Supplement to the 2012/3 South African Cyber Threat Barometer. Brazil Case Study Report
|
|
- Candace Bradley
- 8 years ago
- Views:
Transcription
1 Supplement to the 2012/3 South African Cyber Threat Barometer Brazil Case Study Report
2 Foreword Africa is considered to be the cradle of mankind. There is evidence that some of the earliest people lived in southern Africa. The hunter-gatherer San roamed widely over the area and the pastoral KhoiKhoi wandered in the wellwatered parts where grazing was available. Tribes from central Africa moved southwards into the eastern and central parts of the area known today as South Africa. Milestones in South African history: Dutch Settlers arrive under the leadership of Jan van Riebeeck British occupation of the Cape 1800 onwards - the Zulu kingdom under King Shaka rises to power The Great Trek - Dutch and other settlers leave the Cape colony Anglo-Zulu war First Anglo-Boer war Second Anglo-Boer War The African National Congress (ANC) is founded South Africa becomes a republic Mandela is freed after 27 years in prison and opposition groups are unbanned South Africa's first democratic election South Africa has journeyed through many great obstacles to become a nation whose dream of unity and common purpose is within grasp of all its people. We must not lose sight of this dream. As proud stakeholders of this great country we are now called upon to join hands in the fight against a new threat that is targeting all areas of our society - no organisation, community or child is immune to its impact. For a copy of the full 2012/3 South African Cyber Threat Barometer report and other country supplements please visit the research section of our website. I am referring to the scourge of cybercriminal activity that is rapidly becoming a global concern and one that we as Africans need to prioritise. We hope this project and proposed initiatives will go a long way towards "rallying the troops" to urgently address the growing cyber threat facing our country. I wish to offer my sincere appreciation to the British High Commission for their funding and support to complete this vital research project. I also wish to convey my warmest thanks to all participating companies and teams for their input and independent review of this report. Your passion to make a positive impact in this country has been amazing to witness. I would finally like to acknowledge the Wolfpack team for their dedication shown in the research, analysis, layout and distribution of this report. I am very proud of what we have achieved. Corporate contact details: Craig Rosewarne Managing Director Wolfpack Information Risk (Pty) Ltd Building 1 Prism Office Park Ruby Close, Fourways Johannesburg, 2055 Telephone: info@wolfpackrisk.com Website: 1
3 Brazil History of Cyber Laws, Acts and organisations to combat cyber crime in Brazil Year Bill / Act Description 2008 Code of Criminal Procedure of Brazil The Brazilian Chamber of Deputies approved a law amending the Code of Criminal Procedure. According to the new law, criminal convictions for which the punishment exceeds 20 years of prison time will no longer trigger an automatic appeal for a new trial. The law also reduces the speaking time allotted to both the prosecution and the defense during a jury trial Penal Code of Brazil Criminal Code 1940 The Penal Code has two sections. The first distinguishes between felonies and misdemeanors and outlines the individual citizen's responsibilities under the law. The 1988 constitution proscribes capital punishment, except in case of war. The second section defines criminal behavior more comprehensively, spelling out crimes against persons, property, custom, public welfare, and public trust. Misdemeanors are also defined. Law no of 11 June 2002 adds chapter II-A to Section XI of the Penal Code which rules on the crimes of money laundering and corruption. For instance, article 337-B defines active bribery in international bussines transactions as the "promising, offering or giving any improper advantage to a feorign public official". Traffic of influence in international transactions is also punished when any advantages are promised in exchange for influencing an official act Legal Framework on Cybercrime Brazil has proposed a legal framework on cyber-crime to replace the Budapest Convention, judged too Euro-centric. Brazilian Senate s Substitute Act to the House Bill No.89 of 2003 ( Draft Law ) January, ARTICLE 19 analysed the Brazilian Senate s Substitute Act to the House Bill No.89 of 2003 ( Draft Law ). The Draft Law proposes the creation of new provisions relating to the prevention, detection and punishment of crimes committed with the use of the Internet. ARTICLE 19 is seriously concerned that a number of these provisions are antithetical to the rights to freedom of expression and information and therefore makes a number of recommendations to bring the Draft Law into compliance with international standards. 2
4 Industry Collaboration, Partnership Developments and Initiatives in Cybersecurity Organisation / initiative Brasilia-based Centre of Cyber Defence (CDCiber) Brazilian Federal Police Computer Forensic Unit Brazilian Internet Steering Committee Ccomgex Computer Forensic Unit Cybercrime Unit Description The government launched the Brasilia-based Centre of Cyber Defence (CDCiber) to protect Brazil s protect private infrastructure from attack. The budget for the CDCiber in 2012 is US$45 million to be allocated to at least four other acquisitions that include equipment, software and training of at least 500 officers. Has a strong increment of human and material resources due to the rising demand from BFP investigative teams. At this moment the CFU (central office) has a team of 21 forensic examiners and 5 administrative personnel and counts 3 specialised sections: o An operational section, which runs forensic examinations and supports investigations; o A training section and o A research & development section. Some Brazilian states don t have specialised cybercrime and computer forensic units. The state police and their forensic labs are also authorised to investigate cybercrime and analyse electronic evidence. The Federal or State Prosecution Offices are responsible for the prosecution on cybercrime. The BFU CFU participates at the Interpol Latin-Caribbean cybercrime Working Group The BFP CFU has acts as the national 24/7 point of contact. The Working Committees (CTs) of the Brazilian Internet Steering Committee (CGI.br) are responsible for the design and management of projects in areas that are essential to the operation and development of the Internet in Brazil. The mission of the CGI.br involves certain rights and responsibilities, which include: o Coordinating the allocation of Internet addresses (ips) and registration in the <.br> domain; o Establishing strategic directives related to the use and development of the Internet in Brazil; o Collecting, organizing and disseminating information on Internet services, including indicators and statistics. The military completed tenders for the purchase of an antivirus solution and a program that simulates cyber attacks, for a total of about $ 3.3 million. Both programs will be developed by Brazilian companies. The Ccomgex, which coordinates the purchase of antivirus and cyber attack simulator is part of CDCiber. The Antivirus, with a value of US$ 442,000 will be delivered by the company BluePex, Campinas (in the state of São Paulo), within 12 months. 1996, The Brazilian Federal Police (BFP) established two units that are responsible for the investigation of cybercrimes and analysis of forensic evidence. The Computer Forensic Unit is responsible, for the analysing of forensic evidence, its collection and in many cases for providing support to the Cybercrime Unit in its investigations. The Cybercrime Unit is the primary agency responsible for the investigation of offences against computer systems and information as well as for the investigation of offences by means of computers. The BFP CFU duties are defined by an Internal Act from the General Director Office. 3
5 Organisation / initiative CSIRTs Government Initiatives Law Enforcement NBSO/Brazilian CERT Organization of American States (OAS) Description The Brazilian Research Network (RNP) created it s own CSIRT (CAIS), followed by the Rio Grande do Sul State that created the CERT-RS. Other institutions including Universities and Telecommunication Companies announced their CSIRTs. More than 20 CSIRTs formed. Started a CSIRT contact Directory at NBSO, available at: The Presidential Security Office (GSI) has created task forces to discuss, among other subjects: A CERT for the Government; Internet Security Policies; Legislation; Use of Cryptography; Use of Free Software. Ministry of Justice s Federal Police initiatives: o 1995: first group of computer forensic experts was formed; o 1996: a department dedicated to computer forensics was created; member of the IOCE; o 1999: become a member of the International Web Police/InterGOV; o 2003: created their own CSIRT (CTR). NBSO/Brazilian CERT was created by the Brazilian Internet Steering Committee (CG-I.br) to respond to computer security incident reports and activity related to networks connected to the Brazilian Internet. NBSO, Brazilian CERT, is a FIRST member. Services include: o Provide a focal point for reporting incidents related to Brazilian networks (.br and ips assigned to Brazil); o Provide coordinated support in incident response; o Establish collaborative relationships (law enforcement, service providers, telephone companies, etc); o Increase security awareness and help new csirts to establish their activities. With the Organization of American States (OAS), Brazil is contributing to a cyber-security culture in South America that also involves technical cooperation. 4
6 Case Studies Cyber Threats, Attacks & Actions against Brazil Recently a group of hackers attacked the site of Brazil Central Bank and the pages of BMG banks, Citibank and PanAmericano were temporarily down. The group also claimed responsibility for attacks on the sites of banks Itaú, Bradesco, Banco do Brasil and HSBC, which took place recently. The attacks recorded so far include an attempted theft of keys and a denial of service. Their general cyber warfare simulator will train officers in at least 25 scenarios of various types of network attack similar to those used in military situations. According to general cyber warfare simulator will train officers in at least 25 scenarios of various types of network attack similar to the Army. The service interruption of government websites and the disclosure of the supposedly personal data of top-ranking politicians claimed by hacking collective LulzSec is part of a string of cyber-attacks that have taken place in Brazil recently. This is considered the largest cyber offensive in Brazilian history. The Brazilian government and presidency websites, Brasil.gov.br and Presidencia.gov.br were brought down. Other websites operated by government departments were also hit by the hacking attacks, such as the tax collection agency and the Ministry of Sports. The latter department also had supposed staff login details for restricted areas of its website leaked. The website of oil giant Petrobras was also hit. The company attributed the collapse to a high number of simultaneous accesses, highlighting that no damage to data had been caused. In a You Tube video, a representative of the Anonymous Brazilian arm said: Anonymous has been watching the widespread manipulation of information in Brazil for a long time and decided it s time to take a stance on it. A government without transparency and citizens lacking information are the greatest threats to democracy and Brazil is heading towards a country that is taking away the little freedom the population has left. Much of the information leaked was made public, but the attacks raise questions over the efficiency of the country s primary cyber security efforts. The Brazilian government is set to launch a cyber defense unit staffed by the Armed Forces to protect the country s critical infrastructure and enable the mitigation of cyber-attacks. A few days ago, a group of hackers attacked the site of Brazil Central Bank and the pages of BMG banks, Citibank and PanAmericano, which were temporarily malfunction. The group also claimed responsibility for attacks on the sites of banks Itaú, Bradesco, Banco do Brasil and HSBC, which took place recently. "The attacks we recorded so far are similar to those that happen in any company. Attempted theft of keys, denial of service, etc.. But the way in which you get a bank key is the same that can be used to obtain Confidential records of the Army. And since government sites had fallen, "said Guerra. According to general cyber warfare simulator will train officers in at least 25 scenarios of various types of network attack similar to the Army. Pricewatercooperhouse has recently released a study revealing that in 2011 hackers have stolen US$ 1 billion from companies in Brazil. On the top of that, BSA (Business Software Alliance) ranked Brazil the least prepared nation to adopt cloud computing technology among the 24 countries that account for 80 percent of the world s information and communications technology. 5
7
Supplement to the 2012/3 South African Cyber Threat Barometer. USA Case Study Report
Supplement to the 2012/3 South African Cyber Threat Barometer USA Case Study Report Foreword Africa is considered to be the cradle of mankind. There is evidence that some of the earliest people lived in
More informationSupplement to the 2012/3 South African Cyber Threat Barometer. Russia Case Study Report
Supplement to the 2012/3 South African Cyber Threat Barometer Russia Case Study Report Foreword Africa is considered to be the cradle of mankind. There is evidence that some of the earliest people lived
More informationSupplement to the 2012/3 South African Cyber Threat Barometer. India Case Study Report
Supplement to the 2012/3 South African Cyber Threat Barometer India Case Study Report Foreword Africa is considered to be the cradle of mankind. There is evidence that some of the earliest people lived
More informationThe 2012/3 SA Cyber Threat Barometer. Craig Rosewarne
The 2012/3 SA Cyber Threat Barometer Craig Rosewarne An improved cyber security framework for South Africa Research - Initiatives South Africa (Pty) Ltd Stakeholder Risk Management / Alignment to business
More informationCybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers cristine@cert.br Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationCybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationIncident Handling and Internet Security in Brazil
Incident Handling and Internet Security in Brazil Cristine Hoepers Centro de Estudos, Resposta e Tratamento de Incidentes de Segurança no Brasil Computer Emergency Response Team Brazil
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationCERT.br: Mission and Services
CERT.br: Mission and Services Marcelo H. P. C. Chaves mhp@cert.br Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/ Conferencia
More informationSTATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
More informationExecutive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
More informationPeace and Justice in Cyberspace
Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime
More informationCyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
More informationCouncil Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime
COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationCouncil of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
More informationTURNING THE RISING TIDE OF CYBERSECURITY THREATS
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
More informationCybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
More informationJustice, Crime Prevention and Security cluster update
Justice, Crime Prevention and Security cluster update Justice Minister Jeff Radebe gave an update on the Justice, Crime Prevention and Security (JCPS) cluster in parliament in March where he outlined various
More informationInformation Security Awareness Videos
Information Security Awareness Videos Marcelo H. P. C. Chaves mhp@cert.br CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br - Brazilian Internet Steering
More informationCERT.br Incident Handling and Network Monitoring Activities
CERT.br Incident Handling and Network Monitoring Activities Cristine Hoepers General Manager cristine@cert.br! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More informationSpeech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,
Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach, Organized by American Chamber of Commerce in Cyprus, 30 October
More informationBuilding up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationCYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationSUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through
More informationDECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
More informationGlobal Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
More informationMONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO - Podgorica, July CONTENTS 1. INTRODUCTION... 3 2. DEFINITIONS... 5 3. CYBER SECURITY MANAGEMENT SYSTEM... 8 3.1 METHOD OF MONITORING STARTEGY
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationEdward Lowery III. Special Agent in Charge Criminal Investigative Division, U.S. Secret Service. Prepared Testimony
Edward Lowery III Special Agent in Charge Criminal Investigative Division, U.S. Secret Service Prepared Testimony Before the United States Senate Committee on Homeland Security and Governmental Affairs
More information2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationViewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
More informationCISSA Cybersecurity capacity building workshop. May 2015
CISSA Cybersecurity capacity building workshop Good Practices in Developing Cybersecurity and Cybercrime Strategies Prof Anthoni van Nieuwkerk Centre for Defence and Security Management University of the
More informationCyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
More informationwww.bonddickinson.com Cyber Risks October 2014 2
www.bonddickinson.com Cyber Risks October 2014 2 Why this emerging sector matters Justin Tivey Legal Director T: +44(0)845 415 8128 E: justin.tivey The government estimates that the current cost of cyber-crime
More informationFederal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
More informationPolicing Together. A quick guide for businesses to Information Security and Cyber Crime
Policing Together A quick guide for businesses to Information Security and Cyber Crime This leaflet has been produced by the Surrey and Sussex Cyber Crime Unit Who is this leaflet for? This leaflet will
More informationThe main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationCybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
More informationIncident Handling in Brazil
Incident Handling in Brazil Cristine Hoepers cristine@cert.br! Centro de Estudos, Resposta e Tratamento de Incidentes de Segurança no Brasil - CERT.br Núcleo de Informação e Coordenação do Ponto br - NIC.br
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationThe purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.
National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this
More informationMultilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?
2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 2015 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies
More informationA COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationMigration/ Asylum. Co-operation in the field of drugs
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
More informationNational Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
More informationESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationTHE CRIMINAL JUSTICE RESPONSE TO CORRUPTION (IN THE CONTEXT OF NEPAL)
139TH INTERNATIONAL TRAINING COURSE RESOURCE VISITING MATERIAL EXPERTS SERIES PAPERS No.79 THE CRIMINAL JUSTICE RESPONSE TO CORRUPTION (IN THE CONTEXT OF NEPAL) Rajan Prasad Bhattarai * I. HISTORICAL BACKGROUND
More information2. Cyber security research in the Netherlands
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationWHITEPAPER. Recall Cyber Intelligence
WHITEPAPER Recall Cyber Intelligence Table of Contents isolv Technologies Solves Employee Insider Threats 3 Case Study 3 The Threat 3 The Challenges 4 isolv s Solution: Recall Cyber Intelligence 4 The
More informationNew Horizons Regional Education Centers (C&T) Pacing Guide
New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003 Introducing
More informationCONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE
Strasbourg, 29 November 2006 CCPE (2006) 05 Rev final CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE as approved by the Committee of Ministers
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationRegional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine.
Anti-Corruption Network for Transition Economies OECD Directorate for Financial, Fiscal and Enterprise Affairs 2, rue André Pascal F-75775 Paris Cedex 16 (France) phone: (+33-1) 45249106, fax: (+33-1)
More informationRETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
More informationCO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
More informationNew challenges in Data privacy.
New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013
More informationECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye
ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye Director, ISS Regional Office for West Africa dbarakamfitiye@issafrica.org 0 www.issafrica.org OUTLINE Historical Overview
More informationCyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority
More informationEnterprise Backup and Recovery Solution.
Key Elements to Consider when Choosing an Contents: Page 2 Introduction Page 3 The Problem Page 4 The Need Page 5 The Solution Enterprise Backup and Recovery Solution. 2 INTRODUCTION Your data is at risk
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationATTORNEY GENERAL S GUIDELINES ON PLEA DISCUSSIONS IN CASES OF SERIOUS OR COMPLEX FRAUD
ATTORNEY GENERAL S GUIDELINES ON PLEA DISCUSSIONS IN CASES OF SERIOUS OR COMPLEX FRAUD A FOREWORD A1. These Guidelines set out a process by which a prosecutor may discuss an allegation of serious or complex
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationNew Horizons Regional Education Centers (C&T) Pacing Guide
New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Handout & Lecture Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003
More informationDistributed Honeypots Project: How It s Being Useful for CERT.br
Distributed Honeypots Project: How It s Being Useful for CERT.br Cristine Hoepers cristine@cert.br Klaus Steding-Jessen jessen@cert.br Computer Emergency Response Team Brazil - CERT.br http://www.cert.br/
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationThe Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
More informationMinister Shatter presents Presidency priorities in the JHA area to European Parliament
Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency
More informationE-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
More informationThe Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
More informationInternational Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION
International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationOuagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationIdentifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
More information立 法 會 Legislative Council
立 法 會 Legislative Council LC Paper No. CB(4)1212/14-15(04) Ref. : CB4/PL/ITB Panel on Information Technology and Broadcasting Meeting on 17 July 2015 Updated background brief on information security Purpose
More informationNavigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh
Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?
More informationChallenges and Best Practices in Fighting Financial Fraud in Brazil
Challenges and Best Practices in Fighting Financial Fraud in Brazil Cristine Hoepers cristine@cert.br CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br -
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationSENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
More informationRoadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
More informationTHE WHITE HOUSE Office of the Press Secretary
FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly
More informationCYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationCRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC
124 CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC Vladimíra Trnkócyová 56 General background Historical overview and future vision of investigation in the Slovak Republic The 2001 Accession Partnership
More information