SlideShare a Scribd company logo
C Y B E R S E C U R I T Y:
D O S & D O N ’ T S
M A R T I N A F R A N C E S C A F E R R A C A N E
R E S E A R C H A S S O C I A T E A T E C I P E
Q E D
2 2 J U N E 2 0 1 7
O U T L I N E
1. G E T T I N G T H E T E R M I N O L O G Y R I G H T
2. D O N ’ T S
3. D O S
O U T L I N E
1. G E T T I N G T H E T E R M I N O L O G Y R I G H T
2. D O N ’ T S
3. D O S
C Y B E R S E C U R I T Y
Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers,
programs and data from attack, damage or unauthorized
access.
Elements of cybersecurity include:
Application security; Information security; Network
security; Disaster recovery / business continuity planning;
Operational security; End-user education.
Source: http://whatis.techtarget.com
C Y B E R S E C U R I T Y
Cyber threats can be grouped in 4 categories:
- Crime: fraud, extorsion, theft, DoS, etc
- Commercial espionage
- Nation-State espionage
- Warfare
Source: Information Technology Industry Council (2015)
A C C E S S T O D A TA F O R N A T I O N A L S E C U R I T Y
& L A W E N F O R C E M E N T
Different issues such as:
- Counter-terrorism measures
- MLATs
- Data sovereignty
D A TA P R I VA C Y
Data privacy concerns the
collection, protection and
dissemination of personal or
private information about
individuals or organisations.
Source: http://lexicon.ft.com/
F R E E D O M O F E X P R E S S I O N
Different issues such as:
- Fake news
- Censorship
- Hate speech
O U T L I N E
1. G E T T I N G T H E T E R M I N O L O G Y R I G H T
2. D O N ’ T S
3. D O S
F R A G M E N TA T I O N ( I )
“Member States have very different levels of
preparedness, which has led to fragmented approaches
across the Union. This results in an unequal level of
protection of consumers and businesses, and
undermines the overall level of security of network and
information systems within the Union.”
Recital (5) - NIS Directive
F R A G M E N TA T I O N ( I I )
“Each Member State shall adopt a national strategy on
the security of network and information systems defining
the strategic objectives and appropriate policy and
regulatory measures with a view to achieving and
maintaining a high level of security of network and
information systems (…)”
Article 7 - NIS Directive
F R A G M E N TA T I O N ( I I I )
“Member States shall lay down the rules on penalties
applicable to infringements of national provisions
adopted pursuant to this Directive and shall take all
measures necessary to ensure that they are
implemented (…)”
Article 21 - NIS Directive
N O T I F I C A T I O N O F I N C I D E N T S
Digital services: have to report those incidents that have
a ‘substantial impact on the provision of a service (…)
they offer in the EU’.
Operators of essential services have to report those
incidents ‘having significant impact on the continuity of
the essential services they provide’
Art. 14 & Art. 16 - NIS Directive
‘without undue delay’
C O M P U L S O RY S E C U R I T Y S TA N D A R D S ( I )
“Member States shall (…) encourage the use of
European or internationally accepted standards and
specifications relevant to the security of network and
information systems.”
Article 19 - NIS Directive
C O M P U L S O RY S E C U R I T Y S TA N D A R D S ( I I )
- Multi-Level Protection Scheme (MPLS) - China
- Preferential Market Access (PMA) - India
- Cybersecurity Law - China
‘The security reviews will not target any country or region,
they will not discriminate against foreign technology or
products, nor limit their access to the Chinese market. On
the contrary, they will boost consumer confidence in such
products and services, and expand their markets.’
CAC China
“We cannot allow [terrorism] the safe space it
needs to breed – yet that is precisely what the
internet, and the big companies that provide
internet-based services provide”
Theresa May
H O W S E C U R I T Y S TA N D A R D S C O U L D B E A B U S E D …
‘Personal information and important data collected and
generated by critical information infrastructure operators
in the PRC must be stored domestically’
Art. 37 - China Cybersecurity Law - June 2017
D A TA L O C A L I S A T I O N ( I )
‘Where due to business requirements it is truly necessary
to provide it [data] outside the mainland, they shall (…)
conduct a security assessment’
D A TA L O C A L I S A T I O N ( I I )
Source: Digital Trade Estimates Database - ECIPE
O U T L I N E
1. G E T T I N G T H E T E R M I N O L O G Y R I G H T
2. D O N ’ T S
3. D O S
- Focus on systems that are truly critical in nature
- Improve public agencies
- Improve coordination intra-EU and globally
- Develop national cybersecurity plans
- Involve the private sector in the development of
cybersecurity strategy
- Invest in R&D
- Increase PPP
- Participate in international fora and consortia
D O S
- Preserve interoperability and openness to the
global market
- Balance cybersecurity concerns with:
- civil liberties
- innovation
- trade
- other policy priorities
D O S
"It's no longer OK not to understand how the
Internet works.”
Aaron Swartz
R E F E R E N C E S
- Directive (EU) 2016/1148 of the European Parliament and of the Council of 6
July 2016 concerning measures for a high common level of security of network
and information systems across the Union: http://eur-lex.europa.eu/legal-
content/EN/TXT/?uri=CELEX%3A32016L1148
- English Sina (2017). China Internet regulator says cyber security law not a trade
barrier: http://english.sina.com/news/2017-05-31/detail-ifyfuvpm6886418.shtml
- FT (2017). Special Report on Cyber Security: https://www.ft.com/reports/cyber-
security
- Independent (2017). Theresa May says the internet must now be regulated
following London Bridge terror attack: http://www.independent.co.uk/news/
uk/politics/theresa-may-internet-regulated-london-bridge-terror-attack-
google-facebook-whatsapp-borough-security-a7771896.html
R E F E R E N C E S
- ITIC (2013). ITI Position Paper on the Proposed “Directive of the European
Parliament and of the Council Concerning Measures to Ensure a High
Common Level of Network and Information Security Across the Union”:
https://www.itic.org/dotAsset/a748f2f7-7d73-4d62-8ea0-b5ad35e3af27.pdf
- ITIC (2015). The IT Industry’s Cybersecurity Principles for Industry and
Government: https://www.itic.org/dotAsset/0e3b41c2-587a-48a8-
b376-9cb493be36ec.pdf
- NIST (2014): Framework for Improving Critical Infrastructure Cybersecurity:
https://www.nist.gov/sites/default/files/documents/cyberframework/
cybersecurity-framework-021214.pdf
- QUARTZ (2016). How countries like China and Russia are able to control the
internet: https://qz.com/780675/how-do-internet-censorship-and-surveillance-
actually-work/
R E F E R E N C E S
Websites:
- www.ecipe.org/dte
- http://whatis.techtarget.com
- http://lexicon.ft.com/
M A R T I N A F R A N C E S C A F E R R A C A N E
E M A I L : M A R T I N A . F E R R A C A N E @ E C I P E . O R G
THANK YOU!

More Related Content

What's hot

Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
The Pathway Group
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
ABHAY PATHAK
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
Doug Copley
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
Geeks Anonymes
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
Sandeep Taileng
 

What's hot (20)

Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing
PhishingPhishing
Phishing
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Network security
Network securityNetwork security
Network security
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 

Viewers also liked

Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
Martina F. Ferracane
 
Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
Martina F. Ferracane
 
ITA: What's next?
ITA: What's next?ITA: What's next?
ITA: What's next?
Martina F. Ferracane
 
DIY microscope
DIY microscopeDIY microscope
DIY microscope
Martina F. Ferracane
 
Data Localisation Trends
Data Localisation TrendsData Localisation Trends
Data Localisation Trends
Martina F. Ferracane
 
Fab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurshipFab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurship
Martina F. Ferracane
 
Digital Trade Restrictions in South Africa
Digital Trade Restrictions in South AfricaDigital Trade Restrictions in South Africa
Digital Trade Restrictions in South Africa
Martina F. Ferracane
 
Designing regulation for the future
Designing regulation for the futureDesigning regulation for the future
Designing regulation for the future
Martina F. Ferracane
 
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
Martina F. Ferracane
 
ISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court SystemISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court System
Martina F. Ferracane
 
Digital Trade Estimates Project
Digital Trade Estimates Project Digital Trade Estimates Project
Digital Trade Estimates Project
Martina F. Ferracane
 
Data localisation and data security
Data localisation and data securityData localisation and data security
Data localisation and data security
Martina F. Ferracane
 
Will 3D printing change everything?
Will 3D printing change everything?Will 3D printing change everything?
Will 3D printing change everything?
Martina F. Ferracane
 
Trade and Growth in the Digital Era
Trade and Growth in the Digital EraTrade and Growth in the Digital Era
Trade and Growth in the Digital Era
Martina F. Ferracane
 

Viewers also liked (14)

Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
 
Digital Trade Estimates Project
Digital Trade Estimates ProjectDigital Trade Estimates Project
Digital Trade Estimates Project
 
ITA: What's next?
ITA: What's next?ITA: What's next?
ITA: What's next?
 
DIY microscope
DIY microscopeDIY microscope
DIY microscope
 
Data Localisation Trends
Data Localisation TrendsData Localisation Trends
Data Localisation Trends
 
Fab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurshipFab Labs: a global network for local entrepreneurship
Fab Labs: a global network for local entrepreneurship
 
Digital Trade Restrictions in South Africa
Digital Trade Restrictions in South AfricaDigital Trade Restrictions in South Africa
Digital Trade Restrictions in South Africa
 
Designing regulation for the future
Designing regulation for the futureDesigning regulation for the future
Designing regulation for the future
 
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
The Geopolitics of Internet Taxation: Is digitalisation eroding the corporate...
 
ISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court SystemISDS: The European Proposal of an Investment Court System
ISDS: The European Proposal of an Investment Court System
 
Digital Trade Estimates Project
Digital Trade Estimates Project Digital Trade Estimates Project
Digital Trade Estimates Project
 
Data localisation and data security
Data localisation and data securityData localisation and data security
Data localisation and data security
 
Will 3D printing change everything?
Will 3D printing change everything?Will 3D printing change everything?
Will 3D printing change everything?
 
Trade and Growth in the Digital Era
Trade and Growth in the Digital EraTrade and Growth in the Digital Era
Trade and Growth in the Digital Era
 

Similar to Cybersecurity: Dos and Dont's

Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
IRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
James Bryce Clark
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
Internet of Things - Introduction
Internet of Things - IntroductionInternet of Things - Introduction
Internet of Things - Introduction
MinhQuc9
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
IRJET Journal
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
Aravindharamanan S
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IJNSA Journal
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
EarlvonDeiparine1
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
IRJET Journal
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
Community Protection Forum
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Anna Gomez
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
Module 7 Cyber Laws and Forensic
Module 7 Cyber Laws and ForensicModule 7 Cyber Laws and Forensic
Module 7 Cyber Laws and Forensic
Sitamarhi Institute of Technology
 

Similar to Cybersecurity: Dos and Dont's (20)

Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Internet of Things - Introduction
Internet of Things - IntroductionInternet of Things - Introduction
Internet of Things - Introduction
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Module 7 Cyber Laws and Forensic
Module 7 Cyber Laws and ForensicModule 7 Cyber Laws and Forensic
Module 7 Cyber Laws and Forensic
 
Module 7.pdf
Module 7.pdfModule 7.pdf
Module 7.pdf
 

More from Martina F. Ferracane

Reglamento General de Protección de Datos
Reglamento General de Protección de DatosReglamento General de Protección de Datos
Reglamento General de Protección de Datos
Martina F. Ferracane
 
DATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITYDATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITY
Martina F. Ferracane
 
INCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABSINCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABS
Martina F. Ferracane
 
South Africa & Data Flows
South Africa & Data FlowsSouth Africa & Data Flows
South Africa & Data Flows
Martina F. Ferracane
 
ISDS in APEC region the record
ISDS in APEC region   the recordISDS in APEC region   the record
ISDS in APEC region the record
Martina F. Ferracane
 
Experiencing a FabLab
Experiencing a FabLabExperiencing a FabLab
Experiencing a FabLab
Martina F. Ferracane
 
Will 3D Printing change everything?
Will 3D Printing change everything?Will 3D Printing change everything?
Will 3D Printing change everything?
Martina F. Ferracane
 
Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0
Martina F. Ferracane
 
Bio-hacking
Bio-hackingBio-hacking

More from Martina F. Ferracane (9)

Reglamento General de Protección de Datos
Reglamento General de Protección de DatosReglamento General de Protección de Datos
Reglamento General de Protección de Datos
 
DATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITYDATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITY
 
INCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABSINCLUSIVE TRADE: THE RISE OF FAB LABS
INCLUSIVE TRADE: THE RISE OF FAB LABS
 
South Africa & Data Flows
South Africa & Data FlowsSouth Africa & Data Flows
South Africa & Data Flows
 
ISDS in APEC region the record
ISDS in APEC region   the recordISDS in APEC region   the record
ISDS in APEC region the record
 
Experiencing a FabLab
Experiencing a FabLabExperiencing a FabLab
Experiencing a FabLab
 
Will 3D Printing change everything?
Will 3D Printing change everything?Will 3D Printing change everything?
Will 3D Printing change everything?
 
Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0Manufacturing the future: Industry 4.0
Manufacturing the future: Industry 4.0
 
Bio-hacking
Bio-hackingBio-hacking
Bio-hacking
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 

Recently uploaded (20)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 

Cybersecurity: Dos and Dont's

  • 1. C Y B E R S E C U R I T Y: D O S & D O N ’ T S M A R T I N A F R A N C E S C A F E R R A C A N E R E S E A R C H A S S O C I A T E A T E C I P E Q E D 2 2 J U N E 2 0 1 7
  • 2. O U T L I N E 1. G E T T I N G T H E T E R M I N O L O G Y R I G H T 2. D O N ’ T S 3. D O S
  • 3. O U T L I N E 1. G E T T I N G T H E T E R M I N O L O G Y R I G H T 2. D O N ’ T S 3. D O S
  • 4. C Y B E R S E C U R I T Y Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Elements of cybersecurity include: Application security; Information security; Network security; Disaster recovery / business continuity planning; Operational security; End-user education. Source: http://whatis.techtarget.com
  • 5. C Y B E R S E C U R I T Y Cyber threats can be grouped in 4 categories: - Crime: fraud, extorsion, theft, DoS, etc - Commercial espionage - Nation-State espionage - Warfare Source: Information Technology Industry Council (2015)
  • 6. A C C E S S T O D A TA F O R N A T I O N A L S E C U R I T Y & L A W E N F O R C E M E N T Different issues such as: - Counter-terrorism measures - MLATs - Data sovereignty
  • 7. D A TA P R I VA C Y Data privacy concerns the collection, protection and dissemination of personal or private information about individuals or organisations. Source: http://lexicon.ft.com/
  • 8. F R E E D O M O F E X P R E S S I O N Different issues such as: - Fake news - Censorship - Hate speech
  • 9.
  • 10.
  • 11. O U T L I N E 1. G E T T I N G T H E T E R M I N O L O G Y R I G H T 2. D O N ’ T S 3. D O S
  • 12. F R A G M E N TA T I O N ( I ) “Member States have very different levels of preparedness, which has led to fragmented approaches across the Union. This results in an unequal level of protection of consumers and businesses, and undermines the overall level of security of network and information systems within the Union.” Recital (5) - NIS Directive
  • 13. F R A G M E N TA T I O N ( I I ) “Each Member State shall adopt a national strategy on the security of network and information systems defining the strategic objectives and appropriate policy and regulatory measures with a view to achieving and maintaining a high level of security of network and information systems (…)” Article 7 - NIS Directive
  • 14. F R A G M E N TA T I O N ( I I I ) “Member States shall lay down the rules on penalties applicable to infringements of national provisions adopted pursuant to this Directive and shall take all measures necessary to ensure that they are implemented (…)” Article 21 - NIS Directive
  • 15. N O T I F I C A T I O N O F I N C I D E N T S Digital services: have to report those incidents that have a ‘substantial impact on the provision of a service (…) they offer in the EU’. Operators of essential services have to report those incidents ‘having significant impact on the continuity of the essential services they provide’ Art. 14 & Art. 16 - NIS Directive ‘without undue delay’
  • 16.
  • 17. C O M P U L S O RY S E C U R I T Y S TA N D A R D S ( I ) “Member States shall (…) encourage the use of European or internationally accepted standards and specifications relevant to the security of network and information systems.” Article 19 - NIS Directive
  • 18. C O M P U L S O RY S E C U R I T Y S TA N D A R D S ( I I ) - Multi-Level Protection Scheme (MPLS) - China - Preferential Market Access (PMA) - India - Cybersecurity Law - China ‘The security reviews will not target any country or region, they will not discriminate against foreign technology or products, nor limit their access to the Chinese market. On the contrary, they will boost consumer confidence in such products and services, and expand their markets.’ CAC China
  • 19. “We cannot allow [terrorism] the safe space it needs to breed – yet that is precisely what the internet, and the big companies that provide internet-based services provide” Theresa May H O W S E C U R I T Y S TA N D A R D S C O U L D B E A B U S E D …
  • 20. ‘Personal information and important data collected and generated by critical information infrastructure operators in the PRC must be stored domestically’ Art. 37 - China Cybersecurity Law - June 2017 D A TA L O C A L I S A T I O N ( I ) ‘Where due to business requirements it is truly necessary to provide it [data] outside the mainland, they shall (…) conduct a security assessment’
  • 21. D A TA L O C A L I S A T I O N ( I I ) Source: Digital Trade Estimates Database - ECIPE
  • 22. O U T L I N E 1. G E T T I N G T H E T E R M I N O L O G Y R I G H T 2. D O N ’ T S 3. D O S
  • 23. - Focus on systems that are truly critical in nature - Improve public agencies - Improve coordination intra-EU and globally - Develop national cybersecurity plans - Involve the private sector in the development of cybersecurity strategy - Invest in R&D - Increase PPP - Participate in international fora and consortia D O S
  • 24.
  • 25. - Preserve interoperability and openness to the global market - Balance cybersecurity concerns with: - civil liberties - innovation - trade - other policy priorities D O S
  • 26. "It's no longer OK not to understand how the Internet works.” Aaron Swartz
  • 27. R E F E R E N C E S - Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union: http://eur-lex.europa.eu/legal- content/EN/TXT/?uri=CELEX%3A32016L1148 - English Sina (2017). China Internet regulator says cyber security law not a trade barrier: http://english.sina.com/news/2017-05-31/detail-ifyfuvpm6886418.shtml - FT (2017). Special Report on Cyber Security: https://www.ft.com/reports/cyber- security - Independent (2017). Theresa May says the internet must now be regulated following London Bridge terror attack: http://www.independent.co.uk/news/ uk/politics/theresa-may-internet-regulated-london-bridge-terror-attack- google-facebook-whatsapp-borough-security-a7771896.html
  • 28. R E F E R E N C E S - ITIC (2013). ITI Position Paper on the Proposed “Directive of the European Parliament and of the Council Concerning Measures to Ensure a High Common Level of Network and Information Security Across the Union”: https://www.itic.org/dotAsset/a748f2f7-7d73-4d62-8ea0-b5ad35e3af27.pdf - ITIC (2015). The IT Industry’s Cybersecurity Principles for Industry and Government: https://www.itic.org/dotAsset/0e3b41c2-587a-48a8- b376-9cb493be36ec.pdf - NIST (2014): Framework for Improving Critical Infrastructure Cybersecurity: https://www.nist.gov/sites/default/files/documents/cyberframework/ cybersecurity-framework-021214.pdf - QUARTZ (2016). How countries like China and Russia are able to control the internet: https://qz.com/780675/how-do-internet-censorship-and-surveillance- actually-work/
  • 29. R E F E R E N C E S Websites: - www.ecipe.org/dte - http://whatis.techtarget.com - http://lexicon.ft.com/
  • 30. M A R T I N A F R A N C E S C A F E R R A C A N E E M A I L : M A R T I N A . F E R R A C A N E @ E C I P E . O R G THANK YOU!