Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Cyber Security Cooperation
1. Cyber Security Cooperation
Cyber Army Competitions
Sanjida Yeasmin
Research Assistant
Bangladesh Institute of Peace and Security Studies
(BIPSS)
2. 2
Framing the Issue: A Comprehensive Approach to Cyber
Security
Cyber security requires shared solutions to shared
threats.
Cyber security is a dynamic, not static process.
Cyber threats know no borders.
3. Cyber crime includes:
Including illegal access (unauthorized access), illegal interception (by technical
means of non-public transmissions of computer data to, from or within a computer
system), data interference (unauthorized damaging, deletion, deterioration,
alteration or suppression of computer data), systems interference (interfering with
the functioning of a computer system by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer data), misuse of devices,
forgery (ID theft), and electronic fraud.
4. Categories of Cyber Crime: it can be divided basically in the
following three categories.
Cyber-crimes committed against persons include various
crimes like transmission of child-pornography, harassment of
any one with the use of a computer such as e-mail.
The second category of Cyber-crimes is that of Cyber-crimes
against all forms of property. These crimes include computer
vandalism, transmission of harmful programmes.
The third category of Cyber-crimes relate to Cyber-crimes
against Government.
5.
6. Areas of Threat
Cyber Terrorism
Cyber Radicalization
Threat to Financial Infrastructure
Threat to Governance
Threat to Military Capacity
7. Cyber Terrorism
To qualify as cyber terrorism, an attack should result in violence
against persons or property, or at least cause enough harm to
generate fear.
There are various reasons why cyber attacks are an attractive
choice for terrorists such as:
They can target and affect large numbers of people with less
resources.
It enables terrorists to remain unknown.
8. Contd…
Mostly, attacks are easy to carry out.
There is no physical barriers or check points that they
have to cross.
The speed and form of attacks are not dependent on the
connection speed of the attacker.
A combination of both physical terrorism and cyber
terrorism is thought to be the most effective use of cyber
terrorism.
9. 9
The Concept of Cyber Radicalisation
Groups and Individuals
Become Radicalised
through internet
Advocating for Violence
against the Dominant
Will of the Society through internet
ByProductofRadicalisation
Extremism, Militancy and Terrorism
10. Formulate plans,
Raise and launder funds,
Spread propaganda,
Communicate securely with the members (internal
communication),
Share information and knowledge with similar groups
(external communities),
Command and control,
Make research and development,
Recruit new members,
Generate international support,
Gather intelligence,
Make information warfare on behalf of the nations.
Terrorist groups radicalize people through: Example-
ISIS and AQIS
11. Threat to financial Institution
Unencrypted Data
New Hacker Opportunities
Foreign-Sponsored Attacks
Insecure Third-Party Services
Changed or Manipulated Data
Malware Attacks
Threat to stock exchange
13. Threat to Military Capacity
Cyber Space as a new battlefield
Threat to weapon system
Adversaries are well aware of cyber warfare new
doctrine
Terrorists developing cyber capabilities
Military communications & critical infrastructure
are vulnerable and prone to an over-reliance on
existing civilian networks
14. Threat to Governance
Telecommunications
Energy networks & safety systems
Transportation- air safety & border security
Defense & security: data networks and communications
Banking & financial services
Government services: E-Government
15. Why we need cooperation in the aspect of
cyber security
Ensuring free flow of information
Responding to increasingly serious risks
Enhancing risk-based approach
Acting in partnership based on social responsibilities
16. Areas of cooperation:
1. Implementation of dynamic responses to cyber incidents.
2. Enhancing multi-layered mechanism for information
sharing.
3. Appropriate response to cybercrime
4. Establishing framework of cooperation for international
security in cyberspace.
5. Building up “fundamentals” for dynamic responses.
17. Contd…
1. Support for building a global framework for cyber hygiene.
2. Promotion of awareness-raising activities.
3. Enhanced research and development through
international cooperation.
4. International rulemaking for cyber security.
5. Formulation of international standards of technology.
6. International rulemaking.
18. Military Cooperation
Cooperation in latest skill of information attacks.
Defensive and offensive cyber attacks.
Sharing knowledge on cyber warfare.
Example of NATO
19. Turkish–Arab cooperation in Cyber Security
Cooperation in Cyber Law mechanism
Cooperation in Cyber Infrastructure
Cooperation in Cyber Intelligence
Cooperation in making Cyber Taskforce
Cooperation to do research
OIC should develop cyber sell to provide help to the
member states.