SlideShare a Scribd company logo
1 of 15
1
Internet Governance Series
Issue: Economic
Topic: Cyber Security
Presentation by Glenn McKnight
IEEE Member
2
Sub Topic 1
Internet Governance Series
Overview
The Internet Governance series provides insights into the
inner workings of Internet Governance from multiple
perspectives.
This section focuses Cybersecurity as part of the
economic perspective
3
Sub Topic 1
Internet Governance Series
Introduction
Cybersecurity is among the main concerns of
governments, Internet users, techinical and
business communities. Cyberthreats and
cyberattacks are on the increase, and so is the
extent of the financial loss.
Yet, when the Internet was first invented, security
was not a concern for the inventors. In fact, the
Internet was originally designed for use by a
closed circle of (mainly) academics.
Communication among its users was open.
4
Sub Topic 1
Internet Governance Series
Types
Cybersecurity issues includes
● Action- data interception or interference, illegal
access, DOS and Indentity theft
● Criminal- hackers cyber criminals or terrorists
● Target- Anyone from individuals, companies,
government or the military
5
6
Sub Topic 1
Internet Governance Series
Canadian Stats
● Canada has more computers per capita than any other country
(129 devices per 100 people) and Canadians are the heaviest
Internet users in the world spending more than 40 hours online
per person, per month.
● The current global market for cybersecurity products and
services is expected to grow to over $170 billion by 2020, and
the job market for cyber pros is expected to rise by six million in
the next four years.
● About 70% of Canadian businesses have been victim of cyber
attacks — average cost $15 000 per incident.
Honourable Navdeep Bains, Minister of Innovation, Science and Economic Development
7
Sub Topic 1
Internet Governance Series
The Challenge
The Honourable Harjit S. Sajjan, Minister of National
Defence
“The digital economy increasingly shapes and drives the
broader economy. For Canadians to prosper and be
confident digital innovators, they need to know that the
networks that enable their efforts and safeguard their
assets and information are secure. I am committed to
making Canada a global centre for innovation – one that
creates jobs, drives growth across all industries and
improves the lives of Canadians. ”
8
Sub Topic 1
Internet Governance Series
Norton Security Report
THE SCALE OF CONSUMER CYBERCRIME ONE-AND-A-
HALF MILLION VICTIMS DAILY
● THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US
$110 BILLION ANNUALLY
● CHANGING FACE OF CYBERCRIME CYBERCRIME GOES
SOCIAL AND MOBILE
● SECURITY IQ: MIXED REPORT CARD FOR CONSUMERS.
CONSUMERS WISE UP TO TRADITIONAL THREATS, BUT
MANY STILL UNAWARE AS TO HOW CYBERCRIME IS
RAPIDLY EVOLVING
● STRONG PASSWORDS ARE KEY
EMAIL A POTENTIAL GATEWAY FOR CYBERCRIMINALS
9
10
Sub Topic 1
Internet Governance Series
Impact of Cybercrime
It's reported that
cybercrime in some
cases can cost an
economy o up to 2%
of their GDP
Source
OAS
http://www.oas.org/en/default.asp
11
12
Internet Governance Series
What can we do?
13
Internet Governance Series
Learning Resources
Global Cyber Expertise Forum
http://www.thegfce.com/
Global forum for cyber capacity building. In
the GFCE over 50 organizations and states
work together on practical initiatives to
strengthen cybersecurity, fight cybercrime,
protect online data and support e-
governance.
Sub Topic 2
Internet Governance Series
To keep up to date visit the Diplo Digital
Watch
http://digitalwatch.giplatform.org/issues/cybersecurity
Sub Topic 2
Internet Governance Series
Images
Norton Security Report
http://tinyurl.com/j97gevb
Expanding Threat
http://tinyurl.com/jxzkpts

More Related Content

What's hot

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 

What's hot (20)

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Ppt
PptPpt
Ppt
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Cia security model
Cia security modelCia security model
Cia security model
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Steganography
Steganography Steganography
Steganography
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Network Security
Network SecurityNetwork Security
Network Security
 
Security policies
Security policiesSecurity policies
Security policies
 

Viewers also liked

Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Cyber Security Infotech
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e frictionAdrian Hall
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview Glenn McKnight
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipqwsny
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceARIN
 
Caribbean perspectives in Internet Governance
Caribbean perspectives in Internet GovernanceCaribbean perspectives in Internet Governance
Caribbean perspectives in Internet GovernanceMichele Marius
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Big Data - 25 Amazing Facts Everyone Should Know
Big Data - 25 Amazing Facts Everyone Should KnowBig Data - 25 Amazing Facts Everyone Should Know
Big Data - 25 Amazing Facts Everyone Should KnowBernard Marr
 

Viewers also liked (14)

Data Driven Cybersecurity Governance
Data Driven Cybersecurity GovernanceData Driven Cybersecurity Governance
Data Driven Cybersecurity Governance
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e friction
 
IGF 2012 – ‘Internet Governance for Sustainable Human, Economic and Social De...
IGF 2012 – ‘Internet Governance for Sustainable Human, Economic and Social De...IGF 2012 – ‘Internet Governance for Sustainable Human, Economic and Social De...
IGF 2012 – ‘Internet Governance for Sustainable Human, Economic and Social De...
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
Caribbean perspectives in Internet Governance
Caribbean perspectives in Internet GovernanceCaribbean perspectives in Internet Governance
Caribbean perspectives in Internet Governance
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Big Data - 25 Amazing Facts Everyone Should Know
Big Data - 25 Amazing Facts Everyone Should KnowBig Data - 25 Amazing Facts Everyone Should Know
Big Data - 25 Amazing Facts Everyone Should Know
 

Similar to Introduction to Internet Governance and Cyber-security

Global challenges in the new information age
Global challenges in the new information ageGlobal challenges in the new information age
Global challenges in the new information ageNitish Rai
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....zayadeen2003
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxANA Cyber Security Forensic Pvt. Ltd.
 
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Global Business Events
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical IndustryIJRTEMJOURNAL
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographicAtkins
 

Similar to Introduction to Internet Governance and Cyber-security (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Global challenges in the new information age
Global challenges in the new information ageGlobal challenges in the new information age
Global challenges in the new information age
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 

More from Glenn McKnight

Vsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigVsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigGlenn McKnight
 
Vsig Orientation Session for Group B
Vsig Orientation Session for Group BVsig Orientation Session for Group B
Vsig Orientation Session for Group BGlenn McKnight
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance Glenn McKnight
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallGlenn McKnight
 
Oh What a Lovely War- Probus Presentation
Oh  What a Lovely War- Probus  PresentationOh  What a Lovely War- Probus  Presentation
Oh What a Lovely War- Probus PresentationGlenn McKnight
 
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Glenn McKnight
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything EverywhereGlenn McKnight
 
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipAlan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipGlenn McKnight
 
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipAllan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipGlenn McKnight
 
J.G Harrington: Securing our Internet Traffic
J.G Harrington:  Securing our Internet Traffic J.G Harrington:  Securing our Internet Traffic
J.G Harrington: Securing our Internet Traffic Glenn McKnight
 
William Sandiford TorIX
William Sandiford TorIXWilliam Sandiford TorIX
William Sandiford TorIXGlenn McKnight
 
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC  The IANA FUnctions and Stewardship TransitionKaren Rose, ISOC  The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC The IANA FUnctions and Stewardship TransitionGlenn McKnight
 
Craptioning to captions how to
Craptioning  to captions how toCraptioning  to captions how to
Craptioning to captions how toGlenn McKnight
 
Fayre of opportunties pdf version
Fayre of opportunties pdf versionFayre of opportunties pdf version
Fayre of opportunties pdf versionGlenn McKnight
 
Internet streaming survey isoc
Internet streaming survey isocInternet streaming survey isoc
Internet streaming survey isocGlenn McKnight
 
Isoc canada presentation
Isoc canada presentationIsoc canada presentation
Isoc canada presentationGlenn McKnight
 
Gen join a6-20121228-en
Gen join a6-20121228-enGen join a6-20121228-en
Gen join a6-20121228-enGlenn McKnight
 

More from Glenn McKnight (20)

Vsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigVsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sig
 
Vsig Orientation Session for Group B
Vsig Orientation Session for Group BVsig Orientation Session for Group B
Vsig Orientation Session for Group B
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
Oh What a Lovely War- Probus Presentation
Oh  What a Lovely War- Probus  PresentationOh  What a Lovely War- Probus  Presentation
Oh What a Lovely War- Probus Presentation
 
Afralo presentation
Afralo presentationAfralo presentation
Afralo presentation
 
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
 
APRALO
APRALO  APRALO
APRALO
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything Everywhere
 
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipAlan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
 
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipAllan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
 
J.G Harrington: Securing our Internet Traffic
J.G Harrington:  Securing our Internet Traffic J.G Harrington:  Securing our Internet Traffic
J.G Harrington: Securing our Internet Traffic
 
William Sandiford TorIX
William Sandiford TorIXWilliam Sandiford TorIX
William Sandiford TorIX
 
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC  The IANA FUnctions and Stewardship TransitionKaren Rose, ISOC  The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
 
Craptioning to captions how to
Craptioning  to captions how toCraptioning  to captions how to
Craptioning to captions how to
 
Oh What a Lovely War
Oh  What a Lovely WarOh  What a Lovely War
Oh What a Lovely War
 
Fayre of opportunties pdf version
Fayre of opportunties pdf versionFayre of opportunties pdf version
Fayre of opportunties pdf version
 
Internet streaming survey isoc
Internet streaming survey isocInternet streaming survey isoc
Internet streaming survey isoc
 
Isoc canada presentation
Isoc canada presentationIsoc canada presentation
Isoc canada presentation
 
Gen join a6-20121228-en
Gen join a6-20121228-enGen join a6-20121228-en
Gen join a6-20121228-en
 

Recently uploaded

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Introduction to Internet Governance and Cyber-security

  • 1. 1 Internet Governance Series Issue: Economic Topic: Cyber Security Presentation by Glenn McKnight IEEE Member
  • 2. 2 Sub Topic 1 Internet Governance Series Overview The Internet Governance series provides insights into the inner workings of Internet Governance from multiple perspectives. This section focuses Cybersecurity as part of the economic perspective
  • 3. 3 Sub Topic 1 Internet Governance Series Introduction Cybersecurity is among the main concerns of governments, Internet users, techinical and business communities. Cyberthreats and cyberattacks are on the increase, and so is the extent of the financial loss. Yet, when the Internet was first invented, security was not a concern for the inventors. In fact, the Internet was originally designed for use by a closed circle of (mainly) academics. Communication among its users was open.
  • 4. 4 Sub Topic 1 Internet Governance Series Types Cybersecurity issues includes ● Action- data interception or interference, illegal access, DOS and Indentity theft ● Criminal- hackers cyber criminals or terrorists ● Target- Anyone from individuals, companies, government or the military
  • 5. 5
  • 6. 6 Sub Topic 1 Internet Governance Series Canadian Stats ● Canada has more computers per capita than any other country (129 devices per 100 people) and Canadians are the heaviest Internet users in the world spending more than 40 hours online per person, per month. ● The current global market for cybersecurity products and services is expected to grow to over $170 billion by 2020, and the job market for cyber pros is expected to rise by six million in the next four years. ● About 70% of Canadian businesses have been victim of cyber attacks — average cost $15 000 per incident. Honourable Navdeep Bains, Minister of Innovation, Science and Economic Development
  • 7. 7 Sub Topic 1 Internet Governance Series The Challenge The Honourable Harjit S. Sajjan, Minister of National Defence “The digital economy increasingly shapes and drives the broader economy. For Canadians to prosper and be confident digital innovators, they need to know that the networks that enable their efforts and safeguard their assets and information are secure. I am committed to making Canada a global centre for innovation – one that creates jobs, drives growth across all industries and improves the lives of Canadians. ”
  • 8. 8 Sub Topic 1 Internet Governance Series Norton Security Report THE SCALE OF CONSUMER CYBERCRIME ONE-AND-A- HALF MILLION VICTIMS DAILY ● THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US $110 BILLION ANNUALLY ● CHANGING FACE OF CYBERCRIME CYBERCRIME GOES SOCIAL AND MOBILE ● SECURITY IQ: MIXED REPORT CARD FOR CONSUMERS. CONSUMERS WISE UP TO TRADITIONAL THREATS, BUT MANY STILL UNAWARE AS TO HOW CYBERCRIME IS RAPIDLY EVOLVING ● STRONG PASSWORDS ARE KEY EMAIL A POTENTIAL GATEWAY FOR CYBERCRIMINALS
  • 9. 9
  • 10. 10 Sub Topic 1 Internet Governance Series Impact of Cybercrime It's reported that cybercrime in some cases can cost an economy o up to 2% of their GDP Source OAS http://www.oas.org/en/default.asp
  • 11. 11
  • 13. 13 Internet Governance Series Learning Resources Global Cyber Expertise Forum http://www.thegfce.com/ Global forum for cyber capacity building. In the GFCE over 50 organizations and states work together on practical initiatives to strengthen cybersecurity, fight cybercrime, protect online data and support e- governance.
  • 14. Sub Topic 2 Internet Governance Series To keep up to date visit the Diplo Digital Watch http://digitalwatch.giplatform.org/issues/cybersecurity
  • 15. Sub Topic 2 Internet Governance Series Images Norton Security Report http://tinyurl.com/j97gevb Expanding Threat http://tinyurl.com/jxzkpts