cyber security cooperation

Post on 13-Apr-2017

93 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber Security CooperationCyber Army Competitions

Sanjida YeasminResearch AssistantBangladesh Institute of Peace and Security Studies (BIPSS)

2

Framing the Issue: A Comprehensive Approach to Cyber Security

Cyber security requires shared solutions to shared threats.

Cyber security is a dynamic, not static process. Cyber threats know no borders.

Cyber crime includes: Including illegal access (unauthorized access), illegal interception (by technical

means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.

Categories of Cyber Crime: it can be divided basically in the following three categories.

Cyber-crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail.

The second category of Cyber-crimes is that of Cyber-crimes against all forms of property. These crimes include computer vandalism, transmission of harmful programmes.

The third category of Cyber-crimes relate to Cyber-crimes against Government.

Areas of Threat

Cyber Terrorism Cyber Radicalization Threat to Financial Infrastructure Threat to Governance Threat to Military Capacity

Cyber Terrorism To qualify as cyber terrorism, an attack should result in violence

against persons or property, or at least cause enough harm to generate fear.

There are various reasons why cyber attacks are an attractive choice for terrorists such as: They can target and affect large numbers of people with less

resources. It enables terrorists to remain unknown.

Contd… Mostly, attacks are easy to carry out. There is no physical barriers or check points that they

have to cross. The speed and form of attacks are not dependent on the

connection speed of the attacker. A combination of both physical terrorism and cyber

terrorism is thought to be the most effective use of cyber terrorism.

9

The Concept of Cyber Radicalisation

Groups and IndividualsBecome Radicalised

through internet

Advocating for Violence against the Dominant

Will of the Society through internet

By P

roduct of Radicalisation

Extremism, Militancy and Terrorism

Formulate plans, Raise and launder funds, Spread propaganda, Communicate securely with the members (internal

communication), Share information and knowledge with similar groups

(external communities), Command and control, Make research and development, Recruit new members, Generate international support, Gather intelligence, Make information warfare on behalf of the nations.

Terrorist groups radicalize people through: Example- ISIS and AQIS

Threat to financial Institution

Unencrypted Data New Hacker Opportunities Foreign-Sponsored Attacks Insecure Third-Party Services Changed or Manipulated Data Malware Attacks Threat to stock exchange

Threat to Transportation

Metros and Sub ways Civil aviation Sea movement

Threat to Military Capacity

Cyber Space as a new battlefield Threat to weapon system Adversaries are well aware of cyber warfare new

doctrine Terrorists developing cyber capabilities Military communications & critical infrastructure

are vulnerable and prone to an over-reliance on existing civilian networks

Threat to Governance

Telecommunications Energy networks & safety systems Transportation- air safety & border security Defense & security: data networks and communications Banking & financial services Government services: E-Government

Why we need cooperation in the aspect of cyber security

Ensuring free flow of information Responding to increasingly serious risks Enhancing risk-based approach Acting in partnership based on social responsibilities

Areas of cooperation:

1. Implementation of dynamic responses to cyber incidents.2. Enhancing multi-layered mechanism for information

sharing.3. Appropriate response to cybercrime4. Establishing framework of cooperation for international

security in cyberspace.5. Building up “fundamentals” for dynamic responses.

Contd…

1. Support for building a global framework for cyber hygiene.2. Promotion of awareness-raising activities.3. Enhanced research and development through

international cooperation.4. International rulemaking for cyber security.5. Formulation of international standards of technology.6. International rulemaking.

Military Cooperation

Cooperation in latest skill of information attacks. Defensive and offensive cyber attacks. Sharing knowledge on cyber warfare. Example of NATO

Turkish–Arab cooperation in Cyber Security

Cooperation in Cyber Law mechanism Cooperation in Cyber Infrastructure Cooperation in Cyber Intelligence Cooperation in making Cyber Taskforce Cooperation to do research OIC should develop cyber sell to provide help to the

member states.

Thank you

Bangladesh Institute of Peace and Security Studies (BIPSS)

top related