Cyber Security Cooperation

129 Aufrufe

Veröffentlicht am

  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

Cyber Security Cooperation

  1. 1. Cyber Security Cooperation Cyber Army Competitions Sanjida Yeasmin Research Assistant Bangladesh Institute of Peace and Security Studies (BIPSS)
  2. 2. 2 Framing the Issue: A Comprehensive Approach to Cyber Security  Cyber security requires shared solutions to shared threats.  Cyber security is a dynamic, not static process.  Cyber threats know no borders.
  3. 3. Cyber crime includes:  Including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
  4. 4. Categories of Cyber Crime: it can be divided basically in the following three categories.  Cyber-crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail.  The second category of Cyber-crimes is that of Cyber-crimes against all forms of property. These crimes include computer vandalism, transmission of harmful programmes.  The third category of Cyber-crimes relate to Cyber-crimes against Government.
  5. 5. Areas of Threat  Cyber Terrorism  Cyber Radicalization  Threat to Financial Infrastructure  Threat to Governance  Threat to Military Capacity
  6. 6. Cyber Terrorism  To qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. There are various reasons why cyber attacks are an attractive choice for terrorists such as:  They can target and affect large numbers of people with less resources.  It enables terrorists to remain unknown.
  7. 7. Contd…  Mostly, attacks are easy to carry out.  There is no physical barriers or check points that they have to cross.  The speed and form of attacks are not dependent on the connection speed of the attacker.  A combination of both physical terrorism and cyber terrorism is thought to be the most effective use of cyber terrorism.
  8. 8. 9 The Concept of Cyber Radicalisation Groups and Individuals Become Radicalised through internet Advocating for Violence against the Dominant Will of the Society through internet ByProductofRadicalisation Extremism, Militancy and Terrorism
  9. 9.  Formulate plans,  Raise and launder funds,  Spread propaganda,  Communicate securely with the members (internal communication),  Share information and knowledge with similar groups (external communities),  Command and control,  Make research and development,  Recruit new members,  Generate international support,  Gather intelligence,  Make information warfare on behalf of the nations. Terrorist groups radicalize people through: Example- ISIS and AQIS
  10. 10. Threat to financial Institution  Unencrypted Data  New Hacker Opportunities  Foreign-Sponsored Attacks  Insecure Third-Party Services  Changed or Manipulated Data  Malware Attacks  Threat to stock exchange
  11. 11. Threat to Transportation  Metros and Sub ways  Civil aviation  Sea movement
  12. 12. Threat to Military Capacity  Cyber Space as a new battlefield  Threat to weapon system  Adversaries are well aware of cyber warfare new doctrine  Terrorists developing cyber capabilities  Military communications & critical infrastructure are vulnerable and prone to an over-reliance on existing civilian networks
  13. 13. Threat to Governance  Telecommunications  Energy networks & safety systems  Transportation- air safety & border security  Defense & security: data networks and communications  Banking & financial services  Government services: E-Government
  14. 14. Why we need cooperation in the aspect of cyber security  Ensuring free flow of information  Responding to increasingly serious risks  Enhancing risk-based approach  Acting in partnership based on social responsibilities
  15. 15. Areas of cooperation: 1. Implementation of dynamic responses to cyber incidents. 2. Enhancing multi-layered mechanism for information sharing. 3. Appropriate response to cybercrime 4. Establishing framework of cooperation for international security in cyberspace. 5. Building up “fundamentals” for dynamic responses.
  16. 16. Contd… 1. Support for building a global framework for cyber hygiene. 2. Promotion of awareness-raising activities. 3. Enhanced research and development through international cooperation. 4. International rulemaking for cyber security. 5. Formulation of international standards of technology. 6. International rulemaking.
  17. 17. Military Cooperation  Cooperation in latest skill of information attacks.  Defensive and offensive cyber attacks.  Sharing knowledge on cyber warfare.  Example of NATO
  18. 18. Turkish–Arab cooperation in Cyber Security  Cooperation in Cyber Law mechanism  Cooperation in Cyber Infrastructure  Cooperation in Cyber Intelligence  Cooperation in making Cyber Taskforce  Cooperation to do research  OIC should develop cyber sell to provide help to the member states.
  19. 19. Thank you Bangladesh Institute of Peace and Security Studies (BIPSS)

×