10. creating new offenses and penalties
the need to protect citizens, property and infrastructure vs the
need to respect legal, civil and property rights
distinguishing the different motives of
politicians and objective curbing of cyber attacks
the approach on cybersecurity
is something separate and different from conventional law and order
11. the vague goals and terms that give too much
discretion to prosecutors.
6. Open-ended information gathering and processing
7. One-size-fits-all approach
a threat to internet freedom
over-reach of state security services, widespread state and
corporate surveillance and new censorship mechanisms meant to regulate online content under
the guise of security.
15. only 2% is successfully prosecuted
cross border enforcements
3. Different moral values and laws and varied enforcement responses
ineffecient’ in responding timely and creating quick evidence
16. technically complex and circumvented
scope and pervasiveness of digital technologies
3. Affordability and Access to technology is
adapting counter measures to
preventive and detective software
thatTechnology is the predominant regulating institution
17. , people don’t want cheap things, they want it for free. (music and
piracy case – music is now very cheap but billions commit piracy every year)
18. governs socially salient behaviours
2. Freedom of speech philosophy
a very powerful force in regulating cyber space
21. National Cyber Security Center and strategy for affiliation by corporates and
experts.
Single Point of Contact for Incidents
Incident ResponseTeams (CIRT)
Emergency ResponseTeams (CERT)
Escalation policy from a mere incident status to a critical crime, or emergency level
22. a shared situational awareness
ability to respond quickly to prevent intrusions
counter-intelligence capabilities
security of the supply chain
cyber education
redirect research and development
deterrence strategies