@ localhost
Just for the record, private networks, industrial networks, and goverment networks share alot more then you think, and are not that differend from eachother and often co-exist and support eachother.
You seem to forget that private networks and industrial networks are major components to the internet itself and to the security of a closed network.
As 75% of all the data traffic worldwide is being done by private and industrial owned networks.
Wich means that the biggest online dangers come from those networks.
Agree?
Having that said, the security of a closed network does depend on the level of security and the tier levels of sub networks and public networks.
Because as i said leaks happen at the weakest point, i think we all can agree upon that.
So a closed network that has a switching server with a seperate datacenter can enable a closed network to maintain contact with other closed networks so called sub nets.
However those subnets are linked to eachother by private owned networks wich might be not as secure as we would like.
And there you got one of those weak links. just an example ok?
My point here is in order to secure your "closed" network and to ensure a safe enviroment you will have to upgrade and secure, datacenters, Nodes, Switches hubs and so on.
Some by monitoring, some by tapping, and some by software or hardware based applications.
And here lies it biggest problem, goverment networks secure, open, hybrid or monitored are being transported NOT only by advanced security based and closed networks with hyper secure datacenters and servers, but its also transported by privat owned network with a ISP who has a 2 dollar 50 crappy datacenter...thats just the way it is.
And here you got your connection between Private, Industrial, and goverment networks because no matter how they are secured they are transported by the same internet.
So in order for you to understand what iam talking about i suggest you start looking at the internet as a meduim as a whole instead of putting each section in boxes.
Afterall the internet can be seen as a frame and the applications and server running at it as extentions.
Because there are certain laws and rules that MUST apply to every single pc, network and server/ internet (Incl: Protocols, certificates and so on) and those "cyber criminals" exploit those laws and rules in such way that they can bend them so they can be used for "rogue things"
Why would a cyber criminal want to attack a closed and secured network, and probably get caught in the act as he can hack and manipulate second level servers and private networks who have combined more computing power then thousands of pc's and servers together?
Making his life so mutch easier and raises the odds to effective penetrate a closed network significant, as NASA and other goverment organisations have found out when they got hacked by a 14 year old kid.
This kid is not directly a cybercriminal, but if a kid can do it that easy? then you might be suprised what a person with a full MIT degree could do.
The main differences between EU and US is that the US has still many lower level tier networks while the standards in the EU when it comes to Private and industrial networks are alot higher, and thus effective eleminating or minimizing the exploiting of lower level networks, wich eventually benefit important networks like for example the goverments property.
You cannot secure a network unless you secure and upgrade everything, this applies both regionally, nationally and internationally.
And 15 years ago they started in the EU with upgrading those networks according to EU agreed standards, and with succes if i might add.
If you need references just hit google, no fansy links needed.
you wrote:
You disregard government policies, as you seem to think US gov has carte blanche capability to police private nodes on the public internet
No iam not disregarding that, infact the US Gov has more Carte Blache capability then you know.
You would be suprised how mutch CB they have.
Iam not sure but clinton did sign some kind of law where the GOV does get CB to fight off cybercrime. (Just cannot remember what it called maybe other members can fill this in)
And this law has a really big impact on how internet protocols and systems/data are being handled specially in the western world.
And last but not least before you have critic's upon my posts and replies i kindly request that you readup as you clearly do not understand the 1 o 1 internet basic's.
NO this is not a offence and iam not meaning this in a bad way.
What iam trying to point out, Private, Industrial, Dark, Goverment networks, servers and so on they might run and be operated in a differend matter but they are all working accoording to the IBM Bible wich state that every single meduim must be able to comminucate with eachother by protocols and so on...these are the same world wide this applies to linux and all the other OS's out there. These are the foundations of the internet itself everyone knows this.
This also directly means there are no seperated sections in the internet as the internet is on big massive meduim (or massive network) wich transports ALL the data available controlled or not controlled.
Leaving open the first basic of every network and pc, the weakest spot will point out how good your security is. No matter if its a closed network or not.
This might raise another discussion but lets focus on this generally otherwise we have to go talking about subnets, multinets and the protocols wich go along with that making this topic, at least a 100 times bigger then it already is.
In short there is no easy way or short way to explain this, as there are so many factors.
Cheers
Edit seems you are lucky.
The DAI combines eight variables, covering five areas, to provide an overall country score. The areas are availability of infrastructure, affordability of access, educational level, quality of ICT services, and Internet usage. The results of the Index point to potential stumbling blocks in ICT adoption and can help countries identify their relative strengths and weaknesses.
Ranking list ICT
This is one online rank list dates back to 2003, but its by far the only one online as other rankings are done by specific organisations.
So its not totally complete however it does nice you a credible view.
And it does provide a wealth of info.