SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Achieving a just and secure society
How can international cooperation secure the
internet?
An overview of bilateral/multilateral issues of
security in the internet
Alex Webling
Director - NII
Critical Infrastructure Protection Branch
Achieving a just and secure society
What are the inherent
problems?
• The internet will never be totally secure
AND
• Everybody is your neighbour on the
internet.
That’s Nasty and Nice
– Nice if you’re doing business with them
– Nasty if they’re trying to attack you
Achieving a just and secure society
More problems - Convergence
• Technological Convergence
– Seamless data, voice and video sharing
– Reduces redundant paths for critical
systems
– Higher vulnerability
– Higher threat
Achieving a just and secure society
Convergence eg SCADA
• Supervisory Control & Data Acquisition
Systems (SCADA)
– Used in energy sector for controlling
processes
– Increasingly becoming remotely
controllable via the Internet / wireless!
– Could scada be remotely hijacked?
breaching dams, shutting down power
grids, contaminating water supplies etc
Achieving a just and secure society
Where are we?
Achieving a just and secure society
Drivers
• Reduced cost & increased availability of
Internet access
• New business uses & technologies
– Bluetooth wireless
– VoIP wireless
• Use increasing in sensitive industries
Achieving a just and secure society
What is being done now?
What could be working?
• Information sharing and Joint Response
– CERT to CERT communications
– Cybercrime 24/7 Network (G-8)
– APCERT (Aust/Japan/South Korea etc)
• Standards
• Laws
Achieving a just and secure society
Australian Participation in
International Fora on E-sec
APEC
– APEC TEL
Actively engaged with APEC
Telecommunications Working Group;
• E-Security Task Group
• APEC Projects (more later)
Achieving a just and secure society
International Fora (cont.)
OECD
– WPISP - Guidelines for the Security of
Information Systems and Networks:
Towards a Culture of Security, July 2002
– Working to promote the ‘Culture of
Security’ Guidelines with other economies
– Encouraging OECD economies to sponsor
projects to strengthen e-security of
developing economies in their regions.
Achieving a just and secure society
International Fora (cont)
Let’s not forget!
• ITU
– We’re here!
Achieving a just and secure society
International fora
• APCERT
– CERTs in Asia-Pacific region working
together in a partnership to share
information on threats and vulnerabilities
– AusCERT current chair, JPCERT
secretariat
Achieving a just and secure society
Multilaterals/Bilaterals
• US/Australian bilaterals
– Regular bilateral talks with the United
States on broader CIP issues.
• Discussions with Europeans
eg GovCERT NL Symposium
Achieving a just and secure society
Multilaterals cont.
• Informal Multilateral discussions after
AusCERT Conference. Government
attendees invited to stay and discuss issues
• Multilateral talks on NII issues with several
European and Asian countries, as well as the
UK, US, Canada and NZ
• Additional bilateral CIP talks being considered
with other Asia-Pacific regional countries.
Achieving a just and secure society
Capacity Building / Awareness Raising
• CERT capacity building projects funded
by APEC and AusAID
– AusAID project in Thailand, Vietnam,
Philippines, Papua New Guinea,
Indonesia,
– APEC / US Govt funded project in Chile,
Peru, Mexico and the Russian Federation.
Achieving a just and secure society
Standards
• Technical standards – security should
be built in, not bolt on
Vendor discussions
• Best practice guidelines such as
Standards Australia’s HB171-2003 –
Guidelines for the management of IT
evidence
• ISO standards
Achieving a just and secure society
Laws
• Cybercrime Act 2001 (based on Council
of Europe Convention)
• Australia - updated existing criminal provisions – e.g.
previous computer laws did not sufficiently address
“denial of service attacks”.
• Enhanced investigatory powers relating to
electronically stored data.
• Of course
Laws which are similar across countries makes it
easier for multinational law enforcement response!
Achieving a just and secure society
Awareness Raising
• CERT Awareness raising seminars being run
in APECTEL on security issues.
• Began in March 03, ongoing
• Australia encourages developed economies
to support developing economies’ CERTs eg
through:
– Training – in-country
– Support for experts to attend conferences
– Technical support
Achieving a just and secure society
What is the future?
• Because of the borderless nature of
cyberspace, international cooperation is
even more essential to secure a safe
online environment.
• More businesses and governments and
business machinery online
• A ‘target rich environment’
Achieving a just and secure society
Longer term
Governments and business who are the
major users of the internet will be forced
to work together to combat the worst
elements
Technology will provide some help –
eventually
Achieving a just and secure society
So maybe
We might get closer to the end of the line!
Achieving a just and secure society
Conclusions
• Internet and the high seas (an analogy).
– We need to be exiting the Swashbuckling
days! Pirates, rogues etc (hopefully). But
still, anybody can get a ship (computer)
and sail the seas of the internet.
– Islands of order, seas of chaos
– Treasures to be pillaged and plundered!
Achieving a just and secure society
Conclusions
– Working together to coordinate the islands’
defences is a good way to bring order
– Varying levels of order in different islands!
– Parallel step, work within multilateral orgs
and bilaterally to increase order
– Eventually, we might aim to a law of the
internet.
Achieving a just and secure society
• Alex Webling
• Director – National Information Infrastructure
• Critical Infrastructure Protection Branch
• alex.webling@ag.gov.au
• cip@ag.gov.au (general email address for CIP matters)
• www.tisn.gov.au (Web site on Trusted Information Sharing
Network)
• www.nationalsecurity.gov.au (AGD web site on National
security)

Weitere ähnliche Inhalte

Ähnlich wie CsecS3-p1-webling.ppt

002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
Michalis Mavis, MSc, MSc
 
Ex 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chenEx 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chen
Đô GiẢn
 
Ex 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chenEx 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chen
Đô GiẢn
 
Internet security
Internet securityInternet security
Internet security
Bill Chea
 

Ähnlich wie CsecS3-p1-webling.ppt (20)

Building the African Tech Ecosystem
Building the African Tech EcosystemBuilding the African Tech Ecosystem
Building the African Tech Ecosystem
 
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
 
A002 200 yearsofit
A002 200 yearsofitA002 200 yearsofit
A002 200 yearsofit
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
Digital Cuba: Ride the Wave of Face the Tsunami
Digital Cuba: Ride the Wave of Face the TsunamiDigital Cuba: Ride the Wave of Face the Tsunami
Digital Cuba: Ride the Wave of Face the Tsunami
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
 
Ex 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chenEx 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chen
 
Ex 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chenEx 1 chapter01-living-network-tony_chen
Ex 1 chapter01-living-network-tony_chen
 
Digital divide
Digital divideDigital divide
Digital divide
 
Anyingba - ICT and knowledge-based economy.pdf
Anyingba - ICT and knowledge-based economy.pdfAnyingba - ICT and knowledge-based economy.pdf
Anyingba - ICT and knowledge-based economy.pdf
 
Strategic Insights for Corporate Boards
Strategic Insights for Corporate BoardsStrategic Insights for Corporate Boards
Strategic Insights for Corporate Boards
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
SUB-TOPIC 5 (Business in Its Moral Diversity).pptx
SUB-TOPIC 5 (Business in Its Moral Diversity).pptxSUB-TOPIC 5 (Business in Its Moral Diversity).pptx
SUB-TOPIC 5 (Business in Its Moral Diversity).pptx
 
ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’
ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’
ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
Internet security
Internet securityInternet security
Internet security
 

Kürzlich hochgeladen

一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
Airst S
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 

Kürzlich hochgeladen (20)

589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 

CsecS3-p1-webling.ppt

  • 1. Achieving a just and secure society How can international cooperation secure the internet? An overview of bilateral/multilateral issues of security in the internet Alex Webling Director - NII Critical Infrastructure Protection Branch
  • 2. Achieving a just and secure society What are the inherent problems? • The internet will never be totally secure AND • Everybody is your neighbour on the internet. That’s Nasty and Nice – Nice if you’re doing business with them – Nasty if they’re trying to attack you
  • 3. Achieving a just and secure society More problems - Convergence • Technological Convergence – Seamless data, voice and video sharing – Reduces redundant paths for critical systems – Higher vulnerability – Higher threat
  • 4. Achieving a just and secure society Convergence eg SCADA • Supervisory Control & Data Acquisition Systems (SCADA) – Used in energy sector for controlling processes – Increasingly becoming remotely controllable via the Internet / wireless! – Could scada be remotely hijacked? breaching dams, shutting down power grids, contaminating water supplies etc
  • 5. Achieving a just and secure society Where are we?
  • 6. Achieving a just and secure society Drivers • Reduced cost & increased availability of Internet access • New business uses & technologies – Bluetooth wireless – VoIP wireless • Use increasing in sensitive industries
  • 7. Achieving a just and secure society What is being done now? What could be working? • Information sharing and Joint Response – CERT to CERT communications – Cybercrime 24/7 Network (G-8) – APCERT (Aust/Japan/South Korea etc) • Standards • Laws
  • 8. Achieving a just and secure society Australian Participation in International Fora on E-sec APEC – APEC TEL Actively engaged with APEC Telecommunications Working Group; • E-Security Task Group • APEC Projects (more later)
  • 9. Achieving a just and secure society International Fora (cont.) OECD – WPISP - Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security, July 2002 – Working to promote the ‘Culture of Security’ Guidelines with other economies – Encouraging OECD economies to sponsor projects to strengthen e-security of developing economies in their regions.
  • 10. Achieving a just and secure society International Fora (cont) Let’s not forget! • ITU – We’re here!
  • 11. Achieving a just and secure society International fora • APCERT – CERTs in Asia-Pacific region working together in a partnership to share information on threats and vulnerabilities – AusCERT current chair, JPCERT secretariat
  • 12. Achieving a just and secure society Multilaterals/Bilaterals • US/Australian bilaterals – Regular bilateral talks with the United States on broader CIP issues. • Discussions with Europeans eg GovCERT NL Symposium
  • 13. Achieving a just and secure society Multilaterals cont. • Informal Multilateral discussions after AusCERT Conference. Government attendees invited to stay and discuss issues • Multilateral talks on NII issues with several European and Asian countries, as well as the UK, US, Canada and NZ • Additional bilateral CIP talks being considered with other Asia-Pacific regional countries.
  • 14. Achieving a just and secure society Capacity Building / Awareness Raising • CERT capacity building projects funded by APEC and AusAID – AusAID project in Thailand, Vietnam, Philippines, Papua New Guinea, Indonesia, – APEC / US Govt funded project in Chile, Peru, Mexico and the Russian Federation.
  • 15. Achieving a just and secure society Standards • Technical standards – security should be built in, not bolt on Vendor discussions • Best practice guidelines such as Standards Australia’s HB171-2003 – Guidelines for the management of IT evidence • ISO standards
  • 16. Achieving a just and secure society Laws • Cybercrime Act 2001 (based on Council of Europe Convention) • Australia - updated existing criminal provisions – e.g. previous computer laws did not sufficiently address “denial of service attacks”. • Enhanced investigatory powers relating to electronically stored data. • Of course Laws which are similar across countries makes it easier for multinational law enforcement response!
  • 17. Achieving a just and secure society Awareness Raising • CERT Awareness raising seminars being run in APECTEL on security issues. • Began in March 03, ongoing • Australia encourages developed economies to support developing economies’ CERTs eg through: – Training – in-country – Support for experts to attend conferences – Technical support
  • 18. Achieving a just and secure society What is the future? • Because of the borderless nature of cyberspace, international cooperation is even more essential to secure a safe online environment. • More businesses and governments and business machinery online • A ‘target rich environment’
  • 19. Achieving a just and secure society Longer term Governments and business who are the major users of the internet will be forced to work together to combat the worst elements Technology will provide some help – eventually
  • 20. Achieving a just and secure society So maybe We might get closer to the end of the line!
  • 21. Achieving a just and secure society Conclusions • Internet and the high seas (an analogy). – We need to be exiting the Swashbuckling days! Pirates, rogues etc (hopefully). But still, anybody can get a ship (computer) and sail the seas of the internet. – Islands of order, seas of chaos – Treasures to be pillaged and plundered!
  • 22. Achieving a just and secure society Conclusions – Working together to coordinate the islands’ defences is a good way to bring order – Varying levels of order in different islands! – Parallel step, work within multilateral orgs and bilaterally to increase order – Eventually, we might aim to a law of the internet.
  • 23. Achieving a just and secure society • Alex Webling • Director – National Information Infrastructure • Critical Infrastructure Protection Branch • alex.webling@ag.gov.au • cip@ag.gov.au (general email address for CIP matters) • www.tisn.gov.au (Web site on Trusted Information Sharing Network) • www.nationalsecurity.gov.au (AGD web site on National security)