Your privacy, your choice

We use essential cookies to make sure the site can function. We also use optional cookies for advertising, personalisation of content, usage analysis, and social media.

By accepting optional cookies, you consent to the processing of your personal data - including transfers to third parties. Some third parties are outside of the European Economic Area, with varying standards of data protection.

See our privacy policy for more information on the use of your personal data.

for further information and to change your choices.

Skip to main content

Trusted Computing Initiative on the Spectrum of EU Cyber-Security Legal Framework

  • Chapter
  • First Online:
EU Internet Law in the Digital Era

Abstract

EU is admittedly investing into technological advancements that would protect the users’ security, trust, and privacy, by funding privacy by design and privacy by default research and technologies. The legal framework seems unprepared in dealing effectively with the rising sophisticated cyberattacks, therefore EU is coping to improve the overall network and information security, along with data protection, through the newly introduced and long anticipated General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS). Trusted Computing (TC) is a technology that aims to protect the user, and the integrity of her machine and her privacy against third-party users. To defeat security threats, what is needed are “networks of security” rather than isolated security solutions and “gated communities”. It was argued that technologies like TC can be used to build secure networks and if adopted by Critical Infrastructures (CIs), to avoid cascade effects in interdependent CIs, as well as to standardize components, to comply with EU’s cybersecurity framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    For the different types of interdependencies between CIs, see Eusgeld et al. (2011).

  2. 2.

    See discussions on the appropriateness of using Cloud computing services in Critical Infrastructures in Corn (2017) and Homeland Security (2017) and a discussion on the technical barriers of using Cloud computing in CIs in Mackay et al. (2012).

  3. 3.

    Cyber attacks are characterized as advanced persistent threats due to their increased frequency, sophistication, clear target, and coordination.

  4. 4.

    The Home Office minister Baroness Neville-Jones presented an estimation that cybercrime costs UK £27bn each year in UK Cabinet Office and National security and intelligence.

  5. 5.

    Such interconnections can be classified as physical, geographical, cyber, or logical (Rinaldi et al. 2001).

  6. 6.

    The three modes of malicious attacks on a power infrastructure are as follows: (1) attack upon the system; (2) attack by the system; and (3) attack through the system (Amin 2002).

  7. 7.

    Back in 2003, the Trusted Computing Group (TCG) (formerly known as the Trusted Computing Platform Alliance (TCPA))—a non-profit organization—formed an alliance of promoters like AMD, Hewlett-Packard (HP), IBM, Intel Corporation, Microsoft, Sun Microsystems Incorporation, Fujitsu Limited, and of contributors like Canon, Dell, Erickson, Google, Oracle, Samsung, and many more; initiated the Trusted Computing (TC) project.

  8. 8.

    A Root of Trust is a hardware component to help protect viable configurations.

  9. 9.

    Using base elements to build up a larger system.

  10. 10.

    See more in Danidou (2015).

  11. 11.

    The significance of an incident can be determined based on specific parameters Art. 16 (4) (European Commission 2016).

References

  • Ab Manan J-L, Mubarak MF, Isa MAM, Khattak ZA (2011) Security, trust and privacy–a new direction for pervasive computing. Inf Secur:56–60

    Google Scholar 

  • Amin M (2002) Security challenges for the electricity infrastructure. Computer (Long Beach Calif) 35:supl8–supl10. https://doi.org/10.1109/MC.2002.1012423

  • Andress J (2014) Cyber warfare techniques, tactics and tools for security practitioners, 2nd edn. Syngress, an imprint of Elsevier, Waltham

    Google Scholar 

  • Balacheff B, Chen L, Pearson S et al (2000) Computing platform security in cyberspace. Inf Secur Tech Rep 5:54–63. https://doi.org/10.1016/S1363-4127(00)87631-1

    Article  Google Scholar 

  • BBVA (2016) The Network and Information Security (NIS) Directive. Part 2 of 2. Digit Econ Outlook

    Google Scholar 

  • Belanger F, Hiller JS, Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. J Strateg Inf Syst 11:245–270

    Article  Google Scholar 

  • Berger B (2005) Trusted computing group history. Inf Secur Tech Rep 10:59–62. https://doi.org/10.1016/j.istr.2005.05.007

    Article  Google Scholar 

  • Burmester M, Mulholland J (2006) The advent of trusted computing: implications for digital forensics. In: Proceedings of the 2006 ACM symposium on applied computing. ACM Press, Dijon, pp 283–287

    Chapter  Google Scholar 

  • Camenisch J (2004) Better privacy for trusted computing platforms. In: Samarati P, Ryan P, Gollmann D, Molva R (eds) Computer security – ESORICS 2004. Springer, Heidelberg, pp 73–88

    Chapter  Google Scholar 

  • Carroll A, Juarez M, Polk J, Leininger T (2002) Microsoft Palladium: a business overview. Microsoft Press Release

    Google Scholar 

  • CERT (2018) Vulnerability notes. https://www.kb.cert.org/vuls. Accessed 25 Jun 2018

  • Christou G (2016) Cybersecurity in the European Union

    Google Scholar 

  • Cm7234 (2007) The Government reply to the fifth report from the House of Lords Science and Technology committee

    Google Scholar 

  • Cm7642 (2009) Cyber Security Strategy of the United Kingdom safety, security and resilience in cyber space. 26

    Google Scholar 

  • Cm7948 (2010) Securing Britain in an age of uncertainty: the strategic defence and security review

    Google Scholar 

  • Corn T (2017) A new era for critical infrastructure: IT Security. In: CSO – Resour. Data Secur. Exec. https://www.cso.com.au/article/621183/new-era-critical-infrastructure-it-security/. Accessed 25 Jul 2018

  • Danidou I (2015) Trusted computing or trust in computing?: legislating for trust networks. ProQuest Dissertations Publishing

    Google Scholar 

  • Dekker MAC (2013) Critical cloud computing – a CIIP perspective on cloud computing services. Eur Netw Inf Secur Agency 33

    Google Scholar 

  • European Commission (2009a) Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on Critical Information Infrastructure Protection. “Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience”. COM 149 Final

    Google Scholar 

  • European Commission (2009b) Directive 2009/140/EC of 25 November 2009 amending Directives 2002/21/EC, 2002/19/EC and 2002/20/EC. Off J Eur Union L 337:37–69

    Google Scholar 

  • European Commission (2013a) Cybersecurity strategy of the European Union: an open, safe and secure cyberspace. European Commission

    Google Scholar 

  • European Commission (2013b) Proposal for a Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union. 0027:

    Google Scholar 

  • European Commission (2015) Cybersecurity. https://ec.europa.eu/digital-agenda/en/cybersecurity#Article

  • European Commission (2016) Directive (EU) 2016/1148 Of The European Parliament And Of The Council - of 6 July 2016 - concerning measures for a high common level of security of network and information systems across the Union. European Parliament and of the Council

    Google Scholar 

  • European Commission (2017) Factsheet State of the Union 2017

    Google Scholar 

  • European Commission (2018) Joint communication to the European Parliament and the Council - Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

    Google Scholar 

  • European Parliament (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council – of 27 April 2016 – on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (GDP). European Parliament and of the Council

    Google Scholar 

  • European Political Strategy Centre (2017) Building an effective European cyber shield. Eur Comm 16. https://doi.org/10.2872/955505

  • Eusgeld I, Nan C, Dietz S (2011) “System-of-systems” approach for interdependent critical infrastructures. Reliab Eng Syst Saf 96:679–686. https://doi.org/10.1016/J.RESS.2010.12.010

    Article  Google Scholar 

  • Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Surviv Glob Polit Strateg 53:23–40

    Google Scholar 

  • Gallery E (2008) Who are the TCG and what are the trusted computing concepts? TRUST2008

    Google Scholar 

  • Gordon L, Loeb M (2002) The economics of information security investment. ACM Trans Inf Syst Secur 5:438–457. https://doi.org/10.1145/581271.581274

    Article  Google Scholar 

  • Gordon L, Loeb M (2006) Economic aspects of information security: an emerging field of research. Inf Syst Front 8:335–337. https://doi.org/10.1007/s10796-006-9010-7

    Article  Google Scholar 

  • Guadamuz A (2013) Networks, complexity and internet regulation scale-free law. The University of Edinburgh

    Google Scholar 

  • Homeland Security (2017) Risks to critical infrastructure that use cloud services

    Google Scholar 

  • Hunton P (2009) The growing phenomenon of crime and the internet: a cybercrime execution and analysis model. Comput Law Secur Rev 25:528–535. https://doi.org/10.1016/j.clsr.2009.09.005

    Article  Google Scholar 

  • IWS (2018) World Internet Users Statistics and 2018 World Population Stats. https://www.internetworldstats.com/stats.htm. Accessed 25 Jun 2018

  • Pieter Kalis (2018) NIS Directive – update for the Netherlands – Leiden Law Blog. In: 31/01/2018. http://leidenlawblog.nl/articles/nis-directive-update-for-the-netherlands. Accessed 16 Jun 2018

  • Kaskina BB (2017) How the European Union is tackling cybersecurity: a look at the NIS directive. ITU News, 1–12

    Google Scholar 

  • Kert M, Lopez J, Markatos E, Preneel B (2014) State-of-the-art of Secure ICT landscape

    Google Scholar 

  • King J (2017) Commissioner King’s speech at the EU Cybersecurity Conference “Digital Single Market, Common Digital Security 2017”, 15 September 2017, Tallinn, European Commission. https://ec.europa.eu/commission/commissioners/2014-2019/king/announcements/commissioner-kings-speech-eu-cybersecurity-conference-digital-single-market-common-digital-security_en. Accessed 28 Jun 2018

  • Kraemer S, Carayon P, Clem J (2009) Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput Secur 28:509–520. https://doi.org/10.1016/j.cose.2009.04.006

    Article  Google Scholar 

  • Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Privacy 9:49–51. https://doi.org/10.1109/MSP.2011.67

    Article  Google Scholar 

  • Lessig L (1996) The zones of cyberspace. Stanford Law Rev 48:1403–1411

    Article  Google Scholar 

  • Lipson HF (2002) Tracking and tracing cyber-attacks: technical challenges and global policy issues

    Google Scholar 

  • Liveri D, Skouloudi C (2016) Exploring cloud incidents. Eur Netw Inf Secur Agency 1–14

    Google Scholar 

  • Mackay M, Baker T, Al-Yasiri A (2012) Security-oriented cloud computing platform for critical infrastructures. Comput Law Secur Rev 28:679–686. https://doi.org/10.1016/J.CLSR.2012.07.007

    Article  Google Scholar 

  • Maglaras L, Drivas G, Noou K, Rallis S (2018) ICST Transactions Preprint NIS directive: The case of Greece

    Google Scholar 

  • Mitchell CJ (2008) What is trusted computing? In: Mitchell CJ (ed) Trusted computing. The Institution of Engineering and Technology (IET), London, pp 1–10

    Google Scholar 

  • Mutz DC (2005) Social Trust and E-Commerce: experimental evidence for the effects of social trust on individuals’ economic behavior. Public Opin Q 69:393–416. https://doi.org/10.1093/poq/nfi029

    Article  Google Scholar 

  • Office of Cyber Security and Information Assurance (OCSIA), Detica (2011) The cost of cyber crime. 28

    Google Scholar 

  • Oppliger R, Rytz R (2005) Does trusted computing remedy computer security problems? IEEE Secur Priv 3:16–19. https://doi.org/10.1109/MSP.2005.40

    Article  Google Scholar 

  • Pagallo U (2015) Good onlife governance: on law, spontaneous orders, and design. In: The onlife manifesto. Springer, pp 161–177

    Google Scholar 

  • Proudler G (2005) Concepts of trusted computing. In: Mitchell CJ (ed) Trusted computing. The Institution of Engineering and Technology (IET), London, pp 11–27

    Google Scholar 

  • Proudler G, Dalton C, Chen L (2014) Trusted computing platforms: TPM2.0 in context, 1st edn. Springer

    Google Scholar 

  • Reid J, González Nieto JM, Dawson E, Okamoto E (2003) Privacy and trusted computing. In: Proceedings of the 14th international workshop on database and expert systems applications (DEXA’03). IEEE, Washington, pp 383–388

    Google Scholar 

  • Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst 21:11–25. https://doi.org/10.1109/37.969131

    Article  Google Scholar 

  • Rosinger C, Uslar M, Sauer J (2013) Threat scenarios to evaluate trustworthiness of multi-agents in the energy data management. EnviroInfo, pp 258–264

    Google Scholar 

  • Russia US-CCU Special Report (2009) Overview by the US-CCU of the cyber campaign against Georgia in August of 2008. US Cyber Consequences Unit

    Google Scholar 

  • Safford D (2002a) Clarifying misinformation on TCPA. In: White Pap. http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf

  • Safford D (2002b) The need for TCPA. http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf

  • Schneider FB (2000) Critical infrastructures you can trust: where telecommunications fits. Comput Sci Telecommun 1–29

    Google Scholar 

  • Schneier B (2010) Security in 2020 – Schneier on security. https://www.schneier.com/blog/archives/2010/12/security_in_202.html. Accessed 21 Jun 2018

  • Schoen S (2003) Trusted computing: promise and risk. Electronic Frontier Foundation

    Google Scholar 

  • Schoorman FD, Mayer RC, Davis JH (2007) An integrative model of organizational trust: past, present, and future. Acad Manag Rev 32:344–354. https://doi.org/10.5465/amr.2007.24348410

    Article  Google Scholar 

  • Shirey R (2000) RFC2828: Internet Security Glossary. RFC Editor

    Google Scholar 

  • Simon T (2017) Critical infrastructure and the Internet of Things. Cent Int Gov Innov Chatham House 46

    Google Scholar 

  • Stanganelli J (2018) EU’s NIS Directive Compounding GDPR Burdens & Confusion – Security Now. In: 23/02/2018. https://www.securitynow.com/author.asp?section_id=613&doc_id=740750. Accessed 16 Jun 2018

  • Tankard C (2011) Advanced persistent threats and how to monitor and deter them. Netw Secur 2011:16–19. https://doi.org/10.1016/S1353-4858(11)70086-1

    Article  Google Scholar 

  • TCG (2006) More secure computing. TCG

    Google Scholar 

  • Ten C-W, Manimaran G, Liu C-C (2010) Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans Syst Man Cybern – Part A Syst Humans 40:853–865. https://doi.org/10.1109/TSMCA.2010.2048028

    Article  Google Scholar 

  • The White House (2013) Executive Order 13636: improving critical infrastructure cybersecurity. Fed Regist 78:1–8

    Google Scholar 

  • Varianou Mikellidou C, Shakou LM, Boustras G, Dimopoulos C (2017) Energy critical infrastructures at risk from climate change: a state of the art review. Saf Sci. https://doi.org/10.1016/J.SSCI.2017.12.022

  • Vermesan O, Friess P (2015) Building the hyperconnected society: Internet of things research and innovation value chains, ecosystems and markets. River Publishers

    Google Scholar 

  • Vespignani A (2010) Complex networks: the fragility of interdependency. Nature 464:984–985. https://doi.org/10.1038/464984a

    Article  Google Scholar 

  • Yeung K (2008) Towards an understanding of regulation by design. In: Yeung K (ed) Regulating technologies: legal futures, regulatory frames and technological fixes. Hart, Oxford, pp 79–108

    Google Scholar 

  • Yeung K, Dixon-Woods M (2010) Design-based regulation and patient safety: a regulatory studies perspective. Soc Sci Med 71:502–509

    Article  Google Scholar 

  • Zimmerman R (2004) Decision-making and the vulnerability of interdependent critical infrastructure. In: IEEE international conference on systems, man and cybernetics (IEEE Cat. No. 04CH37583). IEEE, pp 4059–4063

    Google Scholar 

  • Zittrain J (2008) The future of the Internet and how to stop it. Yale University Press, New Haven

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yianna Danidou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Danidou, Y. (2020). Trusted Computing Initiative on the Spectrum of EU Cyber-Security Legal Framework. In: Synodinou, TE., Jougleux, P., Markou, C., Prastitou, T. (eds) EU Internet Law in the Digital Era. Springer, Cham. https://doi.org/10.1007/978-3-030-25579-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-25579-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-25578-7

  • Online ISBN: 978-3-030-25579-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics