SlideShare a Scribd company logo
1 of 7
COLLABORATIVE
SECURITY
An approach to tackling Internet
security issues
Fostering confidence
and protecting
opportunities
Collective
responsibility
Fundamental
properties and
values
Evolution and
consensus
Think globally,
act locally
Elements of the
Collaborative
Security Approach
1
2
3
4
5
An Internet security paradigm should:1
●
Foster confidence globally,
●
Protect social and economic opportunities, and
●
Advance objectives in design and in practice.
Internet participants have:2
●
A common interest in the management of the
Internet to ensure its sustainability, and
●
A collective responsibility to care for the Internet for
the benefit of everyone.
Security solutions should be integrated
to preserve the:
●
Internet Invariants, and
●
Fundamental human rights, values, and
expectations.
Agree on the problem and then find the solution.
Security solutions need to be:
●
Flexible enough to evolve over time,
●
Responsive to new challenges,
●
Resilient against change and threats, and
●
Take an open, consensus-based participatory approach.
3
4
Security solutions should involve communities:
●
Of different players taking action closest to
where issues occur,
●
That are the smallest, lowest, or least centralized
link in the chain,
●
Formed in a bottom-up, self-organizing fashion, and
●
That effectively and efficiently define and implement
solutions based on interoperable building blocks.
5
Questions?
Download the Briefing Paper
Questions?
Download the Briefing Paper

More Related Content

Viewers also liked

Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...
Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...
Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...RCAHMW
 
Industrial Safety Management Training Certificate
Industrial Safety Management Training CertificateIndustrial Safety Management Training Certificate
Industrial Safety Management Training CertificateZahidul Alam
 
Managment of Hazardous Chemical Training Certificate
Managment of Hazardous Chemical Training CertificateManagment of Hazardous Chemical Training Certificate
Managment of Hazardous Chemical Training CertificateZahidul Alam
 
Evidence for the resurrection
Evidence for the resurrectionEvidence for the resurrection
Evidence for the resurrectionaealey
 
Этический кодекс электронного гражданина
Этический кодекс электронного гражданинаЭтический кодекс электронного гражданина
Этический кодекс электронного гражданинаInternet Society
 
Reflexión Taller 7
Reflexión Taller 7Reflexión Taller 7
Reflexión Taller 7nestorortega
 
About the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of BotswanaAbout the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of BotswanaInternet Society
 
Matthew 5 - You Have Heard That It Was Said
Matthew 5 - You Have Heard That It Was SaidMatthew 5 - You Have Heard That It Was Said
Matthew 5 - You Have Heard That It Was SaidJAMES EUGENE BARBUSH
 
Economic theories of wages
Economic theories of wagesEconomic theories of wages
Economic theories of wagesAthira G
 
Labour theory of wages
Labour   theory of wagesLabour   theory of wages
Labour theory of wagesPrabha Panth
 

Viewers also liked (15)

About Shedevr Company
About Shedevr CompanyAbout Shedevr Company
About Shedevr Company
 
Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...
Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...
Darganfod eich Hoff Leoedd Newydd: [Darganfod Eglwysi]: Sarah Crossland (Ymdd...
 
Industrial Safety Management Training Certificate
Industrial Safety Management Training CertificateIndustrial Safety Management Training Certificate
Industrial Safety Management Training Certificate
 
scan0014
scan0014scan0014
scan0014
 
Managment of Hazardous Chemical Training Certificate
Managment of Hazardous Chemical Training CertificateManagment of Hazardous Chemical Training Certificate
Managment of Hazardous Chemical Training Certificate
 
Evidence for the resurrection
Evidence for the resurrectionEvidence for the resurrection
Evidence for the resurrection
 
redes sociales facebook
redes sociales facebookredes sociales facebook
redes sociales facebook
 
Этический кодекс электронного гражданина
Этический кодекс электронного гражданинаЭтический кодекс электронного гражданина
Этический кодекс электронного гражданина
 
Reflexión Taller 7
Reflexión Taller 7Reflexión Taller 7
Reflexión Taller 7
 
National Certificate N3
National Certificate N3National Certificate N3
National Certificate N3
 
About the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of BotswanaAbout the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of Botswana
 
Matthew 5 - You Have Heard That It Was Said
Matthew 5 - You Have Heard That It Was SaidMatthew 5 - You Have Heard That It Was Said
Matthew 5 - You Have Heard That It Was Said
 
Economic theories of wages
Economic theories of wagesEconomic theories of wages
Economic theories of wages
 
Buying a used motorcycle
Buying a used motorcycleBuying a used motorcycle
Buying a used motorcycle
 
Labour theory of wages
Labour   theory of wagesLabour   theory of wages
Labour theory of wages
 

Similar to Collaborative Security Approach

Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiShreedeep Rayamajhi
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution SecurityAlan McSweeney
 
Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2Lisa Marie Martinez
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber RiskKirstjen Nielsen
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-usersThomas Hughes
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Sustainability of ICT initiatives.pptx
Sustainability of ICT initiatives.pptxSustainability of ICT initiatives.pptx
Sustainability of ICT initiatives.pptxHappyness Mkumbo
 
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureTech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureInternet 2Conf
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16Benita Rowe
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfChinatu Uzuegbu
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowDevOps.com
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionIsaiah Edem
 

Similar to Collaborative Security Approach (20)

Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber Risk
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Sustainability of ICT initiatives.pptx
Sustainability of ICT initiatives.pptxSustainability of ICT initiatives.pptx
Sustainability of ICT initiatives.pptx
 
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureTech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 

More from Internet Society

IXP growth challenges in West Africa: The Ghana Experience
IXP growth challenges in West Africa: The Ghana ExperienceIXP growth challenges in West Africa: The Ghana Experience
IXP growth challenges in West Africa: The Ghana ExperienceInternet Society
 
IXP growth challenges in Central Africa
IXP growth challenges in Central AfricaIXP growth challenges in Central Africa
IXP growth challenges in Central AfricaInternet Society
 
IXP growth challenges in Côte D’Ivoire
IXP growth challenges in Côte D’IvoireIXP growth challenges in Côte D’Ivoire
IXP growth challenges in Côte D’IvoireInternet Society
 
Keynote Presentation : “80/20 by 2020”
Keynote Presentation : “80/20 by 2020”Keynote Presentation : “80/20 by 2020”
Keynote Presentation : “80/20 by 2020”Internet Society
 
International Bandwidth and Pricing Trends in Sub-Sahara Africa
International Bandwidth and Pricing Trends in Sub-Sahara Africa International Bandwidth and Pricing Trends in Sub-Sahara Africa
International Bandwidth and Pricing Trends in Sub-Sahara Africa Internet Society
 
In Search of Low Cost Bandwidth
In Search of Low Cost BandwidthIn Search of Low Cost Bandwidth
In Search of Low Cost BandwidthInternet Society
 
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in AfricaInternet Society
 
Looking for Latency Clusters in Africa's internet
Looking for Latency Clusters in Africa's internetLooking for Latency Clusters in Africa's internet
Looking for Latency Clusters in Africa's internetInternet Society
 
Fantsuam: Ideas for the sustainability of Community Networks
Fantsuam: Ideas for the sustainability of Community NetworksFantsuam: Ideas for the sustainability of Community Networks
Fantsuam: Ideas for the sustainability of Community NetworksInternet Society
 
Mawingu: Ideas for the sustainability of Community Networks
Mawingu: Ideas for the sustainability of Community NetworksMawingu: Ideas for the sustainability of Community Networks
Mawingu: Ideas for the sustainability of Community NetworksInternet Society
 
Zenzeleni Networks Update Report
Zenzeleni Networks Update ReportZenzeleni Networks Update Report
Zenzeleni Networks Update ReportInternet Society
 
Canadian Victory Garden: Overview of an Off Grid Solution
Canadian Victory Garden: Overview of an Off Grid SolutionCanadian Victory Garden: Overview of an Off Grid Solution
Canadian Victory Garden: Overview of an Off Grid SolutionInternet Society
 

More from Internet Society (20)

IXP growth challenges in West Africa: The Ghana Experience
IXP growth challenges in West Africa: The Ghana ExperienceIXP growth challenges in West Africa: The Ghana Experience
IXP growth challenges in West Africa: The Ghana Experience
 
IXP growth challenges in Central Africa
IXP growth challenges in Central AfricaIXP growth challenges in Central Africa
IXP growth challenges in Central Africa
 
Benin IX: 3 Years After!
Benin IX: 3 Years After!Benin IX: 3 Years After!
Benin IX: 3 Years After!
 
IXP growth challenges in Côte D’Ivoire
IXP growth challenges in Côte D’IvoireIXP growth challenges in Côte D’Ivoire
IXP growth challenges in Côte D’Ivoire
 
IXP Masterclass
IXP MasterclassIXP Masterclass
IXP Masterclass
 
PeeringDB Updates
PeeringDB UpdatesPeeringDB Updates
PeeringDB Updates
 
Peering Personals #2
Peering Personals #2Peering Personals #2
Peering Personals #2
 
Keynote Presentation : “80/20 by 2020”
Keynote Presentation : “80/20 by 2020”Keynote Presentation : “80/20 by 2020”
Keynote Presentation : “80/20 by 2020”
 
International Bandwidth and Pricing Trends in Sub-Sahara Africa
International Bandwidth and Pricing Trends in Sub-Sahara Africa International Bandwidth and Pricing Trends in Sub-Sahara Africa
International Bandwidth and Pricing Trends in Sub-Sahara Africa
 
In Search of Low Cost Bandwidth
In Search of Low Cost BandwidthIn Search of Low Cost Bandwidth
In Search of Low Cost Bandwidth
 
IPv6 @ Cloudflare
IPv6 @ CloudflareIPv6 @ Cloudflare
IPv6 @ Cloudflare
 
Interconnection Evolution
Interconnection EvolutionInterconnection Evolution
Interconnection Evolution
 
Peering Personals #1
Peering Personals #1Peering Personals #1
Peering Personals #1
 
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa
 
Looking for Latency Clusters in Africa's internet
Looking for Latency Clusters in Africa's internetLooking for Latency Clusters in Africa's internet
Looking for Latency Clusters in Africa's internet
 
Fantsuam: Ideas for the sustainability of Community Networks
Fantsuam: Ideas for the sustainability of Community NetworksFantsuam: Ideas for the sustainability of Community Networks
Fantsuam: Ideas for the sustainability of Community Networks
 
Mawingu: Ideas for the sustainability of Community Networks
Mawingu: Ideas for the sustainability of Community NetworksMawingu: Ideas for the sustainability of Community Networks
Mawingu: Ideas for the sustainability of Community Networks
 
Zenzeleni Networks Update Report
Zenzeleni Networks Update ReportZenzeleni Networks Update Report
Zenzeleni Networks Update Report
 
Canadian Victory Garden: Overview of an Off Grid Solution
Canadian Victory Garden: Overview of an Off Grid SolutionCanadian Victory Garden: Overview of an Off Grid Solution
Canadian Victory Garden: Overview of an Off Grid Solution
 
TVWS use case in Kenya
TVWS use case in KenyaTVWS use case in Kenya
TVWS use case in Kenya
 

Recently uploaded

Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 

Recently uploaded (20)

Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 

Collaborative Security Approach

  • 1. COLLABORATIVE SECURITY An approach to tackling Internet security issues
  • 2. Fostering confidence and protecting opportunities Collective responsibility Fundamental properties and values Evolution and consensus Think globally, act locally Elements of the Collaborative Security Approach 1 2 3 4 5
  • 3. An Internet security paradigm should:1 ● Foster confidence globally, ● Protect social and economic opportunities, and ● Advance objectives in design and in practice. Internet participants have:2 ● A common interest in the management of the Internet to ensure its sustainability, and ● A collective responsibility to care for the Internet for the benefit of everyone.
  • 4. Security solutions should be integrated to preserve the: ● Internet Invariants, and ● Fundamental human rights, values, and expectations. Agree on the problem and then find the solution. Security solutions need to be: ● Flexible enough to evolve over time, ● Responsive to new challenges, ● Resilient against change and threats, and ● Take an open, consensus-based participatory approach. 3 4
  • 5. Security solutions should involve communities: ● Of different players taking action closest to where issues occur, ● That are the smallest, lowest, or least centralized link in the chain, ● Formed in a bottom-up, self-organizing fashion, and ● That effectively and efficiently define and implement solutions based on interoperable building blocks. 5

Editor's Notes

  1. Introduction Internet security depends not only on how well you manage your own security risks, but also how you manage security risks that you may pose to others. If you act independently and solely in your own self-interest, the security of the Internet be impacted, and the overall pool of social and economic potential that the Internet offers the global community could be diminished. “Collaborative Security” is thus an approach to tackling Internet security issues that involves voluntary, multistakeholder cross-border cooperation and collaboration. It is premised on an understanding of the fundamental properties of the Internet as well as an appreciation of the complexity of the cybersecurity landscape. The Internet is a network of networks without centralized control. As such, the security of the Internet cannot be maintained by one entity. All stakeholders must thus collaborate and share the responsibility for addressing Internet security issues. The challenge is in how to achieve cybersecurity strategies while respecting fundamental human rights, properties, and values (i.e. privacy). The Internet is for everyone and we must work together to realize it’s full potential.
  2. Elements of a “Collaborative Security” framework: The Internet enables opportunities for economic and social prosperity globally. The starting point for Internet security should be what solutions are need to preserve those opportunities and foster confidence in the Internet. The security of the Internet is a shared responsibility. We will all be secure only when we are protecting ourselves – and our neighbors. Security solutions must preserve the fundamental, open nature of the Internet as well as fundamental human rights, values, and expectations (such as privacy and freedom of expression). Achieving security objectives, while preserving these fundamental properties, rights and values is the real challenge. We must find solutions that build on lessons learned, which are developed by consensus, and which will evolve to meet whatever new threats emerge. Commercial competition, politics and personal motivation play a role in how well collaboration happens. But differences can be overcome to cooperate against a threat. Solutions should be implemented by people at the closest point where they can have the most impact. This is called the subsidiarity principle. Think globally, but act locally.
  3. Fostering confidence and protecting opportunities: The Internet enables opportunities for human, social and economic development on a global scale. These opportunities will only be realized if Internet participants have confidence that they can use the Internet securely, reliably, and privately. Security solutions must, in design and in practice, foster confidence in the Internet and protect opportunities for economic and social prosperity. Otherwise, security solutions may go too far, thereby jeopardizing the very infrastructure that ties together the global economy and provides the engine for its growth. EXAMPLE: An ISP locking down a firewall may provide better security but would stifle innovation, because some applications won't be accessible without prior configuration. Collective responsibility: The Internet is a global interconnected network of networks. Participation on the Internet means global interdependency. In an interconnected interdependent system, no one participant can achieve absolute security. No security solutions exist in isolation. Internet security depends on how well participants manage both their own security risks and the outward security risks that they may pose to others (whether through their action or inaction). These factors mean that Internet participants have: a common interest in the management of the Internet to ensure its sustainability; and a collective responsibility to care for the Internet for the benefit of everyone. If Internet participants act independently and only in their own self-interest, the security of the Internet will be impacted. In addition, the overall pool of social and economic potential that the Internet offers the global community will be diminished. As such, Internet participants must see cybersecurity as a long-term investment for the benefit of everyone. It is not enough to ask that participants take responsibility just for their part of the Internet ecosystem. Collective responsibility extends to the system as a whole, and requires a common understanding of the problem, shared solutions, common benefits, and open communication channels. Multistakeholder cross-border collaboration is an important component of collective responsibility. Its success depends on trustful relationships – between nations, between citizens and their government, between operators, service providers, and across all stakeholder groups. EXAMPLE: Mutually Agreed Norms for Routing Security (MANRS) demonstrates how industry players have been able to turn to the principles of collective responsibility to voluntarily address issues of resilience and security in the Internet’s global routing system. Traditional, government-led regulatory approaches are not effective and agile enough for the global Internet.
  4. Fundamental properties and values: The Internet Invariants are the fundamental properties of the Internet. They include: open standards, voluntary collaboration, reusable building blocks, integrity, permission-free innovation, and global reach. Security solutions must preserve these fundamental properties of the Internet and fundamental human rights, values and expectations. All security solutions are likely to have an effect on the Internet’s operation and development, as well as on the rights and expectations of Internet end-users. Such effects may be positive or negative. EXAMPLE: If we weaken cryptography, we hurt only the well-meaning and law-abiding citizens who rely on companies to protect their data. Criminals and bad actors will still encrypt their data, using the tools that are readily available to them, but consumers might loose trust in the technology. Removing bad parts can also kill good parts. Evolution and consensus: Technology is going to change. Security threats will adapt to take advantage of new platforms and protocols. Therefore, security solutions need to be responsive to new challenges. Solutions that build on “lessons learned” make the Internet more resilient to threats. Solutions can be incremental. Even if a problem can not be solved completely, you might be able to make the vulnerability less attractive to malicious actors. Be open to testing disruptive or non-traditional ideas. Experience suggests that an open, consensus-based participatory approach is the most robust, flexible and agile. Processes which draw upon the interests and expertise of a broad set of stakeholders are more likely to lead to success. EXAMPLE: Encryption keys that are strong enough today will not be strong enough in the future. Technology and practices should be flexible and evolve over time to maintain the security and stability of the global Internet.
  5. Think globally, act locally: The security of the Internet cannot be maintained by any one entity or organization. Creating security and trust in the Internet requires different players (with different roles and responsibilities) to take action. Solutions should be implemented by the smallest, lowest or least centralized competent community at the point in the system where they can have the most impact. Communities often form spontaneously in a bottom-up, self-organizing fashion around specific issues (i.e. spam, or routing security) or a locality (i.e. protection of critical national infrastructure or security of an Internet exchange). Solutions should be based on interoperable building blocks – i.e. industry-accepted standards, best practices and approaches. Solutions must not undermine the global architecture of the Internet or curtail human rights, because the Internet is for everyone. EXAMPLE: RIPE works with diverse technical actors, in an output-orientated multistakeholder approach, to make fast policy decisions. The smooth running of the Internet depends on the involvement of those who give their input where they can help and implement changes on a voluntary basis.
  6. Conclusion: People are what ultimately hold the Internet together, so we have to work together in order for the Internet to realize its full potential. We must have an Internet that is both secure and open, and where participants trust it is a tool for empowerment and prosperity. We need greater collaboration on security issues, and to work faster at getting things right, so that the Internet can grow and flourish.