SlideShare a Scribd company logo
1 of 15
CYBER SECURITY CHALLENGES
(NEED OF INTERNATIONAL REGULATIONS)
Contents
 Legal & policy issues of cyber security
 Technical Issues
 ORF Research Topics for Cyber Space
Legal & policy issues of cyber security
 Data Protection & Privacy
 Cyber Peace
 International Law
 Cyber Infrastructure should be declared as National Asset
Technical Issues
 Digital currency
1. Currency itself is created, traded, and controlled by Bitcoin users, rather than by a central
authority like a bank or a government
2. The world's first-ever Bitcoin ATM opened in Vancouver, Canada in 2013
3. Most major retailers don’t accept bitcoin yet
4. Bitcoin transactions are irreversible
5. NO body knows who really created bitcoin
6. Provide greater anonymity for transactions
7. Many virtual currency systems can be accessed globally to make payments and transfer funds
across borders.
TOR Browser
1. They are used for fraud and trafficking in people, drugs, money laundering and other illicit
goods.
2. Europol finds several instances of digital currency use on child sexual exploitation dark net
sites (CAM)
 Anonymous Proxy
 Porn sites
 Free VoIP calls
 WhatsApp
 Server Locations
 Spying(PRISM)
 Hardware/ Software Standards
Different privacy policies
a. Social Sites
b. Mobile Service Providers
Internet of Things
This could include, for instance, setting up repositories on how to collect, cross-reference and analyze
data recovered from a range of devices in compliance with relevant privacy and data protection
frameworks and rules.
Industries involved in making the IoE a reality need to be encouraged to consider security as part of
the design process
 A recent 2014 HP Security Research study determined 70% of these smart IoT connected devices are
vulnerable to attack.
January 2012 a hacker exploited the lack of security controls in the devices and sent livestream
images to multiple Internet sites showing the images and sounds of people and their activities from
the rooms where they were used
Cloud Computing & Services
As the public and private sectors continue to outsource data, applications, platforms and entire
infrastructures to Cloud providers, the Cloud itself will become a critical infrastructure
Big Data
 Given the potential value and multi-purpose use of this data, we can expect to see more
targeted attacks on data brokers, either to steal and sell the data, for ransom purposes, for
political reasons or to actually use Big Data analytics to support more sophisticated attacks.
 For instance for smart homes this could be ‘load signatures’ that describe the power
consumption of electrical devices that are unique to the appliance – this information can be
used to determine when residents are not at home and provide insights into their daily behavior
and even illegal activities
ORF Research Topics for Cyber Space
1. Is it feasible and desirable to protect Internet users’ privacy by enforcing
barriers to cross-border data flows?
2. Which form of governance is most appropriate for regulating Internet content
(e.g. national-level regulation of ISPs; voluntary, end-user based initiatives;
international treaties; transnational private sector-led initiatives; hybrid forms of
governance; or any other forms of governance)?
3. Do current Internet governance arrangements empower the United States at
the expense of developing countries, emerging BRICS and the EU?
4. Is it possible to respond to cyber-attacks or to regulate cyber weapons
effectively through existing international legal regimes and institutional
frameworks?
5. Do users of the major social media platforms have adequate protection for
users’ rights of privacy and free expression?
Thank You

More Related Content

What's hot

An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Dan Larkin - Biography
Dan Larkin - Biography Dan Larkin - Biography
Dan Larkin - Biography Vivastream
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Mark Fisher
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALMatthew Magner
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Carolina Rossini
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 

What's hot (20)

An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Dan Larkin - Biography
Dan Larkin - Biography Dan Larkin - Biography
Dan Larkin - Biography
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
cyber crime
cyber crime cyber crime
cyber crime
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber security
Cyber security Cyber security
Cyber security
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Similar to CYBER SECURITY CHALLENGES REGULATIONS

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Tim Hsieh
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 

Similar to CYBER SECURITY CHALLENGES REGULATIONS (20)

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 

CYBER SECURITY CHALLENGES REGULATIONS

  • 1. CYBER SECURITY CHALLENGES (NEED OF INTERNATIONAL REGULATIONS)
  • 2. Contents  Legal & policy issues of cyber security  Technical Issues  ORF Research Topics for Cyber Space
  • 3. Legal & policy issues of cyber security  Data Protection & Privacy  Cyber Peace  International Law  Cyber Infrastructure should be declared as National Asset
  • 4. Technical Issues  Digital currency 1. Currency itself is created, traded, and controlled by Bitcoin users, rather than by a central authority like a bank or a government 2. The world's first-ever Bitcoin ATM opened in Vancouver, Canada in 2013 3. Most major retailers don’t accept bitcoin yet 4. Bitcoin transactions are irreversible 5. NO body knows who really created bitcoin 6. Provide greater anonymity for transactions 7. Many virtual currency systems can be accessed globally to make payments and transfer funds across borders.
  • 5. TOR Browser 1. They are used for fraud and trafficking in people, drugs, money laundering and other illicit goods. 2. Europol finds several instances of digital currency use on child sexual exploitation dark net sites (CAM)
  • 6.  Anonymous Proxy  Porn sites  Free VoIP calls  WhatsApp
  • 7.  Server Locations  Spying(PRISM)  Hardware/ Software Standards
  • 8. Different privacy policies a. Social Sites b. Mobile Service Providers
  • 9. Internet of Things This could include, for instance, setting up repositories on how to collect, cross-reference and analyze data recovered from a range of devices in compliance with relevant privacy and data protection frameworks and rules. Industries involved in making the IoE a reality need to be encouraged to consider security as part of the design process  A recent 2014 HP Security Research study determined 70% of these smart IoT connected devices are vulnerable to attack. January 2012 a hacker exploited the lack of security controls in the devices and sent livestream images to multiple Internet sites showing the images and sounds of people and their activities from the rooms where they were used
  • 10. Cloud Computing & Services As the public and private sectors continue to outsource data, applications, platforms and entire infrastructures to Cloud providers, the Cloud itself will become a critical infrastructure
  • 11. Big Data  Given the potential value and multi-purpose use of this data, we can expect to see more targeted attacks on data brokers, either to steal and sell the data, for ransom purposes, for political reasons or to actually use Big Data analytics to support more sophisticated attacks.  For instance for smart homes this could be ‘load signatures’ that describe the power consumption of electrical devices that are unique to the appliance – this information can be used to determine when residents are not at home and provide insights into their daily behavior and even illegal activities
  • 12. ORF Research Topics for Cyber Space 1. Is it feasible and desirable to protect Internet users’ privacy by enforcing barriers to cross-border data flows? 2. Which form of governance is most appropriate for regulating Internet content (e.g. national-level regulation of ISPs; voluntary, end-user based initiatives; international treaties; transnational private sector-led initiatives; hybrid forms of governance; or any other forms of governance)?
  • 13. 3. Do current Internet governance arrangements empower the United States at the expense of developing countries, emerging BRICS and the EU? 4. Is it possible to respond to cyber-attacks or to regulate cyber weapons effectively through existing international legal regimes and institutional frameworks?
  • 14. 5. Do users of the major social media platforms have adequate protection for users’ rights of privacy and free expression?