Abstract
This chapter covers the second period in the Swiss cyber-security policy formulation. It shows how the Reporting and Analysis Center for Information Assurance (MELANI), the most important unit in Switzerland’s cyber-security approach, was set up and how it functions. It describes its special partnership models, its instruments for establishing trusted public–private partnerships, and its two costumer bases with specific services and products.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Press Release: “Die Melde- und Analysestelle Informationssicherung MELANI wird weitergeführt” Bern, 24 January 2007. http://www.news.admin.ch/dokumentation/00002/00015/index.html?lang=de&msg-id=10361.
- 2.
The following paragraphs have been published in similar form in Dunn Cavelty and Suter (2008). The thoughts in this article were substantially influenced by MELANI and in turn influenced MELANI’s development.
- 3.
- 4.
- 5.
References
*All links accessed 4 July 2014
Anderson R, Moore T (2006) The economics of information security. Science 314:610–623
Andersson JJ, Malm A (2006) Public-private partnerships and the challenge of critical infrastructure protection. In: Dunn M, Mauer V (eds) International CIIP handbook 2006. Vol II: analyzing issues, challenges, and prospects. Center for Security Studies, Zurich
Aviram A (2006) Network responses to network threats: the evolution into private cyber-security associations. In: Grady MF, Parisi F (eds) The law and economics of cybersecurity. Cambridge University Press, Cambridge
Aviram A, Tor A (2004) Overcoming impediments to information sharing. Alabama Law Rev 55:231–279
Branscomb LM, Michel-Kerjan EO (2006) Public-private collaboration on a national and international scale. In: Auerswald PE, Branscomb LM, La Porte TM, Michel-Kerjan EO (eds) Seeds of disaster, roots of response: how private action can reduce public vulnerability. Cambridge University Press, Cambridge
Bush GW (2007) National strategy for information sharing. Success and challenges in improving terrorism-related information sharing. The White House Press, Washington D.C
Campbell K, Gordon LA, Loeb MP, Zhou L (2003) The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J Comput Secur 11:431–448
Cavusoglu H, Birendra M, Raghunathan S (2004) The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers. Int J Electron Commer 9:69–104
Center for Security Studies (2006) Evaluation der Melde- und Analysestelle Informationssicherung Schweiz (MELANI). Center for Security Studies, Zürich
Center for Security Studies (2010) Evaluation und weiterentwicklung der melde- und analysestelle informationssicherung schweiz (MELANI). Center for Security Studies, Zürich
Cukier KN, Mayer-Schoenberger V, Branscomb LM (2005) Ensuring (and insuring?) critical information infrastructure protection. Faculty Research Working Paper, Working Paper RWP05-055. John F. Kennedy School of Government, Cambridge
Dunn Cavelty M, Suter M (2008) Critical infrastructure protection, information-sharing and the role of intelligence. Cátedra Servicios de Inteligencia y Sistemas Democráticos Facultad de Ciencias Jurídicas y Sociales 4:85–114
Dunn Cavelty M, Suter M (2009) Public-private partnerships are no silver bullet: an expanded governance model for critical infrastructure protection. Int J Crit Infrastruct Prot 2(4):179–187
Dunn Cavelty M, Suter M (2012) The art of CIIP strategy: taking stock of content and processes. In: Lopez J, Setola R, Wolthusen SD (eds) Critical infrastructure protection: information infrastructure models, analysis, and defense. Springer, Berlin
Dunn M (2005) A comparative analysis of cybersecurity initiatives worldwide. Background paper for the WSIS thematic meeting on cybersecurity, document: CYB/05. http://www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Comparative_Analysis_Cybersecurity_Initiatives_Worldwide.pdf
Frye E (2003) Information-sharing hangups: is antitrust just a cover? CIP Rep 1(3):6–7
Gal-Or E, Ghose A (2005) The economic incentives for sharing security information. Inf Syst Res 16:186–208
Gordo LA, Loeb MP, Lucyshyn W (2003) Sharing information on computer systems security: an economic analysis. J Acc Public Policy 22:461–485
Holderegger T (2006) The aspect of early warning in critical information infrastructure protection (CIIP). Dunn M, Mauer V (eds) International CIIP handbook 2006. Vol II: analyzing issues, challenges, and prospects. Center for Security Studies, Zurich
MELANI (2009) Semi-annual report 2009/2. Bern, reporting and analysis centre for information assurance MELANI. http://www.melani.admin.ch/dokumentation/00123/00124/01109/index.html
MELANI (2010) Semi-annual report 2010/2. Bern, reporting and analysis centre for information assurance MELANI. http://www.melani.admin.ch/dokumentation/00123/00124/01122/index.html
Moteff JD, Stevens GM (2003) Critical infrastructure information disclosure and homeland security. Congressional Research Report for Congress, RL31547, 29 Jan 2003. Congressional Research Service, Washington
National Infrastructure Advisory Council (2006) Public-private sector intelligence coordination. final report and recommendations by the council. Washington. Available at: http://www.dhs.gov/xlibrary/assets/niac/niac_icwgreport_july06.pdf
OFCOM (2005) Telecom infomailing Nr. 36, 22 Aug 2005. Available at: http://www.bakom.admin.ch/themen/telekom/00939/01328/index.html?lang=de&download=NHzLpZeg7t,lnp6I0NTU042l2Z6ln1acy4Zn4Z2qZpnO2Yuq2Z6gpJCDdn59fmym162epYbg2c_JjKbNoKSn6A--
Personick SD, Patterson CA (2003) Critical information infrastructure protection and the law: an overview of key issues. National Academic Press, Washington
Presidential Commission on Critical Infrastructure Protection (1997) Critical foundations: protecting America’s infrastructures. US Government Printing Office, Washington
Prieto DB (2006) Information sharing with the private sector: history, challenges, innovation, and prospects. In: Auerswald PE, Branscomb LM, La Porte TM, Michel-Kerjan EO (eds) Seeds of disaster, roots of response: how private action can reduce public vulnerability. Cambridge University Press, Cambridge
Rytz R, Römer J (2003) MELANI—ein Lagezentrum zum Schutz kritischer Infrastrukturen im Informationszeitalter. In: Grimm R, Keller HB, Rannenberg K (eds) Lecture notes in informatics. gesellschaft für informatik, Bonn. Available at: http://subs.emis.de/LNI/Proceedings/Proceedings36/article1032.html
Suter M (2006) Information security in swiss companies: a survey on threats, risk management and forms of joint action. Center for Security Studies, Zurich
Suter M (2007a) A generic national framework for critical information infrastructure protection (CIIP). ITU working paper. Available at: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/generic-national-framework-for-ciip.pdf
Suter M (2007b) Improving information security in companies: how to meet the need for threat information. In: Dunn M, Mauer V, Krishna-Hensel F (eds) Power and security in the information age: investigating the role of the state in cyberspace. Ashgate, Aldershot
Zedi R (2003) Damit nicht plötzlich alles stillsteht, Tages-Anzeiger, 29 Sept 2003, p 35
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Dunn Cavelty, M. (2014). Reporting and Analysis Center for Information Assurance (MELANI) (Phase 2: 2004–2010). In: Cybersecurity in Switzerland. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-10620-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-10620-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10619-9
Online ISBN: 978-3-319-10620-5
eBook Packages: Computer ScienceComputer Science (R0)