Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
Internet under Attack       Vint Cerf     21 May 2012
We have it in our grasp• To connect every person on the face of the  Earth to:  – One another  – To all human knowledge• T...
Technical threats•   Viruses, worms, trojan horses•   Phishing and Pharming (DNS cache poisoning)•   Social engineering•  ...
Institutional Threats• ITU – WCIT/ITRs  – Old PSTN business models, IPR “protection,”    interconnection rules, mandatory ...
Institutional Threats• Internet Governance Forum• ITU-R (extension of assignments to 300 GHz)• Old business models and new...
Institutional Responses• Internet Society (ISOC)• OECD• EU: Parliament (new powers), EC (but note  privacy, data flows iss...
Technical Responses• More resistant operating systems• More resistant browsers (maybe next version of  Android should be c...
Real Problems (cannot ignore)• Cyber-harms, crimes and warfare• Disruption of old business models; need new  ones!• Immatu...
Freedoms•   To Speak•   To Hear•   To Gather (assemble, access)•   To Choose•   But should there be a Freedom from Harm?• ...
Nächste SlideShare
Wird geladen in …5
×

F2C12: Vint Cerf

1.162 Aufrufe

Veröffentlicht am

Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk

and other presentations are at:
http://freedom-to-connect.net/videos/

Veröffentlicht in: Technologie
  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

F2C12: Vint Cerf

  1. 1. Internet under Attack Vint Cerf 21 May 2012
  2. 2. We have it in our grasp• To connect every person on the face of the Earth to: – One another – To all human knowledge• To pursue a policy of plenty vs poverty (cf Peter Diamandis: ABUNDANCE)• We’d have to be a pretty stupid species not to take advantage of this opportunity.• But there are problems….
  3. 3. Technical threats• Viruses, worms, trojan horses• Phishing and Pharming (DNS cache poisoning)• Social engineering• Password dictionary attacks• Web-based drive-by downloads
  4. 4. Institutional Threats• ITU – WCIT/ITRs – Old PSTN business models, IPR “protection,” interconnection rules, mandatory standards, cyber-security (excuses) for surveillance…• EU, US, BRIC, SA, … – Security, Data flows, Privacy, IPR protection, ACTA, TPP, SOPA, PIPA, CISPA, …
  5. 5. Institutional Threats• Internet Governance Forum• ITU-R (extension of assignments to 300 GHz)• Old business models and new economics of digital
  6. 6. Institutional Responses• Internet Society (ISOC)• OECD• EU: Parliament (new powers), EC (but note privacy, data flows issues)• US/NTIA+State Dept. but note NSA/DHS tension, ICE domain seizures• Transparency• Civil Society• ICANN ($350M)
  7. 7. Technical Responses• More resistant operating systems• More resistant browsers (maybe next version of Android should be called “Paranoid”)• Stronger authentication mechanisms (2-factor, etc.)• More use of cryptography for confidentiality (HTTPS by default, etc.)• DNSSEC, RPKI, …• Better forensics; more refined tools for law enforcement
  8. 8. Real Problems (cannot ignore)• Cyber-harms, crimes and warfare• Disruption of old business models; need new ones!• Immature digital social norms• Casual use of terms: “cybercrime” “cyberwar”• Mistakes, bugs, mis-attribution (huge issue!)• Multi-stakeholder dialog is needed (including developing world countries, civil society)
  9. 9. Freedoms• To Speak• To Hear• To Gather (assemble, access)• To Choose• But should there be a Freedom from Harm?• And how should we go about achieving that?

×