Skip to main content

Reporting and Analysis Center for Information Assurance (MELANI) (Phase 2: 2004–2010)

  • Chapter
  • First Online:
Cybersecurity in Switzerland

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

This chapter covers the second period in the Swiss cyber-security policy formulation. It shows how the Reporting and Analysis Center for Information Assurance (MELANI), the most important unit in Switzerland’s cyber-security approach, was set up and how it functions. It describes its special partnership models, its instruments for establishing trusted public–private partnerships, and its two costumer bases with specific services and products.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Press Release: “Die Melde- und Analysestelle Informationssicherung MELANI wird weitergeführt” Bern, 24 January 2007. http://www.news.admin.ch/dokumentation/00002/00015/index.html?lang=de&msg-id=10361.

  2. 2.

    The following paragraphs have been published in similar form in Dunn Cavelty and Suter (2008). The thoughts in this article were substantially influenced by MELANI and in turn influenced MELANI’s development.

  3. 3.

    https://www.switch.ch/about/news/2011/malware180411.html.

  4. 4.

    https://www.melani.admin.ch/dienstleistungen/01503/01504/index.html?lang=en.

  5. 5.

    http://www.melani.admin.ch/dokumentation/00123/00124/index.html?lang=en.

References

  • *All links accessed 4 July 2014

    Google Scholar 

  • Anderson R, Moore T (2006) The economics of information security. Science 314:610–623

    Article  Google Scholar 

  • Andersson JJ, Malm A (2006) Public-private partnerships and the challenge of critical infrastructure protection. In: Dunn M, Mauer V (eds) International CIIP handbook 2006. Vol II: analyzing issues, challenges, and prospects. Center for Security Studies, Zurich

    Google Scholar 

  • Aviram A (2006) Network responses to network threats: the evolution into private cyber-security associations. In: Grady MF, Parisi F (eds) The law and economics of cybersecurity. Cambridge University Press, Cambridge

    Google Scholar 

  • Aviram A, Tor A (2004) Overcoming impediments to information sharing. Alabama Law Rev 55:231–279

    Google Scholar 

  • Branscomb LM, Michel-Kerjan EO (2006) Public-private collaboration on a national and international scale. In: Auerswald PE, Branscomb LM, La Porte TM, Michel-Kerjan EO (eds) Seeds of disaster, roots of response: how private action can reduce public vulnerability. Cambridge University Press, Cambridge

    Google Scholar 

  • Bush GW (2007) National strategy for information sharing. Success and challenges in improving terrorism-related information sharing. The White House Press, Washington D.C

    Google Scholar 

  • Campbell K, Gordon LA, Loeb MP, Zhou L (2003) The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J Comput Secur 11:431–448

    Google Scholar 

  • Cavusoglu H, Birendra M, Raghunathan S (2004) The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers. Int J Electron Commer 9:69–104

    Google Scholar 

  • Center for Security Studies (2006) Evaluation der Melde- und Analysestelle Informationssicherung Schweiz (MELANI). Center for Security Studies, Zürich

    Google Scholar 

  • Center for Security Studies (2010) Evaluation und weiterentwicklung der melde- und analysestelle informationssicherung schweiz (MELANI). Center for Security Studies, Zürich

    Google Scholar 

  • Cukier KN, Mayer-Schoenberger V, Branscomb LM (2005) Ensuring (and insuring?) critical information infrastructure protection. Faculty Research Working Paper, Working Paper RWP05-055. John F. Kennedy School of Government, Cambridge

    Google Scholar 

  • Dunn Cavelty M, Suter M (2008) Critical infrastructure protection, information-sharing and the role of intelligence. Cátedra Servicios de Inteligencia y Sistemas Democráticos Facultad de Ciencias Jurídicas y Sociales 4:85–114

    Google Scholar 

  • Dunn Cavelty M, Suter M (2009) Public-private partnerships are no silver bullet: an expanded governance model for critical infrastructure protection. Int J Crit Infrastruct Prot 2(4):179–187

    Article  Google Scholar 

  • Dunn Cavelty M, Suter M (2012) The art of CIIP strategy: taking stock of content and processes. In: Lopez J, Setola R, Wolthusen SD (eds) Critical infrastructure protection: information infrastructure models, analysis, and defense. Springer, Berlin

    Google Scholar 

  • Dunn M (2005) A comparative analysis of cybersecurity initiatives worldwide. Background paper for the WSIS thematic meeting on cybersecurity, document: CYB/05. http://www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Comparative_Analysis_Cybersecurity_Initiatives_Worldwide.pdf

  • Frye E (2003) Information-sharing hangups: is antitrust just a cover? CIP Rep 1(3):6–7

    Google Scholar 

  • Gal-Or E, Ghose A (2005) The economic incentives for sharing security information. Inf Syst Res 16:186–208

    Article  Google Scholar 

  • Gordo LA, Loeb MP, Lucyshyn W (2003) Sharing information on computer systems security: an economic analysis. J Acc Public Policy 22:461–485

    Article  Google Scholar 

  • Holderegger T (2006) The aspect of early warning in critical information infrastructure protection (CIIP). Dunn M, Mauer V (eds) International CIIP handbook 2006. Vol II: analyzing issues, challenges, and prospects. Center for Security Studies, Zurich

    Google Scholar 

  • MELANI (2009) Semi-annual report 2009/2. Bern, reporting and analysis centre for information assurance MELANI. http://www.melani.admin.ch/dokumentation/00123/00124/01109/index.html

  • MELANI (2010) Semi-annual report 2010/2. Bern, reporting and analysis centre for information assurance MELANI. http://www.melani.admin.ch/dokumentation/00123/00124/01122/index.html

  • Moteff JD, Stevens GM (2003) Critical infrastructure information disclosure and homeland security. Congressional Research Report for Congress, RL31547, 29 Jan 2003. Congressional Research Service, Washington

    Google Scholar 

  • National Infrastructure Advisory Council (2006) Public-private sector intelligence coordination. final report and recommendations by the council. Washington. Available at: http://www.dhs.gov/xlibrary/assets/niac/niac_icwgreport_july06.pdf

  • OFCOM (2005) Telecom infomailing Nr. 36, 22 Aug 2005. Available at: http://www.bakom.admin.ch/themen/telekom/00939/01328/index.html?lang=de&download=NHzLpZeg7t,lnp6I0NTU042l2Z6ln1acy4Zn4Z2qZpnO2Yuq2Z6gpJCDdn59fmym162epYbg2c_JjKbNoKSn6A--

  • Personick SD, Patterson CA (2003) Critical information infrastructure protection and the law: an overview of key issues. National Academic Press, Washington

    Google Scholar 

  • Presidential Commission on Critical Infrastructure Protection (1997) Critical foundations: protecting America’s infrastructures. US Government Printing Office, Washington

    Google Scholar 

  • Prieto DB (2006) Information sharing with the private sector: history, challenges, innovation, and prospects. In: Auerswald PE, Branscomb LM, La Porte TM, Michel-Kerjan EO (eds) Seeds of disaster, roots of response: how private action can reduce public vulnerability. Cambridge University Press, Cambridge

    Google Scholar 

  • Rytz R, Römer J (2003) MELANI—ein Lagezentrum zum Schutz kritischer Infrastrukturen im Informationszeitalter. In: Grimm R, Keller HB, Rannenberg K (eds) Lecture notes in informatics. gesellschaft für informatik, Bonn. Available at: http://subs.emis.de/LNI/Proceedings/Proceedings36/article1032.html

  • Suter M (2006) Information security in swiss companies: a survey on threats, risk management and forms of joint action. Center for Security Studies, Zurich

    Google Scholar 

  • Suter M (2007a) A generic national framework for critical information infrastructure protection (CIIP). ITU working paper. Available at: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/generic-national-framework-for-ciip.pdf

  • Suter M (2007b) Improving information security in companies: how to meet the need for threat information. In: Dunn M, Mauer V, Krishna-Hensel F (eds) Power and security in the information age: investigating the role of the state in cyberspace. Ashgate, Aldershot

    Google Scholar 

  • Zedi R (2003) Damit nicht plötzlich alles stillsteht, Tages-Anzeiger, 29 Sept 2003, p 35

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Myriam Dunn Cavelty .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Dunn Cavelty, M. (2014). Reporting and Analysis Center for Information Assurance (MELANI) (Phase 2: 2004–2010). In: Cybersecurity in Switzerland. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-10620-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10620-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10619-9

  • Online ISBN: 978-3-319-10620-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics