2. Contents
Legal & policy issues of cyber security
Technical Issues
ORF Research Topics for Cyber Space
3. Legal & policy issues of cyber security
Data Protection & Privacy
Cyber Peace
International Law
Cyber Infrastructure should be declared as National Asset
4. Technical Issues
Digital currency
1. Currency itself is created, traded, and controlled by Bitcoin users, rather than by a central
authority like a bank or a government
2. The world's first-ever Bitcoin ATM opened in Vancouver, Canada in 2013
3. Most major retailers don’t accept bitcoin yet
4. Bitcoin transactions are irreversible
5. NO body knows who really created bitcoin
6. Provide greater anonymity for transactions
7. Many virtual currency systems can be accessed globally to make payments and transfer funds
across borders.
5. TOR Browser
1. They are used for fraud and trafficking in people, drugs, money laundering and other illicit
goods.
2. Europol finds several instances of digital currency use on child sexual exploitation dark net
sites (CAM)
9. Internet of Things
This could include, for instance, setting up repositories on how to collect, cross-reference and analyze
data recovered from a range of devices in compliance with relevant privacy and data protection
frameworks and rules.
Industries involved in making the IoE a reality need to be encouraged to consider security as part of
the design process
A recent 2014 HP Security Research study determined 70% of these smart IoT connected devices are
vulnerable to attack.
January 2012 a hacker exploited the lack of security controls in the devices and sent livestream
images to multiple Internet sites showing the images and sounds of people and their activities from
the rooms where they were used
10. Cloud Computing & Services
As the public and private sectors continue to outsource data, applications, platforms and entire
infrastructures to Cloud providers, the Cloud itself will become a critical infrastructure
11. Big Data
Given the potential value and multi-purpose use of this data, we can expect to see more
targeted attacks on data brokers, either to steal and sell the data, for ransom purposes, for
political reasons or to actually use Big Data analytics to support more sophisticated attacks.
For instance for smart homes this could be ‘load signatures’ that describe the power
consumption of electrical devices that are unique to the appliance – this information can be
used to determine when residents are not at home and provide insights into their daily behavior
and even illegal activities
12. ORF Research Topics for Cyber Space
1. Is it feasible and desirable to protect Internet users’ privacy by enforcing
barriers to cross-border data flows?
2. Which form of governance is most appropriate for regulating Internet content
(e.g. national-level regulation of ISPs; voluntary, end-user based initiatives;
international treaties; transnational private sector-led initiatives; hybrid forms of
governance; or any other forms of governance)?
13. 3. Do current Internet governance arrangements empower the United States at
the expense of developing countries, emerging BRICS and the EU?
4. Is it possible to respond to cyber-attacks or to regulate cyber weapons
effectively through existing international legal regimes and institutional
frameworks?
14. 5. Do users of the major social media platforms have adequate protection for
users’ rights of privacy and free expression?