Parallel with the evolving of cyber conflicts, the need for appropriate handling of the public administration tasks also appeared. Governmental tasks were necessary, which includes defense (military), diplomatic, law enforcement and public administrative factors also. This paper shows an analysis of the institutional background of cybersecurity administration in the European Union and Hungary in parallel. This includes the regulations about ENISA, the European Union Cybersecurity Agency, the Hungarian cybersecurity authorities, and the cybersecurity strategies for both entities, namely Regulation (EC) No 460/2004, Cybersecurity Strategy of the European Union of 2017, Regulation (EU) 526/2013, COM/2016/0410 final, 2017/0225 (COD) Proposal, Hungarian Government decree no. 223/2009, Government Decision no. 1139/2013, Act L of 2013, and Government Decree 187/2015. The research has been supported by the ÚNKP-17-4-III-NKE-26 New National Excellence Program of the Ministry of Human Capacities.
 DEDINSZKY, F., Informatikai biztonsági elvárások (Information security requirements), MeH-EKK, Budapest, 2008, p. 4.  DOMINGUEZ, M. et al., Cybersecurity training in control systems using real equipment, IFAC PapersOnLine 50-1 (2017) 12179–12184, doi:10.1016/j.ifacol.2017.08.2151  HEARN, J. (2003). Moving forward? Security & Privacy, 1(2), 70–71.  LEUPRECHT, C. et al., Beyond the Castle Model of cyber-risk and cyber-security, Government Information Quarterly, Volume 33, Issue 2, April 2016, Pages 250-257 doi:10.1016/j.giq.2016.01.012  LEWIS, J. A., National Perceptions of Cyber Threats, Strategic Analysis, 38:4, 2014, 566-576, doi:10.1080/09700161.2014.918445  MUHA, L., KRASZNAY, Cs., Kibervédelem Magyarországon: áldás vagy átok? (Cyber defence in Hungary: Bless or curse?), HWSW ONLINE, 2013: Paper 5026.  RUOHONEN, J., HYRYNSALMI, S., LEPPÄNEN, V., An outlook on the institutional evolution of the European Union cyber security apparatus, Government Information Quarterly, Volume 33, Issue 4, October 2016, Pages 746-756 doi:10.1016/j.giq.2016.10.003  SLIWINSKI K. F., Moving beyond the European Union's Weakness as a Cyber-Security Agent, Contemporary Security Policy, 35:3, 2014, 468-486, doi:10.1080/13523260.2014.959261  SOLMS, R., NIEKERK, J., From information security to cyber security, Computers & Security, Volume 38, 2013, Pages 97-102, ISSN 0167-4048, doi:10.1016/j.cose.2013.04.004.  SZÁDECZKY, T., Information Security - Strategy, Codification and Awareness. In: NEMESLAKI, A., (Ed.): ICT Driven Public Service Innovation. Comparative Approach Focusing on Hungary. Budapest, 2014. pp. 109-122.  SZÁDECZKY, T., The role of technology. Auditing and certification in the field of data security. In.: Gergely László Szőke (ed.): Privacy in the Workplace. Data Protection Law and Self-regulation in Germany and Hungary, HVG-ORAC, Budapest 2012, pp. 311-337.  TONDEL, I. A., LINE, M. B., JAATUN, M. G., Information security incident management: Current practice as reported in the literature, Computers & Security, Volume 45, September 2014, Pages 42-57 doi:10.1016/j.cose.2014.05.003
Including a Workshop on Smart Cities organized by the Congress of Local and Regional Authorities of the Council of Europe
Proceedings of the Central and Eastern European E|Dem and E|Gov Days, May 3-4, 2018, Budapest
Facultas, 1. Ed. (14 May 2018), 506 p.
Editors: Hendrik Hansen, Robert Müller-Török, András Nemeslaki, Alexander Prosser, Dona Scola, Tamás Szádeczky