SlideShare une entreprise Scribd logo
1  sur  20
Cyber Security Cooperation
Cyber Army Competitions
Sanjida Yeasmin
Research Assistant
Bangladesh Institute of Peace and Security Studies
(BIPSS)
2
Framing the Issue: A Comprehensive Approach to Cyber
Security
 Cyber security requires shared solutions to shared
threats.
 Cyber security is a dynamic, not static process.
 Cyber threats know no borders.
Cyber crime includes:
 Including illegal access (unauthorized access), illegal interception (by technical
means of non-public transmissions of computer data to, from or within a computer
system), data interference (unauthorized damaging, deletion, deterioration,
alteration or suppression of computer data), systems interference (interfering with
the functioning of a computer system by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer data), misuse of devices,
forgery (ID theft), and electronic fraud.
Categories of Cyber Crime: it can be divided basically in the
following three categories.
 Cyber-crimes committed against persons include various
crimes like transmission of child-pornography, harassment of
any one with the use of a computer such as e-mail.
 The second category of Cyber-crimes is that of Cyber-crimes
against all forms of property. These crimes include computer
vandalism, transmission of harmful programmes.
 The third category of Cyber-crimes relate to Cyber-crimes
against Government.
Areas of Threat
 Cyber Terrorism
 Cyber Radicalization
 Threat to Financial Infrastructure
 Threat to Governance
 Threat to Military Capacity
Cyber Terrorism
 To qualify as cyber terrorism, an attack should result in violence
against persons or property, or at least cause enough harm to
generate fear.
There are various reasons why cyber attacks are an attractive
choice for terrorists such as:
 They can target and affect large numbers of people with less
resources.
 It enables terrorists to remain unknown.
Contd…
 Mostly, attacks are easy to carry out.
 There is no physical barriers or check points that they
have to cross.
 The speed and form of attacks are not dependent on the
connection speed of the attacker.
 A combination of both physical terrorism and cyber
terrorism is thought to be the most effective use of cyber
terrorism.
9
The Concept of Cyber Radicalisation
Groups and Individuals
Become Radicalised
through internet
Advocating for Violence
against the Dominant
Will of the Society through internet
ByProductofRadicalisation
Extremism, Militancy and Terrorism
 Formulate plans,
 Raise and launder funds,
 Spread propaganda,
 Communicate securely with the members (internal
communication),
 Share information and knowledge with similar groups
(external communities),
 Command and control,
 Make research and development,
 Recruit new members,
 Generate international support,
 Gather intelligence,
 Make information warfare on behalf of the nations.
Terrorist groups radicalize people through: Example-
ISIS and AQIS
Threat to financial Institution
 Unencrypted Data
 New Hacker Opportunities
 Foreign-Sponsored Attacks
 Insecure Third-Party Services
 Changed or Manipulated Data
 Malware Attacks
 Threat to stock exchange
Threat to Transportation
 Metros and Sub ways
 Civil aviation
 Sea movement
Threat to Military Capacity
 Cyber Space as a new battlefield
 Threat to weapon system
 Adversaries are well aware of cyber warfare new
doctrine
 Terrorists developing cyber capabilities
 Military communications & critical infrastructure
are vulnerable and prone to an over-reliance on
existing civilian networks
Threat to Governance
 Telecommunications
 Energy networks & safety systems
 Transportation- air safety & border security
 Defense & security: data networks and communications
 Banking & financial services
 Government services: E-Government
Why we need cooperation in the aspect of
cyber security
 Ensuring free flow of information
 Responding to increasingly serious risks
 Enhancing risk-based approach
 Acting in partnership based on social responsibilities
Areas of cooperation:
1. Implementation of dynamic responses to cyber incidents.
2. Enhancing multi-layered mechanism for information
sharing.
3. Appropriate response to cybercrime
4. Establishing framework of cooperation for international
security in cyberspace.
5. Building up “fundamentals” for dynamic responses.
Contd…
1. Support for building a global framework for cyber hygiene.
2. Promotion of awareness-raising activities.
3. Enhanced research and development through
international cooperation.
4. International rulemaking for cyber security.
5. Formulation of international standards of technology.
6. International rulemaking.
Military Cooperation
 Cooperation in latest skill of information attacks.
 Defensive and offensive cyber attacks.
 Sharing knowledge on cyber warfare.
 Example of NATO
Turkish–Arab cooperation in Cyber Security
 Cooperation in Cyber Law mechanism
 Cooperation in Cyber Infrastructure
 Cooperation in Cyber Intelligence
 Cooperation in making Cyber Taskforce
 Cooperation to do research
 OIC should develop cyber sell to provide help to the
member states.
Thank you
Bangladesh Institute of Peace and Security Studies (BIPSS)

Contenu connexe

Tendances

Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharingblogzilla
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscapeJisc
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1vincentleone
 
The cyber terrain
The cyber terrainThe cyber terrain
The cyber terrainblogzilla
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
 
Dni nato cyber panel via the intercept
Dni nato cyber panel via the interceptDni nato cyber panel via the intercept
Dni nato cyber panel via the interceptBaddddBoyyyy
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 

Tendances (20)

Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1
 
The cyber terrain
The cyber terrainThe cyber terrain
The cyber terrain
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
Dni nato cyber panel via the intercept
Dni nato cyber panel via the interceptDni nato cyber panel via the intercept
Dni nato cyber panel via the intercept
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 

En vedette

ICT for Good Governance in Montenegro
ICT for Good Governance in MontenegroICT for Good Governance in Montenegro
ICT for Good Governance in MontenegroUNDP Eurasia
 
Traditional and Social Media as Watchdogs for FOIAct Implementation
Traditional and Social Media as Watchdogs for FOIAct ImplementationTraditional and Social Media as Watchdogs for FOIAct Implementation
Traditional and Social Media as Watchdogs for FOIAct ImplementationMabel Tola-Winjobi
 
E-learning project: Conflict management for government officials in the Horn ...
E-learning project: Conflict management for government officials in the Horn ...E-learning project: Conflict management for government officials in the Horn ...
E-learning project: Conflict management for government officials in the Horn ...IPSS-Addis
 
Locales Framework, CSCW and Conflict Transformation
Locales Framework, CSCW and Conflict TransformationLocales Framework, CSCW and Conflict Transformation
Locales Framework, CSCW and Conflict TransformationSanjana Hattotuwa
 
Technology For Peace - Ideas From The Trenches
Technology For Peace -  Ideas From The TrenchesTechnology For Peace -  Ideas From The Trenches
Technology For Peace - Ideas From The TrenchesSanjana Hattotuwa
 
ICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNING
ICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNINGICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNING
ICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNINGAlan Bruce
 
Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011
Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011
Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011puruma
 
Social Media For Sustainability (by @JoeyShepp)
Social Media For Sustainability (by @JoeyShepp)Social Media For Sustainability (by @JoeyShepp)
Social Media For Sustainability (by @JoeyShepp)Earthsite
 
Digital Marketing Campaign strategy for Prince of Peace Catholic Church
Digital Marketing Campaign strategy for Prince of Peace Catholic Church Digital Marketing Campaign strategy for Prince of Peace Catholic Church
Digital Marketing Campaign strategy for Prince of Peace Catholic Church Edward Alonzo
 
Youth Empowerment through Arts and Media
Youth Empowerment through Arts and MediaYouth Empowerment through Arts and Media
Youth Empowerment through Arts and MediaLinda Raftree
 
Peace Is Every Post: Peace Education and Social Media
Peace Is Every Post: Peace Education and Social MediaPeace Is Every Post: Peace Education and Social Media
Peace Is Every Post: Peace Education and Social Mediastephknox24
 
Social Media: Tools for Peace and Development?
Social Media: Tools for Peace and Development?Social Media: Tools for Peace and Development?
Social Media: Tools for Peace and Development?Leslie Chan
 
Fostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT EcosystemFostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT EcosystemJaroslaw Ponder
 
Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)Sanjana Hattotuwa
 
Media Literacy and Building Peace on Social Media
Media Literacy and Building Peace on Social MediaMedia Literacy and Building Peace on Social Media
Media Literacy and Building Peace on Social MediaMonica Curca
 

En vedette (20)

CTO Cybersecurity Forum 2013_Cameroon
CTO Cybersecurity Forum 2013_CameroonCTO Cybersecurity Forum 2013_Cameroon
CTO Cybersecurity Forum 2013_Cameroon
 
ICT for Good Governance in Montenegro
ICT for Good Governance in MontenegroICT for Good Governance in Montenegro
ICT for Good Governance in Montenegro
 
BUILDING A SOCIAL MEDIA STRATEGY IN AFRICA - 9ideas 2012
BUILDING  A SOCIAL MEDIA STRATEGY IN AFRICA - 9ideas 2012BUILDING  A SOCIAL MEDIA STRATEGY IN AFRICA - 9ideas 2012
BUILDING A SOCIAL MEDIA STRATEGY IN AFRICA - 9ideas 2012
 
Traditional and Social Media as Watchdogs for FOIAct Implementation
Traditional and Social Media as Watchdogs for FOIAct ImplementationTraditional and Social Media as Watchdogs for FOIAct Implementation
Traditional and Social Media as Watchdogs for FOIAct Implementation
 
Anthony Ming ICT to Deepen Democracy
Anthony Ming ICT to Deepen DemocracyAnthony Ming ICT to Deepen Democracy
Anthony Ming ICT to Deepen Democracy
 
E-learning project: Conflict management for government officials in the Horn ...
E-learning project: Conflict management for government officials in the Horn ...E-learning project: Conflict management for government officials in the Horn ...
E-learning project: Conflict management for government officials in the Horn ...
 
Locales Framework, CSCW and Conflict Transformation
Locales Framework, CSCW and Conflict TransformationLocales Framework, CSCW and Conflict Transformation
Locales Framework, CSCW and Conflict Transformation
 
Economics of Peace & Security
Economics of Peace & SecurityEconomics of Peace & Security
Economics of Peace & Security
 
Technology For Peace - Ideas From The Trenches
Technology For Peace -  Ideas From The TrenchesTechnology For Peace -  Ideas From The Trenches
Technology For Peace - Ideas From The Trenches
 
ICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNING
ICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNINGICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNING
ICT SUPPORTED WORK-BASED CONFLICT RESOLUTION LEARNING
 
Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011
Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011
Gavin Moffat - Social Media in Marketing Africa 2011 - 25 February 2011
 
Social Media For Sustainability (by @JoeyShepp)
Social Media For Sustainability (by @JoeyShepp)Social Media For Sustainability (by @JoeyShepp)
Social Media For Sustainability (by @JoeyShepp)
 
Digital Marketing Campaign strategy for Prince of Peace Catholic Church
Digital Marketing Campaign strategy for Prince of Peace Catholic Church Digital Marketing Campaign strategy for Prince of Peace Catholic Church
Digital Marketing Campaign strategy for Prince of Peace Catholic Church
 
Youth Empowerment through Arts and Media
Youth Empowerment through Arts and MediaYouth Empowerment through Arts and Media
Youth Empowerment through Arts and Media
 
Peace Is Every Post: Peace Education and Social Media
Peace Is Every Post: Peace Education and Social MediaPeace Is Every Post: Peace Education and Social Media
Peace Is Every Post: Peace Education and Social Media
 
Social Media: Tools for Peace and Development?
Social Media: Tools for Peace and Development?Social Media: Tools for Peace and Development?
Social Media: Tools for Peace and Development?
 
InfoShare Sri Lanka
InfoShare Sri LankaInfoShare Sri Lanka
InfoShare Sri Lanka
 
Fostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT EcosystemFostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT Ecosystem
 
Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)
 
Media Literacy and Building Peace on Social Media
Media Literacy and Building Peace on Social MediaMedia Literacy and Building Peace on Social Media
Media Literacy and Building Peace on Social Media
 

Similaire à Cyber Security Cooperation

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityIJICTJOURNAL
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfsammartina
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...adnis1
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Kevin Fream
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfjasonuchiha2
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxbenjaminjames21681
 
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdfIntelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdfDataSpace Academy
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research PaperRachel Phillips
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 

Similaire à Cyber Security Cooperation (20)

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
Cyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdfCyber crime Research Topics (1).pdf
Cyber crime Research Topics (1).pdf
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
C018131821
C018131821C018131821
C018131821
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdfIntelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 

Cyber Security Cooperation

  • 1. Cyber Security Cooperation Cyber Army Competitions Sanjida Yeasmin Research Assistant Bangladesh Institute of Peace and Security Studies (BIPSS)
  • 2. 2 Framing the Issue: A Comprehensive Approach to Cyber Security  Cyber security requires shared solutions to shared threats.  Cyber security is a dynamic, not static process.  Cyber threats know no borders.
  • 3. Cyber crime includes:  Including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
  • 4. Categories of Cyber Crime: it can be divided basically in the following three categories.  Cyber-crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail.  The second category of Cyber-crimes is that of Cyber-crimes against all forms of property. These crimes include computer vandalism, transmission of harmful programmes.  The third category of Cyber-crimes relate to Cyber-crimes against Government.
  • 5.
  • 6. Areas of Threat  Cyber Terrorism  Cyber Radicalization  Threat to Financial Infrastructure  Threat to Governance  Threat to Military Capacity
  • 7. Cyber Terrorism  To qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. There are various reasons why cyber attacks are an attractive choice for terrorists such as:  They can target and affect large numbers of people with less resources.  It enables terrorists to remain unknown.
  • 8. Contd…  Mostly, attacks are easy to carry out.  There is no physical barriers or check points that they have to cross.  The speed and form of attacks are not dependent on the connection speed of the attacker.  A combination of both physical terrorism and cyber terrorism is thought to be the most effective use of cyber terrorism.
  • 9. 9 The Concept of Cyber Radicalisation Groups and Individuals Become Radicalised through internet Advocating for Violence against the Dominant Will of the Society through internet ByProductofRadicalisation Extremism, Militancy and Terrorism
  • 10.  Formulate plans,  Raise and launder funds,  Spread propaganda,  Communicate securely with the members (internal communication),  Share information and knowledge with similar groups (external communities),  Command and control,  Make research and development,  Recruit new members,  Generate international support,  Gather intelligence,  Make information warfare on behalf of the nations. Terrorist groups radicalize people through: Example- ISIS and AQIS
  • 11. Threat to financial Institution  Unencrypted Data  New Hacker Opportunities  Foreign-Sponsored Attacks  Insecure Third-Party Services  Changed or Manipulated Data  Malware Attacks  Threat to stock exchange
  • 12. Threat to Transportation  Metros and Sub ways  Civil aviation  Sea movement
  • 13. Threat to Military Capacity  Cyber Space as a new battlefield  Threat to weapon system  Adversaries are well aware of cyber warfare new doctrine  Terrorists developing cyber capabilities  Military communications & critical infrastructure are vulnerable and prone to an over-reliance on existing civilian networks
  • 14. Threat to Governance  Telecommunications  Energy networks & safety systems  Transportation- air safety & border security  Defense & security: data networks and communications  Banking & financial services  Government services: E-Government
  • 15. Why we need cooperation in the aspect of cyber security  Ensuring free flow of information  Responding to increasingly serious risks  Enhancing risk-based approach  Acting in partnership based on social responsibilities
  • 16. Areas of cooperation: 1. Implementation of dynamic responses to cyber incidents. 2. Enhancing multi-layered mechanism for information sharing. 3. Appropriate response to cybercrime 4. Establishing framework of cooperation for international security in cyberspace. 5. Building up “fundamentals” for dynamic responses.
  • 17. Contd… 1. Support for building a global framework for cyber hygiene. 2. Promotion of awareness-raising activities. 3. Enhanced research and development through international cooperation. 4. International rulemaking for cyber security. 5. Formulation of international standards of technology. 6. International rulemaking.
  • 18. Military Cooperation  Cooperation in latest skill of information attacks.  Defensive and offensive cyber attacks.  Sharing knowledge on cyber warfare.  Example of NATO
  • 19. Turkish–Arab cooperation in Cyber Security  Cooperation in Cyber Law mechanism  Cooperation in Cyber Infrastructure  Cooperation in Cyber Intelligence  Cooperation in making Cyber Taskforce  Cooperation to do research  OIC should develop cyber sell to provide help to the member states.
  • 20. Thank you Bangladesh Institute of Peace and Security Studies (BIPSS)