FORMULATION OF CYBER SECURITY STRATEGY FOR PAKISTAN



Similar documents
MULTI ANNUAL WORK PLAN

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

CYBER SECURITY IN INDIA'S COUNTER TERRORISM STRATEGY

CYBER SECURITY IN INDIA

What legal aspects are needed to address specific ICT related issues?

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cyber Diplomacy A New Component of Foreign Policy 6

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Capacity Building in Cyberspace Security

National Cyber Security Policy -2013

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

How To Strengthen Nuclear Security

Real world cyber crime cases

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Executive Director Centre for Cyber Victim Counselling /

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga

Cyber Security ( Lao PDR )

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

National Cyber Security Strategy

Cybersecurity in the Commonwealth: Setting the Stage

SocioBrains. Cyber security threat in Pakistan: causes Challenges and way forward

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

International Journal of Enterprise Computing and Business Systems

Home Security: Russia s Challenges

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

COUNCIL OF THE EUROPEAN UNION. Brussels, 13 February 2002 (19.02) (OR. es) 5712/1/02 REV 1 ENFOPOL 18

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

How do we Police Cyber Crime?

The National Cyber Security Strategy (NCSS) Success through cooperation

Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

TITLE III JUSTICE, FREEDOM AND SECURITY

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Financial Information Unit (FIU)

64/ A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and

Optional Protocol on the sale of children, child prostitution and child pornography

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Code of Virginia, 1950, as amended, Sections , :1, , , and

New-Age Undergraduate Programme

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

DATA PROTECTION LAWS OF THE WORLD. India

CYBERCRIME AND THE LAW

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Viewpoint: Implementing Japan s New Cyber Security Strategy*

Cyber Crimes in India A Closer look

EUROPEAN EXTERNAL ACTION SERVICE

ITU Global Cybersecurity Agenda (GCA)

Honourable members of the National Parliaments of the EU member states and candidate countries,

ASEAN s Cooperation on Cybersecurity and against Cybercrime

How To Discuss Cybersecurity In European Parliament

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises

Cyber security Indian perspective & Collaboration With EU

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Cyber Security and Critical Information Infrastructure

A specification for security-minded building information modelling, digital built environments and smart asset management

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

Policies and Practices on Network Security of MIIT

Cyber Risks and Insurance Solutions Malaysia, November 2013

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

Cyber Security Strategy of Georgia

Securing Critical Information Assets: A Business Case for Managed Security Services

Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,

Capacity Building to Strengthen Cybersecurity: Thailand Update

Justice, Crime Prevention and Security cluster update

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Cybercrime in Canadian Criminal Law

INTEGRATING THE TWO WORLDS OF PHYSICAL AND LOGICAL SECURITY

Cyber security Country Experience: Establishment of Information Security Projects.

How To Protect Yourself From Cyber Crime

Ambassador Christian Strohal Director of the OSCE Office for Democratic Institutions and Human Rights (ODIHR) Wednesday, 31 March 2004

Special Focus: Fighting Botnets

Transcription:

FORMULATION OF CYBER SECURITY STRATEGY FOR PAKISTAN NEED & CHALLENGES DR TUGHRAL YAMIN AUTHOR OF CYBER CBMs BETWEEN PAKISTAN & INDIA

CHALLENGES LACK OF CYBER AWARENESS NO CLEAR CUT NATIONAL CYBER POLICY DIGITAL RIGHTS & OBLIGATIONS NO NATIONAL CYBER FORUM TO SHARE BEST PRACTICES IN CYBER SECURITY ABSENCE OF REGIONAL COOPERATION UNCHECKED HACKTIVISM

CYBER AWARENESS CYBER SECURITY HAS YET TO BLIP ON THE NATIONAL RADAR NO POLITICAL PARTY HAS INCLUDED IT ON ITS MANIFESTO NO LEGISLATION ON CYBER ISSUES IN THE PARLIAMENT POLICE DEPARTMENT, JUDICIARY & LAWYERS HAVE LITTLE/NO KNOWLEDGE AND EXPERIENCE IN INVESTIGATING & PROSECUTING DIGITAL CRIMES. NO CHAMBER OF COMMERCE RUNS ANY CYBER SECURITY COURSE OR GIVES ADVICE TO BUSINESSES TO SECURE THEIR DIGITAL ENTERPRISES. NO POLICY IN PREVENTING IMPORT OF HARDWARE WITH EMBEDDED TECHNOLOGIES. NONE OF THE GOVERNMENT AGENCY, ELECTRONIC MEDIA, HIGHER EDUCATION INSTITUTE HAS A CYBER SECURITY POLICY. DIGITALLY ADVANCED COUNTRIES ORGANIZE CYBER AWARENESS DAYS/WEEKS.

LACK OF NATIONAL CYBER POLICY NATIONAL CYBER MANDATE & DIVISION OF TURF AMONG MULTICIPLE STAKEHOLDERS I.E. IT MINISTRY, MOI, MOST, MOD, JS HQ, INT AGENCIES NATIONAL CYBER STRATEGY ISSUES SUCH AS PROTECTION OF CRITICAL INFRASTRUCTURE & RESPONSE TO COMPUTER EMERGENCIES CYBER TERRORISM CYBER CRIMINAL CODE LAWS TO REGULATE ONLINE BUSINESSES CYBER CENSORSHIP RULES & POLICIES FOREIGNPOLICY HOW TO RESPOND DIPLOMATICALLY TO CYBER INCIDENCES POLICY FOR DELEGATES ATTENDING THE GGE CONFERENCES AT THE UN, INTERNET GOVERNANCE CONFERNENCES & INTERNATIONAL SEMINARS POLICY GUIDELINES FOR ENGAGEMENT WITH ITU DEFENCE POLICY HOW TO REACT TO VARIOUS KINDS OF ATTACKS

NATIONAL CYBER SECURITY FORUM GOVT TO CREATE A NATIONAL CYBER SECURITY FORUM AND DESIGNATE A LEAD MINISTRY /AGENCY LEAD MINISTRY TO PUBLISH A NATIONAL CALENDAR FOR HOLDING CYBER SECURITY SEMINARS LEAD MINISTRY TO ORGANIZE NATIONAL CYBER SECURITY DRILLS MORE THAN ONCE ANNUALLY LEAD MINISTRY TO RUN COURSES FOR PARENTS TO DIGITALLY MONITOR THEIR CHILDREN UNIVERSITIES TO GROUP TOGETHER TO PROMOTE CYBER SECURITY EDUCATION UNDER THE UMBRELLA OF THE HEC

ABSENCE OF REGIONAL COOPERATION COUNTRIES ARE COOPERATING BILATERALLY AND EN BLOC IN CYBER SECURITY ISSUES I.E. ASEAN IS VERY ACTIVE IN THIS REGARD. THERE IS NO BILATERAL OR REGIONAL COOPERATION IN SOUTH ASIA. SAARC CAN PROVIDE AN IMPORTANT FORUM FOR CYBER SECURITY

DIGITAL RIGHTS & OBLIGATIONS IS OUR GOVT AWARE OF ITS NATIONAL DIGITAL OBLIGATIONS? IN MATTERS LIKE ENFORCING UN CONVENTION ON RIGHT OF CHILDREN (UNRC) PREVENTING CHILDREN PORNOGRAPHY THROUGH DIGITAL MEANS WHAT ARE A CITIZEN S DIGITAL RIGHTS? TO ACCESS ALL KINDS OF WEBSITES WHAT ARE THE CITIZEN S OBLIGATIONS? TO PREVENT CYBER BULLYING/SEXUAL HARRASMENT & REPORTING ILLICIT ACTIVITY IN CYBER SPACE

CENSORSHIP NATIONAL POLICY FOR HANDLING DIGITAL INCIDENTS E.G. THE YOUTUBE INCIDENT STRONGER FILTERS FOR PORNOGRAPHIC SITES EFFICIENT MECHANISMS TO CURB PREVENTING SPREAD OF HATE LITERATURE & OPERATIONS OF PROSCRIBED ORGANISATIONS

UNCHECKED HACKTIVISM UNCONTROLLED HACKTIVISM NOW FORMS PART OF THE INDIA PAKISTAN RIVALRY INDEPENDENT GROUP OF HACKERS WITH COLOURFUL NAMES LIKE PAKISTAN CYBER ARMY, INDIAN CYBER ARMY, PAKISTAN HACKERS CLUB, PAKHAXORS, PREDATORS PK, HINDUSTAN HACKERS ORGANISATION DEFACE AN INDIAN OR PAKISTANI WEBSITE. MOSTLY THE HOMEPAGE IS LITTERED WITH POORLY- WORDED PATRIOTIC STATEMENTS AND TAUNTS THAT OFTEN PROVOKE THE OTHER NATION S HACKING GROUPS TO RETALIATE. THESE ATTACKS HAVE BEEN OCCURRING INTERMITTENTLY SINCE THE LATE 90S, THEY SEEM TO HAVE ESCALATED SINCE THE MUMBAI TERRORIST ATTACKS IN 2008. WHILE PREVIOUSLY THESE HACKS TARGETED POPULAR BUT HARMLESS WEBSITES, THE TREND HAS GRADUALLY MOVED TO DEFACING MAJOR GOVERNMENT AND LAW ENFORCEMENT WEBSITES. THE HOMEPAGE IS DEFACED AND REPLACED WITH JUVENILE COMMENTS. OFTEN, THESE HACKERS BLOCK VISITORS ACCESS TO IMPORTANT INFORMATION. SUCH ACTS, OF COURSE, LEAD TO MORE CYBER DEFACEMENTS, WITH THE MOST COVETED TARGETS BEING GOVERNMENT WEBSITES. A CYBER ATTACK IS USUALLY TRIGGERED BY SOME ACT OF VIOLENCE OR AGGRESSION FROM THE RIVAL COUNTRY. WITHIN A SPAN OF HOURS, THESE GROUPS OF HACKERS LOCATE A HIGH-VALUE WEBSITE THAT DOESN T HAVE ADEQUATE CYBER SECURITY IN PLACE, AND GAINS ROOT ACCESS TO THE WEB SERVER BY HACKING INTO IT.

Q&A