... Combating cybercrime:
efficiency or effectiveness?
World Summit on the Information Society Forum 2015
25th of May 2015
One Team, One Fight
... Dr. Phyllis Schneck
Deputy Under Secretary for Cybersecurity and
Department of Homeland Security
Breaking Trust On The Internet
... security specifically related to the Internet,
often involving browser security but
also network security on a more general level
as it applies to other applications or operating
systems on a whole.
10 years APCERT - Conferences
... 2. APCERT Drill (Simulation exercise of cyber
APCERT Annual Report
... e-health and e-finance.
3. Legal Basis : Currently finalizing a draft law on
Information Technology and Elecronic Transaction
4. Technical Realm: Dept of Com and Inf Tech
cooperation with INP and Internet Community,
establishment of Indonesia Security Incident
Response Team on Internet Infras ...
new zealand`s cyber security strategy
... • Increasing use of internet and digital
• Cyber threats increasing and more
sophisticated – no international borders
• Threats to:
- government-held information
- businesses and intellectual property
- critical national infrastructure
Online dating Virtual gaming Twitter LinkedIn Facebook Google +
... THE RAPID EVOLUTION OF INFORMATION TECHNOLOGY
• “The sharing of information, using technology as an
enabler, is a culture change that has been fully
embraced by political, military, and the business
• “If we do not develop robust capabilities to detect,
expose, and hold accountable ...
Cybersecurity - Queen`s Wiki
... In the media…
February 2016 – University of Florida reported that as many as 63,000 records were exposed.
March 2016 - Concordia University found hardware devices called keyloggers on some of its workstations.
April 2016 - Anonymous attacks Dalhousie University website and others
May 2016 – Universi ...
... – Amending existing articles (e.g. article 8), in order to include
security related elements
– Making specific references to countermeasures against spam
(in line with WTPF Opinion 6)
There is no consensus on the proposals
"O brave new world, that has such people in`t
... Center for Business, Law, and Public Policy, recently addressed "Cyber
Threats and Cyber Security." What they said was both terrifying--by some
accounts international businesses are losing more than $1 trillion a year to
digital crimes--and oddly reassuring--diligent organizations can pull from an
Tackling the challenges of cybersecurity in Africa
... in infrastructure damage, but it is also expected
to have cost the Kenyan economy some $200
million in lost tourism revenue.13
Consequently, African countries need to
urgently scale up efforts to combat cybercrimes
through a multi-stakeholder approach involving
government, industry and civil society ...
... In today’s world, organizations must be prepared to defend against threats in cyberspace.
Decision makers must be familiar with the basic principles and best practices of cybersecurity to
best protect their enterprises. In this course, experts from academia, the military, and industry
share their kn ...
... appropriate countermeasures with speed and this has resulted
in hacking taking place.
The attacks are then picked through everyday profiling
activities done for traffic directed to hot destinations.
The responsibility to ensure that last mile equipment
Emsisoft Internet Security
... small businesses, who frequently travel beyond their home network and
who want something simple-yet-intelligent that will keep their information
secure, no matter where they go.
slides - University of Cambridge Computer Laboratory
... • Auditing firms will follow old formulae until
something compels change
• But should the government regulate (as with
NERC/FERC) or facilitate (as the UK)?
• See ‘Security Economics and Critical National
Infrastructure’, on my web page, and at the
Workshop on the Economics of Information
Skating on Stilts
... • 74% have implemented new measures as a result of regulation
• 58% say regulation has “sharpened policy and improved security”
• 28% say it has “diverted resources from improving security to
recording/reporting incidents or other forms of compliance”
john p. carlin - AFCEA International
... III, former director of the FBI, where he helped lead the FBI’s evolution to meet growing and changing national
security threats, including cyber threats. Mr. Carlin also held positions as National Coordinator of the DOJ’s
Computer Hacking and Intellectual Property Program and Assistant United State ...
There is no commonly agreed single definition of “cybercrime”. Broadly speaking, it refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is ""international"" or ""transnational"" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced. No matter in developing or developed countries, governments and industries have gradually realized the colossal threats of cybercrime on economic and political security and public interests. However, complexity in types and forms of cybercrime increases the difficulty to fight back. In this sense, fighting cybercrime calls for international cooperation. Various organizations and governments have already made joint efforts in establishing global standards of legislation and law enforcement both on a regional and on an international scale. U.S.-China's cooperation is one of the most striking progress recently because they are the top two source countries of cybercrime.Information and communication technology (ICT) plays an important role in helping ensure interoperability and security based on global standards. General countermeasures have been adopted in cracking down cybercrime, such as legal measures in perfecting legislation and technical measures in tracking down crimes over the network, Internet content control, using public or private proxy and computer forensics, encryption and plausible deniability, etc. Due to the heterogeneity of law enforcement and technical countermeasures of different countries, this article will mainly focus on legislative and regulatory initiatives of international cooperation.