Cybersecurity

592 views

Published on

Cybersecurity issues in Internet Governance

Published in: Education, Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
592
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
14
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cybersecurity

  1. 1. www.isoc.ghCybersecurityInternet Governance & Standards Development Workshop, AccraEdwin A. Opareedwin.opare@isoc.ghwww.isoc.gh
  2. 2. www.isoc.ghCybersecurity – The situation• The Internet was originally designed for use by aclosed circle of mainly academics without securityconcerns.• They communicated openly and addressed possiblesecurity problems informally.2
  3. 3. www.isoc.ghClassification of Cybersecurity issues• Type of action• data interception, data interference, illegal access, spyware,data corruption, sabotage, denial-of-service, and identity theft• Type of perpetrator• hackers, cybercriminals, cyberwarriors, and cyberterrorists• Type targets• individuals, private companies, and public institutions tocritical infrastructures, governments, and military assets.3
  4. 4. www.isoc.ghCybersecurity policy initiatives• National level• DHS for the United States• MoC for Ghana• International level• ITU (X.509 ) – PKI• ITU - Global Cybersecurity Agenda(legal measures, policycooperation, and capacity building )• The G8 - 24/7(High Tech Crime )• UN General Assembly resolutions on ‘developments in thefield of information and telecommunications in the context ofinternational security’4
  5. 5. www.isoc.ghCybersecurity policy initiatives cont.• CoE, Convention on Cybercrime, (1 July 2004)• Bilateral arrangements and agreements• Stanford Draft Convention on Protection from CyberCrime and Terrorism. This draft recommends theestablishment of an international body, named theAgency for Information Infrastructure Protection(AIIP).5
  6. 6. www.isoc.ghCybersecurity - The issues• Influence of Internet architecture on cybersecurity• DNSSEC• for ccTLDs• for the root zone in 20106
  7. 7. www.isoc.ghFuture development of e-commercedemands a high level of cybersecurity7
  8. 8. www.isoc.ghCybersecurity and privacy• Will additional cybersecurity measures imply someloss of privacy?• What regulation should apply to encryption software,which can be used both for the legitimate protection ofcommunication privacy and for the protection ofcommunications of terrorists and criminals?• Extension of the CoE Convention on Cybercrime to8

×