SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
BUILDING INTERNET SAFETY WALL
(BISW) Understanding the imperatives of
national domain names for safe Internet

By

Mrs. Mary Uduma
President, Nigeria Internet Registration
Association
Chairwoman, Multi-Stakeholder Local
Advisory Group NG IGF
CTO FORUM, ABUJA , 7-11 OCT, 2013
THE CONVERSATION
•
•
•
•
•

Introduction
Building Internet Safety Wall (BISW)
Critical Considerations
Imperatives
National Domain Names
INTRODUCTION

BISW consist of two
fundamental concepts
BISW = Internet Safety + Safety Wall
Internet safety
• It is a critical digital culture and a new
tradition which must be embedded into the
mindset of internet users.
• It is a vital component of the responsibility of
all internet community stakeholders – most
especially the Users
• For an effective Cybersecurity ecosystem
Internet Safety capability gap must be fully
entrenched
Internet safety II
.

• No Cybersecurity initiative will work without it, just
like internet without the people.
• It is not a security matter, it is a social response
matter. Why? Security is the welfare responsibility of
the government, while Safety is the responsibility of
people.
• However, government has a big role to play from
policy and guidance perspectives.
Safety Wall
• This is a strong multi-stakeholder ’s frontier network
towards achieving the following;
i.
Safety awareness
ii. Safety advocacy
iii. Safety literacy
iv. Safety readiness (i.e knowing what to do, knowing why
you do it, how to do it, and when to do it, when and
where to do it)
v. Decisive enforcement and
vi. Social/cultural standards significant to Internet safety
paradigm shift
10 Critical Issues Internet
Safety Wall Must Address
The following 10 critical issues have diverse consequences on the
economy, socio-security, development, and innovations.
i.
ii.
iii.
iv.
v.
vi.

Inappropriate contents as duly classified
Online backdoor distributive channels
Misuse and abuse of IT devices and critical internet resources
Users abuse and exploitation materials
User personal vulnerability
Digital harm and exposure risk critical to personal safety and
national image
vii. Digital device safety and mobile protection
viii. Internet security and online safety illiteracy
ix. Vendor neutral safety countermeasures
x. Local internet community safety capability gap
Moving Forward…
How Can We Build an Internet
Safety Wall?
BISW- Imperatives:
Develop a CTO unified framework for Internet Safety
Strategy & Engagement roadmap among member
countries which must harness the following key
components of internet for successful outcome;
i. Multi-dimensional nature of internet
ii. Multi-disciplinary nature of users
BISW- Imperatives:
i.

Multi-lateral intervention vehicle such as
CTO for structural and coordinated
engagement within member country.
ii. Thinking borderless synergy
iii. Multi-stakeholder engagement
BISW – Key Considerations
• Internet Safety measures that spur development of
innovation not killing it under the guise of providing
safety.
• Measures that favour user’s empowerment and
control of over safety issues.
• Measures that recognized user’s right to privacy and
security
BISW – Key Considerations II
• Measures that collaborate national effort on countermeasures on online security incidents
• Measures that work in partnership with industry
regulatory framework
• Measure that seek legislative advocacy /legal approach
for enforcement of nationally acceptable user safety
guidelines and standards
BISW – Key Considerations III
• Measures that seek to transform users through Internet
Safety literacy and public awareness
• Measures that promote Internet Safety Technology as
a lifestyle, culture or tradition
• Measures that incorporate multi-stakeholder, multidimensional and multi-disciplinary nature of internet
Safety wall
• Measures that unite and build consensus among all
stakeholders
Overview of framework for Internet Safety
Wall
• Structural mechanism for the delivery of
Internet Safety –Gov at all levels.
• Building a framework for local internet
safety with safety watch capability
• Public internet safety emergency readiness,
national advocacy and awareness gateway
that will fit into the existing e-security
ecosystem
Overview of framework for Internet Safety
Wall II
• A framework for development of local IT
tools, materials, contents and software
applications appropriate for ensuring safety
of users.
• Creating local Internet Safety wall via multistakeholder framework for
countermeasure, interactions and
engagement.
Overview of framework for Internet
Safety Wall III
• Mechanism for monitoring and
evaluation process to help
safeguard local internet
community .
• A framework for national
capability on internet safety
research and development
Glimpse into Nigeria’s Efforts
Towards Internet Security &
Online Safety e.g.
Nigeria Child Online Protection
www.cop.gov.ng
Country Code Top Level
Domain – Safety Wall
• Domestication of
ccTLD -National
Domain Names
• Community Ownership
• Location of primary
Registry. In-country Vs
Outside
• Use of any cast model
of cctld Registry
• Adoption of DNSSEC in
the cctld Registry
National Domain NamesSafety Wall
• Multi-stakeholder V
Business model
• Easy of resolving
disputes
• National Identity Vs
new gTLD
• User education
• User empowerment
• Safety Awareness
THANK YOU
muduma@nira.org.ng

Contenu connexe

Tendances

Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e frictionAdrian Hall
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasEmyana Ruth
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Robin Sedeqi
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new releaseElena Zvarici
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of thingsAkib B. Momin
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitolTechU
 

Tendances (19)

Mikie
MikieMikie
Mikie
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e friction
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Week 8
Week 8Week 8
Week 8
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new release
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of things
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

En vedette

Going from good to great with concept testing
Going from good to great with concept testingGoing from good to great with concept testing
Going from good to great with concept testingBen Crothers
 
Taller sistemas tecnológicos
Taller sistemas tecnológicosTaller sistemas tecnológicos
Taller sistemas tecnológicosinfogolden
 
Chproject2 report
Chproject2 reportChproject2 report
Chproject2 reportlimziahuei
 
Un caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on lineUn caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on linePietro Izzo
 
Separata de religión 3
Separata de religión 3Separata de religión 3
Separata de religión 3La profe Irene
 
Definición de los materiales
Definición de los materialesDefinición de los materiales
Definición de los materialesfernadno espinoza
 
Cirugía en endodoncia
Cirugía  en endodonciaCirugía  en endodoncia
Cirugía en endodonciaUrich Jusepe
 
Società Di Massa E Industria Culturale Ver 4.2 Teorie Marcobinotto
Società Di Massa E Industria Culturale   Ver 4.2   Teorie   MarcobinottoSocietà Di Massa E Industria Culturale   Ver 4.2   Teorie   Marcobinotto
Società Di Massa E Industria Culturale Ver 4.2 Teorie MarcobinottoMarco Binotto
 
Diseño de miembros estructurales en madera
Diseño de miembros estructurales en maderaDiseño de miembros estructurales en madera
Diseño de miembros estructurales en maderaraynelarq
 
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione PercettivaAlcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione PercettivaEleonora Mencarini
 
Hayao Miyazaki
Hayao MiyazakiHayao Miyazaki
Hayao Miyazakicbugs47
 

En vedette (17)

EDI - Photoshop - smartobject
EDI - Photoshop - smartobjectEDI - Photoshop - smartobject
EDI - Photoshop - smartobject
 
Going from good to great with concept testing
Going from good to great with concept testingGoing from good to great with concept testing
Going from good to great with concept testing
 
Taller sistemas tecnológicos
Taller sistemas tecnológicosTaller sistemas tecnológicos
Taller sistemas tecnológicos
 
Questionnaire Analysis
Questionnaire AnalysisQuestionnaire Analysis
Questionnaire Analysis
 
Chproject2 report
Chproject2 reportChproject2 report
Chproject2 report
 
Reference letter Alia
Reference letter AliaReference letter Alia
Reference letter Alia
 
ACTIVITY 1
ACTIVITY 1ACTIVITY 1
ACTIVITY 1
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
Un caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on lineUn caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on line
 
Separata de religión 3
Separata de religión 3Separata de religión 3
Separata de religión 3
 
Volem el que no tenim
Volem el que no tenimVolem el que no tenim
Volem el que no tenim
 
Definición de los materiales
Definición de los materialesDefinición de los materiales
Definición de los materiales
 
Cirugía en endodoncia
Cirugía  en endodonciaCirugía  en endodoncia
Cirugía en endodoncia
 
Società Di Massa E Industria Culturale Ver 4.2 Teorie Marcobinotto
Società Di Massa E Industria Culturale   Ver 4.2   Teorie   MarcobinottoSocietà Di Massa E Industria Culturale   Ver 4.2   Teorie   Marcobinotto
Società Di Massa E Industria Culturale Ver 4.2 Teorie Marcobinotto
 
Diseño de miembros estructurales en madera
Diseño de miembros estructurales en maderaDiseño de miembros estructurales en madera
Diseño de miembros estructurales en madera
 
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione PercettivaAlcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
 
Hayao Miyazaki
Hayao MiyazakiHayao Miyazaki
Hayao Miyazaki
 

Similaire à Building internet safety wall understanding the imperatives of national domain names for safe internet

Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxYekoyeTigabuYeko
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationShiva Bissessar
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxANA Cyber Security Forensic Pvt. Ltd.
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesSaeed Al Dhaheri
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustAnsgar Koene
 

Similaire à Building internet safety wall understanding the imperatives of national domain names for safe internet (20)

Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpation
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Session 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip PaulwellSession 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip Paulwell
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User Trust
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 

Plus de Commonwealth Telecommunications Organisation

Plus de Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 

Dernier

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Dernier (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Building internet safety wall understanding the imperatives of national domain names for safe internet

  • 1. BUILDING INTERNET SAFETY WALL (BISW) Understanding the imperatives of national domain names for safe Internet By Mrs. Mary Uduma President, Nigeria Internet Registration Association Chairwoman, Multi-Stakeholder Local Advisory Group NG IGF CTO FORUM, ABUJA , 7-11 OCT, 2013
  • 2. THE CONVERSATION • • • • • Introduction Building Internet Safety Wall (BISW) Critical Considerations Imperatives National Domain Names
  • 3. INTRODUCTION BISW consist of two fundamental concepts BISW = Internet Safety + Safety Wall
  • 4. Internet safety • It is a critical digital culture and a new tradition which must be embedded into the mindset of internet users. • It is a vital component of the responsibility of all internet community stakeholders – most especially the Users • For an effective Cybersecurity ecosystem Internet Safety capability gap must be fully entrenched
  • 5. Internet safety II . • No Cybersecurity initiative will work without it, just like internet without the people. • It is not a security matter, it is a social response matter. Why? Security is the welfare responsibility of the government, while Safety is the responsibility of people. • However, government has a big role to play from policy and guidance perspectives.
  • 6. Safety Wall • This is a strong multi-stakeholder ’s frontier network towards achieving the following; i. Safety awareness ii. Safety advocacy iii. Safety literacy iv. Safety readiness (i.e knowing what to do, knowing why you do it, how to do it, and when to do it, when and where to do it) v. Decisive enforcement and vi. Social/cultural standards significant to Internet safety paradigm shift
  • 7. 10 Critical Issues Internet Safety Wall Must Address The following 10 critical issues have diverse consequences on the economy, socio-security, development, and innovations. i. ii. iii. iv. v. vi. Inappropriate contents as duly classified Online backdoor distributive channels Misuse and abuse of IT devices and critical internet resources Users abuse and exploitation materials User personal vulnerability Digital harm and exposure risk critical to personal safety and national image vii. Digital device safety and mobile protection viii. Internet security and online safety illiteracy ix. Vendor neutral safety countermeasures x. Local internet community safety capability gap
  • 8. Moving Forward… How Can We Build an Internet Safety Wall?
  • 9. BISW- Imperatives: Develop a CTO unified framework for Internet Safety Strategy & Engagement roadmap among member countries which must harness the following key components of internet for successful outcome; i. Multi-dimensional nature of internet ii. Multi-disciplinary nature of users
  • 10. BISW- Imperatives: i. Multi-lateral intervention vehicle such as CTO for structural and coordinated engagement within member country. ii. Thinking borderless synergy iii. Multi-stakeholder engagement
  • 11. BISW – Key Considerations • Internet Safety measures that spur development of innovation not killing it under the guise of providing safety. • Measures that favour user’s empowerment and control of over safety issues. • Measures that recognized user’s right to privacy and security
  • 12. BISW – Key Considerations II • Measures that collaborate national effort on countermeasures on online security incidents • Measures that work in partnership with industry regulatory framework • Measure that seek legislative advocacy /legal approach for enforcement of nationally acceptable user safety guidelines and standards
  • 13. BISW – Key Considerations III • Measures that seek to transform users through Internet Safety literacy and public awareness • Measures that promote Internet Safety Technology as a lifestyle, culture or tradition • Measures that incorporate multi-stakeholder, multidimensional and multi-disciplinary nature of internet Safety wall • Measures that unite and build consensus among all stakeholders
  • 14. Overview of framework for Internet Safety Wall • Structural mechanism for the delivery of Internet Safety –Gov at all levels. • Building a framework for local internet safety with safety watch capability • Public internet safety emergency readiness, national advocacy and awareness gateway that will fit into the existing e-security ecosystem
  • 15. Overview of framework for Internet Safety Wall II • A framework for development of local IT tools, materials, contents and software applications appropriate for ensuring safety of users. • Creating local Internet Safety wall via multistakeholder framework for countermeasure, interactions and engagement.
  • 16. Overview of framework for Internet Safety Wall III • Mechanism for monitoring and evaluation process to help safeguard local internet community . • A framework for national capability on internet safety research and development
  • 17. Glimpse into Nigeria’s Efforts Towards Internet Security & Online Safety e.g. Nigeria Child Online Protection www.cop.gov.ng
  • 18. Country Code Top Level Domain – Safety Wall • Domestication of ccTLD -National Domain Names • Community Ownership • Location of primary Registry. In-country Vs Outside • Use of any cast model of cctld Registry • Adoption of DNSSEC in the cctld Registry
  • 19. National Domain NamesSafety Wall • Multi-stakeholder V Business model • Easy of resolving disputes • National Identity Vs new gTLD • User education • User empowerment • Safety Awareness