Challenges from Living with ICTs: Strategy for Mitigation, Protection

advertisement
5/29/2009
Session 1: Setting The Stage ― Towards an Integrated
Approach for Cyber
C ber security
sec rit and Critical Information
Infrastructure Protection (CIIP)
2009 ITU Regional Cyber Security
Forum for Africa and Arab States
Tunis, Tunisia
4 - 5 June, 2009
Delivering Value Thrrough Information Communic
cation Technology
Challenges from Living with ICTs:
Strategy for Mitigation, Protection
and Prevention
“Connecting the World Responsibly”
Copyrights © e Worldwide Group, 2009
Agenda
ƒ Living with ICTs in 21st Century
ƒ Interaction with Youth and Vulnerable
ƒ Emerging Risks and Dangers
ƒ Challenges
ƒ Mitigation, Protection and Prevention
ƒ Q&A Session
Copyrights © e Worldwide Group, 2009
2
1
5/29/2009
Living with ICTs in
21st Century
Copyrights © e Worldwide Group, 2009
Background – World
Copyrights © e Worldwide Group, 2009
4
2
5/29/2009
Background – World
Copyrights © e Worldwide Group, 2009
5
Interaction with
Youth and Vulnerable
Copyrights © e Worldwide Group, 2009
3
5/29/2009
Interaction with Youth and
Vulnerable
1.
2
2.
3.
4.
e-Schools
Media and Interactive TV
Entertainment
Social Networking
–
–
–
–
My Space
Face book
Bibo
Orkut
5. Social Benefits from Governments
6. Online Shopping
7. eHealth
Copyrights © e Worldwide Group, 2009
7
Emerging Risks
and Dangers
Copyrights © e Worldwide Group, 2009
4
5/29/2009
Statistics - Cyber Crimes
ƒ The most recent report of the U.S.-based Internet Crime
Complaint Centre showed that Nigerian e-mail fraud resulted
i an average (median)
in
( di ) loss
l
suffered
ff d by
b victims
i ti
off $5,100.
$5 100 In
I
total Nigerian e-mail fraud generated $3.3 million in reported
losses over the course of one year in the United States (IC3,
2006).
Source: Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation
(2008)
ƒ
ƒ
ƒ
ƒ
ƒ
237 Million
Milli Security
S
it Attacks
Att k Globally
Gl b ll (Aug,
(A
2005)
2005).
54 Million Attacks on Government Agencies.
36 Million Attacks on Manufacturing Agencies.
34 Millions Attacks on Financial Services.
17 Million Attacks on Health Care.
Source: CRS Report for Congress (Jan, 2008)
Copyrights © e Worldwide Group, 2009
9
Statistics - Cyber Crimes
ƒ More than 4 Million people worldwide are victims of
Human Trafficking
g everyy yyear
Source: www.radio.cz/en/article/60695
ƒ 18,000 to 20,000 Persons are Trafficked into US Annually
Source: www.blackwell-sygnery.com
ƒ Human Trafficking
ff
is a $ 32 billion Industry
Source: Human Trafficking Awareness Conference – Denver, CO – Oct. 25, 2008
Copyrights © e Worldwide Group, 2009
10
5
5/29/2009
Worldwide Trends
Crimes in Cyber Cafes
Multiple Layers of Vulnerability – Cyber Crime
ƒ
ƒ
Economic Front
ƒ Economic Fraud
ƒ Stock Market Loss
ƒ
ƒ
Financial market
ƒ Bank Frauds
ƒ
IInfrastructure
f
t
t
ƒ Botnet
ƒ Denial Of Service attack –
DOS
ƒ
Industry
ƒ Airline Reservation
ƒ Net Extortion
Entertainment
ƒ Pornography
ƒ Pedophiles
ƒ Human Trafficking
ƒ Prostitution
Personal Identity
ƒ Credit Cards Thefts
ƒ Identity Card Thefts
ƒ VIP – Movies Stores
ƒ Harassment
ƒ
Terrorism
ƒ Online Radicalization
Content
ƒ
Piracy
ƒ Internet Piracy
ƒ Software Piracy
11
Copyrights © e Worldwide Group, 2008
Challenges
Copyrights © e Worldwide Group, 2009
12
6
5/29/2009
Challenges
Child
Family
Stakeholders
State
ƒ Disclosure of Personal Information
ƒ Curiosity
y
ƒ Security
ƒ Disclosure of Identity
ƒ Critical Information
ƒ Security
ƒ Infrastructure
ƒ Security/ Theft
ƒ Reliability
ƒ Critical Information
ƒ Virus Dissemination
ƒ Security and Reliability
13
Mitigation, Protection
Mitigation
and Prevention
St t
Strategy
Copyrights © e Worldwide Group, 2009
7
5/29/2009
Approach toward Cyber Security
Policy and
Procedures
Assessments and
Monitoring
Educational
Training
Integrated
Approach
Technology and
Infrastructure
Information and
Knowledge
Awareness and
Communication
Copyrights © e Worldwide Group, 2009
15
Mitigation, Protection
Mitigation
and Prevention
Pl off Attack
Plan
Att k
Copyrights © e Worldwide Group, 2009
8
5/29/2009
Child Perspective
ƒ Awareness
ƒ Training
ƒ Role Play
ƒ Exercises
ƒ Guideline / Booklets
Copyrights © e Worldwide Group, 2009
17
Family Perspective
ƒ Awareness
ƒ Training
ƒ Role Play
ƒ Exercises
ƒ Parental Controls
ƒ Technology Products for Safety
Controls
ƒ Website Blockage
Copyrights © e Worldwide Group, 2009
18
9
5/29/2009
Stakeholders Perspective
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Awareness
Policy
Training
Surveillance
Framework of Cyber Policing
Booklets for Citizens
Best Practices
Alerts / Help Lines
Networking / Support Structures
Copyrights © e Worldwide Group, 2009
19
State Perspective
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Policy
Surveillance
Monitoring Systems
Taskforce
Framework of Cyber Policing
Best Practices
Alerts / Help Lines
Networking / Support Structures
Steering Committees
ƒ International Level
ƒ National Level
ƒ Community Level
Copyrights © e Worldwide Group, 2009
20
10
5/29/2009
Q & A Session
Copyrights © e Worldwide Group, 2009
21
11
Download