Indo-US Cooperation on Internet Governance and Cyber Security
Cyber Security Cooperation
Transcript of Cyber Security Cooperation
Cyber Security CooperationCyber Army Competitions
Sanjida YeasminResearch AssistantBangladesh Institute of Peace and Security Studies (BIPSS)
2
Framing the Issue: A Comprehensive Approach to Cyber Security
Cyber security requires shared solutions to shared threats.
Cyber security is a dynamic, not static process. Cyber threats know no borders.
Cyber crime includes: Including illegal access (unauthorized access), illegal interception (by technical
means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
Categories of Cyber Crime: it can be divided basically in the following three categories.
Cyber-crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail.
The second category of Cyber-crimes is that of Cyber-crimes against all forms of property. These crimes include computer vandalism, transmission of harmful programmes.
The third category of Cyber-crimes relate to Cyber-crimes against Government.
Areas of Threat
Cyber Terrorism Cyber Radicalization Threat to Financial Infrastructure Threat to Governance Threat to Military Capacity
Cyber Terrorism To qualify as cyber terrorism, an attack should result in violence
against persons or property, or at least cause enough harm to generate fear.
There are various reasons why cyber attacks are an attractive choice for terrorists such as: They can target and affect large numbers of people with less
resources. It enables terrorists to remain unknown.
Contd… Mostly, attacks are easy to carry out. There is no physical barriers or check points that they
have to cross. The speed and form of attacks are not dependent on the
connection speed of the attacker. A combination of both physical terrorism and cyber
terrorism is thought to be the most effective use of cyber terrorism.
9
The Concept of Cyber Radicalisation
Groups and IndividualsBecome Radicalised
through internet
Advocating for Violence against the Dominant
Will of the Society through internet
By P
roduct of Radicalisation
Extremism, Militancy and Terrorism
Formulate plans, Raise and launder funds, Spread propaganda, Communicate securely with the members (internal
communication), Share information and knowledge with similar groups
(external communities), Command and control, Make research and development, Recruit new members, Generate international support, Gather intelligence, Make information warfare on behalf of the nations.
Terrorist groups radicalize people through: Example- ISIS and AQIS
Threat to financial Institution
Unencrypted Data New Hacker Opportunities Foreign-Sponsored Attacks Insecure Third-Party Services Changed or Manipulated Data Malware Attacks Threat to stock exchange
Threat to Transportation
Metros and Sub ways Civil aviation Sea movement
Threat to Military Capacity
Cyber Space as a new battlefield Threat to weapon system Adversaries are well aware of cyber warfare new
doctrine Terrorists developing cyber capabilities Military communications & critical infrastructure
are vulnerable and prone to an over-reliance on existing civilian networks
Threat to Governance
Telecommunications Energy networks & safety systems Transportation- air safety & border security Defense & security: data networks and communications Banking & financial services Government services: E-Government
Why we need cooperation in the aspect of cyber security
Ensuring free flow of information Responding to increasingly serious risks Enhancing risk-based approach Acting in partnership based on social responsibilities
Areas of cooperation:
1. Implementation of dynamic responses to cyber incidents.2. Enhancing multi-layered mechanism for information
sharing.3. Appropriate response to cybercrime4. Establishing framework of cooperation for international
security in cyberspace.5. Building up “fundamentals” for dynamic responses.
Contd…
1. Support for building a global framework for cyber hygiene.2. Promotion of awareness-raising activities.3. Enhanced research and development through
international cooperation.4. International rulemaking for cyber security.5. Formulation of international standards of technology.6. International rulemaking.
Military Cooperation
Cooperation in latest skill of information attacks. Defensive and offensive cyber attacks. Sharing knowledge on cyber warfare. Example of NATO
Turkish–Arab cooperation in Cyber Security
Cooperation in Cyber Law mechanism Cooperation in Cyber Infrastructure Cooperation in Cyber Intelligence Cooperation in making Cyber Taskforce Cooperation to do research OIC should develop cyber sell to provide help to the
member states.
Thank you
Bangladesh Institute of Peace and Security Studies (BIPSS)