The following chapter does not have an ambition to thoroughly explore all the cyber security-related topics. However, I chose a way to open the hottest topics from the national security perspective.
All the parts do not have any deep conclusions, but should serve the reader as a guide for further reading. In each part I provide you with some further references that are the most discussed and cited papers in the academic debate.
However, as cyber security is an explosive topic today, we can assume that considerable amount of articles are accidentally omitted. The current securitization wave of cyber threats as one of the most serious national security issue contributes to the production of a huge amount of literature, making the finding of a wisely compiled literature not an easy task.
This is the reason why the articles mentioned in the following chapter are chosen from those that are the most debated ones. Cyber security as a topic for study should be divided into several branches.
Development of tools used in cyberspace (software) falls into the technical branch that is the oldest one since the Arpanet, a predecessor to Internet, was developed in the end of 60s. Moreover people well educated in software development and the related ICT security are usually very pessimistic about drawing the scenarios of national security threat emanating from cyberspace.
Another important aspect, or branch, is the policy makers that see any opportunity to exploit critical ICT as vulnerability and thus threat to national security. The third and last branch is devoted to lawyers and cyber crime investigators.
This branch has had its unique path of development as plenty of activities that are illegal in the physical world are approached differently in cyberspace. Sharing of intellectual property as a general right of having a direct access to information is still discussed and definitely not satisfactorily resolved.