ID-CONFIG is a hub for CSO who concern on "Internet Governance" issues in Indonesia. This presentation describe its activities and the impact of their activities on "internet governance" policies in Indonesia
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
This presentation implies what is the actual meaning of the Digital Bangladesh . To ensure Digital Bangladesh what are the steps have to be taken , what are the challenges have to be faced.
ID-CONFIG is a hub for CSO who concern on "Internet Governance" issues in Indonesia. This presentation describe its activities and the impact of their activities on "internet governance" policies in Indonesia
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
This presentation implies what is the actual meaning of the Digital Bangladesh . To ensure Digital Bangladesh what are the steps have to be taken , what are the challenges have to be faced.
Full text of the Philippine Digital Strategy 2011-2016, as presented by the Commission on Information and Communications Technology (CICT) on June 29, 2011
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Digital bangladesh and application of MIS in ITRafid Anjum
This is about the application of Management Information system on Information Technology to make the 7th Five Year Plan successful and achieve the vision 21 appropriately. Which is set through the Digital Bangladesh by 2021 challenge.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Digital Bangladesh is an Idea that includes the IT use for management, administration and governance to ensure transparency, accountability and answer-ability at all levels of society and state.
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
Presentation given by Amirudin bin Abdul Wahab, Head of ICT Policy Cluster, Ministry of Science, Technology and Innovation (MOSTI) Malaysia on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session ICT Leader's Conclave
Presentation file for partnership initiation between D Korea Foundation (Big data education organization) and Tech Soup Global, Global NPO providing other NPOs with IT support.
Full text of the Philippine Digital Strategy 2011-2016, as presented by the Commission on Information and Communications Technology (CICT) on June 29, 2011
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Digital bangladesh and application of MIS in ITRafid Anjum
This is about the application of Management Information system on Information Technology to make the 7th Five Year Plan successful and achieve the vision 21 appropriately. Which is set through the Digital Bangladesh by 2021 challenge.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Digital Bangladesh is an Idea that includes the IT use for management, administration and governance to ensure transparency, accountability and answer-ability at all levels of society and state.
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
Presentation given by Amirudin bin Abdul Wahab, Head of ICT Policy Cluster, Ministry of Science, Technology and Innovation (MOSTI) Malaysia on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session ICT Leader's Conclave
Presentation file for partnership initiation between D Korea Foundation (Big data education organization) and Tech Soup Global, Global NPO providing other NPOs with IT support.
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
Highlights of the 2015 Scalar Security Study, The Cyber Security Readiness of Canadian Organizations, published February 2015. The full report can be downloaded at: http://hubs.ly/y0tFbr0
Use of Information technology in Human Resource Management is increasing day by day. The Judiciary has to adopt appropriate ICT for its HRM related needs.
DANE: The Future of Transport Layer Security (TLS)
Dan York (Internet Society)
If you connect to a “secure” server using TLS/SSL (such as a web server, email server or xmpp server), how do you know you are using the correct certificate? With DNSSEC now being deployed, a new protocol has emerged called “DANE” (“DNS-Based Authentication of Named Entities“), which allows you to securely specify exactly which TLS/SSL certificate an application should use to connect to your site. DANE has great potential to make the Internet much more secure by marrying the strong integrity protection of DNSSEC with the confidentiality of SSL/TLS certificates. In this session, we will explain how DANE works and how you can use it to secure your websites, email, XMPP, VoIP, and other web services.
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
Executive Summary of the 2016 Scalar Security Study, The Cyber Security Readiness of Canadian Organizations, published February 2016. The full report can be downloaded at: scalar.ca/security-study-2016/
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
Presentation from the 2016 Scalar Security Study Roadshow, highlighting the findings from the second annual Scalar Security Study, The Cyber Security Readiness of Canadian Organizations, which examines trends among Canadian organizations in dealing with growing cyber threats.
smart Nation initiative was launched by Prime Minister Lee Hsien Loong on 24 November 2014. The aim is to build a “nation where people live meaningful and fulfilled lives, enabled seamlessly by technology, o ering exciting opportunities for all.”1 It is an environment where, in our daily living, networks of sensors and smart devices enable us to live sustainably and comfortably; in our communities, technology will enable more people to connect to one another more easily and intensely; and in our future, we can create possibilities for ourselves beyond what we imagined possible.
Summary South East Asia (SEA) IGF 2021 Bali - English (tata kelola internet /...ICT Watch - Indonesia
Summary South East Asia (SEA) IGF 2021 Bali - English (tata kelola internet / internet governance). Site: igf.id. E-mail: contact [at] igf.id. Uploader: donnybu.id
Various government bodies, organizations, associations and agencies have been involved in IG discussion at different names and forms.
Right before APrIGF 2016, some of major stakeholders (DoIT, ISOC Nepal, FDE, ISPAN and IOE) had a meeting at Department of Information Technology on conducting a full stakeholder’s meeting for wider consultation. An informal meeting with IGF MAG Chair Lynn St. Amour, and NRI’s focal Anja Genjo was held during ICANN 57 [5th November 2016] in Hyderabad, India.
For more details: https://2018.igf.org.np/nepal-internet-governance-forum-nepal-igf/
Access has been highlighted as a key issue in Eastern Africa. This presentation looks at access from the civil society perspective of Real Access should equal Real Impact and highlights 12 criteria against which impact can be assessed.
To ensure connectivity of each and every village, Tehsil, Town, District, City, Province in Pakistan through a digital hub and provide a platform to every citizen of Pakistan to connect the world through channelizing the energy, creativity, passion and commitment of every young person of Pakistan.
Visit our website: http://supportdigitalpakistan.com
Facebook Group: http://facebook.com/groups/supportdigitalpakistan
Facebook Page: http://facebook.com/supportdigitalpak
India-U.S. CEO Forum met in September 2015 as part of the first ever U.S.-India Strategic and Commercial Dialogue held in Washington D.C. In the forum, the Digital Infrastructure, Innovation and Entrepreneurship Working Group was co-chaired by Sunil Bharti Mittal (Founder & Chairman of Bharti Enterprises) and James Taiclet (Chairman, President & CEO of ATC)
This report outlines the events that occured during the first half of the year 2013 (January 2013 - June 2013 ) at Mobile Monday Nigeria ( Our events bring the technology ecosystem in Nigeria together)
Email us at info@momonigeria.org
or visit our website http://www.momonigeria.org
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)TRPC Pte Ltd
TRPC Managing Director Lim May-Ann's presentation at the Global Digital Development Forum 2020, for a panel on Planning the Next Lap of ASEAN’s Digital Masterplan 2025.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
3. Message from IGF Sri Lanka Chairman - Organizing Committee
I thank APNIC for giving us this opportunity to present on IGF Sri
Lanka 2016. And plead for not present physically today..
We had our first ever Local IGF 8th March 2016. We had 21
panelists, and 107 participants. We have discussed three topics in
detail. We had the opportunity engage Minister Digital Infrastructure
into the Local IGF.
Our aim was to make the Bottom to top communication platform in
IG policy making process. It was being achieved successfully.
Now we are getting into the Second Local IGF. Now we are already
in the process. I request your assistance and continues support to
make IGF Sri Lanka 2017 a success.
Thank you and wish APNIC 42 a success.
Maheeshwara B Kirindigoda
Chairman - IGF Sri Lanka - Organising Committee
Media Secretary - Uva Province Governor's Office
14. Next Billionth User
! Free Wi-Fi like projects were implemented without proper investigation
! As per the security concern that The Digital Ministry, ministry of defense & TRC is still making the background for Google Loon.
Expressed the needness of public discussions and information to be shared for the general public on such projects. IGF platform is highly
appreciated and highlighted its needness.
! It is noted that all government web sites need to be updated accurately in three languages (Sinhala,Tamil and English). Same time
accessibility for the differently abled community should be maintain.
! It was mentioned that “Beyond the Net”( project of ISOC LK ) has a training program for Web developers to facilitate the differently-abled
community.
! It was highlighted that all the web developers should follow the W3C standards to comply with the accessibility. To improve language gap
there was a suggestion of using government paid translators for the website development where university of Moratuwa already started.
! Providing internet facility for rural areas is one of the key problems. Providing wif facilitiy using public wifi hotspots will not solve the
problem. It’s to be still proven. Some procedures are impractical as going ISP to register for Wi-Fi. In next 3 years ICTA is planning to
connect 4500 government organizations. Minimum broadband speed is 20Mbps, going up to 100Mbps. That is not going to rural areas,
limited to divisional secretariats & so on.
15. Safer Internet
● It was raised that many issues directed towards conflicts in cultural, privacy issues, and harassing females especially.
● As per the meeting with the agents from the SAARC Countries all are facing the same issues regarding facebook. FB management are not
bothered about our issues related to culture.
It was suggested that there should be common understanding between countries to address issue.
● Poorninma Meegamana introduced Respect girls project the privacy handbook and there is mobile app to check to see cyber goodness.
● Digital footprints can be leave on the cyber space either in passive or active manner. here is Passive and active digital footprint.
● We need to have a proper way without barring them using proper technology. They have to use this technologies for empower with the
world. To make them aware of how the things can happen and how we can monitor and safeguard them self
● Due to cultural barriers young people may not have space to express themselves in free manner so they go online to express themselves.
● Importance of awareness on digital forensic.
● Before talk about international policy changes we should focus on the local policies and make it strong.
● government introduced a policy such as do not call list which is used by america if people who registered on that list can sue others if they
get a call or sms on that number.
● Introduced Pro Hitawathie Project assists recognizing incident related to cyber harassments, prevent such incidents, guidance.
● IOT and future of digital Security issues
● We have to empower children / parents to use technology without trouble specially Online bulling, scams,Audience:
16. Freedom of Expression
News Media Web Registration Issues
Responsibility of Journalist
Ethics of Journalist
How technically block news website
Defamation and Mudslugin in Internet Age
Protection of Internet Journalists
17. Schedule for the next IGF Sri Lanka
IGF Sri lanka 2017 will be on March 2017
18. Main Considerations for next Local IGF
Better public awareness on IG Issues before the event.
More participation from civil society and civil society organisations.
Create a mechanism to manage the IG process in between the annual IGF
events. A Local IGF Secretariat
19. What we need from you
Join us, make others aware , Comment us , Give your feedback and Assist us.
Thank you