cyber crime & cyber security workshop, zie

24
15 September 2016

Upload: kangai-maukazuva-cgeit

Post on 28-Jan-2018

219 views

Category:

Presentations & Public Speaking


3 download

TRANSCRIPT

Page 1: Cyber Crime & Cyber Security Workshop, ZIE

15 September 2016

Page 2: Cyber Crime & Cyber Security Workshop, ZIE
Page 3: Cyber Crime & Cyber Security Workshop, ZIE

High Level Qualitative Approach

experience from other countries.

Page 4: Cyber Crime & Cyber Security Workshop, ZIE
Page 5: Cyber Crime & Cyber Security Workshop, ZIE

. Stakeholder Interests in Cyber Security, Regulation, Cyber Security

Laws

Page 6: Cyber Crime & Cyber Security Workshop, ZIE
Page 7: Cyber Crime & Cyber Security Workshop, ZIE
Page 8: Cyber Crime & Cyber Security Workshop, ZIE
Page 9: Cyber Crime & Cyber Security Workshop, ZIE

Criticism and Tension created by introducing Cyber Security

Regulation, Cyber Security Laws

Page 10: Cyber Crime & Cyber Security Workshop, ZIE

creating new offenses and penalties

the need to protect citizens, property and infrastructure vs the need to respect legal, civil and property rights

distinguishing the different motives of politicians and objective curbing of cyber attacks

the approach on cybersecurityis something separate and different from conventional law and order

Page 11: Cyber Crime & Cyber Security Workshop, ZIE

the vague goals and terms that give too muchdiscretion to prosecutors.

6. Open-ended information gathering and processing

7. One-size-fits-all approach

a threat to internet freedom

over-reach of state security services, widespread state andcorporate surveillance and new censorship mechanisms meant to regulate online content underthe guise of security.

Page 12: Cyber Crime & Cyber Security Workshop, ZIE

Source: right2know SA.

Page 13: Cyber Crime & Cyber Security Workshop, ZIE

Constraints of Cyber Security Regulation & Laws

Page 14: Cyber Crime & Cyber Security Workshop, ZIE

1. Social Norms

2. Architecture

3. The Law

4. The Market

Page 15: Cyber Crime & Cyber Security Workshop, ZIE

only 2% is successfully prosecuted

cross border enforcements

3. Different moral values and laws and varied enforcement responses

ineffecient’ in responding timely and creating quick evidence

Page 16: Cyber Crime & Cyber Security Workshop, ZIE

technically complex and circumvented

scope and pervasiveness of digital technologies

3. Affordability and Access to technology is

adapting counter measures to preventive and detective software

that Technology is the predominant regulating institution

Page 17: Cyber Crime & Cyber Security Workshop, ZIE

, people don’t want cheap things, they want it for free. (music and piracy case – music is now very cheap but billions commit piracy every year)

Page 18: Cyber Crime & Cyber Security Workshop, ZIE

governs socially salient behaviours

2. Freedom of speech philosophy

a very powerful force in regulating cyber space

Page 19: Cyber Crime & Cyber Security Workshop, ZIE

Strategies that can help create the necessary Buy-In

Page 20: Cyber Crime & Cyber Security Workshop, ZIE
Page 21: Cyber Crime & Cyber Security Workshop, ZIE

National Cyber Security Center and strategy for affiliation by corporates and experts.

Single Point of Contact for Incidents

Incident Response Teams (CIRT)

Emergency Response Teams (CERT)

Escalation policy from a mere incident status to a critical crime, or emergency level

Page 22: Cyber Crime & Cyber Security Workshop, ZIE

a shared situational awareness

ability to respond quickly to prevent intrusions

counter-intelligence capabilities

security of the supply chain

cyber education

redirect research and development

deterrence strategies

Page 23: Cyber Crime & Cyber Security Workshop, ZIE
Page 24: Cyber Crime & Cyber Security Workshop, ZIE

Regulation is a Necessity …