cto-cybersecurity-2010-dr. martin koyabe

14
Critical Information Infrastructure Protection: Threats & Challenges for Developing Countries Dr Martin Koyabe Security Futures Practice, BT Innovate & Design CTO, Cyber Security Forum, London,UK 17-18 th June 2010

Upload: segughana

Post on 19-Dec-2014

670 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: CTO-Cybersecurity-2010-Dr. Martin Koyabe

Critical Information Infrastructure Protection: Threats & Challenges for Developing CountriesDr Martin Koyabe

Security Futures Practice, BT Innovate & Design

CTO, Cyber Security Forum, London,UK

17-18th June 2010

Page 2: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Basic Understanding of CII [1/2]

• Critical Information Infrastructures (CII) – communications and/or information services whose

availability, reliability and resilience are essential to the functioning of a modern economy

– CII also includes:• telecommunications, power distribution, water supply, public health services, national

defense, law enforcement, government services, and emergency services

Page 3: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Basic Understanding of CII [2/2]

• Critical Information Infrastructure Protection (CIIP) – Focuses on protection of IT systems and assets

• Telecommunication, computers/software, Internet, Satellite, interconnected computers/networks (Internet) & services they provide

– Ensures Confidentiality, Integrity and Availability• Required 27/4 (365 days)

• Part of the daily modern economy and the existence of any country

Confidentiality

Integrity

Availability

Page 4: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Key levels of CII risks

• Technical– Complexity and interdependencies

• Increased dependencies increased vulnerabilities

– Trust relationships increasingly complex– End-to-End mitigation can be difficult

• Actor– State-sponsored actors– Ideological and political extremist actors– Frustrated insiders/social-engineering– Organised criminal agents/individuals

• Supported by underworld economy

Page 5: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Global trends towards CIIP

• Increased awareness for CIIP & cyber security– Countries aware that risks to CIIP need to be managed

• Whether at National, Regional or International level

• Cyber security & CIIP becoming essential tools– For supporting national security & social-economic well-being

• At national level– Increased need to share responsibilities & co-ordination

• Among stakeholders in prevention, preparation, response & recovery

• At regional & international level– Increased need for co-operation & co-ordination with partners

• In order to formulate and implement effective CIIP frameworks

Page 6: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

How about developed economies?

• Key Cybersecurity threat(s) are diverse, but related

“Established capable states...”Source: UK Cyber Security Strategy [2009]

“The role of nations in exploiting information networks...”Source: US Cyberspace Policy Review [2009]

“The dangers from IT crime, threat to government agencies...”

Source: Swedish Emergency Management Agency (SEMA) [2008]

“Financial incentive for online criminal behaviour...”Source: Towards a Belgian strategy on Information Security [2008]

Page 7: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Challenges for developing countries

#1: Cost and lack of (limited) financial investment– Economics for establishing a CIIP framework can be a hindrance– Limited human & institutional resources

Page 8: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Challenges for developing countries

#2: Technical complexity in deploying CIIP– Need to understand dependencies & interdependencies

• Especially vulnerabilities & how they cascade

– Lack of effective trust relationships among stakeholders

Provides

Technical & Policy assistance to member

states

Page 9: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Challenges for developing countries

#3: Need for Cybersecurity education & culture re-think– Create awareness on importance of Cybersecurity & CIIP

• By sharing information on what works & successful best practices

– Creating a Cybersecurity culture can promote trust & confidence• It will stimulate secure usage, ensure protection of data and privacy

Page 10: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Challenges for developing countries

#4: Lack of relevant CII policies & legal framework– Needs Cybercrime legislation & enforcement mechanisms– Setup policies to encourage co-operation among stakeholders

• Especially through Public-Private-Partnerships (PPP)

#5: Lack of information sharing & knowledge transfer– It is important at ALL levels National, Regional & International – Necessary for developing trust relationships among stakeholders

• Including CERT teams

Page 11: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Future CII threat vectors

• Expanding Infrastructures– Fiber optic connectivity

• TEAMS/Seacom/EASSy

– Mobile/Wireless Networks• Africa – accounts for 30% of ALL

mobile phones in the world

• Existence of failed states– Increased ship piracy

• To fund other activities

– Cyber warfare platforms• Doesn’t need troops or military hardware

• Cyber communities– Social Networks – Attacker’s “gold mine”

Page 12: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Summary

• CIIP deployment in developing countries is working progress– Despite the challenges, there are also success stories too

• E.g. TUNISIA (CERT/TCC)

• CIIP/Cybersecurity is a 24/7 (365 days) business– It’s costly, but doing without it is even worse

• Co-ordination & co-operation among stake holders is crucial– Encourages trust, knowledge sharing & skills transfer

• Future threat vectors need our full attention– Dependencies & interdependencies will become more complex

Page 13: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc

Q&A Session

Thank You

[email protected]

Page 14: CTO-Cybersecurity-2010-Dr. Martin Koyabe

© British Telecommunications plc