SlideShare a Scribd company logo
1 of 18
Cyber Security , An Analysis of
State Security in Sri Lanka
The Thesis High Level Overview
Agenda
1. Background
2. Importance of Study
3. Definitions
4. International Incidents and Local Incidents
5. Preparedness Levels
6. Concluding Remarks
The Snowden Effect
โ€ข The Economist speculated that "the big
consequence" of the "Snowden Effectโ€œ
will be that "countries and companies
will erect borders of sorts in
cyberspace.
โ€ข In Forbes, the effect was seen as
evidenced by a rare bipartisan
movement in the U.S. Congress: "a
divided, intransigent Congress seems
nearly united over the idea that the
massive domestic intelligence gathering
system that grew after 9/11 has simply
gone too far."
`
Definitions of Cyber Terrorism
โ€ข โ€œCyber Terrorism is the premeditated use of disruptive
activities, or the threat thereof, against computers and/or
networks, with the intention to cause harm or further social,
ideological, religious, political or similar objectives, or to
intimidate any person in furtherance of such objectives. โ€
โ€ข Cyber Terrorism is limited to actions by individuals, independent groups, or
organizations. Any form of cyber warfare conducted by governments and states would
be regulated and punishable under international law.
โ€ข Examples are ,
โ€“ hacking into computer systems, introducing
viruses to vulnerable networks, web site
defacing, Denial-of-service attacks,
or terroristic threats made via
electronic communication.
International Incidents
โ€ข The Baltic state of Estonia was target to a massive denial-of-service attack
that ultimately rendered the country offline and shut out from services
dependent on Internet connectivity for three weeks in the spring of 2007.
The infrastructure of Estonia including everything from online banking and
mobile phone networks to government services and access to health care
information was disabled for a time. The tech-dependent state was in
severe problem and there was a great deal of concern over the nature and
intent of the attack.
โ€ข During the Russia-Georgia War, on 5 August 2008, three days before
Georgia launched its invasion of South Ossetia, the websites for OSInform
News Agency and OSRadio were hacked.
โ€ข In October 2007, the website of Ukrainian president Viktor Yushchenko
was attacked by hackers. A radical Russian nationalist youth group, the
Eurasian Youth Movement, claimed responsibility.
Local Incidents
โ€ข In 1998, ethnic Tamil guerrillas swamped Sri Lankan
embassies with 800 e-mails a day over a two-week
period. The messages read "We are the Internet Black
Tigers and we're doing this to disrupt your
communications." Intelligence authorities
characterized it as the first known attack by terrorists
against a country's computer systems.
โ€ข In May 2009 SRI LANKA Army's official news wing,
(www.army.lk) has been illegally hacked by suspected
Tiger terrorists
Other Countries โ€“ State of
Preparedness
โ€ข The Chinese Defense Ministry confirmed the existence of an online defense unit in
May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber
Blue Team," or "Blue Army," is officially claimed to be engaged in cyber-defense
operations, though there are fears the unit has been used to penetrate secure online
systems of foreign governments.
โ€ข May 2011 Israeli Prime Minister Benjamin Netanyahu announced the establishment
of the National Internet Defense Taskforce, charged with developing tools to secure
vital Israeli online infrastructure. "The main responsibility of the taskforce will be to
expand the state's ability to defend vital infrastructure networks against cybernetic
terrorist attacks perpetrated by foreign countries and terrorist elements
โ€ข The US Department of Defense (DoD) charged the United States Strategic Command
with the duty of combating cyber terrorism. This is accomplished through the Joint
Task Force-Global Network Operations, which is the operational component
supporting USSTRATCOM in defense of the DoD's Global Information Grid. This is
done by integrating GNO capabilities into the operations of all DoD computers,
networks, and systems used by DoD combatant commands, services and agencies.
Other Countries โ€“ State of
Preparedness
National Cyber Security Strategies in the World
Other Countries โ€“ State of
Preparedness
EU Moving Towards a Combined Strategy .
The Strategy is accompanied by the technical legislative proposal by the European
Commission's Directorate General Connect to strengthen the security of
information systems in the EU. This will encourage economic growth as people's
confidence in buying things online and using the Internet will be strengthened.
The Strategy is offering clear priorities for the EU international cyberspace policy:
1. Freedom and openness: The strategy will outline the vision and principles on applying the
EU core values and fundamental rights in cyberspace.
2. The laws, norms and EU's core values apply as much in the cyberspace as in the physical
world: The responsibility for a more secure cyberspace lies with all players of the global
information society, from citizens to governments.
3. Developing cyber security capacity building: The EU will engage with international partners
and organisations, the private sector and civil society to support global capacity building in
third countries. It will include improving access to information and to an open Internet, and
preventing cyber threats.
4. Fostering international cooperation in cyberspace issues: To preserve open, free and secure
cyberspace is a global challenge, which the EU will address together with the relevant
international partners and organisations, the private sector and civil society.
Sri Lanka Computer Emergency
Readiness Team (CERT)
Reshan Dewapura (Head of SL Central IT Body / ICTA ) made the following
five practical proposals to overcome cyber crime in Sri Lanka:-
1. We have to recognise that it is the responsibility of the government to ensure that national
networks are secure and have not been penetrated. To achieve this, the nationโ€™s cyber
activities need to be coordinated on both the institutional, district and provincial levels.
And this has to be led by the Apex Agency of Cyber Security in Sri Lanka, SLCERT.
2.
Centralised bodies such as Sri Lanka CERT, Law Enforcement Agencies and the Legislature
should focus on areas where it has particular competence, such as protecting critical
infrastructure and coordinating legal structures, as well as regulating and working with
business, consumer protection privacy, and anti-terrorism.
3.
The national security policy would need to be extended to include a cyber security agenda
that covers the length and breadth of the country, in order to take the message to the
people that cyber security is compatible with individual rights, privacy and freedom of
speech.
Sri Lanka Computer Emergency
Readiness Team (CERT)
4.
This national security and defense policy can be used for
furthering Sri Lankaโ€™s cyber security agenda; this policy must also
ensure that military operations and civilian missions are protected
against cyber attacks. Cyber defence should be made an active
capability of the country as a whole; it is crucial that Sri Lanka
takes advantage of the overlaps it shares with its powerful Asian
neighbours to coordinate activities between our countries.
5. Establish Public Private Partnerships โ€“ It is essential for
governments to cooperate with the private sector, as the majority
of web infrastructure is in private hands. All developed nations
have identified this and are working closely with the private
sector, and the private sector in return should reciprocate
equally.โ€
Sri Lanka Computer Emergency
Readiness Team (CERT)
- Actual State
โ€ข Citizens
Citizens who use emails, social media and many web applications such as e-banking
are misled and duped by people who have malicious and financial intents.
โ€ข Government Organizations
1. Information Security (IS) Audit. IS audits on your IT systems should be carried out every 6
months, at the very minimum.
2. Sri Lanka CERT|CC conducted a web security workshop/seminar for government
3. Ensure your website is compliant with Sri Lanka Government web standards.
4. Ensure that your web developer or the party responsible for maintain the website comply
with Information Security checklist.
5. Ensure that your organization has adopted, implemented and conforming to the Information
Security Policy which has been approved by the Cabinet of Ministers through the
eGovernment Policy.
6. Information Security Management Systems (ISMS) certificate
Concluding Remarks
1. Resources and attention given to Sri Lankan Cyber
Security sector is very less compared with
neighboring countries.
2. The appointed body to secure the country from such
threats are severely understaffed, and comparatively
has limited technical knowledge compared to privet
sector specialists.
3. Cyber Security is the least secure of the security
bodies in Sri Lanka (Compared with Army , Navy Air
force & Police)
Thank You !
Bibliography for Research
1. Westcott N. (2008) , โ€œDigital Diplomacy: The Impact of the Internet on
International Relationsโ€ , Oxford Internet Institute, Research Report 16
2. Nissenbaum H (2005) , โ€œWhere Computer Security Meets National Securityโ€ , Ethics
and Information Technology , New York University
3. Edith Cowan University (2010) , โ€œInternational Relations and Cyber Attached
Official and Unofficial Disclosureโ€ , Australian Information Security Welfare
Conference
4. Nye J S (2010), โ€œCyber Powerโ€, Harvard Kennedy School
5. Graham E (2010) , โ€œCyber Threats and Law of Warโ€ , Journal of Security Law and
Policyโ€
6. Herzog J (2011) , โ€œRevisiting Estonian Cyber Attacks: Digital Threats and
Multinational Responsesโ€ , Journal of Strategy Security
7. Cavelty M (2013) , โ€œ From Cyber Bombs to Political Fallout: Threat Representations
with an Impact in the Cyber Security Disclosureโ€ , International Studies Review

More Related Content

What's hot

Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
ย 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
ย 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
ย 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?John Gilligan
ย 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
ย 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
ย 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
ย 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber TerrorismShivam Lohiya
ย 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
ย 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
ย 
cyber stalking
cyber stalking cyber stalking
cyber stalking Rishabh Kataria
ย 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
ย 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurityjumanne rajabu
ย 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
ย 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
ย 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
ย 

What's hot (20)

Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
ย 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
ย 
Security risk management
Security risk managementSecurity risk management
Security risk management
ย 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
ย 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
ย 
Information security
Information securityInformation security
Information security
ย 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
ย 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
ย 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
ย 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
ย 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
ย 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
ย 
cyber stalking
cyber stalking cyber stalking
cyber stalking
ย 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
ย 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
ย 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
ย 

Viewers also liked

Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
ย 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
ย 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri LankaSLINTEC
ย 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsUpekha Vandebona
ย 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
ย 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
ย 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
ย 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
ย 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardAPNIC
ย 
The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate InitiativePrabath Siriwardena
ย 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri LankaAPNIC
ย 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
ย 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation Jackseen Jeyaluck
ย 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
ย 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
ย 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
ย 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
ย 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceUpekha Vandebona
ย 

Viewers also liked (20)

Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
ย 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
ย 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
ย 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
ย 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
ย 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
ย 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
ย 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
ย 
The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate Initiative
ย 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
ย 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
ย 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
ย 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
ย 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
ย 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
ย 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
ย 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
ย 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic Commerce
ย 

Similar to Cyber security , an Analysis of State Security in Sri Lanka

Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
ย 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
ย 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
ย 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
ย 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
ย 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
ย 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)Gry Helene Stavseng
ย 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
ย 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
ย 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
ย 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
ย 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
ย 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
ย 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
ย 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
ย 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementDavid Sweigert
ย 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyICT Watch
ย 

Similar to Cyber security , an Analysis of State Security in Sri Lanka (20)

Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
ย 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
ย 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
ย 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
ย 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
ย 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
ย 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
ย 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
ย 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
ย 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
ย 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
ย 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
ย 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
ย 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
ย 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
ย 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
ย 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
ย 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency Management
ย 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
ย 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
ย 

Recently uploaded

Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...kumargunjan9515
ย 
Erotic Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...
Erotic  Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...Erotic  Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...
Erotic Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...vershagrag
ย 
Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...
Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...
Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...Sareena Khatun
ย 
Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...
Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...
Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...kumargunjan9515
ย 
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and NumberSareena Khatun
ย 
Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...Call Girls Mumbai
ย 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32JSchaus & Associates
ย 
Premium Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort Service
Premium  Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort ServicePremium  Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort Service
Premium Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort Servicevershagrag
ย 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehousesubs7
ย 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
ย 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
ย 
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...Sareena Khatun
ย 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxScottMeyers35
ย 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Menggugurkan Kandungan 087776558899
ย 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.Christina Parmionova
ย 
Just Call VIP Call Girls In Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...HyderabadDolls
ย 
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiVasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiPriya Reddy
ย 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)NAP Global Network
ย 

Recently uploaded (20)

Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
ย 
Erotic Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...
Erotic  Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...Erotic  Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...
Erotic Meerut Call Girls ๐Ÿ’ฏCall Us ๐Ÿ” 6378878445 ๐Ÿ” ๐Ÿ’ƒ Top Class Call Girl Servi...
ย 
Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...
Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...
Call girls Service Budhwar Peth - 8250092165 Our call girls are sure to provi...
ย 
Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...
Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...
Call Girls Patancheru / 8250092165 Genuine Call girls with real Photos and Nu...
ย 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
ย 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
ย 
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Umbergaon / 8250092165 Genuine Call girls with real Photos and Number
ย 
Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar ๐Ÿ‘‰๐Ÿ‘‰ 9777949614 Top Class Call Girl Service ...
ย 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
ย 
Premium Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort Service
Premium  Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort ServicePremium  Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort Service
Premium Prayagraj โค๏ธ๐Ÿ‘ 6378878445 ๐Ÿ‘„๐ŸซฆIndependent Escort Service
ย 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
ย 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
ย 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
ย 
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
ย 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
ย 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
ย 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
ย 
Just Call VIP Call Girls In Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram โ˜Ž๏ธ 6378878445 Independent Fem...
ย 
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiVasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
ย 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
ย 

Cyber security , an Analysis of State Security in Sri Lanka

  • 1. Cyber Security , An Analysis of State Security in Sri Lanka
  • 2. The Thesis High Level Overview
  • 3. Agenda 1. Background 2. Importance of Study 3. Definitions 4. International Incidents and Local Incidents 5. Preparedness Levels 6. Concluding Remarks
  • 4. The Snowden Effect โ€ข The Economist speculated that "the big consequence" of the "Snowden Effectโ€œ will be that "countries and companies will erect borders of sorts in cyberspace. โ€ข In Forbes, the effect was seen as evidenced by a rare bipartisan movement in the U.S. Congress: "a divided, intransigent Congress seems nearly united over the idea that the massive domestic intelligence gathering system that grew after 9/11 has simply gone too far."
  • 5. `
  • 6.
  • 7. Definitions of Cyber Terrorism โ€ข โ€œCyber Terrorism is the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. โ€ โ€ข Cyber Terrorism is limited to actions by individuals, independent groups, or organizations. Any form of cyber warfare conducted by governments and states would be regulated and punishable under international law. โ€ข Examples are , โ€“ hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made via electronic communication.
  • 8. International Incidents โ€ข The Baltic state of Estonia was target to a massive denial-of-service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity for three weeks in the spring of 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time. The tech-dependent state was in severe problem and there was a great deal of concern over the nature and intent of the attack. โ€ข During the Russia-Georgia War, on 5 August 2008, three days before Georgia launched its invasion of South Ossetia, the websites for OSInform News Agency and OSRadio were hacked. โ€ข In October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.
  • 9. Local Incidents โ€ข In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems. โ€ข In May 2009 SRI LANKA Army's official news wing, (www.army.lk) has been illegally hacked by suspected Tiger terrorists
  • 10. Other Countries โ€“ State of Preparedness โ€ข The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team," or "Blue Army," is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign governments. โ€ข May 2011 Israeli Prime Minister Benjamin Netanyahu announced the establishment of the National Internet Defense Taskforce, charged with developing tools to secure vital Israeli online infrastructure. "The main responsibility of the taskforce will be to expand the state's ability to defend vital infrastructure networks against cybernetic terrorist attacks perpetrated by foreign countries and terrorist elements โ€ข The US Department of Defense (DoD) charged the United States Strategic Command with the duty of combating cyber terrorism. This is accomplished through the Joint Task Force-Global Network Operations, which is the operational component supporting USSTRATCOM in defense of the DoD's Global Information Grid. This is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.
  • 11. Other Countries โ€“ State of Preparedness National Cyber Security Strategies in the World
  • 12. Other Countries โ€“ State of Preparedness EU Moving Towards a Combined Strategy . The Strategy is accompanied by the technical legislative proposal by the European Commission's Directorate General Connect to strengthen the security of information systems in the EU. This will encourage economic growth as people's confidence in buying things online and using the Internet will be strengthened. The Strategy is offering clear priorities for the EU international cyberspace policy: 1. Freedom and openness: The strategy will outline the vision and principles on applying the EU core values and fundamental rights in cyberspace. 2. The laws, norms and EU's core values apply as much in the cyberspace as in the physical world: The responsibility for a more secure cyberspace lies with all players of the global information society, from citizens to governments. 3. Developing cyber security capacity building: The EU will engage with international partners and organisations, the private sector and civil society to support global capacity building in third countries. It will include improving access to information and to an open Internet, and preventing cyber threats. 4. Fostering international cooperation in cyberspace issues: To preserve open, free and secure cyberspace is a global challenge, which the EU will address together with the relevant international partners and organisations, the private sector and civil society.
  • 13. Sri Lanka Computer Emergency Readiness Team (CERT) Reshan Dewapura (Head of SL Central IT Body / ICTA ) made the following five practical proposals to overcome cyber crime in Sri Lanka:- 1. We have to recognise that it is the responsibility of the government to ensure that national networks are secure and have not been penetrated. To achieve this, the nationโ€™s cyber activities need to be coordinated on both the institutional, district and provincial levels. And this has to be led by the Apex Agency of Cyber Security in Sri Lanka, SLCERT. 2. Centralised bodies such as Sri Lanka CERT, Law Enforcement Agencies and the Legislature should focus on areas where it has particular competence, such as protecting critical infrastructure and coordinating legal structures, as well as regulating and working with business, consumer protection privacy, and anti-terrorism. 3. The national security policy would need to be extended to include a cyber security agenda that covers the length and breadth of the country, in order to take the message to the people that cyber security is compatible with individual rights, privacy and freedom of speech.
  • 14. Sri Lanka Computer Emergency Readiness Team (CERT) 4. This national security and defense policy can be used for furthering Sri Lankaโ€™s cyber security agenda; this policy must also ensure that military operations and civilian missions are protected against cyber attacks. Cyber defence should be made an active capability of the country as a whole; it is crucial that Sri Lanka takes advantage of the overlaps it shares with its powerful Asian neighbours to coordinate activities between our countries. 5. Establish Public Private Partnerships โ€“ It is essential for governments to cooperate with the private sector, as the majority of web infrastructure is in private hands. All developed nations have identified this and are working closely with the private sector, and the private sector in return should reciprocate equally.โ€
  • 15. Sri Lanka Computer Emergency Readiness Team (CERT) - Actual State โ€ข Citizens Citizens who use emails, social media and many web applications such as e-banking are misled and duped by people who have malicious and financial intents. โ€ข Government Organizations 1. Information Security (IS) Audit. IS audits on your IT systems should be carried out every 6 months, at the very minimum. 2. Sri Lanka CERT|CC conducted a web security workshop/seminar for government 3. Ensure your website is compliant with Sri Lanka Government web standards. 4. Ensure that your web developer or the party responsible for maintain the website comply with Information Security checklist. 5. Ensure that your organization has adopted, implemented and conforming to the Information Security Policy which has been approved by the Cabinet of Ministers through the eGovernment Policy. 6. Information Security Management Systems (ISMS) certificate
  • 16. Concluding Remarks 1. Resources and attention given to Sri Lankan Cyber Security sector is very less compared with neighboring countries. 2. The appointed body to secure the country from such threats are severely understaffed, and comparatively has limited technical knowledge compared to privet sector specialists. 3. Cyber Security is the least secure of the security bodies in Sri Lanka (Compared with Army , Navy Air force & Police)
  • 18. Bibliography for Research 1. Westcott N. (2008) , โ€œDigital Diplomacy: The Impact of the Internet on International Relationsโ€ , Oxford Internet Institute, Research Report 16 2. Nissenbaum H (2005) , โ€œWhere Computer Security Meets National Securityโ€ , Ethics and Information Technology , New York University 3. Edith Cowan University (2010) , โ€œInternational Relations and Cyber Attached Official and Unofficial Disclosureโ€ , Australian Information Security Welfare Conference 4. Nye J S (2010), โ€œCyber Powerโ€, Harvard Kennedy School 5. Graham E (2010) , โ€œCyber Threats and Law of Warโ€ , Journal of Security Law and Policyโ€ 6. Herzog J (2011) , โ€œRevisiting Estonian Cyber Attacks: Digital Threats and Multinational Responsesโ€ , Journal of Strategy Security 7. Cavelty M (2013) , โ€œ From Cyber Bombs to Political Fallout: Threat Representations with an Impact in the Cyber Security Disclosureโ€ , International Studies Review