Your SlideShare is downloading. ×
F2C12: Vint Cerf
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

F2C12: Vint Cerf

517
views

Published on

Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here: …

Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk

and other presentations are at:
http://freedom-to-connect.net/videos/

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
517
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Internet under Attack Vint Cerf 21 May 2012
  • 2. We have it in our grasp• To connect every person on the face of the Earth to: – One another – To all human knowledge• To pursue a policy of plenty vs poverty (cf Peter Diamandis: ABUNDANCE)• We’d have to be a pretty stupid species not to take advantage of this opportunity.• But there are problems….
  • 3. Technical threats• Viruses, worms, trojan horses• Phishing and Pharming (DNS cache poisoning)• Social engineering• Password dictionary attacks• Web-based drive-by downloads
  • 4. Institutional Threats• ITU – WCIT/ITRs – Old PSTN business models, IPR “protection,” interconnection rules, mandatory standards, cyber-security (excuses) for surveillance…• EU, US, BRIC, SA, … – Security, Data flows, Privacy, IPR protection, ACTA, TPP, SOPA, PIPA, CISPA, …
  • 5. Institutional Threats• Internet Governance Forum• ITU-R (extension of assignments to 300 GHz)• Old business models and new economics of digital
  • 6. Institutional Responses• Internet Society (ISOC)• OECD• EU: Parliament (new powers), EC (but note privacy, data flows issues)• US/NTIA+State Dept. but note NSA/DHS tension, ICE domain seizures• Transparency• Civil Society• ICANN ($350M)
  • 7. Technical Responses• More resistant operating systems• More resistant browsers (maybe next version of Android should be called “Paranoid”)• Stronger authentication mechanisms (2-factor, etc.)• More use of cryptography for confidentiality (HTTPS by default, etc.)• DNSSEC, RPKI, …• Better forensics; more refined tools for law enforcement
  • 8. Real Problems (cannot ignore)• Cyber-harms, crimes and warfare• Disruption of old business models; need new ones!• Immature digital social norms• Casual use of terms: “cybercrime” “cyberwar”• Mistakes, bugs, mis-attribution (huge issue!)• Multi-stakeholder dialog is needed (including developing world countries, civil society)
  • 9. Freedoms• To Speak• To Hear• To Gather (assemble, access)• To Choose• But should there be a Freedom from Harm?• And how should we go about achieving that?

×