cyber crime & cyber security workshop, zie
TRANSCRIPT
![Page 1: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/1.jpg)
15 September 2016
![Page 2: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/2.jpg)
![Page 3: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/3.jpg)
High Level Qualitative Approach
experience from other countries.
![Page 4: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/4.jpg)
![Page 5: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/5.jpg)
. Stakeholder Interests in Cyber Security, Regulation, Cyber Security
Laws
![Page 6: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/6.jpg)
![Page 7: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/7.jpg)
![Page 8: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/8.jpg)
![Page 9: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/9.jpg)
Criticism and Tension created by introducing Cyber Security
Regulation, Cyber Security Laws
![Page 10: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/10.jpg)
creating new offenses and penalties
the need to protect citizens, property and infrastructure vs the need to respect legal, civil and property rights
distinguishing the different motives of politicians and objective curbing of cyber attacks
the approach on cybersecurityis something separate and different from conventional law and order
![Page 11: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/11.jpg)
the vague goals and terms that give too muchdiscretion to prosecutors.
6. Open-ended information gathering and processing
7. One-size-fits-all approach
a threat to internet freedom
over-reach of state security services, widespread state andcorporate surveillance and new censorship mechanisms meant to regulate online content underthe guise of security.
![Page 12: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/12.jpg)
Source: right2know SA.
![Page 13: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/13.jpg)
Constraints of Cyber Security Regulation & Laws
![Page 14: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/14.jpg)
1. Social Norms
2. Architecture
3. The Law
4. The Market
![Page 15: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/15.jpg)
only 2% is successfully prosecuted
cross border enforcements
3. Different moral values and laws and varied enforcement responses
ineffecient’ in responding timely and creating quick evidence
![Page 16: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/16.jpg)
technically complex and circumvented
scope and pervasiveness of digital technologies
3. Affordability and Access to technology is
adapting counter measures to preventive and detective software
that Technology is the predominant regulating institution
![Page 17: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/17.jpg)
, people don’t want cheap things, they want it for free. (music and piracy case – music is now very cheap but billions commit piracy every year)
![Page 18: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/18.jpg)
governs socially salient behaviours
2. Freedom of speech philosophy
a very powerful force in regulating cyber space
![Page 19: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/19.jpg)
Strategies that can help create the necessary Buy-In
![Page 20: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/20.jpg)
![Page 21: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/21.jpg)
National Cyber Security Center and strategy for affiliation by corporates and experts.
Single Point of Contact for Incidents
Incident Response Teams (CIRT)
Emergency Response Teams (CERT)
Escalation policy from a mere incident status to a critical crime, or emergency level
![Page 22: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/22.jpg)
a shared situational awareness
ability to respond quickly to prevent intrusions
counter-intelligence capabilities
security of the supply chain
cyber education
redirect research and development
deterrence strategies
![Page 23: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/23.jpg)
![Page 24: Cyber Crime & Cyber Security Workshop, ZIE](https://reader034.vdocument.in/reader034/viewer/2022052418/5a6d8f467f8b9a04428b5b3f/html5/thumbnails/24.jpg)
“
”
Regulation is a Necessity …