Cybersecurity. Canisius College
|
|
- Beatrice Stokes
- 8 years ago
- Views:
Transcription
1 Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never before has there been so much information digitized and available electronically. People and their governments struggle to preserve norms of privacy in a new digital age and sometimes tensions between privacy and security arise. The recent case involving Edward Snowden highlights just how important cybersecurity truly is in the world today. In this case a citizen was exposing secrets of his own state and that s not the only high-profile case of this kind. The legal case, trial, and conviction of Private Chelsea (Bradley) Manning in the United States for releasing secret documents to Wikileaks has provided proof that governments do not take breaches of cybersecurity lightly. Cyber-attacks against governments and corporations are also on the rise annually sometimes with origins traceable to state militaries, sometimes to non-government sources. In this atmosphere of cyber insecurity, states are looking for solutions to protect themselves and their citizens. The Issue McAfee, a security software company, produces its own research on cyberattacks both annually and quarterly. The most recent quarterly report is that from the first quarter of The report is quite extensive but a few conclusions about personal cybersecurity are worth noting. For example, one major point of the report was that mobile security has seen more breaches in the first quarter of 2013 than in all of the previous year. The report also notes the development of more advanced malware than they have ever witnessed in the past. 1 This malware is associated with cybercrime, which involves theft and fraud made possible by gaining access to individual users private data. Concurrent with the rise in personal cybercrime is the development of states abilities to carry out cyber attacks. Many countries have been implicated as victims, perpetrators, or both, including the United States, Russia, China, Iran, Israel, and many others, and allegations are leading to concerns about cyber weapons and even cyber arms races. Stuxnet and Flame are just two examples of specific cyber weapons that have made their way to headline news in the United States and around the world. Stuxnet is a computer worm attributed to the United States that 1
2 infiltrated and damaged Iranian nuclear facilities. Similarly, Flame is malware attributed to the Israeli government that has infiltrated the computer networks of other Middle Eastern States. Although two of the biggest stories of state of the art cyber weapons came from these two states, most of the developed states are producing similar weapons. For example when the Russian army invaded Georgia in 2008, a cyber weapon was developed to jam Georgian computers, with the assistance of Russian civilians. 2 Another story comes from the United States with regard to its development of cyber weapons. As explained in Computer Weekly, The US plans to fast-track the development of cyber weapons to give it the ability to create the means to attack specific targets within months and even days. The rapid development process is designed to respond to urgent, mission critical needs when the risk to operations and personnel is unacceptable, said the Washington Post, citing Pentagon a report. 3 While these measures create security for some, they also create insecurity that needs to be addressed by the global community. Some see the development and deployment of cyber weapons as an emerging threat that destabilizes global security and creates pressure for cyber arms races that could spiral out of control. Another pressing issue for the international community is cyber terrorism. The Center for Strategic and International Studies (CSIS) defines cyber terrorism as, "The use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population." 4 Research shows that cybercrime is on the rise; as states seek out their own solutions to protect themselves and their citizens from these cybercrimes, the international community through the United Nations has also conducted its own research on the issue. A recent UN study called the Comprehensive Study on Cyber Crime concluded the following: The technological developments associated with cybercrime mean that while traditional laws can be applied to some extent legislation must also grapple with new concepts and objects, such as intangible 'computer data,' not traditionally addressed by law At the national level, cybercrime laws most often concern criminalization establishing specialized offences for core cybercrime acts. Countries increasingly recognize the need, however, for legislation in other areas. Compared to existing laws, new or planned cybercrime laws more frequently address investigative measures, jurisdiction, electronic evidence, and international cooperation. 5 The UN consensus, released June 7 th of 2013, was one of the first major steps that the charter has made in addressing the issues of cyber security, but it is not enough to call for individual member-states to develop laws that deal with cybercrime within their own borders. Cyber security is a transnational issue and requires coordination and cooperation across borders. The People s Republic of China (PRC) has been accused of generating cyber attacks, but the government of the PRC has also been a leading voice among those calling for transnational
3 cooperation to improve cyber security. 6 In the wake of the sensationalized Snowden affair and just a few days after China called for cyber security measures to be passed by the international community, Russia and the United States responded. On June 17th, the two states signed a bilateral agreement, stating that they would keep each other updated in real time on threats to security so as to reduce the risk of conflict in cyber space. The agreement came together as part of a broader effort to improve cooperation, including issues of counterterrorism and weapons of mass destruction. 7 Bilateral agreements between leading states is an important step toward global security, and cooperation between P-5 member-states Russia and the United States is encouraging. However, an endless series of bilateral agreements is not as desirable as broad-based global cooperation. The United Nations Security Council can build a strong foundation for global cooperation on cyber security by issuing a resolution pledging that all member-states should work together on this vital issue. What is being done? The United Nations will hold a summit meeting on the issue in Azerbaijan in But can the world afford to wait that long for UN leadership to emerge? A resolution from the UN Security Council would emphasize the importance of global cooperation on cybersecurity and would probably increase the chances of success at the summit meeting. As one report published on July 31 st, 2013 states about next year s summit: Taking into account that Azerbaijan is a UN Security Council non-permanent member, the UN proposed the country to hold a summit on cyber security in Baku The International Telecommunication Union (ITU) together with the [Azerbaijani IT] Ministry plan to organize an international conference on cyber security, to be held within the 19th International Exhibition and Conference BakuTel-2013 (Dec. 2-5). An expert meeting and a ministerial meeting of the member-states are expected to be held within the conference, [and] the Baku Declaration on cyber security is expected to be adopted following the conference [which would be] the first and single resolution on cyber security in the world. 8 There is no way to predict the outcome of this accord however the summit itself is of great significance. This is a very young issue with no certainty as to its direction. Recent years have shown that some solution or agreement must originate, because tensions are on the rise in the international community. The task will only become more difficult as technology increases, and states become more and more prone to construct protections for them. That is why it is imperative that the United Nations reaches consensus on the road ahead for cyber security, and crucial for the UN Security Council to lead the way by working toward a meaningful resolution
4 Questions to consider when preparing for Security Council deliberations on cybersecurity: What can member-states of the UN do to improve national and transnational cybersecurity? Are there precedents in the UN Security Council s resolutions that can be extended to the emerging issue-area of cybersecurity? Is cyberterrorism a big problem? If so, what can the UN Security Council do about it? Who or what is hurt by international cyberattacks? How can the UN Security Council prevent or reduce the damage associated with cyberwarfare or even better, to prevent cyberattacks from happening at all? Should the UN Security Council discourage the development of cyberweapons? What is your state s position on cybersecurity? Is your country developing cyber weapons or a cyberwarfare doctrine? What would your state be willing to do to contribute to improved global security in this area? Is cyber-warfare to be treated as any other form of war? If not, will a standard of just cyberwarfare develop? Is cyberwarfare a precursor to war, or an act of war itself? Sources and other valuable links: Cited Sources:
5 Useful Sources, some with excerpts UN Security Council Page: Are cyber security and international cooperation at odds? (December 2009; news) It has quickly transformed the way we live our lives, from the way we communicate to the way we do business. The Internet has evolved rapidly and with it the threats to international peace and security the idea of an international framework governing the rules of cyberspace has taken on a renewed spirit in public discussions. United Nations Making Slow Progress on Cybersecurity (July 2010; opinion) The U.N. has a chance to really make a difference with cybersecurity. Let's hope that diplomats realize that we are dealing with a real-time issue and respond with 21st century solutions rather than 19th century pomp and circumstance. US to fast-track cyber weapon development (12 April 2012; news) The US plans to fast-track the development of cyber weapons to give it the ability to create the means to attack specific targets within months and even days. The rapid development process is designed to respond to "urgent, mission critical" needs when the risk to operations and personnel is unacceptable, said the Washington Post, citing Pentagon a report. Security researchers discover powerful cyber espionage weapon 'Flame' (28 May 2012; news) Security researchers have discovered a powerful cyber weapon with functionality exceeding that of all other known threats. The advanced malware, which is said to be attacking targets in several countries, was discovered by security firm Kaspersky Lab during an investigation prompted by the International Telecommunication Union (ITU). The malicious program, detected as Worm.Win32.Flame, is designed to carry out cyber espionage Kaspersky calls for international cooperation on cyber security (31 January 2013; news) Governments must understand that cyber weapons are extremely dangerous and have to agree not to use them, according to Eugene Kaspersky, founder and chief of security firm Kaspersky Lab. It would be good if governments were to sign a treaty against the use of cyber weapons in the same way as they have done against nuclear, biological and chemical weapons, he told Computer Weekly Cybersecurity Strategies Raise Hopes of International Cooperation (Summer 2013; expert analysis)
6 Statement on Consensus Achieved by the UN Group of Governmental Experts On Cyber Issues (7 June 2013; press statement) The UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security agreed that confidence-building measures, such as high-level communication and timely information sharing, can enhance trust and assurance among states and help reduce the risk of conflict by increasing predictability and reducing misperception. The Group agreed on the vital importance of capacity-building to enhance global cooperation in securing cyberspace. The Group reaffirmed the importance of an open and accessible cyberspace, as it enables economic and social development. And, the Group agreed that the combination of all these efforts support a more secure cyberspace. Furthermore, the Group affirmed that international law, especially the UN Charter, applies in cyberspace. International Cyber Security at the UN: Between Doom and Hesitant Optimism (11 June 2013; blog post) Congruen with three, week-long sessions by the UN Group of Governmental Experts (GGE) on cyber security issues, the German embassy to the UN in cooperation with the EastWest Institute hosted an expert panel, entitled Cyber Security - Uncharted waters for the UN. Yes, the group maintained, international law and even the UN Charter apply to cyberspace. However, the path to consensus among member states on a global framework will be, not surprisingly, long and arduous. After Snowden revelations, China calls for cyber security regulations (14 June 2013) Foreign Ministry spokesperson Hua Chunying said at a regular briefing on Friday, "The international community should come up with regulations on cyber security. What cyberspace needs is not war or hegemony, not irresponsible attacks or accusations, but regulation and cooperation." Ms. Hua said [that] China was of the view that "international regulations should be made within the framework of the United Nations". U.S. and Russia sign pact to create communication link on cyber security (17 June 2013; news) The United States and Russia have signed a landmark agreement to reduce the risk of conflict in cyberspace through real-time communications about incidents of national security concern The accord is a rare positive development in an area of national security otherwise dominated by gloomy assessments of increased threats and capabilities among other nations and terrorists. UN offers Azerbaijan to host summit on cyber security (31 July 2013; news) The International Telecommunication Union (ITU) together with the [Azerbaijani Communications and IT Ministry] plan to organize an international conference on cyber security, to be held within the 19th International Exhibition and Conference BakuTel-2013 (Dec. 2-5). The Baku Declaration on cyber security the first and single resolution on cyber security in the world is expected to be adopted within the summit. In classified cyberwar against Iran, trail of Stuxnet leak leads to White House (18 August 2013; news) /?page=all The Obama administration provided a New York Times reporter exclusive access to a range of highlevel national security officials for a book that divulged highly classified information on a U.S. cyberwar on Iran s nuclear program, internal State Department s show.
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationThe main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationHarmful Interference into Satellite Telecommunications by Cyber Attack
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
More informationThe threats which were perceivable 20 years ago differ greatly from our ever increasing
1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different
More informationThe Cyber Security Challenge: What Can be Done?
The Cyber Security Challenge: What Can be Done? Swiss Business Associa=on Singapore Grand HyaB, 22 October 2015 Presenta)on by Daniel Stauffacher President, ICT4Peace Founda=on www.ict4peace.org Cybersecurity
More informationworking group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
More informationInhibition of an Arms Race in Outer Space
Inhibition of an Arms Race in Outer Space Introduction Jinseong Joo The exploration and use of outer space shall be for peaceful purposes and should be carried out for the benefit and in the interest of
More informationNew Battlegrounds: The Future of Cyber Security and Cyber Warfare
New Battlegrounds: The Future of Cyber Security and Cyber Warfare Information and communications technologies are part of daily life. They are helping to revolutionize health and education, transform the
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationSummary. Russian-Dutch Bilateral Seminar
Summary Russian-Dutch Bilateral Seminar "THE ROLE OF NUCLEAR INDUSTRY IN NUCLEAR SECURITY GOVERNANCE: MOVING TO THE 2014 NUCLEAR SECURITY SUMMIT IN THE HAGUE" On September 3, 2013 PIR Center and the Embassy
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationThe final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national
More informationUNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015
UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum
More informationHome Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
More informationDear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.
Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN
More informationNATO & Cyber Conflict: Background & Challenges
NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented
More informationDECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
More informationAN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH
AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationResearch Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
More informationA Reluctant Cyber Security Agreement between the US and China
16 November, 2015 A Reluctant Cyber Security Agreement between the US and China Dr. Omair Anas* Three months after the biggest data theft from the American networks, the US and China have agreed to cooperate
More informationSTRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
More informationCybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.
Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information
More informationODUMUNC 39. Disarmament and International Security Committee. The Future of Cyber Intelligence. By: Joseph Espinoza
ODUMUNC 39 Disarmament and International Security Committee Introduction: In 2014, a security report showed that, on average in the United States, a new and unknown malware variant was being downloaded
More informationTheme: The Growing Role of Private Security Companies in Protecting the Homeland.
Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
More informationThe BGF-G7 Summit Initiative Ise-Shima Norms
The BGF-G7 Summit Initiative Ise-Shima Norms Governor Michael Dukakis Professor Thomas Patterson Nguyen Anh Tuan Professor John Savage Professor Derek Reveron Allan Cytryn Ryan Maness Boston, May 9 th
More informationThank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
More informationChairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
More informationEl Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
More informationHow Effective are International Approaches for Global Cyber Security?
International Pugwash Workshop: Cyberwar & Cyberpeace How Effective are International Approaches for Global Cyber Security? Berlin, 23 October 2015 1 Numerous states are pursuing military cyber-capabilities.
More informationVIENNA MODEL UNITED NATIONS CLUB
VIENNA MODEL UNITED NATIONS CLUB STUDY GUIDE APRIL SESSION 2013 CYBER SECURITYAND CYBER WARFARE 1 INTRODUCTION With anever-increasingnumber of technological improvements and the expansion of online services
More informationPanel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
More informationCyber Confrontation: Hackers Convincing Victory Over the Security Industry
Your texte here. Cyber Confrontation: Hackers Convincing Victory Over the Security Industry Ilia Kolochenko, High-Tech Bridge, CEO Regional Cyber Security Summit 20 th of April 2014 From where does the
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
More informationRUSSIA CHINA NEXUS IN CYBER SPACE
RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationCyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.
Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror
More informationA Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationToday s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
More information"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information
"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South
More informationFINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
More informationGeneral Assembly. United Nations A/69/723
United Nations A/69/723 General Assembly Distr.: General 13 January 2015 Original: English Sixty-ninth session Agenda item 91 Developments in the field of information and telecommunications in the context
More informationCybersecurity: Taking Stock and Looking Ahead
Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity
More informationWhat legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
More informationUN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
More informationObama s Cybersecurity Plan
SECURITY TECHNOLOGY POLICY PAPERS SERIES 1 Spring 10 Obama s Cybersecurity Plan Marianne STONE Geest-MSH - Paris Sciences Po Paris Columbia University, School of International and Public Affairs New York
More informationA COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
More informationFive Principles for Shaping Cybersecurity Norms
TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More informationAppendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
More informationCybersecurity and United States Policy Issues
Global Security Studies, Summer 2014, Volume 5, Issue 3 Cybersecurity and United States Policy Issues Cristina Berriz Peace, War and Defense Program University of North Carolina at Chapel Hill Chapel Hill,
More informationChairman Johnson, Ranking Member Carper, and Members of the committee:
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationF A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations
Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014
More informationCybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist April 17, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
More informationCybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist December 26, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
More informationCyberterrorism: Addressing the Challenges for Establishing an International Legal Framework
Edith Cowan University Research Online Australian Counter Terrorism Conference Security Research Institute Conferences 2012 Cyberterrorism: Addressing the Challenges for Establishing an International Legal
More informationGeneral Assembly. United Nations A/66/359
United Nations A/66/359 General Assembly Distr.: General 14 September 2011 Original: English Sixty-sixth session Item 93 of the provisional agenda* Developments in the field of information and telecommunications
More informationThe Cancer Running Through IT Cybercrime and Information Security
WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:
More informationEspionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
More informationPresenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations
TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights
More informationCyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage
Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies
More informationCybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
More informationCybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist April 26, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
More informationActive Engagement, Modern Defence
Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,
More informationCO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
More informationSecurity concerns and the desire to reduce fossil fuel emissions have led the United Nations to take up the topic of nuclear power.
Topic 1: Nuclear Power Security concerns and the desire to reduce fossil fuel emissions have led the United Nations to take up the topic of nuclear power. The United Nations is concerned with the spread
More informationS. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
More informationEvolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance
Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats
More informationASIA: THE CYBERSECURITY BATTLEGROUND
Statement before the House Foreign Affairs Committee, Subcommittee on Asia and the Pacific ASIA: THE CYBERSECURITY BATTLEGROUND A Statement by James A. Lewis Director and Senior Fellow, Technology and
More informationA New Obstacle For Cyberinsurance Coverage
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com A New Obstacle For Cyberinsurance Coverage Law360,
More informationCybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
More informationTrends Concerning Cyberspace
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
More informationConfidence-building and international agreement in cybersecurity
Confidence-building and international agreement in cybersecurity James Andrew Lewis The global digital network has become the backbone of the world economy and a significant new venue for attack, but there
More informationBWC/CONF.V/COW/WP.28 STOCKPILING OF BACTERIOLOGICAL 27 November 2001 (BIOLOGICAL) AND TOXIN WEAPONS AND ON THEIR DESTRUCTION PROPOSALS
FIFTH REVIEW CONFERENCE OF THE STATES PARTIES TO THE CONVENTION ON THE PROHIBITION OF THE DEVELOPMENT, PRODUCTION AND BWC/CONF.V/COW/WP.28 STOCKPILING OF BACTERIOLOGICAL 27 November 2001 (BIOLOGICAL) AND
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationCLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee
More informationFINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
More informationCybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationResolution adopted by the General Assembly on 8 September 2006. [without reference to a Main Committee (A/60/L.62)]
United Nations A/RES/60/288 General Assembly Distr.: General 20 September 2006 Sixtieth session Agenda items 46 and 120 Resolution adopted by the General Assembly on 8 September 2006 [without reference
More informationComputer and Network Security in Higher Education
Mark Luker and Rodney Petersen Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass,
More informationOffensive capabilities
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
More informationQuestion of Cyber security Maria Paek (President)
Question of Cyber security Maria Paek (President) Introduction The words cyber terrorism and cyber security have been floating around media headlines, recently thrust into heavy attention as large-scale
More informationVictims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats. Dr.
Victims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats Dr. Michael Kilchling "The Member States of the Council of Europe and the
More informationExecutive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
More informationCybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationNSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
More informationGlobal IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
More informationKeynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationDoes NATO s Article V Genuinely Protect Its Members?
Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful
More informationMaritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
More informationTHE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY
前 沿 探 索 THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY By Lt Col Jose Luis Llagran Bonilla 1 (Ecuador) I. Introduction Cyberspace is an interdependent network of information technology infrastructures
More information