SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02.
1. Input on threat images against information society
Abstract:
More and more countries have taken the leap from being industrial societies to being information
societies. Societies are becoming increasingly dependent upon information technology, and thereby it
is important to reduce vulnerabilities in the information infrastructure and combat threats against such
an information society.
Background
Helping geniuses! Our slogan sums up who Somerco aims to help. Somerco are a
company that target to help researchers and innovators so that these geniuses can
create prosperity and jobs in society. We are foremost a technology company, but are
open to contribute with input on issues concerning the protection of information
society. Much has been done more needs to be discussed, developed and adopted.
Introduction
The information age has created incredible possibilities concerning how societies
disseminate, collect, and use information. The communication between people and the
access to information has appreciably been facilitated through information technology
(IT). However, technical development seldom means only advantages; it also means
challenges. During the last decades, the development of IT products and systems has
been very rapid, and the use of IT has increased considerably. A common observation
is it has made societies more vulnerable. Moreover, IT-related threats are often
invisible. An actor can operate from anywhere in the world, making it difficult to
identify a threat and its aim. Moreover, the number of persons with sufficient
computer knowledge of how to disseminate computer viruses and with capacity to
carry out attacks against the IT infrastructure is increasing. With this paper I want to
contribute on how to best protect information society. I want to start by raising a
question: Is it by increasing our money spent on combating or learning more about
cyber attacks that gives greatest value for money, or are there more urgent areas to
attend too?
A wide perception on threats
Lack of proper attention from decision-makers to various kinds of threats could lead
to insufficient risk management of threats against vital functions in an IT society. The
analysis of threats against an IT dependent society includes digital threats. The other
threat images that need attention are the so called physical actor threats, construction
flaws and threats originating from natural disasters, dependencies and
interdependencies.
Examples of digital threats are cyber-attacks against web sites and servers, on-line
databases and IP-addresses. These attacks can be executed by actors such as young
hackers that are driven by curiosity, but also more threatening actors such as
criminals, spies, terrorists and by other states. The motives can be to steal, manipulate
or destroy data in order to affect political decision-making processes, or to get access
to information in corporations and authorities. Physical threats have an external
intentional or unintentional effect on the function of IT. Intentional threats include
deliberate acts of sabotage to IT infrastructure, with the use of explosives or tools,
such as a sledgehammer. Unintentional threats can be caused by poor security
routines, which might lead to further incidents. Negligence and other human factors
CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02.
can also be a risk factor.
Figure 1. Threat images against information society
Construction flaws arise when IT systems have an insufficient security level or a
functional flaw. One example is when bugs in software become threats against
societies. Natural disasters that can threaten the IT infrastructure include lightning,
storms, earthquakes, volcanic eruptions and avalanches since these can cause
interruptions in the power supply and the telecommunication networks, which are
necessary for the proper functioning of Internet, e-mail etcetera.
When it concern dependency I focus on a key dependency for the functioning of
information society – namely access to computer chips in times of crisis. In times of
crisis our access to computer chips are critical. When it concern interdependencies for
an information society they are related to infrastructural interdependencies. Threats
against and vulnerabilities in information society have taken a salient role in the
political security agenda in many states and EU. One reason is that the IT
infrastructure has a vital function in a modern society since other infrastructures, such
as the power networks and telecommunications, have become increasingly dependent
upon IT in order to function.
Figure 2. Infrastructural interdependencies
Digital
Physical
Construction flaw
Natural disasters
Dependencies
Interdependencies
Trans-
port
Oil
IT
El
Tele-
com
Water
CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02.
Discussion
Regardless of the reason for the disruptions in IT-systems, the information society
will not function if they are not prepared for these threats. Lack of proper attention
from decision-makers to these various kinds of threats could lead to insufficient risk
management of threats against vital functions in an IT society. Due to this I would
like to continue with the question raised at the start. Is it by increasing our money
spent on combating or learning more about cyber attacks that gives greatest value for
money, or are there more urgent areas to attend too?
In this paper I focus on a few issues that could be discussed with the question in mind.
I start by discussing the role national and international governmental agencies and
move on to comment private-public partnership PPP and ends by discussing Europe’s
dependency on access to computer chips.
To start, I want to acknowledge the importance the European Government CERTs
(EGC) group, which performs operational tasks, has played and also the national
CERTs. To set up a well-functioning national/governmental CERT is a first step.
Only some Member States have to date adopted national cyber security strategies.
However, I do not think it is enough to only rely on CERTs since them to date only
focus on computer incident – digital threats. With a wide perception of threats against
information society, which besides digital threats also includes physical, construction
flaws, natural disasters, dependencies and interdependencies threats. In my opinion, a
cyber security strategy is an import step but a more holistic approach should be
adopted and thereby the countries national strategy should be further developed and
include more aspects of vulnerabilities. With a more inclusive perception on threats
against information society also responsibilities of governmental agencies should
evolve or new ones be put in place. Should the CERTs be a part of an agency that
works with a wider threat palette? Or should the CERTs evolve and adopt greater
responsibilities to face these threats? Here in lies is an interesting issue what is the
best organisational solutions on a national level and EU level. Future steps could be to
increase CERTs mandate to include preventive work and also combating with all
threats described – digital, physical, construction flaws, natural disasters,
dependencies and interdependencies. Or should the future role of ENISA evolve and
take on this responsibility and what relation should the EC member states have to
them?
Private Public Partnership is important to have in place on a national and international
level since a lot of society’s critical infrastructures who are dependent on the
functioning of IT are run by private companies. The European Public-Private
Partnership for Resilience (EP3R) is a platform which facilitates the exchange of best
practices among the Member States and ICT companies. The EP3R has no formal
standing and cannot require the private sector to report incidents to the national
authorities. A framework for trusted information sharing and for communicating
information on NIS threats, risks and incidents is absent within the EP3R. Is this an
initiative that should be given greater importance by implementing legislation for
demanding incident reporting? Will it be necessary to allocate more financial
resources to them? A particular interesting question is if they should be managed by
ENISA and the private sector or will it be necessary to have another organisational
structure in place with a more holistic approach?
CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02.
In times of crisis - when does our access to computer chips become critical? I would
argue, in short – term crisis it is possible for those companies and agencies that are
considered critical for the functioning of society to stock pile what is on their home
market. In long – term crisis the chip producer will change location of their facilities
or ask some else in another country to build up their capacity to meet the demand on
the market. It is when you are into mid – term crisis in countries/areas where
computer chips are manufactured the vulnerabilities are highest. In crisis when
shortages of computer chips do occur; what countries get access to the produced
computer chips first? Who ranks second and so on? I would argue the countries that
rank first are the countries that produce the computer chips and the two largest
chipmakers Intel and AMD who US companies. Second would be those countries that
pay the most. Most likely several European countries would and could pay more.
However, are we prepare to be ranked second in such a key area for the functioning of
information society?
To have companies in the European Union who produce computer chips is one way to
decrease our dependency on having access to this key component. I know that Russia
has thought in these terms and thereby have production facilities in their country.
Moreover, if it would emerge a European company that are interested in producing
computer chips, would these be able to compete in this rapid development, with price,
etc

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Impact of IT on Society
Impact of IT on SocietyImpact of IT on Society
Impact of IT on Societysweetshashi44
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsNumaan Huq
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)Bradley Susser
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...Chris Marsden
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)Chris Marsden
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasioniosrjce
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2IAEME Publication
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorGovLoop
 

Was ist angesagt? (19)

Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Impact of IT on Society
Impact of IT on SocietyImpact of IT on Society
Impact of IT on Society
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public Sector
 

Andere mochten auch

Going abroad - Competitive assets
Going abroad - Competitive assetsGoing abroad - Competitive assets
Going abroad - Competitive assetsSomerco Research
 
The locally developed infrastructure
The locally developed infrastructureThe locally developed infrastructure
The locally developed infrastructureSomerco Research
 
Crowdfunding and crowd sourcing
Crowdfunding and crowd sourcingCrowdfunding and crowd sourcing
Crowdfunding and crowd sourcingSomerco Research
 
Open source from science to society
Open source from science to societyOpen source from science to society
Open source from science to societySomerco Research
 

Andere mochten auch (8)

Going abroad - Competitive assets
Going abroad - Competitive assetsGoing abroad - Competitive assets
Going abroad - Competitive assets
 
Olaf forumspammer
Olaf forumspammerOlaf forumspammer
Olaf forumspammer
 
Expansion options
Expansion optionsExpansion options
Expansion options
 
The locally developed infrastructure
The locally developed infrastructureThe locally developed infrastructure
The locally developed infrastructure
 
Crowdfunding and crowd sourcing
Crowdfunding and crowd sourcingCrowdfunding and crowd sourcing
Crowdfunding and crowd sourcing
 
Open source from science to society
Open source from science to societyOpen source from science to society
Open source from science to society
 
Keep talents in Europe
Keep talents in EuropeKeep talents in Europe
Keep talents in Europe
 
Indiegogo22campaigns
Indiegogo22campaignsIndiegogo22campaigns
Indiegogo22campaigns
 

Ähnlich wie Input on threat images against information society

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16Maliha Ghazal
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfarahsyed9
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyMaliha Ghazal
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfarahsyed9
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperMicrosoft
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Ministersegughana
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxarnoldmeredith47041
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfmessengerhelper4
 

Ähnlich wie Input on threat images against information society (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the society
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docx
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdf
 

Mehr von Somerco Research (20)

Facebook ahmedabadpolice
Facebook ahmedabadpoliceFacebook ahmedabadpolice
Facebook ahmedabadpolice
 
Facebook ahmedabadpolice
Facebook ahmedabadpoliceFacebook ahmedabadpolice
Facebook ahmedabadpolice
 
Indiegogotweetsshort
IndiegogotweetsshortIndiegogotweetsshort
Indiegogotweetsshort
 
Indiegogo toa
Indiegogo toaIndiegogo toa
Indiegogo toa
 
Bb bcaselink
Bb bcaselinkBb bcaselink
Bb bcaselink
 
Indiegogo search2daysafter
Indiegogo search2daysafterIndiegogo search2daysafter
Indiegogo search2daysafter
 
Indiegogo mixstats
Indiegogo mixstatsIndiegogo mixstats
Indiegogo mixstats
 
Bbb printscreen jan
Bbb printscreen janBbb printscreen jan
Bbb printscreen jan
 
Indiegogobike3
Indiegogobike3Indiegogobike3
Indiegogobike3
 
Indiegogo miximportant2
Indiegogo miximportant2Indiegogo miximportant2
Indiegogo miximportant2
 
Indiegogo technology3
Indiegogo technology3Indiegogo technology3
Indiegogo technology3
 
Listofcountries
ListofcountriesListofcountries
Listofcountries
 
Arctic route
Arctic routeArctic route
Arctic route
 
Build infrastructure
Build infrastructureBuild infrastructure
Build infrastructure
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Digital inequality into prosperity
Digital inequality into prosperityDigital inequality into prosperity
Digital inequality into prosperity
 
External energy dependency
External energy dependencyExternal energy dependency
External energy dependency
 
Non ip parks
Non ip parksNon ip parks
Non ip parks
 
Old innovations
Old innovationsOld innovations
Old innovations
 
Innovation, commercialization,growth
Innovation, commercialization,growthInnovation, commercialization,growth
Innovation, commercialization,growth
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Input on threat images against information society

  • 1. CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02. 1. Input on threat images against information society Abstract: More and more countries have taken the leap from being industrial societies to being information societies. Societies are becoming increasingly dependent upon information technology, and thereby it is important to reduce vulnerabilities in the information infrastructure and combat threats against such an information society. Background Helping geniuses! Our slogan sums up who Somerco aims to help. Somerco are a company that target to help researchers and innovators so that these geniuses can create prosperity and jobs in society. We are foremost a technology company, but are open to contribute with input on issues concerning the protection of information society. Much has been done more needs to be discussed, developed and adopted. Introduction The information age has created incredible possibilities concerning how societies disseminate, collect, and use information. The communication between people and the access to information has appreciably been facilitated through information technology (IT). However, technical development seldom means only advantages; it also means challenges. During the last decades, the development of IT products and systems has been very rapid, and the use of IT has increased considerably. A common observation is it has made societies more vulnerable. Moreover, IT-related threats are often invisible. An actor can operate from anywhere in the world, making it difficult to identify a threat and its aim. Moreover, the number of persons with sufficient computer knowledge of how to disseminate computer viruses and with capacity to carry out attacks against the IT infrastructure is increasing. With this paper I want to contribute on how to best protect information society. I want to start by raising a question: Is it by increasing our money spent on combating or learning more about cyber attacks that gives greatest value for money, or are there more urgent areas to attend too? A wide perception on threats Lack of proper attention from decision-makers to various kinds of threats could lead to insufficient risk management of threats against vital functions in an IT society. The analysis of threats against an IT dependent society includes digital threats. The other threat images that need attention are the so called physical actor threats, construction flaws and threats originating from natural disasters, dependencies and interdependencies. Examples of digital threats are cyber-attacks against web sites and servers, on-line databases and IP-addresses. These attacks can be executed by actors such as young hackers that are driven by curiosity, but also more threatening actors such as criminals, spies, terrorists and by other states. The motives can be to steal, manipulate or destroy data in order to affect political decision-making processes, or to get access to information in corporations and authorities. Physical threats have an external intentional or unintentional effect on the function of IT. Intentional threats include deliberate acts of sabotage to IT infrastructure, with the use of explosives or tools, such as a sledgehammer. Unintentional threats can be caused by poor security routines, which might lead to further incidents. Negligence and other human factors
  • 2. CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02. can also be a risk factor. Figure 1. Threat images against information society Construction flaws arise when IT systems have an insufficient security level or a functional flaw. One example is when bugs in software become threats against societies. Natural disasters that can threaten the IT infrastructure include lightning, storms, earthquakes, volcanic eruptions and avalanches since these can cause interruptions in the power supply and the telecommunication networks, which are necessary for the proper functioning of Internet, e-mail etcetera. When it concern dependency I focus on a key dependency for the functioning of information society – namely access to computer chips in times of crisis. In times of crisis our access to computer chips are critical. When it concern interdependencies for an information society they are related to infrastructural interdependencies. Threats against and vulnerabilities in information society have taken a salient role in the political security agenda in many states and EU. One reason is that the IT infrastructure has a vital function in a modern society since other infrastructures, such as the power networks and telecommunications, have become increasingly dependent upon IT in order to function. Figure 2. Infrastructural interdependencies Digital Physical Construction flaw Natural disasters Dependencies Interdependencies Trans- port Oil IT El Tele- com Water
  • 3. CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02. Discussion Regardless of the reason for the disruptions in IT-systems, the information society will not function if they are not prepared for these threats. Lack of proper attention from decision-makers to these various kinds of threats could lead to insufficient risk management of threats against vital functions in an IT society. Due to this I would like to continue with the question raised at the start. Is it by increasing our money spent on combating or learning more about cyber attacks that gives greatest value for money, or are there more urgent areas to attend too? In this paper I focus on a few issues that could be discussed with the question in mind. I start by discussing the role national and international governmental agencies and move on to comment private-public partnership PPP and ends by discussing Europe’s dependency on access to computer chips. To start, I want to acknowledge the importance the European Government CERTs (EGC) group, which performs operational tasks, has played and also the national CERTs. To set up a well-functioning national/governmental CERT is a first step. Only some Member States have to date adopted national cyber security strategies. However, I do not think it is enough to only rely on CERTs since them to date only focus on computer incident – digital threats. With a wide perception of threats against information society, which besides digital threats also includes physical, construction flaws, natural disasters, dependencies and interdependencies threats. In my opinion, a cyber security strategy is an import step but a more holistic approach should be adopted and thereby the countries national strategy should be further developed and include more aspects of vulnerabilities. With a more inclusive perception on threats against information society also responsibilities of governmental agencies should evolve or new ones be put in place. Should the CERTs be a part of an agency that works with a wider threat palette? Or should the CERTs evolve and adopt greater responsibilities to face these threats? Here in lies is an interesting issue what is the best organisational solutions on a national level and EU level. Future steps could be to increase CERTs mandate to include preventive work and also combating with all threats described – digital, physical, construction flaws, natural disasters, dependencies and interdependencies. Or should the future role of ENISA evolve and take on this responsibility and what relation should the EC member states have to them? Private Public Partnership is important to have in place on a national and international level since a lot of society’s critical infrastructures who are dependent on the functioning of IT are run by private companies. The European Public-Private Partnership for Resilience (EP3R) is a platform which facilitates the exchange of best practices among the Member States and ICT companies. The EP3R has no formal standing and cannot require the private sector to report incidents to the national authorities. A framework for trusted information sharing and for communicating information on NIS threats, risks and incidents is absent within the EP3R. Is this an initiative that should be given greater importance by implementing legislation for demanding incident reporting? Will it be necessary to allocate more financial resources to them? A particular interesting question is if they should be managed by ENISA and the private sector or will it be necessary to have another organisational structure in place with a more holistic approach?
  • 4. CEO of Somerco Research Ltd Jan Softa. Date: 2013-04-02. In times of crisis - when does our access to computer chips become critical? I would argue, in short – term crisis it is possible for those companies and agencies that are considered critical for the functioning of society to stock pile what is on their home market. In long – term crisis the chip producer will change location of their facilities or ask some else in another country to build up their capacity to meet the demand on the market. It is when you are into mid – term crisis in countries/areas where computer chips are manufactured the vulnerabilities are highest. In crisis when shortages of computer chips do occur; what countries get access to the produced computer chips first? Who ranks second and so on? I would argue the countries that rank first are the countries that produce the computer chips and the two largest chipmakers Intel and AMD who US companies. Second would be those countries that pay the most. Most likely several European countries would and could pay more. However, are we prepare to be ranked second in such a key area for the functioning of information society? To have companies in the European Union who produce computer chips is one way to decrease our dependency on having access to this key component. I know that Russia has thought in these terms and thereby have production facilities in their country. Moreover, if it would emerge a European company that are interested in producing computer chips, would these be able to compete in this rapid development, with price, etc