Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Internet under Attack       Vint Cerf     21 May 2012
We have it in our grasp• To connect every person on the face of the  Earth to:  – One another  – To all human knowledge• T...
Technical threats•   Viruses, worms, trojan horses•   Phishing and Pharming (DNS cache poisoning)•   Social engineering•  ...
Institutional Threats• ITU – WCIT/ITRs  – Old PSTN business models, IPR “protection,”    interconnection rules, mandatory ...
Institutional Threats• Internet Governance Forum• ITU-R (extension of assignments to 300 GHz)• Old business models and new...
Institutional Responses• Internet Society (ISOC)• OECD• EU: Parliament (new powers), EC (but note  privacy, data flows iss...
Technical Responses• More resistant operating systems• More resistant browsers (maybe next version of  Android should be c...
Real Problems (cannot ignore)• Cyber-harms, crimes and warfare• Disruption of old business models; need new  ones!• Immatu...
Freedoms•   To Speak•   To Hear•   To Gather (assemble, access)•   To Choose•   But should there be a Freedom from Harm?• ...
Upcoming SlideShare
Loading in …5
×

F2C12: Vint Cerf

1,136 views

Published on

Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk

and other presentations are at:
http://freedom-to-connect.net/videos/

Published in: Technology
  • Be the first to comment

  • Be the first to like this

F2C12: Vint Cerf

  1. 1. Internet under Attack Vint Cerf 21 May 2012
  2. 2. We have it in our grasp• To connect every person on the face of the Earth to: – One another – To all human knowledge• To pursue a policy of plenty vs poverty (cf Peter Diamandis: ABUNDANCE)• We’d have to be a pretty stupid species not to take advantage of this opportunity.• But there are problems….
  3. 3. Technical threats• Viruses, worms, trojan horses• Phishing and Pharming (DNS cache poisoning)• Social engineering• Password dictionary attacks• Web-based drive-by downloads
  4. 4. Institutional Threats• ITU – WCIT/ITRs – Old PSTN business models, IPR “protection,” interconnection rules, mandatory standards, cyber-security (excuses) for surveillance…• EU, US, BRIC, SA, … – Security, Data flows, Privacy, IPR protection, ACTA, TPP, SOPA, PIPA, CISPA, …
  5. 5. Institutional Threats• Internet Governance Forum• ITU-R (extension of assignments to 300 GHz)• Old business models and new economics of digital
  6. 6. Institutional Responses• Internet Society (ISOC)• OECD• EU: Parliament (new powers), EC (but note privacy, data flows issues)• US/NTIA+State Dept. but note NSA/DHS tension, ICE domain seizures• Transparency• Civil Society• ICANN ($350M)
  7. 7. Technical Responses• More resistant operating systems• More resistant browsers (maybe next version of Android should be called “Paranoid”)• Stronger authentication mechanisms (2-factor, etc.)• More use of cryptography for confidentiality (HTTPS by default, etc.)• DNSSEC, RPKI, …• Better forensics; more refined tools for law enforcement
  8. 8. Real Problems (cannot ignore)• Cyber-harms, crimes and warfare• Disruption of old business models; need new ones!• Immature digital social norms• Casual use of terms: “cybercrime” “cyberwar”• Mistakes, bugs, mis-attribution (huge issue!)• Multi-stakeholder dialog is needed (including developing world countries, civil society)
  9. 9. Freedoms• To Speak• To Hear• To Gather (assemble, access)• To Choose• But should there be a Freedom from Harm?• And how should we go about achieving that?

×