cyber security cooperation

20
Cyber Security Cooperation Cyber Army Competitions Sanjida Yeasmin Research Assistant Bangladesh Institute of Peace and Security Studies (BIPSS)

Upload: -

Post on 13-Apr-2017

92 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security Cooperation

Cyber Security CooperationCyber Army Competitions

Sanjida YeasminResearch AssistantBangladesh Institute of Peace and Security Studies (BIPSS)

Page 2: Cyber Security Cooperation

2

Framing the Issue: A Comprehensive Approach to Cyber Security

Cyber security requires shared solutions to shared threats.

Cyber security is a dynamic, not static process. Cyber threats know no borders.

Page 3: Cyber Security Cooperation

Cyber crime includes: Including illegal access (unauthorized access), illegal interception (by technical

means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.

Page 4: Cyber Security Cooperation

Categories of Cyber Crime: it can be divided basically in the following three categories.

Cyber-crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail.

The second category of Cyber-crimes is that of Cyber-crimes against all forms of property. These crimes include computer vandalism, transmission of harmful programmes.

The third category of Cyber-crimes relate to Cyber-crimes against Government.

Page 5: Cyber Security Cooperation
Page 6: Cyber Security Cooperation

Areas of Threat

Cyber Terrorism Cyber Radicalization Threat to Financial Infrastructure Threat to Governance Threat to Military Capacity

Page 7: Cyber Security Cooperation

Cyber Terrorism To qualify as cyber terrorism, an attack should result in violence

against persons or property, or at least cause enough harm to generate fear.

There are various reasons why cyber attacks are an attractive choice for terrorists such as: They can target and affect large numbers of people with less

resources. It enables terrorists to remain unknown.

Page 8: Cyber Security Cooperation

Contd… Mostly, attacks are easy to carry out. There is no physical barriers or check points that they

have to cross. The speed and form of attacks are not dependent on the

connection speed of the attacker. A combination of both physical terrorism and cyber

terrorism is thought to be the most effective use of cyber terrorism.

Page 9: Cyber Security Cooperation

9

The Concept of Cyber Radicalisation

Groups and IndividualsBecome Radicalised

through internet

Advocating for Violence against the Dominant

Will of the Society through internet

By P

roduct of Radicalisation

Extremism, Militancy and Terrorism

Page 10: Cyber Security Cooperation

Formulate plans, Raise and launder funds, Spread propaganda, Communicate securely with the members (internal

communication), Share information and knowledge with similar groups

(external communities), Command and control, Make research and development, Recruit new members, Generate international support, Gather intelligence, Make information warfare on behalf of the nations.

Terrorist groups radicalize people through: Example- ISIS and AQIS

Page 11: Cyber Security Cooperation

Threat to financial Institution

Unencrypted Data New Hacker Opportunities Foreign-Sponsored Attacks Insecure Third-Party Services Changed or Manipulated Data Malware Attacks Threat to stock exchange

Page 12: Cyber Security Cooperation

Threat to Transportation

Metros and Sub ways Civil aviation Sea movement

Page 13: Cyber Security Cooperation

Threat to Military Capacity

Cyber Space as a new battlefield Threat to weapon system Adversaries are well aware of cyber warfare new

doctrine Terrorists developing cyber capabilities Military communications & critical infrastructure

are vulnerable and prone to an over-reliance on existing civilian networks

Page 14: Cyber Security Cooperation

Threat to Governance

Telecommunications Energy networks & safety systems Transportation- air safety & border security Defense & security: data networks and communications Banking & financial services Government services: E-Government

Page 15: Cyber Security Cooperation

Why we need cooperation in the aspect of cyber security

Ensuring free flow of information Responding to increasingly serious risks Enhancing risk-based approach Acting in partnership based on social responsibilities

Page 16: Cyber Security Cooperation

Areas of cooperation:

1. Implementation of dynamic responses to cyber incidents.2. Enhancing multi-layered mechanism for information

sharing.3. Appropriate response to cybercrime4. Establishing framework of cooperation for international

security in cyberspace.5. Building up “fundamentals” for dynamic responses.

Page 17: Cyber Security Cooperation

Contd…

1. Support for building a global framework for cyber hygiene.2. Promotion of awareness-raising activities.3. Enhanced research and development through

international cooperation.4. International rulemaking for cyber security.5. Formulation of international standards of technology.6. International rulemaking.

Page 18: Cyber Security Cooperation

Military Cooperation

Cooperation in latest skill of information attacks. Defensive and offensive cyber attacks. Sharing knowledge on cyber warfare. Example of NATO

Page 19: Cyber Security Cooperation

Turkish–Arab cooperation in Cyber Security

Cooperation in Cyber Law mechanism Cooperation in Cyber Infrastructure Cooperation in Cyber Intelligence Cooperation in making Cyber Taskforce Cooperation to do research OIC should develop cyber sell to provide help to the

member states.

Page 20: Cyber Security Cooperation

Thank you

Bangladesh Institute of Peace and Security Studies (BIPSS)