SlideShare a Scribd company logo
By:
Pragati
Roll no -13
Msc 1
Founding member countries (1961)
Other member countries
 Austria
 Belgium
 Canada
 Denmark
 France
 Germany
 Greece
 Iceland
 Ireland
 Italy
Luxembourg
Netherlands
Norway
Portugal
Spain
Sweden
Switzerland
Turkey
Uk
Us
 Japan (28th April 1964)
 Finland (28th January 1969)
 Australia (7th June 1971)
 New Zealand (29th May 1973)
 Mexico (18th May 1994)
 the Czech Republic (21st December 1995)
Hungary (7th May 1996)
 Poland (22nd November 1996)
 Korea (12th December 1996)
 the Slovak Republic (14th December 2000).
Background :-
 Founded in 1961 by 18 European nation plus the
United States and Canada to stimulate economic
progress and world trade.
 It has expanded over time to include members from
South America and the Asia-Pacific region.
 Most OECD members are high-income economies with
a very high Human Development Index (HDI) and are
regarded as developed countries.
 In 2002, these Guidelines were revised to help
policy makers foster security.
 In 1992, the OECD developed the first Security
Guidelines to foster confidence in information
systems. of information systems and networks for
economic and social prosperity in an open and
interconnected technical environment.
 The 2002 Security Guidelines target national public
policy makers in charge of cybersecurity strategies,
as well as leaders of public and private
organisations whose economic and social activities
rely on the digital environment.
OCED’s Aim :-
 Promote a culture of security among all
participants as a means of protecting information
systems and networks.
 Raise awareness about the risk to information
systems and networks; the policies, practices,
measures and procedures available to address
those risks; and the need for their adoption
 and implementation.
 Foster greater confidence among all participants in
information systems and networks and the way in
which they are provided and used.
 Create a general frame of reference that will help
participants understand security issues and respect
ethical values in the development and implementation
of coherent policies, practices measures and procedures
for the security of information systems and networks.
 Promote co-operation and information sharing, as
appropriate, among all participants in the development
and implementation of security policies, practices,
measures and procedures.
 Promote the consideration of security as an important
objective among all participants involved in the
development or implementation of standards.
Principles :-
 1) Awareness
Participants should be aware of the need for
security of information systems and networks and
what they can do to enhance security.
 2) Responsibility
All participants are responsible for the
security of information systems and networks.
 3) Response
Participants should act in a timely and co-
operative manner to prevent, detect and respond to
security incidents.
 4) Ethics
Participants should respect the legitimate
interests of others.
 5) Democracy
The security of information systems and
networks should be compatible with essential
values of a democratic society.
 6) Risk assessment
Participants should conduct risk
assessments.
 7) Security design and implementation
Participants should incorporate security as
an essential element of information systems and
networks.
 8) Security management
Participants should adopt a comprehensive
approach to security management.
 9) Reassessment
Participants should review and reassess the
security of information systems and networks, and
make appropriate modifications to security
policies, practices, measures and procedures.
Challenge:-
 Developing an effective enabling network,
strengthening solid accountability
mechanisms and safeguarding public interest
represent some serious challenges for the
OECD.
 The OECD Restated Job Strategy aims to
formulate pro-employment policies to
improve networking market outcomes.
However, its productivity impact remains
unclear.
 In December 2013, the OECD Committee on Digital
Economy Policy (CDEP, formerly ICCP) agreed to
revise the 2002 Recommendation of the Council
concerning Guidelines for the Security of
Information Systems and Networks: Towards a
Culture of Security (Security Guidelines). It also
agreed to start its review of the Recommendation
on the Protection of Critical Information
Infrastructures in December 2014.
 Internet becoming an essential platform for
innovation, new sources of growth and social
development.
 The threat landscape changing, both in scale and
in kind, with more sophisticated actors, cyber
crimes, and other sorts of economic and social
disruptions.
 Trends such as digital mobility, cloud
computing, “bring your own device” (BYOD),
social networks and the Internet of
things, blurring the perimeter of information
systems.
 To respond to these challenges,
governments are adopting a new generation
of national cybersecurity strategies which
elevate the priority of cybersecurity and
holistically encompass economic and social
objectives of security with sovereignty
aspects such as international security,
intelligence and military issues.
 www.oecd.org
 Google.com
Thank you !

More Related Content

What's hot

Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
atuljaybhaye
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
Dr. Prashant Vats
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
Ristya Anditha
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
Nitya Nand Pandey
 
Jurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the SovereignJurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the Sovereign
carolineelias239
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
Talwant Singh
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
atuljaybhaye
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 
Introduction to ICC
Introduction to ICCIntroduction to ICC
Introduction to ICC
cpjcollege
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
Prateek Sinha
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international law
carolineelias239
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
atuljaybhaye
 

What's hot (20)

Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
It act 2000
It act 2000It act 2000
It act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Jurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the SovereignJurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the Sovereign
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Introduction to ICC
Introduction to ICCIntroduction to ICC
Introduction to ICC
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
UNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTEUNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTE
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international law
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 

Similar to OECD

Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
Genti79
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paperpteromys_volans
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
consultancyss
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
Knowledge Group
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
Genève Lab
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy
ETDAofficialRegist
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
National cyber security strategies
National cyber security strategiesNational cyber security strategies
National cyber security strategiesjcp88600
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
APNIC
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
Elleinerose
 
PPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdf
PPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdfPPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdf
PPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdf
Support for Improvement in Governance and Management SIGMA
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
Benjamin Ang
 
Data Privacy, Ethics and Protection
Data Privacy, Ethics and ProtectionData Privacy, Ethics and Protection
Data Privacy, Ethics and Protection
Dr Lendy Spires
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
Centre for Strategic Cyberspace + Security Science
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
Kevin Duffey
 
Digital and Green Transformation for Developing Economies.docx
Digital and Green Transformation for Developing Economies.docxDigital and Green Transformation for Developing Economies.docx
Digital and Green Transformation for Developing Economies.docx
Dr. Monideep Dey
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
BigData_Europe
 

Similar to OECD (20)

Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
National cyber security strategies
National cyber security strategiesNational cyber security strategies
National cyber security strategies
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
PPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdf
PPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdfPPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdf
PPT - SIGMA-GIZ Academies - Topic 3 - ISO in public sector.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Data Privacy, Ethics and Protection
Data Privacy, Ethics and ProtectionData Privacy, Ethics and Protection
Data Privacy, Ethics and Protection
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
Digital and Green Transformation for Developing Economies.docx
Digital and Green Transformation for Developing Economies.docxDigital and Green Transformation for Developing Economies.docx
Digital and Green Transformation for Developing Economies.docx
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 

Recently uploaded

Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
SidharthKashyap5
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
OmGod1
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
Purushottam Jha
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
shweeta209
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
AHRP Law Firm
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 

Recently uploaded (20)

Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 

OECD

  • 2. Founding member countries (1961) Other member countries
  • 3.  Austria  Belgium  Canada  Denmark  France  Germany  Greece  Iceland  Ireland  Italy Luxembourg Netherlands Norway Portugal Spain Sweden Switzerland Turkey Uk Us
  • 4.  Japan (28th April 1964)  Finland (28th January 1969)  Australia (7th June 1971)  New Zealand (29th May 1973)  Mexico (18th May 1994)  the Czech Republic (21st December 1995) Hungary (7th May 1996)  Poland (22nd November 1996)  Korea (12th December 1996)  the Slovak Republic (14th December 2000).
  • 5. Background :-  Founded in 1961 by 18 European nation plus the United States and Canada to stimulate economic progress and world trade.  It has expanded over time to include members from South America and the Asia-Pacific region.  Most OECD members are high-income economies with a very high Human Development Index (HDI) and are regarded as developed countries.
  • 6.  In 2002, these Guidelines were revised to help policy makers foster security.  In 1992, the OECD developed the first Security Guidelines to foster confidence in information systems. of information systems and networks for economic and social prosperity in an open and interconnected technical environment.  The 2002 Security Guidelines target national public policy makers in charge of cybersecurity strategies, as well as leaders of public and private organisations whose economic and social activities rely on the digital environment.
  • 7. OCED’s Aim :-  Promote a culture of security among all participants as a means of protecting information systems and networks.  Raise awareness about the risk to information systems and networks; the policies, practices, measures and procedures available to address those risks; and the need for their adoption  and implementation.  Foster greater confidence among all participants in information systems and networks and the way in which they are provided and used.
  • 8.  Create a general frame of reference that will help participants understand security issues and respect ethical values in the development and implementation of coherent policies, practices measures and procedures for the security of information systems and networks.  Promote co-operation and information sharing, as appropriate, among all participants in the development and implementation of security policies, practices, measures and procedures.  Promote the consideration of security as an important objective among all participants involved in the development or implementation of standards.
  • 9. Principles :-  1) Awareness Participants should be aware of the need for security of information systems and networks and what they can do to enhance security.  2) Responsibility All participants are responsible for the security of information systems and networks.  3) Response Participants should act in a timely and co- operative manner to prevent, detect and respond to security incidents.  4) Ethics Participants should respect the legitimate interests of others.
  • 10.  5) Democracy The security of information systems and networks should be compatible with essential values of a democratic society.  6) Risk assessment Participants should conduct risk assessments.  7) Security design and implementation Participants should incorporate security as an essential element of information systems and networks.  8) Security management Participants should adopt a comprehensive approach to security management.
  • 11.  9) Reassessment Participants should review and reassess the security of information systems and networks, and make appropriate modifications to security policies, practices, measures and procedures.
  • 12. Challenge:-  Developing an effective enabling network, strengthening solid accountability mechanisms and safeguarding public interest represent some serious challenges for the OECD.  The OECD Restated Job Strategy aims to formulate pro-employment policies to improve networking market outcomes. However, its productivity impact remains unclear.
  • 13.  In December 2013, the OECD Committee on Digital Economy Policy (CDEP, formerly ICCP) agreed to revise the 2002 Recommendation of the Council concerning Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security (Security Guidelines). It also agreed to start its review of the Recommendation on the Protection of Critical Information Infrastructures in December 2014.
  • 14.  Internet becoming an essential platform for innovation, new sources of growth and social development.  The threat landscape changing, both in scale and in kind, with more sophisticated actors, cyber crimes, and other sorts of economic and social disruptions.  Trends such as digital mobility, cloud computing, “bring your own device” (BYOD), social networks and the Internet of things, blurring the perimeter of information systems.
  • 15.  To respond to these challenges, governments are adopting a new generation of national cybersecurity strategies which elevate the priority of cybersecurity and holistically encompass economic and social objectives of security with sovereignty aspects such as international security, intelligence and military issues.