Thoughts on the evolution of national security in cyberspace
Imre Dobák 1  
More details
Hide details
University of Public Service, Hungary
Imre Dobák   

University of Public Service, Hungary
Submission date: 2020-09-14
Acceptance date: 2021-02-08
Online publication date: 2021-03-01
Publication date: 2021-03-01
Security and Defence Quarterly 2021;33(1)
Nowadays, the vast majority of the threats to our security come from cyberspace, resulting in a significant transformation of national security systems. Behind these changes, we can find some organisational and capability responses to technological developments, seeing that the function of national security is inseparable from the social environment and its processes. The study examines certain impacts of cyberspace on national security as a system, addressing some features of the changing external environment. The topic is related to the research on the relationship between the information society and security in the 21st century. Therefore, the study explores some processes visible at the international level and reviews some external environment trends in connection with national security. The changes affect the future of national security thinking and the development of principles and methods. It is the task of national security services operating under strict legislation to respond effectively to various threats in a changing environment. All this is only possible through the continuous monitoring of changes in the environment and long-term strategic thinking.
Akhgar, B., Yates, S. and Lockley, E. (2013) ‘Introduction: Strategy Formation in a Globalized and Networked Age – A Review of the Concept and its Definition’, in Akhgar, B., Yates, S. (eds) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann. doi: 10.1016/B978-0-12-407191-9.00001-6.
Atesş, A. (2020) ‘Current challenges and trends in intelligence’, Güvenlik Bilimleri Dergisi, Jandarma ve Sahil Güvenlik Akademisi, pp. 177–204. doi: 10.28956/gbd.736153.
Budish, R., Burkert, H., and Gasser, U. (2018) ‘Encryption Policy and Its International Impacts: A Framework for Understanding Extraterritorial Ripple Effects’, Aegis Series Paper No. 1804. Available at: (Accessed: 25 August, 2020).
Crosston, M. and Valli, F. (2017) An Intelligence Civil War: “HUMINT” vs. “TECHINT”, Cyber, Intelligence, and Security, 1(1), pp. 67–82. Available at: (Accessed: 25 August, 2020).
Di Franco, F. (2018) Analysis of the European R&D priorities in cybersecurity, Strategic priorities in cybersecurity for a safer Europe. European Union Agency For Network and Information Security.
Privacy and Civil Liberties Oversight Board (2014) Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court. Available at: (Accessed: 25 August, 2020).
Gery, W. R., Lee, S., and Ninas, J. (2017) ‘Information Warfare in an Information Age’, Joint Force Quarterly, 85(2). Available at: (Accessed: 25 August 2020).
Global Risk Report (2020) The Global RisksReport 2020, Geneva: The World Economic Forum.
Henricks, S. C. (2017) ‘Social Media, Publicly Available Information, and the Intelligence Community.’ American Intelligence Journal, 34(1), pp. 21–31. Available at: (Accessed 14 February, 2021).
Hewling, M. (2018) ‘Cyber Intelligence: A Framework for the Sharing of Data’, Reading: Academic Conferences International Limited. Available at: (Accessed: 10 September, 2020).
Johnson, L. K. (ed.) (2010) The Oxford Handbook of National Security Intelligence. Oxford, New York: Oxford University Press. doi: 10.1093/oxfordhb/9780195375886.001.0001.
Kadtke, J. and Wharton, J. (2018) ‘Technology and National Security: The United States at a Critical Crossroads’, Defense Horizons, Institue for National Strategic Studies. Available at: Documents/defensehorizon/DH-84.pdf (Accessed: 10 July, 2020).
Lewis, J. A. (2018) ‘Telecom and National Security (commentary)’ March 13, Center for Strategic and International Studies (CSIS). (Accessed: 21 December, 2020).
LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens (2013). Available at: (Accessed: 10 August, 2020).
Lourenco, M. and Marinos, L. (2020) ENISA Threat Landscape, from January 2019 to April 2020, European Union Agency for Cybersecurity.
Misuraca, G. and Lusoli, W. (ed.) (2010) Envisioning Digital Europe 2030: Scenarios for ICT in Future Governance and Policy Modelling, EUR 24614 EN, European Commission Joint Research Centre Institute for Prospective Technological Studies, Luxembourg, Publications Office of the European Union.
Morgan, S. (2019) ‘Cybersecurity Talent Crunch To Create 3.5 Million Unfilled Jobs Globally by 2021’, Cybercrime Magazine, 24 October. Available at: https://cybersecurityventures.... (Accessed: 22 December, 2020).
Nishimura, H., Kanoshima, E. and Kono, K. (2019) ‘Advancement in Science and Technology and Human Societies’, in Abe, S., Ozawa, M. and Kawata, Y. (eds) Science of Societal Safety Living at Times of Risks and Disasters. Singapore: Springer, pp. 15–26. doi: 10.1007/978-981-13-2775-9_2.
O’Hanlon, M. (2018) Forecasting change in military technology, 2020-2040, Washington D.C.: The Brookings Institution. Available at: https://www.worldpittsburgh.or... (Accessed: 10 August, 2020).
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (2016). Available at: (Accessed: 10 August, 2020).
The Guardian (2013) ‘The NSA Files’. The Guardian. Available at: (Accessed: 10 August, 2020).
Unver, H. A. (2018) ‘Digital Open Source Intelligence and International Security: A Primer’, EDAM Research Reports, Cyber Governance and Digital Democracy 2018/8. Available at: (Accessed: 15 August, 2020).
US Embassy in Luxembourg (2020) Secretary Pompeo and Secretary Esper Speak at Munich Security Conference 2020. Available at: (Accessed: 15 August, 2020).