
Section 3
STRATEGIC CONTEXT
3. STRATEGIC CONTEXT
Section 3
STRATEGIC CONTEXT
Section 3
STRATEGIC CONTEXT
Section 3
STRATEGIC CONTEXT
Terrorists Hacktivists
3.11. Terrorist groups continue to aspire 3.13. Hacktivist groups are decentralised
to conduct damaging cyber activity against and issue-orientated. They form and select
the UK and its interests. The current their targets in response to perceived
technical capability of terrorists is judged grievances, introducing a vigilante quality
to be low. Nonetheless the impact of even to many of their acts. While the majority
low-capability activity against the UK to of hacktivist cyber activity is disruptive in
date has been disproportionately high: nature (website defacement or DDoS), more
simple defacements and doxing activity able hacktivists have been able to inflict
(where hacked personal details are leaked greater and lasting damage on their victims.
online) enable terrorist groups and their
supporters to attract media attention and
INSIDERS
intimidate their victims.
Insider threats remain a cyber risk to
Terrorists using the Internet for organisations in the UK. Malicious
insiders, who are trusted employees
their purposes does not equal cyber of an organisation and have access
terrorism. However, by increasingly to critical systems and data, pose
engaging in cyber-space, and given the the greatest threat. They can cause
financial and reputational damage
availability of cyber-crime as a service, through the theft of sensitive data and
one can assume that they would be in intellectual property. They can also pose
the position to launch cyber attacks a destructive cyber threat if they use
their privileged knowledge, or access, to
ENISA Threat Landscape 2015 facilitate, or launch, an attack to disrupt
or degrade critical services on the
network of their organisations, or wipe
3.12. The current assessment is that
data from the network.
physical, rather than cyber, terrorist attacks
will remain the priority for terrorist groups
Of equal concern are those insiders
for the immediate future. As an increasingly
or employees who accidentally cause
computer-literate generation engages
cyber harm through inadvertent
in extremism, potentially exchanging
clicking on a phishing email, plugging
enhanced technical skills, we envisage
an infected USB into a computer,
a greater volume of low-sophistication
or ignoring security procedures and
(defacement or DDoS) disruptive activity
downloading unsafe content from the
against the UK. The potential for a number
Internet. Whilst they have no intention
of skilled extremist lone actors to emerge
of deliberately harming the organisation,
will also increase, as will the risk that a
their privileged access to systems and
terrorist organisation will seek to enlist an
data mean their actions can cause just
established insider. Terrorists will likely
as much damage as a malicious insider.
use any cyber capability to achieve the
These individuals are often the victims of
maximum effect possible. Thus, even a
social engineering they can unwittingly
moderate increase in terrorist capability
provide access to the networks of their
may constitute a significant threat to the
organisation or carry out instructions in
UK and its interests.
good faith that benefit the fraudster.
Section 3
STRATEGIC CONTEXT
Section 3
STRATEGIC CONTEXT
Section 3
STRATEGIC CONTEXT
Section 3
STRATEGIC CONTEXT
Section 4
OUR NATIONAL RESPONSE
4. OUR NATIONAL
RESPONSE
Section 4
OUR NATIONAL RESPONSE
4.1. To mitigate the multiple threats needs across the public and private
we face and safeguard our interests in sectors. Our cutting-edge analysis
cyberspace, we need a strategic approach and expertise will enable the UK to
that underpins all our collective and meet and overcome future threats
individual actions in the digital domain over and challenges.
the next five years. This section sets out
our vision and strategic approach. 4.4. Underpinning these objectives, we
will pursue INTERNATIONAL ACTION
OUR VISION and exert our influence by investing in
partnerships. We will shape the global
4.2. Our vision for 2021 is that evolution of cyberspace in a manner
the UK is secure and resilient to cyber that advances our wider economic and
threats, prosperous and confident in security interests.
the digital world.
PRINCIPLES
4.3. To realise this vision, we will work to
achieve the following objectives: 4.5 In working towards these objectives,
the Government will apply the following
DEFEND We have the principles:
means to defend the UK
against evolving cyber our actions and policies will be driven
threats, to respond by the need to both protect our people
effectively to incidents, and enhance our prosperity;
and to ensure UK networks, data and we will treat a cyber attack on the UK
systems are protected and resilient. as seriously as we would an equivalent
Citizens, businesses and the public conventional attack and we will defend
sector have the knowledge and ability ourselves as necessary;
to defend themselves. we will act in accordance with national
and international law and expect others
DETER The UK will be a to do the same;
hard target for all forms of we will rigorously protect and promote
aggression in cyberspace. our core values. These include
We detect, understand, democracy; the rule of law; liberty;
investigate and disrupt open and accountable governments
hostile action taken against us, and institutions; human rights; and
pursuing and prosecuting offenders. freedom of expression;
We have the means to take offensive we will preserve and protect UK
Section 4
OUR NATIONAL RESPONSE
have a responsibility to take reasonable to safeguard not only our hardware our
steps to protect themselves online and smart phones and other devices but also
ensure they are resilient and able to the data, software and systems that afford
continue operating in the event of an us freedom, flexibility and convenience in
incident; our private and professional lives.
responsibility for the security of
organisations across the public Businesses and organisations
sector, including cyber security
and the protection of online data 4.8. Businesses, public and private
and services, lies with respective sector organisations and other institutions
Ministers, Permanent Secretaries and hold personal data, provide services,
Management Boards; and operate systems in the digital
we will not accept significant risk being domain. The connectivity of this
posed to the public and the country as information has revolutionised their
a whole as a result of businesses and operations. But with this technological
organisations failing to take the steps transformation comes the responsibility
needed to manage cyber threats; to safeguard the assets which they hold,
we will work closely with those maintain the services they provide, and
countries that share our views and incorporate the appropriate level of
with whom our security overlaps, security into the products they sell. The
recognising that cyber threats know citizen and consumer, and society at large,
no borders. We will also work broadly look to businesses and organisations to
across the range of international take all reasonable steps to protect their
partners to influence the wider personal data, and build resilience the
community, acknowledging the value ability to withstand and recover into the
of broad coalitions; and systems and structures on which they
to ensure Government interventions are depend. Businesses and organisations
having a substantive impact on overall must also understand that, if they are the
national cyber security and resilience, victim of a cyber attack, they are liable for
we will seek to define, analyse and the consequences.
present data which measures the state
of our collective cyber security and our Government
success in meeting our strategic goals.
4.9. The primary duty of the Government
ROLES AND RESPONSIBILITIES is to defend the country from attacks
by other states, to protect citizens and
4.6. Securing the national cyberspace will the economy from harm, and to set the
require a collective effort. Each and every domestic and international framework
one of us has an important part to play. to protect our interests, safeguard
fundamental rights, and bring criminals to
Individuals justice.
4.7. As citizens, employees and 4.10. As the holder of significant data and
consumers, we take practical steps to a provider of services, the Government
secure the assets we value in the physical takes stringent measures to provide
world. In the virtual world, we must do the safeguards for its information assets.
same. That means fulfilling our personal The Government also has an important
responsibility to take all reasonable steps responsibility to advise and inform citizens
Section 4
OUR NATIONAL RESPONSE
and organisations what they need to do 4.14. The market still has a role to
to protect themselves online, and where play and in the longer term will deliver
necessary, set the standards we expect key greater impact than the Government
companies and organisations to meet. ever can. However, the immediacy of the
threat facing the UK and the expanding
4.11. Although key sectors of our vulnerabilities of our digitalised environment
economy are in private hands, the call for greater action in the short term from
Government is ultimately responsible for the Government.
assuring their national resilience and, with
its partners across the administration, the Driving change: expanded role for the
maintenance of essential services and Government
functions across the whole of government.
4.15. The Government must therefore set
Driving change: the role of the market the pace in meeting the countrys national
cyber security needs. Only Government
4.12. The 2011 Strategy and National can draw on the intelligence and other
Cyber Security Programme sought to drive assets required to defend the country
outcomes and increase capacity in both from the most sophisticated threats.
the public and private sector by looking to Only Government can drive cooperation
the market to drive the right behaviours. across the public and private sectors and
We expected commercial pressures ensure information is shared between the
and government-instigated incentives to two. Government has a leading role, in
ensure adequate business investment in consultation with industry, in defining what
appropriate cyber security, to stimulate a good cyber security looks like and ensuring
flow of investment into our industry, and to it is implemented.
encourage an adequate pipeline of skills
into the sector. 4.16. The Government will bring about
a significant improvement in our national
4.13. Much has been achieved. Across cyber security over the next five years. This
the economy and wider society, awareness ambitious and transformational programme
of the risk and of the actions required to will focus on the following four broad areas:
mitigate cyber risk have increased over
the last five years. But the combination Levers and incentives. The
of market forces and government Government will invest to maximise
encouragement has not been sufficient in the potential of a truly innovative
itself to secure our long-term interests in UK cyber sector. We will do this by
cyberspace at the pace required. Too many supporting start-ups and investing
networks, including in critical sectors, are in innovation. We will also seek to
still insecure. The market is not valuing, identify and bring on talent earlier in the
and therefore not managing, cyber risk education system and develop clearer
correctly. Too many organisations are still routes into a profession that needs
suffering breaches at even the most basic better definition. The Government will
level. Too few investors are willing to risk also make use of all available levers,
supporting entrepreneurs in the sector. Too including the forthcoming General Data
few graduates and others with the right Protection Regulation (GDPR), to drive
skills are emerging from the education and up standards of cyber security across
training system. the economy, including, if required,
through regulation.
Section 4
OUR NATIONAL RESPONSE
Section 4
OUR NATIONAL RESPONSE
Section 4
OUR NATIONAL RESPONSE
IMPLEMENTATION
PLAN
Section 4
OUR NATIONAL RESPONSE
Our goals for the countrys cyber security over the next five
years are rightly ambitious. To achieve them will require
us to act with consequence and determination across the
digital landscape. Activity to deliver the Governments vision
will advance the three primary objectives of the strategy:
to DEFEND our cyberspace, to DETER our adversaries and
to DEVELOP our capabilities, all underpinned by effective
INTERNATIONAL ACTION.
Section 5
DEFEND
5. DEFEND
Section 5
DEFEND
Section 5
DEFEND
harden the UKs critical infrastructure 5.1.4. Where possible, these initiatives will
and citizen-facing services against be delivered with or through partnerships
cyber threats; and with industry. For many, industry will be
disrupt the business model of attackers designing and leading implementation,
of every type, to demotivate them and with the Governments critical contribution
to reduce the harm that their attacks being expert support, advice and
can cause. thought-leadership.
Section 5
DEFEND
Section 5
DEFEND
5.2.2. The Government is well-placed It will also put security at the heart of
to take a lead role in exploring those new product development, eliminate
new technologies that will better protect opportunities for criminal exploitation
our own systems, help industry build and thereby protect the end user.
greater security into the supply chain,
secure the software ecosystem and 5.2.5. To do this we will:
provide automated protections to citizens
accessing government services online. continue to encourage hardware and
The Government must test and implement software providers to sell products with
new technologies that provide automated security settings activated as default,
protection for government online products requiring the user to actively disable
and services. Where possible, similar these settings to make them insecure.
technologies should be offered to the Some vendors are already doing this,
private sector and the citizen. but some are not yet taking these
necessary steps;
Objective continue to develop an Internet
Protocol (IP) reputation service to
5.2.3. The majority of online products protect government digital services
and services coming into use become (this would allow online services to
secure by default by 2021. Consumers get information about an IP address
will be empowered to choose products connecting to them, helping the service
and services that have built-in security as make more informed risk management
a default setting. Individuals can switch off decisions in real time);
these settings if they choose to do so but seek to install products on government
those consumers who wish to engage in networks that will provide assurance
cyberspace in the most secure way will be that software is running correctly, and
automatically protected. not being maliciously interfered with;
look to expand beyond the GOV.UK
Our approach domain into other digital services
measures that notify users who are
5.2.4. We will pursue the following actions: running out-of-date browsers; and
invest in technologies like Trusted
the Government will lead by example Platform Modules (TPM) and emerging
by running secure services on the industry standards such as Fast
Internet that do not rely on the Internet Identity Online (FIDO), which do not rely
itself being secure; on passwords for user authentication,
the Government will explore options for but use the machine and other
collaboration with industry to develop devices in the users possession to
cutting-edge ways to make hardware and authenticate. The Government will test
software more secure by default; and innovative authentication mechanisms
we will adopt challenging new cyber to demonstrate what they can offer,
security technologies in government, both in terms of security and overall
encouraging Devolved Administrations user experience.
to do likewise, in order to reduce
perceived risks of adoption. This 5.2.6. The Government will also explore
will provide proof of concept and how to encourage the market by providing
demonstrate the security benefits of security ratings for new products, so that
new technologies and approaches. consumers have clear information on
Section 5
DEFEND
which products and services offer them face of continuous attempts by hostile
the greatest security. The Government actors to gain access to government and
will also explore how to link these product public sector networks and data.
ratings to new and existing regulators, and
ways to warn consumers when they are Objectives
about to take an action online that might
compromise their security. 5.3.2. We want to achieve the following
outcomes:
Measuring success
citizens use government online services
5.2.7. The Government will measure with confidence: they trust that their
its success in building a secure Internet sensitive information is safe and, in
by assessing progress towards the turn, understand their responsibility to
following outcomes: submit their sensitive information online
in a secure manner;
the majority of commodity products and the Government will set and adhere to
services available in the UK in 2021 are the most appropriate cyber security
making the UK more secure because standards, to ensure that all branches
they have their default security settings of government understand and meet
enabled by default or have security their obligations to secure their
integrated into their design; and networks, data and services; and
all government services provided the Governments critical assets,
Section 5
DEFEND
attack. This means ensuring an accurate with vastly differing information security
and up to date knowledge of all systems, resources and capability. The National Data
data, and those who have access to them. Guardian for Health and Care has set new
The likelihood and impact of a cyber data security standards for the health and
incident will be minimised by implementing social care systems in England, alongside
best practice as set out by the NCSC. a new data consent/opt-out model for
The Government will also ensure that it patients. The Government will work with
is able to respond effectively to cyber health and social care organisations to
incidents through a programme of incident implement these standards.
exercises and regular testing of government
networks. We will invite Devolved
Administrations and local authorities Britain is a world leader in cyber
to participate in these exercises, as
appropriate. Through automated scanning, security, but with growing threats,
we will ensure that we have a better this new Cyber Security Operations
knowledge of governments online security Centre will ensure our Armed forces
status.
continue to operate securely. Our
5.3.6. Cyber security is not just about increasing defence budget means that
technology. Almost all successful cyber we can stay ahead of our adversaries
attacks have a contributing human factor.
We will therefore continue to invest in our in cyberspace while also investing in
people, to ensure that everyone who works conventional capabilities
in government has a sound awareness of
cyber risk. We will develop specific cyber
The Rt Hon Michael Fallon MP,
expertise in areas where the risks are Defence Secretary, April 2016
heightened and ensure that we have the
right processes in place to manage these
risks effectively. 5.3.10. Cyber security is vital to our defence.
Our Armed Forces depend on information
5.3.7. The NCSC will develop world- and communications systems, both in the
leading cyber security guidance which will UK and on operations around the world. The
keep pace with the threat and development infrastructure and personnel of the Ministry
of new technologies. We will take steps to of Defence (MoD) are prominent targets.
make sure government organisations have Defence systems are regularly targeted by
easy access to threat information to inform criminals, foreign intelligence services and
their understanding of their own cyber risks other malicious actors seeking to exploit
and take appropriate action. personnel, disrupt business and operations,
and corrupt and steal information. We
5.3.8. We will continue to improve will enhance cyber threat awareness,
our highest classification networks to detection, and reaction functions, through
safeguard the Governments most sensitive the development of a Cyber Security
communications. Operations Centre (CSOC) that uses state-
of-the-art defensive cyber capabilities to
5.3.9. Health and care systems pose unique protect the MoDs cyberspace and deal with
challenges in the context of cyber security. threats. The CSOC will work closely with the
The sector employs around 1.6 million NCSC to confront the MoDs cyber security
people in over 40,000 organisations, each challenges and contribute to wider national
cyber security.
National Cyber Security Strategy 2016
39
Section 5
DEFEND
sector;
Context
individual government departments
and other bodies protect themselves 5.4.1 The cyber security of certain UK
in proportion to their level of risk and organisations is of particular importance
to an agreed government minimum because a successful cyber attack on
standard; them would have the severest impact on
government departments and the wider the countrys national security. This impact
public sector are resilient and can could have a bearing on the lives of UK
respond effectively to cyber incidents, citizens, the stability and strength of the
maintaining functions and recovering UK economy, or the UKs international
quickly; standing and reputation. This premium
new technologies and digital services group of companies and organisations
deployed by government will be cyber within the public and private sector
secure by default; includes the critical national infrastructure
Section 5
DEFEND
Section 5
DEFEND
Section 5
DEFEND
Section 5
DEFEND
Section 5
DEFEND
Section 5
DEFEND
Section 6
DETER
6. DETER
Section 6
DETER
6.0.1. The National Security Strategy states 6.1.3. We will pursue a comprehensive
that defence and protection start with national approach to cyber security and
deterrence. This is as true in cyberspace deterrence that will make the UK a harder
as any other sphere. To realise our vision target, reducing the benefits and raising the
of a nation that is secure and resilient costs to an adversary be they political,
to cyber threats, and prosperous and diplomatic, economic or strategic. We must
confident in the digital world, we have ensure our capability and intent to respond
to dissuade and deter those who would are understood by potential adversaries in
harm us and our interests. To achieve order to influence their decision-making.
this we all need to continue to raise levels We shall have the tools and capabilities
of cyber security so that attacking us in we need: to deny our adversaries easy
cyberspace whether to steal from us or opportunities to compromise our networks
harm us is neither cheap nor easy. Our and systems; to understand their intent and
adversaries must know that they cannot act capabilities; to defeat commodity malware
with impunity: that we can and will identify threats at scale; and to respond and
them, and that we can act against them, protect the nation in cyberspace.
using the most appropriate response from
amongst all the tools at our disposal. We 6.2. REDUCING CYBER CRIME
will continue to build global alliances and
promote the application of international law 6.2.1. We need to raise the cost, raise
in cyberspace. We will also more actively the risk, and reduce the reward of cyber
disrupt the activity of all those who threaten criminals activity. While we must harden
us in cyberspace and the infrastructure on the UK against cyber attacks and reduce
which they rely. Delivering this ambition vulnerabilities, we must also focus
requires world-class sovereign capabilities. relentlessly on pursuing criminals who
continue to target the UK.
6.1. CYBERS ROLE IN DETERRENCE
6.2.2. Law enforcement agencies will
6.1.1. Cyberspace is only one sphere in focus their efforts on pursuing the criminals
which we must defend our interests and who persist in attacking UK citizens and
sovereignty. Just as our actions in the businesses. We will work with domestic
physical sphere are relevant to our cyber and international partners to target
security and deterrence, so our actions and criminals wherever they are located, and to
posture in cyberspace must contribute to dismantle their infrastructure and facilitation
our wider national security. networks. Law enforcement agencies will
also continue to help raise awareness and
6.1.2. The principles of deterrence are as standards of cyber security, in collaboration
applicable in cyberspace as they are in the with the NCSC.
physical sphere. The UK makes clear that
the full spectrum of our capabilities will be
used to deter adversaries and to deny them
opportunities to attack us. However, we
recognise that cyber security and resilience
are in themselves a means of deterring
attacks that rely on the exploitation of
vulnerabilities.
Section 6
DETER
Section 6
DETER
If you are a member of the public and 6.3.3. To reduce the cyber threat from
you believe that you are the victim of hostile foreign actors, we will:
cyber crime, or cyber enabled fraud, you
should contact Action Fraud. reinforce the application of
international law in cyberspace in
You can report the incident using Action addition to promoting the agreement
Frauds online fraud reporting tool of voluntary, non-binding norms of
anytime of the day or night, or call 0300 responsible state behaviour and the
123 2040. For further information see development and implementation of
www.actionfraud.police.uk confidence building measures;
The Action Fraud service is run by the
work with international partners,
City of London Police.
particularly through collective defence,
cooperative security, and enhanced
deterrence that our membership of
NATO affords;
identify both the unique and
cyber activity;
Section 6
DETER
generate and explore all available terrorists using and intending to use cyber
options for deterring and countering for this purpose. In doing so, we will
this threat, drawing on the full range of minimise their impact and prevent an uplift
government capabilities. We will take in terrorist cyber capability that would further
full account of other related factors, threaten UK networks and national security.
including country-specific strategies,
international cyber priorities, and cyber Objective
crime and prosperity objectives;
use existing networks and relationships 6.4.2. To mitigate the threat of terrorist
with our key international partners use of cyber, through the identification
to share information about current and disruption of terrorist cyber actors
and nascent threats, adding value to who currently hold, and aspire to build,
existing thought and expertise; and capability that could threaten UK
attribute specific cyber identities
national security.
publicly when we judge it in the
Section 6
DETER
both cyberspace and the physical sphere. and deploy our sovereign offensive
develop the ability of our Armed Forces 6.6.2. We have the confidence that the
to deploy offensive cyber capabilities UK will always have political control over
as an integrated part of operations, those cryptographic capabilities vital to our
thereby enhancing the overall impact national security and, therefore, the means
we can achieve through military action. to protect UK secrets.
Section 6
DETER
Section 6
DETER
Section 7
DEVELOP
7. DEVELOP
Section 7
DEVELOP
7.0.1. The DEVELOP strand of the strategy long-term strategy that can build on
sets out how we will acquire and strengthen these interventions to close the skills
the tools and capabilities that the UK needs gap. However, it must be recognised
to protect itself from the cyber threat. that to have any profound impact, this
effort must be collaborative, with input
7.0.2. The UK requires more talented from a range of participants and influencers
and qualified cyber security professionals. across the Devolved Administrations,
The Government will act now to plug public sector, education providers,
the growing gap between demand and academia bodies and industry.
supply for key cyber security roles, and
inject renewed vigour into this area of Objective
education and training. This is a long-term,
transformative objective, and this strategy 7.1.3. The Governments ambition is to
will kick-start this important work, which ensure the sustained supply of the best
will necessarily continue beyond 2021. possible home-grown cyber security talent,
A skilled workforce is the lifeblood of a whilst funding specific interventions in the
vital and world leading cyber security short term to help meet known skills gaps.
commercial ecosystem. This ecosystem We will also define and develop the cyber
will ensure cyber start-ups prosper and security skills needed across the population
receive the investment and support they and workforce to operate safely and
need. This innovation and vigour can only securely online.
be provided by the private sector; but
the Government will act to support its 7.1.4. This requires action over the next
development, and actively promote the twenty years, not just the next five. We will
wider cyber security sector to the world define the long-term, coordinated set of
market. A dynamic and thriving scientific actions needed by government, industry,
research sector is required to support both education providers and academia to
the development of highly skilled people, establish a sustained supply of competent
and to ensure that new ideas translate into cyber security professionals, who meet
cutting-edge products. the requisite standards and certification to
practise confidently and securely.
7.1. STRENGTHENING CYBER SECURITY
SKILLS 7.1.5. We will close the skills gap in
Defence. We will attract cyber specialists
7.1.1. The UK needs to tackle the systemic to government who are not only effectively
issues at the heart of the cyber skills trained but also ready to maintain our
shortage: the lack of young people entering national security. This includes an
the profession; the shortage of current understanding of the impact of cyberspace
cyber security specialists; insufficient on military operations.
exposure to cyber and information security
concepts in computing courses; a shortage Our approach
of suitably qualified teachers; and the
absence of established career and training 7.1.6. We will develop and implement a
pathways into the profession. self-standing skills strategy that builds on
existing work to integrate cyber security
7.1.2. This calls for swift intervention by into the education system. This will
the Government to help address the continue to improve the state of computer
current shortage and develop a coherent science teaching overall and embed cyber
Section 7
DEVELOP
security into the curriculum. Everyone 7.1.9. Alongside this work, the Government
studying computer science, technology will invest in a range of initiatives to bring
or digital skills will learn the fundamentals about immediate improvements and inform
of cyber security and will be able to bring the development of the long-term skills
those skills into the workforce. As part strategy. These include:
of this effort, we will address the gender
imbalance in cyber-focused professions, establishing a schools programme
and reach people from more diverse to create a step change in specialist
backgrounds, to make sure we are cyber security education and
drawing from the widest available talent training for talented 14-18 year olds
pool. We will work closely with the (involving classroom-based activities,
Devolved Administrations to encourage a after-school sessions with expert
consistent approach across the UK. mentors, challenging projects and
summer schools);
7.1.7. We will set out more clearly the creating higher and degree-level
respective roles of government and apprenticeships within the energy,
industry, including how these might finance and transport sectors to
evolve over time. The UK Government address skills gaps in essential areas;
and Devolved Administrations have a establishing a fund to retrain
key role in creating the right environment candidates already in the workforce
for cyber security skills to be developed who show a high potential for the cyber
and to update the education system to security profession;
reflect the changing needs of industry and identifying and supporting quality cyber
government. But employers also have a graduate and post graduate education,
significant responsibility to clearly articulate and identifying and filling any specialist
their needs, as well as train and develop skills gaps acknowledging the key
employees and young people entering role that universities play in skills
the profession. Industry has an important development;
role in building diverse and attractive supporting the accreditation of teacher
career and training pathways in partnership professional development in cyber
with academia, professional bodies and security. This work will help teachers,
trade associations. and others supporting learning, to
understand cyber security education
7.1.8. In recognition of the collective and provide a method of externally
challenge we face in closing the skills accrediting such individuals;
gap, we will establish a skills advisory developing the cyber security
group formed of government, employers, profession, including through achieving
professional bodies, skills bodies, Royal Chartered status by 2020,
education providers and academia, which reinforcing the recognised body of cyber
will strengthen the coherence between security excellence within the industry
these key sectors. This group will support and providing a focal point which can
the development of a long-term strategy advise, shape and inform national policy;
which will take account of developments in developing a Defence Cyber Academy
the broad field of digital skills, ensuring that as a centre of excellence for cyber
cyber security considerations are aligned training and exercise across the
and incorporated throughout. This group Ministry of Defence and wider
will work with similar bodies across the UK. Government, addressing specialist
skills and wider education;
Section 7
DEVELOP
post-graduate level;
security companies prosper, and get
cyber security is widely acknowledged the investment they need to grow;
as an established profession with clear the best minds from government,
career pathways, and has achieved academia and the private sector
Royal Chartered Status; collaborate closely to spur innovation; and
appropriate cyber security knowledge customers of the Government and
is an integral part of the continual industry are sufficiently confident
professional development for relevant and prepared to adopt cutting-edge
non-cyber security professionals, services.
Section 7
DEVELOP
Section 7
DEVELOP
7.3.1. The UKs thriving science and 7.3.4. This will underpin the creation
technology sector and its cutting-edge of products, systems and services that
research, underpins our world-leading are secure by default, with appropriate
cyber security capabilities. To maintain security considered from the outset and
and enhance the UKs reputation as a where security becomes a conscious
global leader in cutting-edge research, opt-out for users.
we need our academic research
establishments to continue to attract the 7.3.5. We will publish a detailed Cyber
best and the brightest minds in the field Science and Technology Strategy after a
of cyber security. This will require us to thorough consultation with partners and
foster centres of excellence that attract stakeholders. This will include identifying
the most able and dynamic scientists areas of science and technology that
and researchers, and deepen the active the Government, industry and academia
partnership between academia, the consider to be important and identifying
Government and industry. This will involve gaps in the UKs current capacity to
a match-making role for the Government, address them.
where we incentivise such collaborations.
Success would see us establish a self- 7.3.6. The Government will continue
sustaining ecosystem that allows ideas to provide funding and support for the
and people to circulate between the Academic Centres of Excellence, Research
three sectors in a mutually beneficial way. Institutes and Centres for Doctoral Training.
In addition, we will create a new Research
Objective Institute in a strategically important subject
area. We will also fund further research in
7.3.2. By 2021, the UK will have those areas where the upcoming Cyber
strengthened its position as a world Science and Technology Strategy identifies
leader in cyber science and technology. capability gaps. Important areas that will
Flexible partnerships between universities be given consideration include: big data
and industry will translate research into analytics; autonomous systems; trustworthy
Section 7
DEVELOP
7.3.10. The Government will measure identify gaps in current work, and
its success in promoting cyber security coordinate work across disciplinary
science and technology by assessing boundaries to develop a holistic approach
progress towards the following outcomes: to horizon scanning for cyber security;
promote better integration of technical
significantly increased numbers
aspects of cyber security with
of UK companies successfully
behavioural science;
commercialising academic cyber
support rigorous monitoring of the
research and fewer agreed and
cyber criminal market place to spot
identified gaps in the UKs cyber
new tools and services that might
security research capability with
enable technology transfer to hostile
effective action to close them; and
states, terrorists or criminals;
Section 7
DEVELOP
Section 8
INTERNATIONAL ACTION
8. INTERNATIONAL
ACTION
Section 8
INTERNATIONAL ACTION
However, with a growing divide over how build on agreement that international
to address the common challenge of law applies in cyberspace;
reconciling national security with individual continue to promote the agreement
rights and freedoms, any global consensus of voluntary, non-binding, norms of
remains fragile. responsible state behaviour;
support the development and
implementation of confidence-building
We must work internationally to agree measures;
the rules of the road that will ensure increase our ability to disrupt and
prosecute cyber criminals based
the UKs future security and prosperity abroad, especially in hard-to-reach
in cyberspace. jurisdictions;
The Rt. Hon. Boris Johnson, MP, help foster an environment which
allows our law enforcement agencies
Foreign Secretary to work together to ensure fewer
places exist where cyber criminals
can act without fear of investigation
and prosecution;
promote the resilience of cyberspace
by shaping the technical standards
governing emerging technologies
Section 8
INTERNATIONAL ACTION
Section 8
INTERNATIONAL ACTION
Section 9
METRICS
9. METRICS
Section 9
METRICS
9.1. Cyber security remains an area of 1. The UK has the capability effectively
relative immaturity when it comes to the to detect investigate and counter the
measurement of outcomes and impacts threat from the cyber activities of our
normally referred to as metrics. Already adversaries.
the science of cyber security has been
obscured by hyperbole and obstructed 2. The impact of cybercrime on the
by an absence of calibrated data. This is UK and its interests is significantly
a source of frustration for policy-makers reduced and cyber criminals are
and businesses alike, who have struggled deterred from targeting the UK.
to measure investment against outcomes.
The Government assesses that the effective 3. The UK has the capability to manage
use of metrics is essential for delivering this and respond effectively to cyber
strategy and focussing the resources that incidents to reduce the harm they
underpin it. cause to the UK and counter cyber
adversaries.
9.2. We will ensure that this strategy
is founded upon a rigorous and 4. Our partnerships with industry on
comprehensive set of metrics against active cyber defence mean that large
which we measure progress towards the scale phishing and malware attacks
outcomes we need to achieve. As well are no longer effective.
as being a major deliverable under the
Strategy in its own right, the NCSC will 5. The UK is more secure as a result of
play a crucial role in enabling other parts of technology products and services
Government, industry and society to deliver having cyber security designed into
all of these strategic outcomes within this them and activated by default.
strategy.
6. Government networks and services
9.3. Annex 3 sets out how the success will be as secure as possible from the
measures set out in the strategy will moment of their first implementation.
contribute to the strategic outcomes, The public will be able to use
which will be reviewed annually to ensure government digital services with
they accurately reflect our national goals confidence and trust that their
and requirements. The headline, strategic information is safe.
outcomes are as follows:
7. All organisations in the UK, large
and small, are effectively managing
their cyber risk and are supported by
high quality advice designed by the
NCSC, underpinned by the right mix
of regulation and incentives.
Section 9
METRICS
Section 9
METRICS
CONCLUSION
CYBER SECURITY BEYOND 2021
CONCLUSION:
CYBER SECURITY
BEYOND 2021
CONCLUSION
CYBER SECURITY BEYOND 2021
10.1. The rapid evolution of the cyber 10.4. Even in the most optimistic scenario,
landscape will constantly throw up new some of the challenges the UK faces in
challenges as technology evolves and our the cyber domain, whether in scale or
adversaries act to exploit it. However, this complexity, may need more than five years
strategy aims to provide a range of policies, to address. This strategy nonetheless
tools and capabilities that will ensure we provides us with the means to transform
can respond quickly and flexibly to each our future security and safeguard our
new challenge as it arises. prosperity in the digital era.
Annex 1
GLOSSARY
ANNEXES
Annex 1
ACRONYMS
ANNEX 1: ACRONYMS
CCA the Centre for Cyber Assessment. CPNI has built up strong partnerships
Based in the NCSC, it provides cyber with private sector organisations across
threat assessments for UK government the national infrastructure, creating a
departments to inform policy. trusted environment where information
can be shared for mutual benefit. Direct
CERT Computer Emergency Response relationships are augmented by an
Team. extended network, which includes other
government departments and professional
CERT-UK National Computer Emergency service organisations.
Response Team in the UK.
DDoS Distributed Denial of Service
CESG the National Technical Authority attack. The flooding of an information
for Information Assurance within the UK. system with more requests than it can
It provides a trusted, expert, independent, handle, resulting in authorised users being
research and intelligence-based service on unable to access it.
information security on behalf of UK the
government. GCHQ Government Communications
Headquarters; the centre for the
CNI Critical National Infrastructure. Those Governments signals intelligence
critical elements of infrastructure (namely activities and Cyber National Technical
assets, facilities, systems, networks or Authority (NTA).
processes and the essential workers that
operate and facilitate them), the loss or ICT Information and Communications
compromise of which could result in: Technology.
Annex 2
GLOSSARY
ANNEX 2: GLOSSARY
Action Fraud the UKs national fraud Computer Network Exploitation (CNE)
and internet crime reporting centre, cyber espionage; the use of a computer
providing a central point of contact network to infiltrate a target computer
for the public and businesses. network and gather intelligence.
Big data data sets which are too big Cyber ecosystem the totality of
to process and manage with commodity interconnected infrastructure, persons,
software tools in a timely way, and require processes, data, information and
bespoke processing capabilities to manage communications technologies, along
their volumes, speed of delivery and with the environment and conditions that
multiplicity of sources. influence those interactions.
Annex 2
GLOSSARY
Annex 2
GLOSSARY
Annex 2
GLOSSARY
Script kiddie a less skilled individual who Vishing vishing or voice phishing is the
uses ready-made scripts, or programs, that use of voice technology (landline phones,
can be found on the Internet to conduct mobile phones, voice email, etc) to trick
cyber attacks, such as web defacements. individuals into revealing sensitive financial
or personal information to unauthorised
Secure by default the unlocking of the entities, usually to facilitate fraud.
secure use of commodity technologies
whereby security comes by default for users. Vulnerability bugs in software
programs that have the potential to be
Secure by design software, hardware exploited by attackers.
and systems that have been designed from
the ground up to be secure.
Annex 3
HEADLINE IMPLEMENTATION PROGRAMME
1. The UK has the The stronger information sharing networks that we DETER
capability to have established with our international partners, and
effectively detect, wider multilateral agreements in support of lawful and
investigate and responsible behaviour by states, are substantially
counter the threat contributing to our ability to understand and respond to the
from the cyber threat, resulting in a better defended UK.
activities of our Our defence and deterrence measures, alongside our
adversaries. country-specific strategies, are making the UK a harder
target for hostile foreign actors and cyber terrorists to
succeed against.
Improved understanding of the cyber threat from hostile
foreign and terrorist actors, through identification and
investigation of cyber terrorism threats to the UK.
Ensuring that terrorist cyber capability remains low in the
long term, through close monitoring of capability, and
disruption of terrorist cyber potential and activity at the
earliest opportunity.
The UK is a world leader in offensive cyber capability.
The UK has established a pipeline of skills and expertise to
develop and deploy our sovereign offensive cyber capabilities.
Our sovereign cryptographic capabilities are effective in
keeping our secrets and sensitive information safe from
unauthorised disclosure.
2. The impact of We are having a greater disruptive effect on cyber criminals DETER
cybercrime on the attacking the UK, with increased numbers of arrests and
UK and its interests convictions, and larger numbers of criminal networks
is significantly dismantled as a result of law enforcement intervention.
reduced and Improved law enforcement capability, including: capacity
cyber criminals and skills for both dedicated specialists and mainstream
are deterred from officers; and enhanced overseas law enforcement capability.
targeting the UK. Improved effectiveness, and increased scale, of early
intervention (PREVENT) measures is dissuading and
reforming offenders.
A reduction in low-level cyber offences as a result of cyber
criminal services being harder to access and less effective.
Annex 3
HEADLINE IMPLEMENTATION PROGRAMME
5. The UK is more The majority of commodity products and services available DEFEND
secure as a result in the UK in 2021 are making the UK more secure, because
of technology they have their default security settings enabled by default
products and or have security integrated into their design.
services having Government services are trusted by the UK public,
cyber security because they have been implemented as securely
designed into them as possible, and fraud levels against them are within
and activated by acceptable risk parameters.
default.
Annex 3
HEADLINE IMPLEMENTATION PROGRAMME
7. All organisations We understand the level of cyber security across the CNI, DEFEND
in the UK, large and have measures in place to intervene, where necessary,
and small, are to drive improvements in the national interest.
effectively Our most important companies and organisations
managing their understand the level of threat and implement proportionate
cyber risk, are cyber security practices.
supported by The UK economys level of cyber security is as high as, or
high quality higher than, comparative advanced economies.
advice designed The number, severity and impact of successful cyber
by the NCSC, attacks against businesses in the UK has reduced,
underpinned by because cyber hygiene standards have been applied.
the right mix of The UK has an improving cyber security culture, because
regulation and organisations and the public understand their cyber risk
incentives. levels, and understand the cyber hygiene steps they need
to take to manage those risks.
8. There is the right Greater than average global growth in the size of the UK DEVELOP
ecosystem in the cyber sector year on year.
UK to develop and A significant increase in investment in early stage
sustain a cyber companies.
security sector
that can meet our
national security
demands.
9. The UK has a There are effective and clear entry routes into the cyber- DEVELOP
sustainable supply security profession, which are attractive to a diverse range
of home grown of people.
cyber skilled By 2021 cyber security is taught effectively as an integral
professionals to part of relevant courses within the education system, from
meet the growing primary to post-graduate level.
demands of an Cyber security is widely acknowledged as an established
increasingly digital profession with clear career pathways, and has achieved
economy, in both Royal Chartered Status.
the public and Appropriate cyber security knowledge is an integral part
private sectors, of the continual professional development for relevant
and defence. non-cyber security professionals, across the economy.
Government and the armed forces have access to cyber
specialists able to maintain the security and resilience of
the UK.
Annex 3
HEADLINE IMPLEMENTATION PROGRAMME
12. The threat to Enhanced international collaboration reduces cyber threat INTERNATION-
the UK and our to the UK and our interest overseas; AL ACTION
interests overseas A common understanding of responsible state behaviour in AND
is reduced due cyberspace; INFLUENCE
to increased International partners increased their cyber security
international capability; and
consensus and Strengthened international consensus on the benefits of a
capability towards free, open, peaceful and secure cyberspace.
responsible state
behaviour in a free,
open peaceful and
secure cyberspace.