SlideShare a Scribd company logo
Introduction to
Internet Governance
Jovan Kurbalija
Geneva, 2015
DiploFoundation
Why?
Relevance
DiploFoundation
Dependence
DiploFoundation
Dependence
DiploFoundation
Cable geo-strategy
DiploFoundation
IGIn 3 Triangles
Money flow in the Internet business model
Politics around data
How to avoid digital ‘Bermuda triangle’?
DiploFoundation
What?
Issues
Internet Governance: narrow vs. broad
Cyber diplomacy
Digital policy
Cybersecurity
E-government
International Internet Public Policy Issues
(UN CSTD formulation)
DiploFoundation Terminological Confusion
Internet governance is the development and
applications by governments, the private
sector, and civil society, in their respective
roles, of shared principles, norms, rules,
decision-making procedures, and
programmes that shape the evolution and
use of the Internet.
WGIG working definition of IG
DiploFoundation
DiploFoundation 2004
DiploFoundation 2014
DiploFoundation
IG Layers
Telecom infrastructure
(cable, wireless, ...)
Protocols, standards and services
(DNS, TCP/IP, SSL...)
Content and applications
(HTML, FTP, XML)
DiploFoundation
Access
Source: ITU indoFec “ICT Regulation Toolkit”
IAP
Telcos
IXP
DiploFoundation
Critical Internet Resources (CIR)
Domain addr. IP addr.
coe.int
193.164.
229.87
RIR
Registries
Registrars
DiploFoundation
Cloud and content
OTT
Service industry
Content industry
Cloud services providers
DiploFoundation
Net neutrality
DiploFoundation
DiploFoundation
Cyber-Security
DiploFoundation
Cyber-attacks
DiploFoundation
Security and Privacy
?
DiploFoundation
DiploFoundation
DiploFoundation
Privacy
DiploFoundation
Interplay

More Related Content

What's hot

Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Internet of things
Internet of thingsInternet of things
Internet of thingsNaiyer Khan
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction AARYAN GUPTA
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingGarima Kulshreshtha
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Tarika Verma
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachDeloitte United States
 

What's hot (20)

Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
E gov lecture1
E gov lecture1E gov lecture1
E gov lecture1
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Blockchain+IOT
Blockchain+IOTBlockchain+IOT
Blockchain+IOT
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
 

Viewers also liked

Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet GovernanceDiploFoundation
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview Glenn McKnight
 
Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017
Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017
Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017Mohamed Said Ouerghi
 
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunNode 科技創業新聞網
 
1 蔡怡昌 網際網路與網路治理
1 蔡怡昌 網際網路與網路治理1 蔡怡昌 網際網路與網路治理
1 蔡怡昌 網際網路與網路治理Kobe Chen
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Cyber Security Infotech
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipqwsny
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 

Viewers also liked (10)

Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet Governance
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
 
Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017
Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017
Internet Governance - INTT Workshop on Net Neutrality - 9 mars 2017
 
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
 
1 蔡怡昌 網際網路與網路治理
1 蔡怡昌 網際網路與網路治理1 蔡怡昌 網際網路與網路治理
1 蔡怡昌 網際網路與網路治理
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)
 
Data Driven Cybersecurity Governance
Data Driven Cybersecurity GovernanceData Driven Cybersecurity Governance
Data Driven Cybersecurity Governance
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 

Similar to Introduction to Internet Governance

ICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-AwarenessICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-AwarenessIsmael Peña-López
 
GIC Introduction to Internet Governance
GIC   Introduction to Internet GovernanceGIC   Introduction to Internet Governance
GIC Introduction to Internet GovernanceDiploFoundation
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010segughana
 
Internet governance
Internet governanceInternet governance
Internet governancermvvr143
 
eGovernment for Citizen: Leveraging Open SOA Standards and Interoperability ...
eGovernment for Citizen:  Leveraging Open SOA Standards and Interoperability ...eGovernment for Citizen:  Leveraging Open SOA Standards and Interoperability ...
eGovernment for Citizen: Leveraging Open SOA Standards and Interoperability ...Adomas Svirskas
 
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy”  Task Force Meeting - Andrew WyckoffG20 “Digital Economy”  Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoffinnovationoecd
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)Ismael Peña-López
 
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesInternet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesSarra REBHI
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)
Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)
Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)Shreedeep Rayamajhi
 
20061031 Policies and measures for eBusiness and ICT in the European Union
20061031 Policies and measures for eBusiness and ICT in the European Union20061031 Policies and measures for eBusiness and ICT in the European Union
20061031 Policies and measures for eBusiness and ICT in the European UnionArian Zwegers
 
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...IoT Tunisia
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...ServiceWave 2010
 

Similar to Introduction to Internet Governance (20)

ICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-AwarenessICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-Awareness
 
GIC Introduction to Internet Governance
GIC   Introduction to Internet GovernanceGIC   Introduction to Internet Governance
GIC Introduction to Internet Governance
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010
 
Internet governance
Internet governanceInternet governance
Internet governance
 
eGovernment for Citizen: Leveraging Open SOA Standards and Interoperability ...
eGovernment for Citizen:  Leveraging Open SOA Standards and Interoperability ...eGovernment for Citizen:  Leveraging Open SOA Standards and Interoperability ...
eGovernment for Citizen: Leveraging Open SOA Standards and Interoperability ...
 
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy”  Task Force Meeting - Andrew WyckoffG20 “Digital Economy”  Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoff
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)
 
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesInternet of Things Gouvernance Challenges
Internet of Things Gouvernance Challenges
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)
Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)
Concept paper-on-igf-2014-istanbul-turkey-from-nepal-s-perspective-docx (1)
 
20061031 Policies and measures for eBusiness and ICT in the European Union
20061031 Policies and measures for eBusiness and ICT in the European Union20061031 Policies and measures for eBusiness and ICT in the European Union
20061031 Policies and measures for eBusiness and ICT in the European Union
 
Act.1.8 aminta
Act.1.8 amintaAct.1.8 aminta
Act.1.8 aminta
 
ICT AND NATIONAL DEVELOPMENT
ICT AND NATIONAL DEVELOPMENTICT AND NATIONAL DEVELOPMENT
ICT AND NATIONAL DEVELOPMENT
 
How japan can learn from danish best practice v01 20120503_meyer
How japan can learn from danish best practice v01 20120503_meyerHow japan can learn from danish best practice v01 20120503_meyer
How japan can learn from danish best practice v01 20120503_meyer
 
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
Bilel Jamoussi - Driving Internet of Ihings (IoT) standardization - IoT Tunis...
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
Internet Governance Backround
Internet Governance BackroundInternet Governance Backround
Internet Governance Backround
 

More from Escola de Governança da Internet no Brasil

Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...
Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...
Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...Escola de Governança da Internet no Brasil
 

More from Escola de Governança da Internet no Brasil (20)

Políticas Públicas para Acesso e uso da Internet
Políticas Públicas para Acesso e uso da InternetPolíticas Públicas para Acesso e uso da Internet
Políticas Públicas para Acesso e uso da Internet
 
Futuro da Internet - Perspectivas para os Próximos 10 anos
Futuro da Internet - Perspectivas para os Próximos 10 anosFuturo da Internet - Perspectivas para os Próximos 10 anos
Futuro da Internet - Perspectivas para os Próximos 10 anos
 
Políticas Públicas Temáticas e Desafios da Inclusão Digital
Políticas Públicas Temáticas e Desafios da Inclusão DigitalPolíticas Públicas Temáticas e Desafios da Inclusão Digital
Políticas Públicas Temáticas e Desafios da Inclusão Digital
 
Liberdade de Expressão, Privacidade e Proteção de Dados Pessoais
Liberdade de Expressão, Privacidade e Proteção de Dados PessoaisLiberdade de Expressão, Privacidade e Proteção de Dados Pessoais
Liberdade de Expressão, Privacidade e Proteção de Dados Pessoais
 
Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...
Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...
Economia Política na era da Informação: Propriedade Intelectual x Livre Compa...
 
A economia da Internet e os negócios eletrônicos
A economia da Internet e os negócios eletrônicosA economia da Internet e os negócios eletrônicos
A economia da Internet e os negócios eletrônicos
 
Economia de Telecomunicações para o Provimento de Acesso à Internet
Economia de Telecomunicações para o Provimento de Acesso à InternetEconomia de Telecomunicações para o Provimento de Acesso à Internet
Economia de Telecomunicações para o Provimento de Acesso à Internet
 
Liberdade liberal e a liberdade na rede
Liberdade liberal e a liberdade na redeLiberdade liberal e a liberdade na rede
Liberdade liberal e a liberdade na rede
 
Marco Civil da Internet
Marco Civil da InternetMarco Civil da Internet
Marco Civil da Internet
 
Setor de Provimento de Serviços Internet
Setor de Provimento de Serviços InternetSetor de Provimento de Serviços Internet
Setor de Provimento de Serviços Internet
 
Panorama do setor de Provimento de Internet
Panorama do setor de Provimento de InternetPanorama do setor de Provimento de Internet
Panorama do setor de Provimento de Internet
 
Marco Civil da Internet e Direitos dos cidadãos e consumidores
Marco Civil da Internet e Direitos dos cidadãos e consumidoresMarco Civil da Internet e Direitos dos cidadãos e consumidores
Marco Civil da Internet e Direitos dos cidadãos e consumidores
 
Atividade - Recursos Críticos de Internet
Atividade - Recursos Críticos de InternetAtividade - Recursos Críticos de Internet
Atividade - Recursos Críticos de Internet
 
Marco Civil da Internet
Marco Civil da InternetMarco Civil da Internet
Marco Civil da Internet
 
Recursos Críticos de Internet
Recursos Críticos de InternetRecursos Críticos de Internet
Recursos Críticos de Internet
 
Internet, Conceitos e Evolução
Internet, Conceitos e EvoluçãoInternet, Conceitos e Evolução
Internet, Conceitos e Evolução
 
Como funciona a Internet
Como funciona a InternetComo funciona a Internet
Como funciona a Internet
 
Fundamentos de Segurança da Informação
Fundamentos de Segurança da InformaçãoFundamentos de Segurança da Informação
Fundamentos de Segurança da Informação
 
Fundamentos de Segurança da Informação
Fundamentos de Segurança da InformaçãoFundamentos de Segurança da Informação
Fundamentos de Segurança da Informação
 
Internet e Web NÃO SÃO as mesmas coisas
Internet e Web NÃO SÃO as mesmas coisasInternet e Web NÃO SÃO as mesmas coisas
Internet e Web NÃO SÃO as mesmas coisas
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxAnkitscribd
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 

Recently uploaded (14)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 

Introduction to Internet Governance

Editor's Notes

  1. Impact on DD: we all know about the infrastructure...
  2. Impact on DD: we all know about the infrastructure...
  3. Impact on DD: we all know about the infrastructure...
  4. virtual worlds and emerging issues
  5. virtual worlds and emerging issues
  6. Global Botnet Threat Activity Map by TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Attacks on early warning system sensors of Deutsche Telekom and partners (under "Info" you can also find other statistics, such as most commonly used passwords by attackers!) http://www.sicherheitstacho.eu/ Digital attack map showcasing distributed denial-of-service (DDoS) attacks on honeypots by Google and Arbor Networks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&time=16367&view=map http://map.ipviking.com/
  7. but not much about the traffic!