SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Public Private Partnership
Combating CyberCrime


Mohamed Shihab
Growing Cybersecurity Threats
“No geographical borders, no boundaries and tremendous destructive power”

• ICTs have become an integral part of information society.
• ICT networks are regarded as basic national infrastructure.
• ICTs are also exposing our societies to the threat of cyberattacks.
• Vulnerability of national infrastructures increases as the use of ICTs take root.
• Cyber attacks on ICTs are borderless and can be launched from virtually
  anywhere.
• As global reliance on ICTs grows, so does vulnerability to attacks on critical
  infrastructures through cyberspace.




                                                                                      2
Key Cybersecurity Challenges
 Lack of adequate and interoperable national or regional legal frameworks
 Lack of secure software and ICT-based applications
 Lack of appropriate national and global organizational structures to deal with
  cyber incidents
 Lack of information security professionals and skills within governments; lack of
  basic awareness among users
 Lack of international cooperation between industry experts, law enforcements,
  regulators, academia & international organizations to address a global challenge




                                                                                      3
4
5
Source : Symantec. http://uk.norton.com/content/en/uk/home_homeoffice/html/cybercrimereport/
Cybercrime
No limits
The number of cyber threats are growing
A combination of the “tools” can be a powerful “weapon”




                                                          6
Cost of War

      Cost of a stealth bomber?    $737 Million to $1.1 billion



      Cost of a stealth fighter?        $80 to $120 million



      Cost of a cruise missile?             $1 to $2 million




      Cost of using cyber space as a weapon? $300 to $50,000


                                                                  7
Cyberia
A Case Study




  FACT FILE
  Country : Cyberia
  Terrain : Island, with beautiful beaches
  Density : 3,064 /km2
  Ethnic Groups : Cyberians
  Official Language : Binary, JAVA and C
  -------------------------------------------------------------------
  Country is well known for tourism and trading. Houses
  one of the most prominent harbour in the world. One of
  the finest technology driven countries in the world with
  state of the art infrastructure.




                                                                        8
???



                             Harbour                DdOS
                           Server Down




                                 Internet
                                                  Air traffic controller
                                Congested
                                                    not responding




One fine day............

                                                                           9
We cannot
                                                           contain the
                                                             attack

                                            Status
                                                                           We do not have
                                                                           diplomatic ties




                                             All attacks
                                                from
                                             overseas                  Stock market is
                      Where is the actual                           crashing... It’s havoc
                         attacker?                                         outside


Panic Starts.......

                                                                                             10
In the future all wars will be preceded by:
    • Chaos
    • Panic
    • Disinformation
    • Disruption of services


48hrs later.......

                                              11
Living Examples
Estonia




                                                                          Wave 4: ISP
    Wave 1: Government        Wave 2: Servers      Wave 3: Banks                  Media
            SPAM                      Government            Education             Banks
            Cyber Vandalism           SPAM                 Wave 2 ctd..           Wave 3 ctd..




                                                                                           12
Living Examples
Georgia




                                                                                        Stage 4: Physical Attack
  Stage 1: Bot Harvesting       Stage 2: Training / Recruiting       Stage 3: Continued Attack




                                                     Wave 2: Financial Institutions        Wave 3: Networks
                  Wave 1: Government / Media                 Business Establishments               SCADA
                                                             Educational Institutions              SPAM
                                                             Government / Media                    Wave 2 ctd..




                                                                                                            13
Cross Border Crime                 Lack of Knowledge
                                          Lack of Resources No Direction
                                            No legal framework                        Management Challenges

                                            New Problems
                                                                        Capital intensive solutions

                                 Need proactive solutions
      No emergency telephone numbers

          Organisations working in silos Delays in Response
Lack of international collaboration                                 Crimes have become organised
Need better early warning system Addressing different type of attacks

                                               I wonder if it is possible to                 How can I notify this
   The suspect is in                             have more intelligence                       threat to others?
   another country. What                            on this situation
   do I do?




                I wish somebody had                                            I need more data for my research! I
               foreseen that this was                                          wonder if somebody else is working
                        coming                                                          on the same thing



                                                                                                                     14
Cybercrime vs Conventional Crime
Crime Comparison



                                     Internet crimes span multiple jurisdictions
 Nearly all crimes were local
                                     Organised
 Evidence never far from the crime
 scene                               Ever-evolving and complex
 Language and communication          Evidence across borders
 restrictions                        No proper cyber laws
 Not internationally co-ordinated    It is not targetted on a specific individual
 Often isolated to a region          alone anymore.
                                     Need not have specialised knowledge



                                                                                16
17
18
IMPACT
20
21
22
Global Response Centre
Centre for Policy & International Cooperation
           CIRT             GRC Services        Capacity Building
Centre for Training & Skills Development
Centre for Security Assurance & Research
ITU-IMPACT
A combined effort to tackle growing cybercrime
Working Together                            Academia


                                                            Research
                   UNODC




At UN level if we try to avert cyberwar we can achieve:
   • Early mediation
   • Build a global security council
   • Credible body
   • Trusted source of information
                   INTERPOL
   • A reliable global body to express the problems           Private Org.



                                               Government
                                                                         25
26
Provide Point of Contacts with different Countries
Establish contact with ITU-IMPACT partners for instant remedy
Provide heads up information on possible threats
  Taking a look at Cyberia again...
Co-ordinate a collaborative effort to tackle the attack
Develop human capacity within Cyberia
                                                                27
Setup Incident Response Team within Cyberia
Bridging the Resources
           ITU-IMPACT’s Global Alliances




                                           28
4 Pillars of IMPACT
Global Response Centre
                  • Network Early Warning System
                    (NEWS)
                     Cyber threat reference centre
                     Aggregation of cyber threats across the
                      globe
                     Collaboration with global industry
                      partners
                  • Electronically Secure      Collaborative
                    Application Platform       for Experts
                    (ESCAPE)
                     Key experts and personnel from partner
                      countries (law enforcement, regulators,
                      country focal, cybersecurity experts,
                      etc)
                     Facilitate & coordinate with partner
                      countries during cyber attack




                                                                30
Centre for Security Assurance & Research


                        • Security Assurance:
                            • IMPACT Government Security
                              Scorecard (IGSS)
                            • CIRT-Lite (Computer Incident
                              Response Team)
                            • Professional services
                              (vulnerability assessment,
                              security audits, etc)
                        • Research:
                            • Facilitation & coordination of
                              cybersecurity research
                            • Bringing together the research
                              community and the industry




                                                               31
Workshops & CIRT Deployment
Objectives:
- To assist partner countries’ assessment of its readiness to implement a National CIRT.
- IMPACT reports on key issues and analysis, recommending a phased implementation plan
  for National CIRT.
- In later stages the national CIRT will also be provided with enabling tools.
- Conducted workshops for 33 countries globally

  No. Partner Countries                                                 Assessment Status
   1   Afghanistan                                                      Completed in October 2009
   2   Uganda, Tanzania, Kenya & Zambia                                 Completed in April 2010

   3   Nigeria, Burkina Faso, Ghana, Mali, Senegal & Ivory Coast        Completed in May 2010

   4   Maldives, Bhutan, Nepal & Bangladesh                             Completed in June 2010
   5   Serbia, Montenegro, Bosnia & Albania                             Completed in November 2010
   6   Cameroon, Chad, Gabon, Congo & Sudan                             Completed in December 2010
   7   Senegal, Gambia, Togo, Niger                                     Completed in November 2011
   8   Lao P.D.R                                                        Completed in November 2011
   9   Cambodia, Myanmar, Vietnam (Assessment for CMV national CIRTs)   Completed in October and November 2011
   10 Armenia                                                           Completed in November 2011
   11 South America and Arab region                                     2012




                                                                                                                 32
CIRT Deployment




    CIRT Lite for National deployment   Regional CIRT deployment


                                                                   33
Cybersecurity Assessment
ITU-IMPACT conducted cybersecurity assessment for Afghanistan : October 2009




Session conducted in Kabul, Afghanistan


                                                                               34
Cybersecurity Assessment
ITU-IMPACT conducted cybersecurity assessment for East Africa (Kenya, Tanzania, Uganda and
Zambia) : 26th – 29th April 2010




Session conducted in Kampala, Uganda


                                                                                             35
Cybersecurity Assessment

ITU-IMPACT conducted cybersecurity assessment for West Africa (Burkina Faso, Côte
d'Ivoire, Ghana, Nigeria, Mali and Senegal) : 17th – 21st May 2010




Session conducted in Ouagadougou, Burkina Faso



                                                                                    36
Cybersecurity Assessment

ITU-IMPACT conducted cybersecurity assessment for Bhutan & Bangladesh : 1st – 11th June
2010




                                                                                          37
Cybersecurity Assessment

ITU-IMPACT conducted cybersecurity assessment for Nepal & Maldives: 14th – 25th June 2010




                                                                                            38
Cybersecurity Workshop /Assessment




                                     39
Centre for Training & Skills Development
Providing world class capability & capacity programmes

                               • Specialised training programs
                                   • IMPACT SecurityCore
                                   • IMPACT Network Forensics
                                   • IMPACT Forensics Investigation for Law
                                     Enforcement
                                   • IMPACT Malware Analysis

                               • Scholarship - partnership with global
                                 certification body
                                    • EC-Council (US$1 mil grant)
                                    • SANS Institute (US$1 mil grant –
                                      completed)

                               • Global certification courses
                                    • (ISC)2
                                    • EC-Council



                                                                          40
Training & Skills Development
Courses conducted for partner countries and in collaboration with IMPACT’s partners




                                                                                      41
Training & Skills Development

IMPACT-Microsoft Network Forensics & Investigation Course: 6th – 9th April 2010 (Brunei)




Closed session for law enforcement agencies – 4 countries participated



                                                                                           42
Training & Skills Development

IMPACT Network Forensics Course: 3rd – 7th May 2010 (IMPACT Global HQ)




Class conducted for 22 participants from 5 countries




                                                                         43
Training & Skills Development

 IMPACT-SANS IPv6 Training: 26th May 2010 (IMPACT Global HQ)




Training conducted by Dr Johannes Ullrich (SANS Internet Storm Center) – 72 participants




                                                                                           44
Centre for Policy & International
Cooperation

                     • Policy:
                         • Workshops and seminars
                         • Policy advisory & best practices
                         • e-Newsletter

                     • International cooperation:
                         • Partner country coordination
                         • Partnership, cooperation and
                           collaboration with industry,
                           academia, think tanks &
                           international organisations
                         • Child Online Protection (COP)


                                                              45
IMPACT – ISRA Collaboration
GRC has been collaborating with ISRA (Information Security Research Association) since June
   2012

ISRA provides IMPACT with regular feeds for the GRC Portals.

Feeds contain information regarding:

   ISRA looks at the vulnerabilities in various government websites, attack plans and patterns
    from different countries around the world on voluntary basis.
   ISRA teams verify those initial findings of insecure systems by checking the live systems and
    then upload this verified data to its database.
   This information is then sent to IMPACT via email service on a weekly basis using excel files.
   GRC publishes this weekly information for its member countries so that they can patch and
    secure the system before hackers exploit the systems and damage them.

Collaboration Interest for both sides:
 ISRA through this collaboration is looking for a safe and secure cyber space where they can report
 their vulnerability findings and IMPACT already had those platforms in the form of NEWS and
 ESCAPE with the target users in place.


                                                                                                      46
Partnership with Interpol
Areas of Co-operation
•   Establishing key contact point in member states
•   Exchange of information
•   Capacity building programs for law enforcement officials
•   Consultation of key initiatives for the law enforcement agencies
•   Joint development efforts on enhancing forensic capabilities of member states




                                                                                    47
IMPACT’s Partners

               International
               Organisations




                               Academia
                  Alliance      (200+)    Child Online Protection
    Industry




                                                                    48
Areas of Co-operation
Public/Private Partnership
•   Access to key security industry players
•   Establishing key contact point in member states
•   Exchange of information
•   Capacity building programs for law enforcement officials
•   Establishing a framework for protecting children online
•   Jointly establishing a Centre of Excellence :
     • Research on tools/technologies
     • Capacity building programs for Law enforcement officials from other regions
        as well as international agencies
     • Implementation of best practices and solution sets in the field of
        CyberSecurity for key agencies
     • Annual regional/international workshop for LEAs on CyberSecurity




                                                                                     49
Thank you
  www.facebook.com/impactalliance




        IMPACT            T +60 (3) 8313 2020
        Jalan IMPACT      F +60 (3) 8319 2020
        63000 Cyberjaya   E contactus@impact-alliance.org
        Malaysia          impact-alliance.org               © Copyright 2011 IMPACT. All Rights Reserved.

Weitere ähnliche Inhalte

Andere mochten auch

Private Public Partnerships by Parth J Shah
Private Public Partnerships by Parth J ShahPrivate Public Partnerships by Parth J Shah
Private Public Partnerships by Parth J ShahCentre for Civil Society
 
Public Private Partnership and Education
Public Private Partnership and EducationPublic Private Partnership and Education
Public Private Partnership and EducationGhulam Ghaus
 
Role of PPP in education of CWSN - A study FINAL
Role of PPP in education of CWSN - A study FINALRole of PPP in education of CWSN - A study FINAL
Role of PPP in education of CWSN - A study FINALdeepika bhatt
 
Education in pakistan
Education in pakistanEducation in pakistan
Education in pakistanASAD ALI
 
Education in-pakistan
Education in-pakistanEducation in-pakistan
Education in-pakistanHumayoun Aziz
 
SOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODEL
SOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODELSOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODEL
SOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODELIAEME Publication
 

Andere mochten auch (7)

Private Public Partnerships by Parth J Shah
Private Public Partnerships by Parth J ShahPrivate Public Partnerships by Parth J Shah
Private Public Partnerships by Parth J Shah
 
Public Private Partnership and Education
Public Private Partnership and EducationPublic Private Partnership and Education
Public Private Partnership and Education
 
Role of PPP in education of CWSN - A study FINAL
Role of PPP in education of CWSN - A study FINALRole of PPP in education of CWSN - A study FINAL
Role of PPP in education of CWSN - A study FINAL
 
Education in pakistan
Education in pakistanEducation in pakistan
Education in pakistan
 
Ppp in education
Ppp in educationPpp in education
Ppp in education
 
Education in-pakistan
Education in-pakistanEducation in-pakistan
Education in-pakistan
 
SOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODEL
SOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODELSOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODEL
SOLID WASTE MANAGEMENT THROUGH PUBLIC-PRIVATE PARTNERSHIP MODEL
 

Ähnlich wie Combating Cybercrime Through Public Private Partnerships

AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012F-Secure Corporation
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 

Ähnlich wie Combating Cybercrime Through Public Private Partnerships (20)

AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 

Mehr von c0c0n - International Cyber Security and Policing Conference (7)

Leveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and OrderLeveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and Order
 
Cracking the Mobile Application Code
Cracking the Mobile Application CodeCracking the Mobile Application Code
Cracking the Mobile Application Code
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Web-App Remote Code Execution Via Scripting Engines
Web-App Remote Code Execution Via Scripting EnginesWeb-App Remote Code Execution Via Scripting Engines
Web-App Remote Code Execution Via Scripting Engines
 
UI-Redressing Attacks - The Process & Exploitation
UI-Redressing Attacks - The Process & ExploitationUI-Redressing Attacks - The Process & Exploitation
UI-Redressing Attacks - The Process & Exploitation
 

Kürzlich hochgeladen

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Combating Cybercrime Through Public Private Partnerships

  • 1. Public Private Partnership Combating CyberCrime Mohamed Shihab
  • 2. Growing Cybersecurity Threats “No geographical borders, no boundaries and tremendous destructive power” • ICTs have become an integral part of information society. • ICT networks are regarded as basic national infrastructure. • ICTs are also exposing our societies to the threat of cyberattacks. • Vulnerability of national infrastructures increases as the use of ICTs take root. • Cyber attacks on ICTs are borderless and can be launched from virtually anywhere. • As global reliance on ICTs grows, so does vulnerability to attacks on critical infrastructures through cyberspace. 2
  • 3. Key Cybersecurity Challenges  Lack of adequate and interoperable national or regional legal frameworks  Lack of secure software and ICT-based applications  Lack of appropriate national and global organizational structures to deal with cyber incidents  Lack of information security professionals and skills within governments; lack of basic awareness among users  Lack of international cooperation between industry experts, law enforcements, regulators, academia & international organizations to address a global challenge 3
  • 4. 4
  • 5. 5 Source : Symantec. http://uk.norton.com/content/en/uk/home_homeoffice/html/cybercrimereport/
  • 6. Cybercrime No limits The number of cyber threats are growing A combination of the “tools” can be a powerful “weapon” 6
  • 7. Cost of War Cost of a stealth bomber? $737 Million to $1.1 billion Cost of a stealth fighter? $80 to $120 million Cost of a cruise missile? $1 to $2 million Cost of using cyber space as a weapon? $300 to $50,000 7
  • 8. Cyberia A Case Study FACT FILE Country : Cyberia Terrain : Island, with beautiful beaches Density : 3,064 /km2 Ethnic Groups : Cyberians Official Language : Binary, JAVA and C ------------------------------------------------------------------- Country is well known for tourism and trading. Houses one of the most prominent harbour in the world. One of the finest technology driven countries in the world with state of the art infrastructure. 8
  • 9. ??? Harbour DdOS Server Down Internet Air traffic controller Congested not responding One fine day............ 9
  • 10. We cannot contain the attack Status We do not have diplomatic ties All attacks from overseas Stock market is Where is the actual crashing... It’s havoc attacker? outside Panic Starts....... 10
  • 11. In the future all wars will be preceded by: • Chaos • Panic • Disinformation • Disruption of services 48hrs later....... 11
  • 12. Living Examples Estonia Wave 4: ISP Wave 1: Government Wave 2: Servers Wave 3: Banks Media SPAM Government Education Banks Cyber Vandalism SPAM Wave 2 ctd.. Wave 3 ctd.. 12
  • 13. Living Examples Georgia Stage 4: Physical Attack Stage 1: Bot Harvesting Stage 2: Training / Recruiting Stage 3: Continued Attack Wave 2: Financial Institutions Wave 3: Networks Wave 1: Government / Media Business Establishments SCADA Educational Institutions SPAM Government / Media Wave 2 ctd.. 13
  • 14. Cross Border Crime Lack of Knowledge Lack of Resources No Direction No legal framework Management Challenges New Problems Capital intensive solutions Need proactive solutions No emergency telephone numbers Organisations working in silos Delays in Response Lack of international collaboration Crimes have become organised Need better early warning system Addressing different type of attacks I wonder if it is possible to How can I notify this The suspect is in have more intelligence threat to others? another country. What on this situation do I do? I wish somebody had I need more data for my research! I foreseen that this was wonder if somebody else is working coming on the same thing 14
  • 16. Crime Comparison Internet crimes span multiple jurisdictions Nearly all crimes were local Organised Evidence never far from the crime scene Ever-evolving and complex Language and communication Evidence across borders restrictions No proper cyber laws Not internationally co-ordinated It is not targetted on a specific individual Often isolated to a region alone anymore. Need not have specialised knowledge 16
  • 17. 17
  • 18. 18
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. Global Response Centre Centre for Policy & International Cooperation CIRT GRC Services Capacity Building Centre for Training & Skills Development Centre for Security Assurance & Research
  • 24. ITU-IMPACT A combined effort to tackle growing cybercrime
  • 25. Working Together Academia Research UNODC At UN level if we try to avert cyberwar we can achieve: • Early mediation • Build a global security council • Credible body • Trusted source of information INTERPOL • A reliable global body to express the problems Private Org. Government 25
  • 26. 26
  • 27. Provide Point of Contacts with different Countries Establish contact with ITU-IMPACT partners for instant remedy Provide heads up information on possible threats Taking a look at Cyberia again... Co-ordinate a collaborative effort to tackle the attack Develop human capacity within Cyberia 27 Setup Incident Response Team within Cyberia
  • 28. Bridging the Resources ITU-IMPACT’s Global Alliances 28
  • 29. 4 Pillars of IMPACT
  • 30. Global Response Centre • Network Early Warning System (NEWS)  Cyber threat reference centre  Aggregation of cyber threats across the globe  Collaboration with global industry partners • Electronically Secure Collaborative Application Platform for Experts (ESCAPE)  Key experts and personnel from partner countries (law enforcement, regulators, country focal, cybersecurity experts, etc)  Facilitate & coordinate with partner countries during cyber attack 30
  • 31. Centre for Security Assurance & Research • Security Assurance: • IMPACT Government Security Scorecard (IGSS) • CIRT-Lite (Computer Incident Response Team) • Professional services (vulnerability assessment, security audits, etc) • Research: • Facilitation & coordination of cybersecurity research • Bringing together the research community and the industry 31
  • 32. Workshops & CIRT Deployment Objectives: - To assist partner countries’ assessment of its readiness to implement a National CIRT. - IMPACT reports on key issues and analysis, recommending a phased implementation plan for National CIRT. - In later stages the national CIRT will also be provided with enabling tools. - Conducted workshops for 33 countries globally No. Partner Countries Assessment Status 1 Afghanistan Completed in October 2009 2 Uganda, Tanzania, Kenya & Zambia Completed in April 2010 3 Nigeria, Burkina Faso, Ghana, Mali, Senegal & Ivory Coast Completed in May 2010 4 Maldives, Bhutan, Nepal & Bangladesh Completed in June 2010 5 Serbia, Montenegro, Bosnia & Albania Completed in November 2010 6 Cameroon, Chad, Gabon, Congo & Sudan Completed in December 2010 7 Senegal, Gambia, Togo, Niger Completed in November 2011 8 Lao P.D.R Completed in November 2011 9 Cambodia, Myanmar, Vietnam (Assessment for CMV national CIRTs) Completed in October and November 2011 10 Armenia Completed in November 2011 11 South America and Arab region 2012 32
  • 33. CIRT Deployment CIRT Lite for National deployment Regional CIRT deployment 33
  • 34. Cybersecurity Assessment ITU-IMPACT conducted cybersecurity assessment for Afghanistan : October 2009 Session conducted in Kabul, Afghanistan 34
  • 35. Cybersecurity Assessment ITU-IMPACT conducted cybersecurity assessment for East Africa (Kenya, Tanzania, Uganda and Zambia) : 26th – 29th April 2010 Session conducted in Kampala, Uganda 35
  • 36. Cybersecurity Assessment ITU-IMPACT conducted cybersecurity assessment for West Africa (Burkina Faso, Côte d'Ivoire, Ghana, Nigeria, Mali and Senegal) : 17th – 21st May 2010 Session conducted in Ouagadougou, Burkina Faso 36
  • 37. Cybersecurity Assessment ITU-IMPACT conducted cybersecurity assessment for Bhutan & Bangladesh : 1st – 11th June 2010 37
  • 38. Cybersecurity Assessment ITU-IMPACT conducted cybersecurity assessment for Nepal & Maldives: 14th – 25th June 2010 38
  • 40. Centre for Training & Skills Development Providing world class capability & capacity programmes • Specialised training programs • IMPACT SecurityCore • IMPACT Network Forensics • IMPACT Forensics Investigation for Law Enforcement • IMPACT Malware Analysis • Scholarship - partnership with global certification body • EC-Council (US$1 mil grant) • SANS Institute (US$1 mil grant – completed) • Global certification courses • (ISC)2 • EC-Council 40
  • 41. Training & Skills Development Courses conducted for partner countries and in collaboration with IMPACT’s partners 41
  • 42. Training & Skills Development IMPACT-Microsoft Network Forensics & Investigation Course: 6th – 9th April 2010 (Brunei) Closed session for law enforcement agencies – 4 countries participated 42
  • 43. Training & Skills Development IMPACT Network Forensics Course: 3rd – 7th May 2010 (IMPACT Global HQ) Class conducted for 22 participants from 5 countries 43
  • 44. Training & Skills Development IMPACT-SANS IPv6 Training: 26th May 2010 (IMPACT Global HQ) Training conducted by Dr Johannes Ullrich (SANS Internet Storm Center) – 72 participants 44
  • 45. Centre for Policy & International Cooperation • Policy: • Workshops and seminars • Policy advisory & best practices • e-Newsletter • International cooperation: • Partner country coordination • Partnership, cooperation and collaboration with industry, academia, think tanks & international organisations • Child Online Protection (COP) 45
  • 46. IMPACT – ISRA Collaboration GRC has been collaborating with ISRA (Information Security Research Association) since June 2012 ISRA provides IMPACT with regular feeds for the GRC Portals. Feeds contain information regarding:  ISRA looks at the vulnerabilities in various government websites, attack plans and patterns from different countries around the world on voluntary basis.  ISRA teams verify those initial findings of insecure systems by checking the live systems and then upload this verified data to its database.  This information is then sent to IMPACT via email service on a weekly basis using excel files.  GRC publishes this weekly information for its member countries so that they can patch and secure the system before hackers exploit the systems and damage them. Collaboration Interest for both sides: ISRA through this collaboration is looking for a safe and secure cyber space where they can report their vulnerability findings and IMPACT already had those platforms in the form of NEWS and ESCAPE with the target users in place. 46
  • 47. Partnership with Interpol Areas of Co-operation • Establishing key contact point in member states • Exchange of information • Capacity building programs for law enforcement officials • Consultation of key initiatives for the law enforcement agencies • Joint development efforts on enhancing forensic capabilities of member states 47
  • 48. IMPACT’s Partners International Organisations Academia Alliance (200+) Child Online Protection Industry 48
  • 49. Areas of Co-operation Public/Private Partnership • Access to key security industry players • Establishing key contact point in member states • Exchange of information • Capacity building programs for law enforcement officials • Establishing a framework for protecting children online • Jointly establishing a Centre of Excellence : • Research on tools/technologies • Capacity building programs for Law enforcement officials from other regions as well as international agencies • Implementation of best practices and solution sets in the field of CyberSecurity for key agencies • Annual regional/international workshop for LEAs on CyberSecurity 49
  • 50. Thank you www.facebook.com/impactalliance IMPACT T +60 (3) 8313 2020 Jalan IMPACT F +60 (3) 8319 2020 63000 Cyberjaya E contactus@impact-alliance.org Malaysia impact-alliance.org © Copyright 2011 IMPACT. All Rights Reserved.

Hinweis der Redaktion

  1. Hypothetical country comes under a massive DDOS attackCritical services go downMayhem ensues.Government tries to contain attackNo expertise found within the countryAll attacks originated from overseasNo diplomatic relations with countries hosting the source IPsAttack runs its due course – Damage done – Millions lost, Lost faith in government, general panicTakes months to rebuild – confidence, infrastructure etc.
  2. IMPACT’s partners globally; Industry, International Organisations, Academia and COPIMPACT and INTERPOL is currently reviewing the MoU to be signed which will see a landmark agreement being inked very soon to have INTERPOL on board the ITU-IMPACT coalition and subsequently working with the law enforcement globally.