cybersecurity

8
www.isoc.gh Cybersecurity Internet Governance & Standards Development Workshop, Accra Edwin A. Opare [email protected] www.isoc.gh

Upload: edwin-a-opare-ing-ceh-itil-v3

Post on 08-May-2015

308 views

Category:

Education


0 download

DESCRIPTION

Cybersecurity issues in Internet Governance

TRANSCRIPT

Page 1: Cybersecurity

www.isoc.gh

Cybersecurity

Internet Governance & Standards Development Workshop, Accra

Edwin A. [email protected]

www.isoc.gh

Page 2: Cybersecurity

www.isoc.gh

Cybersecurity – The situation

• The Internet was originally designed for use by a closed circle of mainly academics without security concerns.

• They communicated openly and addressed possible security problems informally.

2

Page 3: Cybersecurity

www.isoc.gh

Classification of Cybersecurity issues

• Type of action• data interception, data interference, illegal access, spyware,

data corruption, sabotage, denial-of-service, and identity theft

• Type of perpetrator• hackers, cybercriminals, cyberwarriors, and cyberterrorists

• Type targets• individuals, private companies, and public institutions to

critical infrastructures, governments, and military assets.

3

Page 4: Cybersecurity

www.isoc.gh

Cybersecurity policy initiatives

• National level• DHS for the United States• MoC for Ghana

• International level• ITU (X.509 ) – PKI• ITU - Global Cybersecurity Agenda(legal measures, policy

cooperation, and capacity building )• The G8 - 24/7(High Tech Crime )• UN General Assembly resolutions on ‘developments in the

field of information and telecommunications in the context of international security’

4

Page 5: Cybersecurity

www.isoc.gh

Cybersecurity policy initiatives cont.

• CoE, Convention on Cybercrime, (1 July 2004)• Bilateral arrangements and agreements

• Stanford Draft Convention on Protection from Cyber Crime and Terrorism. This draft recommends the establishment of an international body, named the Agency for Information Infrastructure Protection (AIIP).

5

Page 6: Cybersecurity

www.isoc.gh

Cybersecurity - The issues

• Influence of Internet architecture on cybersecurity• DNSSEC

• for ccTLDs• for the root zone in 2010

6

Page 7: Cybersecurity

www.isoc.gh

Future development of e-commerce demands a high level of cybersecurity

7

Page 8: Cybersecurity

www.isoc.gh

Cybersecurity and privacy

• Will additional cybersecurity measures imply some loss of privacy?

• What regulation should apply to encryption software, which can be used both for the legitimate protection of communication privacy and for the protection of communications of terrorists and criminals?

• Extension of the CoE Convention on Cybercrime to

8