SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
Internet Society © 1992–2016
and Internet Governance
Cybersecurity
Date 12 Feb 2018
Presentation title – Client name
Abdulrahman M. Abotaleb
Vice President
ISOC-Yemen
www.isoc.ye
a.abotaleb@isoc.ye
2
3
Cybersecurity is the collection of:
[Tools + policies + concepts + actions + best
practices + strategies]
required to protect the cyber environment, and is important to:
[individual users + organizations + communities
+ companies + states]
4
Forms of Cyber Threats.
Malware.
- Viruses
- Worms
- Trojan horses
- Keyloggers and spyware
- Backdoor rootkitsages
- Adware and cookies
- Etc.
5
DoS attacks.
DNS security.
- DNS spoofing
- DNS poisoning (chaining)
Copyrighted content
Child pornography
Surveillance.
Censorship.
Bugs. OpenSSL Heartbleed bug 2014
6
[Cybercrime]
is a criminal activity that requires the use of
computers or networks.
Cybercrime.
• The annual cost of cybercrime to the global economy could
have reached a maximum of USD 575 billion.
• Lack of global standards of cybercrime forms = those
threats may or may not be considered cybercrime
depending on the laws that are applied.
7
Cybercrime [Case Studies].
8
• In 2014, Suicide cases that were reportedly caused by cyber bullying in the
USA=17, Canada=18 and Sweden=19. Harassment, cyber-bullying increase
the risk of suicide amongst children by up to nine times.
• In 2014, Almost 200 private pictures of celebrities were leaked and
disseminated on social media after they were allegedly obtained via a security
breach of Apple's cloud services suite iCloud.
Cybercrime [Case Studies, MENA].
• In 2013, Carbanak is cybercrime process developed by a multinational gang
of cybercriminals with the objective of stealing money rather than data. [2~4
months, 30 countries including Morocco, US$1 billion loss in total].
• In 2012, United Arab Emirates’ Rakbank, and Oman’s Bank of Muscat lost
US$ 45 million through another global cybercrime attack employing fraudulent
ATM withdrawals during a 10-hour attack.
• In 2013, Lebanese banking computer network systems were also found to be
infected by a Gauss virus designed to capture data.
9
10
[Cyberterrorism]
Unlawful attacks and threats of attack against
computers, networks, and the information stored
therein when done to intimidate or coerce a
government or its people in furtherance of political
or social objectives.
Cyberterrorism [Case Studies].
11
France 2013
Passing an anti-terror law allows authorities in France to punish
inciters of terrorism on the Internet with a five-year prison
sentence and a fine up to €45 000 EUR.
Egypt 2015
ISIS has utilized the Internet by publishing videos of beheading
hostages on social media to gain publicity and outreach.
12
[Cyberwarfare]
The use of computer technology to disrupt the
activities of a state or organization, especially the
deliberate attacking of information systems for
strategic or military purposes.
.
Cyberwarfare.
13
• Traditional wars have expanded to include acts of cyber warfare
using cyber arms.
• It relies heavily on software programmers, hackers, and network
experts.
• Major difference between a traditional and cyber war is the scale
and outreach.
• It can easily turn global rather than remaining between two states.
Cyberwarfare[Case Studies].
14
• USA and the Israeli army targeting the Iranian nuclear centers by
STUXNET warm.
• Russia was the source of DoS attacks against Estonia in April 2007.
• Syrian Electronic Army (SEA) has engaged in attacks against anti-
government websites.
• KSA warns on cyber defense as Shamoon resurfaces in 2017.
• A hacker group (GOP) from North Korea leaked a release of
confidential data from the film studio Sony Pictures in 2014.
Computer Emergency Response Teams
CERTs
A team consists of trained and certified experts that are able to
conduct cyber forensics, quickly identify the source of an attack,
and mitigate as much risk as possible, particularly to data and other
valuable resources.
15
Functions of CERTs.
16
- Responding to cyber incidents by gathering, analyzing, and
disseminating relevant information, as well as taking any
emergency measures.
- Assessing risk levels and forecasting possible cyber security
threats. This proactive approach is usually the main task of a
computer security incident prevention team (CSIP) team.
- Capacity building and networking. This task involves
developing guidelines, best practice manuals and curricula to
be used for training and awareness purposes.
CERT/CIRT Constituency could be:
17
q An army
q National Security
q A Police
q Universities
q Banks
q Heath System
q ISP
q Telcos
q Grids Power
q Ministry of Finance
q Software Companies
q Etc.
CERTs around the world.
18
• First CERT was established at Carnegie Mellon University in 1988
in response to the Morris worm incident.
• Over 250 CERTs have been established around the world.
• All the MENA national CERTs are run by organizations that are
affiliated to governments or are directly run by governments.
Egypt, Oman, UAE, Sudan, Qatar, Tunis, Algeria, Morocco, KSA.
Legislations and policies on cybersecurity
19
Legislations & Policies.
20
• 2001, European Convention on Cybercrime (CoC).
• 2011, Commonwealth Cybercrime Initiative was launched.
• 2007, ITU established a Global Cybersecurity Agenda as a
framework for international cooperation to enhance security on the
Internet.
Laws & Legislations [in MENA].
21
• 2006, Yemen established Electronic Transaction Protection Law.
• 2006, UAE established Law on Prevention of Information Technology
Crimes and the Law on Electronic Commerce and Transaction.
• 2007, KSA enforced the Anti Cyber-Crime Law as well as the
Electronic Transaction Protection Law.
• 2007, Sudan issued E-crime Law along with the Informatics Offense.
• Algeria had issued Law 09-04 for preventing and fighting cyber
crimes.
Policies & Strategies [in MENA].
22
• CERTs: Providing support in response to computer, network, and
related cybersecurity incidents.
• CSIRTs: Establishment specializing in the financial and other
sectors became a priority.
• ITU: Arab Regional Development Forum is taking the lead in
organizing different programs.
• ESCWA: leading activities to provide a basis for the harmonization
of legal and regulatory frameworks for cyberlaw model directives
for the region.
CYBERWELLNESS Profile of Yemen.
23
24
25
26
27
28
U.S. Dominance in the INTERNET.
29
30
Root Servers (DNS Zone) Submarine International Network
Big Companies, not users, own the data.
31
Edward Snowden Leaks
32
The Hunter Leaks: Network-Shaping-101
33
34
Visit us at
www.internetsociety.org
Follow us
@internetsociety
Galerie Jean-Malbuisson 15,
CH-1204 Geneva,
Switzerland.
+41 22 807 1444
1775 Wiehle Avenue,
Suite 201, Reston, VA
20190-5108 USA.
+1 703 439 2120
Thank you.
35
Abdulrahman M. Abotaleb
Vice President
ISOC-Yemen
www.isoc.ye
a.abotaleb@isoc.ye

Contenu connexe

Tendances

Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 

Tendances (20)

Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security
Cyber securityCyber security
Cyber security
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 

Similaire à cybersecurity- A.Abutaleb

Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfFiyona Nourin
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimesMichalis Mavis, MSc, MSc
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Complianceijtsrd
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 

Similaire à cybersecurity- A.Abutaleb (20)

CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 

Plus de Fahmi Albaheth

تحديات أمن تكنولوجيا المعلومات - خالد القائفي
تحديات أمن تكنولوجيا المعلومات - خالد القائفيتحديات أمن تكنولوجيا المعلومات - خالد القائفي
تحديات أمن تكنولوجيا المعلومات - خالد القائفيFahmi Albaheth
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaFahmi Albaheth
 
توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018
توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018
توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018Fahmi Albaheth
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Social engineering - Fadi Al-aswadi
Social engineering - Fadi Al-aswadiSocial engineering - Fadi Al-aswadi
Social engineering - Fadi Al-aswadiFahmi Albaheth
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb GhallabFahmi Albaheth
 
حوكمة الإنترنت - عمر الحياني
حوكمة الإنترنت - عمر الحيانيحوكمة الإنترنت - عمر الحياني
حوكمة الإنترنت - عمر الحيانيFahmi Albaheth
 
مقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالب
مقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالبمقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالب
مقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالبFahmi Albaheth
 
نحو تدشين المنتدى اليمني لحوكمة الإنترنت
نحو تدشين المنتدى اليمني لحوكمة الإنترنتنحو تدشين المنتدى اليمني لحوكمة الإنترنت
نحو تدشين المنتدى اليمني لحوكمة الإنترنتFahmi Albaheth
 
اعرف حقوقك على الإنترنت
اعرف حقوقك على الإنترنتاعرف حقوقك على الإنترنت
اعرف حقوقك على الإنترنتFahmi Albaheth
 
الإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمن
الإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمنالإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمن
الإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمنFahmi Albaheth
 
التدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربي
التدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربيالتدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربي
التدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربيFahmi Albaheth
 

Plus de Fahmi Albaheth (12)

تحديات أمن تكنولوجيا المعلومات - خالد القائفي
تحديات أمن تكنولوجيا المعلومات - خالد القائفيتحديات أمن تكنولوجيا المعلومات - خالد القائفي
تحديات أمن تكنولوجيا المعلومات - خالد القائفي
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
 
توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018
توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018
توصيات ورشة أمن تكنولوجيا المعلومات 12 فبراير 2018
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Social engineering - Fadi Al-aswadi
Social engineering - Fadi Al-aswadiSocial engineering - Fadi Al-aswadi
Social engineering - Fadi Al-aswadi
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
حوكمة الإنترنت - عمر الحياني
حوكمة الإنترنت - عمر الحيانيحوكمة الإنترنت - عمر الحياني
حوكمة الإنترنت - عمر الحياني
 
مقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالب
مقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالبمقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالب
مقدمة حول جمعية الإنترنت اليمن - عبدالرحمن أبوطالب
 
نحو تدشين المنتدى اليمني لحوكمة الإنترنت
نحو تدشين المنتدى اليمني لحوكمة الإنترنتنحو تدشين المنتدى اليمني لحوكمة الإنترنت
نحو تدشين المنتدى اليمني لحوكمة الإنترنت
 
اعرف حقوقك على الإنترنت
اعرف حقوقك على الإنترنتاعرف حقوقك على الإنترنت
اعرف حقوقك على الإنترنت
 
الإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمن
الإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمنالإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمن
الإنترنت كوسيلة للإستثمار وريادة الأعمال- مؤتمر فرص شبابية - اليمن
 
التدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربي
التدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربيالتدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربي
التدوين وأثره في إثراء المحتوى العربي - أيام الإنترنت العربي
 

Dernier

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

cybersecurity- A.Abutaleb

  • 1. Internet Society © 1992–2016 and Internet Governance Cybersecurity Date 12 Feb 2018 Presentation title – Client name Abdulrahman M. Abotaleb Vice President ISOC-Yemen www.isoc.ye a.abotaleb@isoc.ye
  • 2. 2
  • 3. 3 Cybersecurity is the collection of: [Tools + policies + concepts + actions + best practices + strategies] required to protect the cyber environment, and is important to: [individual users + organizations + communities + companies + states]
  • 4. 4
  • 5. Forms of Cyber Threats. Malware. - Viruses - Worms - Trojan horses - Keyloggers and spyware - Backdoor rootkitsages - Adware and cookies - Etc. 5 DoS attacks. DNS security. - DNS spoofing - DNS poisoning (chaining) Copyrighted content Child pornography Surveillance. Censorship. Bugs. OpenSSL Heartbleed bug 2014
  • 6. 6 [Cybercrime] is a criminal activity that requires the use of computers or networks.
  • 7. Cybercrime. • The annual cost of cybercrime to the global economy could have reached a maximum of USD 575 billion. • Lack of global standards of cybercrime forms = those threats may or may not be considered cybercrime depending on the laws that are applied. 7
  • 8. Cybercrime [Case Studies]. 8 • In 2014, Suicide cases that were reportedly caused by cyber bullying in the USA=17, Canada=18 and Sweden=19. Harassment, cyber-bullying increase the risk of suicide amongst children by up to nine times. • In 2014, Almost 200 private pictures of celebrities were leaked and disseminated on social media after they were allegedly obtained via a security breach of Apple's cloud services suite iCloud.
  • 9. Cybercrime [Case Studies, MENA]. • In 2013, Carbanak is cybercrime process developed by a multinational gang of cybercriminals with the objective of stealing money rather than data. [2~4 months, 30 countries including Morocco, US$1 billion loss in total]. • In 2012, United Arab Emirates’ Rakbank, and Oman’s Bank of Muscat lost US$ 45 million through another global cybercrime attack employing fraudulent ATM withdrawals during a 10-hour attack. • In 2013, Lebanese banking computer network systems were also found to be infected by a Gauss virus designed to capture data. 9
  • 10. 10 [Cyberterrorism] Unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 11. Cyberterrorism [Case Studies]. 11 France 2013 Passing an anti-terror law allows authorities in France to punish inciters of terrorism on the Internet with a five-year prison sentence and a fine up to €45 000 EUR. Egypt 2015 ISIS has utilized the Internet by publishing videos of beheading hostages on social media to gain publicity and outreach.
  • 12. 12 [Cyberwarfare] The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. .
  • 13. Cyberwarfare. 13 • Traditional wars have expanded to include acts of cyber warfare using cyber arms. • It relies heavily on software programmers, hackers, and network experts. • Major difference between a traditional and cyber war is the scale and outreach. • It can easily turn global rather than remaining between two states.
  • 14. Cyberwarfare[Case Studies]. 14 • USA and the Israeli army targeting the Iranian nuclear centers by STUXNET warm. • Russia was the source of DoS attacks against Estonia in April 2007. • Syrian Electronic Army (SEA) has engaged in attacks against anti- government websites. • KSA warns on cyber defense as Shamoon resurfaces in 2017. • A hacker group (GOP) from North Korea leaked a release of confidential data from the film studio Sony Pictures in 2014.
  • 15. Computer Emergency Response Teams CERTs A team consists of trained and certified experts that are able to conduct cyber forensics, quickly identify the source of an attack, and mitigate as much risk as possible, particularly to data and other valuable resources. 15
  • 16. Functions of CERTs. 16 - Responding to cyber incidents by gathering, analyzing, and disseminating relevant information, as well as taking any emergency measures. - Assessing risk levels and forecasting possible cyber security threats. This proactive approach is usually the main task of a computer security incident prevention team (CSIP) team. - Capacity building and networking. This task involves developing guidelines, best practice manuals and curricula to be used for training and awareness purposes.
  • 17. CERT/CIRT Constituency could be: 17 q An army q National Security q A Police q Universities q Banks q Heath System q ISP q Telcos q Grids Power q Ministry of Finance q Software Companies q Etc.
  • 18. CERTs around the world. 18 • First CERT was established at Carnegie Mellon University in 1988 in response to the Morris worm incident. • Over 250 CERTs have been established around the world. • All the MENA national CERTs are run by organizations that are affiliated to governments or are directly run by governments. Egypt, Oman, UAE, Sudan, Qatar, Tunis, Algeria, Morocco, KSA.
  • 19. Legislations and policies on cybersecurity 19
  • 20. Legislations & Policies. 20 • 2001, European Convention on Cybercrime (CoC). • 2011, Commonwealth Cybercrime Initiative was launched. • 2007, ITU established a Global Cybersecurity Agenda as a framework for international cooperation to enhance security on the Internet.
  • 21. Laws & Legislations [in MENA]. 21 • 2006, Yemen established Electronic Transaction Protection Law. • 2006, UAE established Law on Prevention of Information Technology Crimes and the Law on Electronic Commerce and Transaction. • 2007, KSA enforced the Anti Cyber-Crime Law as well as the Electronic Transaction Protection Law. • 2007, Sudan issued E-crime Law along with the Informatics Offense. • Algeria had issued Law 09-04 for preventing and fighting cyber crimes.
  • 22. Policies & Strategies [in MENA]. 22 • CERTs: Providing support in response to computer, network, and related cybersecurity incidents. • CSIRTs: Establishment specializing in the financial and other sectors became a priority. • ITU: Arab Regional Development Forum is taking the lead in organizing different programs. • ESCWA: leading activities to provide a basis for the harmonization of legal and regulatory frameworks for cyberlaw model directives for the region.
  • 24. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. U.S. Dominance in the INTERNET. 29
  • 30. 30 Root Servers (DNS Zone) Submarine International Network
  • 31. Big Companies, not users, own the data. 31
  • 33. The Hunter Leaks: Network-Shaping-101 33
  • 34. 34
  • 35. Visit us at www.internetsociety.org Follow us @internetsociety Galerie Jean-Malbuisson 15, CH-1204 Geneva, Switzerland. +41 22 807 1444 1775 Wiehle Avenue, Suite 201, Reston, VA 20190-5108 USA. +1 703 439 2120 Thank you. 35 Abdulrahman M. Abotaleb Vice President ISOC-Yemen www.isoc.ye a.abotaleb@isoc.ye