Uploaded by Abdillah Satari Rahim

Keamanan Siber di Albania Pendekatan Multipihak

advertisement
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/315495692
Cybersecurity in Albania: a Multistakeholder Approach
Article · January 2017
CITATIONS
READS
0
747
1 author:
Desara Dushi
Epoka University
3 PUBLICATIONS 5 CITATIONS
SEE PROFILE
All content following this page was uploaded by Desara Dushi on 22 March 2017.
The user has requested enhancement of the downloaded file.
DCAF Young Faces 2016 – “Strategic cybersecurity policy development in Southeast Europe”
Cybersecurity in Albania: a Multistakeholder Approach
AUTHOR: Desara Dushi*
Executive Summary
Cybersecurity in Albania is a new field which has brought new challenges and threats through
digitalization and connectivity. Currently, approximately 60% of the Albanian population are
internet users.1 The new Agenda on Digitalization of public services, together with the positive
impact in the EU integration process, brings ahead new challenges which cannot be faced by
the government alone. Cybersecurity is a field that involves many stakeholders and to
effectively respond to cyber threats, there is the necessity of cooperation among these
stakeholders. The aim of this brief is to describe the current multistakeholder involvement in the
cybersecurity of Albania and to promote the idea that better answers are reached when a
range of experts can discuss and cooperate with each other for common goals even if
different interests are at stake. It will start with a short overview of the legal basis on which
multistakeholder cooperation in the country can be achieved. The policy brief will continue
with an analysis of the current involvement of different stakeholders in the development of
cybersecurity in Albania, especially their involvement in the drafting of the new draft strategy
on cybersecurity. The brief will conclude with recommendations highlighting the need for wellbalanced coordination among activities of state and non-state actors in cybersecurity
measures and on the increased involvement of all stakeholders in the development of
cybersecurity and better protection from cyber threats.
OVERVIEW OF CURRENT POLICY
Statistics taken from the Agency for Electronic
and Postal Communications:
http://akep.al/statistika
1
1
The concept of cybersecurity and cyber
threat response in Albania is very recent.
However we are witnessing a very rapid
increase
of
information
and
communication technologies (ICTs) in the
country especially in the last two years,
where the number of ICT users by
broadband 3G/4G access from 2014 to
2016 has increased by 32.6%, currently
reaching 64.7% of the population.1
Increase in users and usage also points to
the higher risks that the Albanian
population faces in cases of weak
cybersecurity policies, risks that include
Page
Cyberspace is a very dynamic area and
requires adequate control in order to
prevent its negative effects which can
cause serious cybersecurity damage to
both governments and individuals. As
every country, Albania is susceptible to
cybercrime
and
attacks
against
cybersecurity, thus it should take action to
prevent cybercrime and maintain a
secure and safe cyberspace. Since
cyberspace is a dynamic environment
with new challenges and threats coming
up
at
every
moment,
Albania’s
cybersecurity policy must be equally
dynamic
and
flexible
enough
to
effectively respond to any kind of cyber
threat.
DCAF Young Faces 2016 – “Strategic cybersecurity policy development in Southeast Europe”
In December
adopted the
2015 the government
Document on Cyber
Dokumenti i Politikave per Sigurine Kibernetike
2015-2017 (Document on Cyber Security Policy
2015-2017)
3 See: Cyber Defence Strategy, Ministry of
Defence
4 See: Strategy on National Security 2014-2020,
available
at:
http://www.mbrojtja.gov.al/qksm/strategji_siguris
e_25mars_2014.pdf
2
Strengthening
of
partnerships
with
different responsible stakeholders is one of
the strategic objectives of this Document.5
The Document then describes in more
detail the fields of collaboration with
different
stakeholders,
such
as:
strengthening the collaboration with
Internet Service Provides as regards the
treatment of cyber incidents and
measures for blocking the access to
websites
with
illegal
content;
collaboration with civil society regarding
the online safety of children; collaboration
with academia on the opening of
specialized study programmes about
cybersecurity; collaboration with the
banking sector which, according to this
document, should be present in any legal
or technical initiative taken in the field of
cyber security. The Document puts the
responsibility with the government to
create the conditions and encouraging
the private sector, NGOs and Critical
Information Infrastructure (CII) operators
to engage in the processes of legislation
improvement,
CII
identification,
strengthening
of
human
resources,
meetings with representatives of public
2
In November 2014 the Ministry of Defense
(MoD) adopted its Strategy for Cyber
Defense. One of its main objectives is the
creation of partnership with the IT business
sector for guaranteeing security and
stability of the infrastructure, computer
systems, products and services. Besides IT
businesses, the MoD pays attention to the
collaboration with other public institutions
on cyber defense, with academia on
research and innovation in the field, and
the private sector on training and
fundraising.3 Another important document
adopted the same year, the Strategy of
National Security 2014-2020, pays specific
attention to fostering cyber security and
protection against cybercrime. This
strategy highlights that cyber threats in
the country are increasing and thus urges
for the drafting and implementation of
policies against cybercrime, especially for
the protection of networks of classified
information in the army and civil area.4
Security Policy 2015-2017 which aims to
coordinate the duties and responsibilities
of all actors involved in the maintenance
of a secure cyberspace. Among the basic
principles of cybersecurity listed in this
document are also the collective
responsibility
among
all
users
of
cyberspace,
including
not
only
government institutions but also the
private sector and citizens; collaboration
and coordination among all stakeholders:
interinstitutional collaboration, publicprivate
collaboration
and
even
collaboration with academia is included;
and international cooperation.
See: Dokumenti i
Kibernetike 2015-2017
5
Politikave
per
Sigurine
Page
but are not limited to: data theft (credit
cards, passwords or other personal data),
identity theft, botnet attacks, Denial of
Service
(DDoS)
attacks,
copyright
infringement, online grooming and even
production and distribution of child
pornography. According to police reports
in 2014 alone, 180 criminal acts classified
as cybercrimes were detected in the
country, out of which 53 were in the ICT
field and 127 committed through
computer systems.2
DCAF Young Faces 2016 – “Strategic cybersecurity policy development in Southeast Europe”
Ibid.
See: Albanian Digital Agenda 2015-2020,
available
at:
http://akshi.gov.al/images/Strategjia_Axhenda_D
ixhitale_e_Shqiperise_2015-2020.pdf
8 European Commission, Albania 2016 Report:
http://ec.europa.eu/enlargement/pdf/key_docu
ments/2016/20161109_report_albania.pdf
9 Ibid.
10 Ibid.
6
7
In December 2016, the second National
Security Forum was held in Tirana, where
the National Agency for Cyber Security
(ALCIRT) presented the draft Law on
Cyber Security which was drafted in
cooperation
with
the
Ministry
for
Innovation and Public Administration
(MIPA). This draft law provides for the
creation of a National Authority for Cyber
Security (NACS), as the central authority
for monitoring and implementing this law
and other regulations related to the law.
NACS will replace ALCIRT and will be the
central national contact point of the
country when it comes to cyber security,
serving directly under the Prime Minister.
This
authority
is
responsible
for
coordinating
the
public-private
collaborations between operators of CII,
operators
of
Important
Information
Infrastructure and other public or private
stakeholders engaged in cyber security;
and for the creation of awareness and
educational activities in the field of cyber
3
In 2014, the Albanian government
adopted an inter-sectorial strategy called
“Albanian Digital Agenda 2015-2020”,
which established as part of the basic
principles for the development of the
digital
agenda
the
public-private
collaboration and partnership and intersectorial, local-central, regional and
international
collaboration.7
On
9
November
2016
the
European
Commission launched the Albania 2016
Progress Report on EU enlargement policy,
with a chapter related to information
society and media. According to this
report, Albania is making continuous
efforts towards the implementation of the
2015-2020 digital agenda and the
national
plan
for
broadband
development.8 A new law on electronic
identification and trust services was
adopted in October. Amendments to the
law on e-commerce suggest further
alignment with the acquis. The number of
e-government services provided through
the e-Albania.al portal increased, as well
as the number of users and electronic
payments carried out.9 The administrative
capacity of the National Agency for
Information Society was strengthened with
20 employees.10
The government of Albania has also just
started a new initiative trying to engage
civil society living abroad in the
cybersecurity development of the country
by creating a network of Albanians living
abroad
who
are
engaged
in
cybersecurity in all sectors. As such, on 19
November 2016 the Ministry for Innovation
and Public Administration organized the
first Summit of the Albanian Diaspora, with
the intention of creating a network of
successful Albanian citizens living abroad,
in order to increase their involvement in
the country’s development. One of the
main topics discussed at the summit was
innovation in the direction of e-commerce
and digital economy, which require a
strong network and online security
development.
Page
and private institutions, project creations
and public discussions about legislation,
creation of public-private partnerships
and involvement in the monitoring of the
results of the Document.6
DCAF Young Faces 2016 – “Strategic cybersecurity policy development in Southeast Europe”
security.11 The draft law, which is currently
being reviewed by the Parliament,
describes organizational and technical
measures that each institution should
respect in order to ensure cyber security
ranging from the management of risks,
the persons who have access to
information, verifying the identity of users,
and even the physical security of the
equipment, or the use of cryptography.12
WHY THE MULTISTAKEHOLDER
APPROACH?
A multistakeholder approach is used in
many areas as an accepted international
norm. It results in high effectiveness on
issues where:




Decisions impact a wide range of
people and interests;
There are overlapping rights and
responsibilities;
Different forms of expertise are
needed;
Decisions
directly
impact
13
implementation.
Internet, as a very dynamic medium, fulfills
all the above criteria. It is used by a very
wide range of people and affects all of its
users and their different interests. Different
stakeholders
have
rights
and
responsibilities
which
are
often
overlapping with each-other. Digital
security is not simply a technical issue, but
also an economic and social issue, all
stakeholders are responsible for managing
digital security risks. Internet governance
See: Draft law “On Cyber Security”, Art. 16
available
at:
http://www.inovacioni.gov.al/al/legjislacioni/kon
sultim-publik/konsultim-publik-per-projektligjin-persigurine-kibernetike
12 Ibid. Art. 6
13 Internet Society (2015) Internet Governance:
Why the multistakeholder approach works?
includes a wide range of actors, all of
which influence in the effective decisionmaking and implementation according to
their respective roles and the context.
ANALYSIS OF MULTISTAKEHOLDER
INVOLVEMENT
The key to strong cybersecurity is having
integrated security solutions with a threefold approach: detection, removal, and
prevention.14 It is also important to follow
good security practices and policies at
every level.15 Security is all about being
aware and open to twists in the tale, and
tackling them with the right foresight and
quick after-action.16 Investing in security
solutions now is a must. One of the main
fields of investment that the Albanian
government should focus on is also
increasing cooperation between different
stakeholders, both public and private,
comprising law enforcement, policy
makers, private sector (internet industry),
academia
and
researchers.
Such
cooperation should be based on a solid
legal framework that sets precise and
balanced limits on the powers of each
stakeholder, especially of the law
enforcement to access data held by
private sector entities on the basis of the
Convention
on
Cybercrime,
which
Albania has ratified since 2002, as well as
applicable standards of human rights and
the rule of law.
A key factor to make multistakeholder
cooperation work efficiently is the
dialogue between the government,
industry and all the other stakeholders in
11
R. Kulkarni (2016) Network and Online Security:
Emerging Threats and Solutions, available at:
http://www.readitquik.com/articles/networking2/network-and-online-security-emerging-threatsand-solutions/
15 Ibid.
16 Ibid.
Page
4
14
DCAF Young Faces 2016 – “Strategic cybersecurity policy development in Southeast Europe”
The new draft Law on Cyber Security in
Albania, mentioned in the above section,
provides for the creation of a central
authority for cyber security but it does not
mention
any
criteria
about
its
composition. This authority could be a
very good opportunity for a development
of a multistakeholder approach if
members
of
this
authority
were
representatives
of
not
only
the
government but also from the private
See: https://www.cybersecurityraad.nl/indexenglish.aspx
17
Obviously,
collaboration
between
different stakeholders is not an easy task,
especially if considering the different
interests and operating methodologies.
Not only should this kind of council have a
clear position in the cyber security
dialogue and policy development of the
country, but the same should be for each
stakeholder. Their responsibilities and
duties should be precise and clear, in
order to avoid overlap and conflict
among the stakeholders.
The first and most important task of this
dialogue among stakeholders in Albania
would be the creation of a list of Critical
Information Infrastructure for the country,
followed by a drafting of a cybersecurity
strategy, which is still non-existent, thus
creating many difficulties and obstacles
for the tackling of cybercrime and the
development of cyber security.
Recently, the Albanian government is
focusing on the development of egovernment but is lacking in the
development of cyber security measures
and awareness by putting the country at
a very critical situation and making it an
easy target for cyber threats. Getting IT
business and academia engaged in the
development of e-government would
result in a more secure infrastructure and
ability to mitigate possible future risks, by
creating protective mechanisms.
In Albania, there is a general lack of trust
among different stakeholders, making the
cooperation even more difficult. For this
reason, I think that the best method of
cooperation would be through formal,
regular and transparent meetings. This
would allow all stakeholders to be
5
Such an approach of creating a council
of representatives from all stakeholders is
very effective because it will make
possible for a continuous dialogue among
stakeholders through regular meetings, by
keeping all stakeholders updated with
new threats and developments. Besides, it
also makes possible the tackling of issues
from various angles, thus increasing the
productivity of the results. For reaching the
highest results, a balanced composition of
such a council is mandatory; each
stakeholder should be represented and
should have a voice.
sector, academia, NGOs, IT business,
banking, law enforcement, and even
think-tanks, each of them having an
equal voice.
Page
order to keep a balanced approach
between the need for strong protection
against cybercrime and cybersecurity
and the protection of private life of
individuals. This is noticeable when
examining the best practices of other
countries, where all the most successful
initiatives in achieving a satisfactory level
of
cyber
security
involve
several
stakeholders working together. It is worth
mentioning here the Dutch Cyber Security
Council which has a strong public-private
partnership due to its composition which
includes members from government,
industry, and the scientific community. It
monitors the National Cyber Security
Strategy and gives advice to the
government and society.17
DCAF Young Faces 2016 – “Strategic cybersecurity policy development in Southeast Europe”
included, thereby building confidence
among them: which is crucial for reaching
compromises on information sharing in
cyber security issues.
CONCLUSION
The experience accumulated by several
successful initiatives described above
demonstrates that, in order to be
effective, any cybersecurity initiative
depends
on
collaboration
among
different stakeholders, and it cannot be
achieved only by a single organization or
structure. A multistakeholder approach in
regulating national cybersecurity is crucial
for Albania. It is fundamental for creating
a stable, secure and transparent
management
of
such
a
critical
environment as Internet. Albania is still in
its early stage of cyber security initiatives
and action should be taken rapidly. While
laws are reasonably good and compliant
to the EU standards, implementation is
very weak, resulting in very weak
cybersecurity awareness and protection.
The Albanian government, in addition to
traditional security and defense strategies,
needs to improve its awareness of the
multistakeholder nature of the Internet
and the vital importance of cooperation
to address security threats.
Transparency and inclusiveness are
essential
elements
for
effective
collaborative
decision-making.
Those
significantly affected by a decision should
have the chance to be involved in
making it. For this reason, all stakeholders
should have a shared understanding of
the importance of transparency and
collective responsibility in the quality of
outputs for the cyber security of the
country. Clear shared goals among
experts of different fields, defined
objectives and outlined core principles
help build consensus, ease the monitoring
process and produce more effective
results.
Acknowledgement: Research presented in
this paper by the author is conducted as
part of PhD research at Mykolas Romeris
University, within the Erasmus Mundus Joint
International Doctoral (Ph.D.) Programme in
Law, Science and Technology.
* Ms. Desara Dushi was a PhD Candidate at the Erasmus Mundus Joint International Doctoral Degree in
Law, Science and Technology (LAST-JD) Programme, coordinated by University of Bologna and supervised
by University of Luxembourg when taking part in the DCAF Young Faces Network 2016 cycle. Research
presented in this paper is conducted as a PhD researcher at Mykolas Romeris University, within the Erasmus
Mundus Joint International Doctoral (Ph.D.) Degree Programme in Law, Science and Technology. All
opinions and evaluations contained in the paper are those of the author and cannot be attributed to
DCAF or any institution to which she is affiliated. The factual background for the paper might have been
overtaken by events since late 2016.
Page
6
http://www.dcaf.ch/Region/Southeast-Europe/DCAF-Southeast-Europe-Regional-Young-FacesNetwork
View publication stats
Download