Академический Документы
Профессиональный Документы
Культура Документы
Combating CyberCrime
Mohamed Shihab
Growing Cybersecurity
Threats
ICTs have become an integral part of information society.
5
Source : Symantec.
http://uk.norton.com/content/en/uk/home_homeoffice/html/cybercrimereport/
Cybercrime
No limits
The number of cyber threats are growing
A combination of the tools can be a powerful weapon
Cost of War
Cost of a stealth bomber? $737 Million to $1.1 billion
$1 to $2 million
$300 to $50,000
Cost of using cyber space as a weapon?
Cyberia
A Case Study
FACT FILE
Country : Cyberia
Terrain : Island, with beautiful beaches
Density : 3,064/km2
Ethnic Groups : Cyberians
Official Language : Binary, JAVA and C
------------------------------------------------------------------
???
Harbour
Harbour
Server
Down
Down
Internet
Internet
Congested
Congested
DdO
S
Air
Air traffic
traffic
controller not
responding
responding
We cannot
contain
the attack
Statu
s
Where is the
actual attacker?
All attacks
from
overseas
We do not
have
diplomatic
ties
Stock market is
crashing... Its
havoc outside
Panic Starts.......
10
48hrs later.......
11
Living Examples
Estonia
Wave 3: Banks
Wave 2: Servers
Wave 1: Government
Education
Government
SPAM
Wave 2 ctd..
SPAM
Cyber Vandalism
Wave 4: ISP
Media
Banks
Wave
3 ctd..
12
Living Examples
Georgia
13
WE HAVE
PROBLEMS
Lack of Knowledge
Management Challenges
No emergency telephone
numbers
I wonder if it is possible to
have more intelligence
on this situation
14
Cybercrime vs Conventional
Crime
Click icon to add picture
Crime Comparison
Conventional
Cyber
16
17
18
IMPACT
20
21
22
144 Countrie
Building
ITU-IMPACT
A combined effort to tackle growing cybercrime
Working Together
Academia
Research
UNODC
Government
25
26
27
Industry Experts
International
Organisations
Academia
Expertise
Technology
Skills
Resources
Think Tanks
Experience
Cybersecurity services/expertise
193 Countries
UN Agencies
28
4 Pillars of IMPACT
Electronically
Secure
Collaborative
Application
Platform for Experts (ESCAPE)
Key experts and personnel from
partner countries (law
enforcement, regulators, country
focal, cybersecurity experts, etc)
Facilitate & coordinate with
partner countries during cyber
attack
30
31
Afghanistan
Lao P.D.R
Completed in November 2011
Cambodia, Myanmar, Vietnam (Assessment for CMV national
9
Completed in October and November 2011
CIRTs)
10 Armenia
Completed in November 2011
11 South America and Arab region
2012
32
CIRT Deployment
33
Cybersecurity Assessment
ITU-IMPACT conducted cybersecurity assessment for Afghanistan : October 2009
Cybersecurity Assessment
ITU-IMPACT conducted cybersecurity assessment for East Africa (Kenya, Tanzania,
Uganda and Zambia) : 26th 29th April 2010
Cybersecurity Assessment
ITU-IMPACT conducted cybersecurity assessment for West Africa (Burkina Faso,
Cte d'Ivoire, Ghana, Nigeria, Mali and Senegal) : 17th 21st May 2010
36
Cybersecurity Assessment
ITU-IMPACT conducted cybersecurity assessment for Bhutan & Bangladesh : 1st
11th June 2010
37
Cybersecurity Assessment
ITU-IMPACT conducted cybersecurity assessment for Nepal & Maldives: 14th 25th
June 2010
38
Cybersecurity Workshop
/Assessment
39
40
41
42
43
44
46
47
IMPACTs Partners
International
Organisations
Industry
Alliance
Academia
(200+)
48
Areas of Co-operation
Public/Private Partnership
49
Thank you
www.facebook.com/impactalliance
IMPACT
Jalan IMPACT
63000 Cyberjaya
Malaysia