collaborative security: an approach to tackling internet security issues
TRANSCRIPT
![Page 1: Collaborative Security: An approach to tackling Internet security issues](https://reader031.vdocument.in/reader031/viewer/2022030212/58a01a8c1a28ab9c418b668d/html5/thumbnails/1.jpg)
COLLABORATIVESECURITY
An approach to tackling Internet security issues
![Page 2: Collaborative Security: An approach to tackling Internet security issues](https://reader031.vdocument.in/reader031/viewer/2022030212/58a01a8c1a28ab9c418b668d/html5/thumbnails/2.jpg)
Fostering confidence
and protecting opportunities
Collective responsibility
Fundamental properties and values
Evolution and consensus
Think globally, act locally
Elements of the Collaborative
Security Approach
1
2
3
4
5
![Page 3: Collaborative Security: An approach to tackling Internet security issues](https://reader031.vdocument.in/reader031/viewer/2022030212/58a01a8c1a28ab9c418b668d/html5/thumbnails/3.jpg)
An Internet security paradigm should:1
• Foster confidence globally,• Protect social and economic opportunities, and• Advance objectives in design and in practice.
Internet participants have:2
• A common interest in the management of the Internet to ensure its sustainability, and
• A collective responsibility to care for the Internet for the benefit of everyone.
![Page 4: Collaborative Security: An approach to tackling Internet security issues](https://reader031.vdocument.in/reader031/viewer/2022030212/58a01a8c1a28ab9c418b668d/html5/thumbnails/4.jpg)
Security solutions should be integrated to preserve the:
• Internet Invariants, and• Fundamental human rights, values, and
expectations.Agree on the problem and then find the solution. Security solutions need to be:
• Flexible enough to evolve over time,• Responsive to new challenges,• Resilient against change and threats, and • Take an open, consensus-based participatory approach.
3
4
![Page 5: Collaborative Security: An approach to tackling Internet security issues](https://reader031.vdocument.in/reader031/viewer/2022030212/58a01a8c1a28ab9c418b668d/html5/thumbnails/5.jpg)
Security solutions should involve communities:
• Of different players taking action closest to where issues occur,
• That are the smallest, lowest, or least centralized link in the chain,
• Formed in a bottom-up, self-organizing fashion, and• That effectively and efficiently define and implement
solutions based on interoperable building blocks.
5