Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.

Slides:



Advertisements
Similar presentations
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Cyberterrorism. Critical Infrastructure Vulnerability.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Unit 4 – Impact of the use of IT on Business Systems.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Financial Innovation Shahid Yusuf DRG World Bank September 22, 2006.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
CHAPTER 10 Technology Issues.
Unethical use of Computers and Networks
CYBER CRIME.
Information Warfare Playgrounds to Battlegrounds.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Jeopardy: Digital Citizenship Please use presentation mode!
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
CJ 499 Unit 9. International Crime and What is it ?
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Information Warfare Playgrounds to Battlegrounds.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
A threat to global security and economy Koushik Mannepalli CMPE 294.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Hamid Jahankhani Chapter 21 - Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the.
Security Mindset Lesson Introduction Why is cyber security important?
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Cyberwar Becomes a Reality
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Securing Information Systems
Five Unethical Uses of Computers
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Assessing Deterrence Options for Cyberweapons
Internet Vulnerabilities & Criminal Activity
Deborah Housen-Couriel, ADV.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cy·ber (sīb ə r) adjective of, relating to, or characteristic of the culture of computers, information technology, and virtual reality this formal definition is often unhelpful when cyber is used in conjunction with other terms because it does not provide context

context for cyber activities MEANS FINANCIAL ability to finance actions TECHNOLOGICAL ability to digitally mediate actions INTELLECTUAL ability to plan and act (talent) MOTIVE POLITICAL AIM BUSINESS AIM FINANCIAL GAIN NOTORIETY… OPPORTUNITY ACCESS TO INTERNET the digital mediation playing field

closer look at… means technology and talent for cyber activities must be financed – these are cost centers for legitimate or criminal enterprises commercial, NGO, or government financing is largely pay for digital goods, bounties, or open source (and sweat equity) criminal financing encompasses use of stolen or exploited goods and bartering for digital goods – credit cards, botnets, software – in an underground economy activism uses open source; hacktivism may use criminal means

a closer look at… opportunity the Internet is an open access, common technology infrastructure its power derives from adaptability these characteristics serve all actors, according to their aim

a closer look at… motive political aim: everything from controlling, oppressing, or inciting citizenry to opposition against suppression of rights or free speech commercial aim: from corporate espionage to tracking/profiling consumers

cybersecurity body of practices and measures to protect networks, computers, and data from digitally- mediated attacks

cyberattack an “online” or digitally mediated attack against digital or physical world assets or infrastructures A T T A C K

cybercrime online activity that has been classified as a crime, or an online activity that is committed in violation of law

cyberwarfare Digitally mediated attacks on a nation state by a nation state

cyberterrorism Digitally mediated intimidation attack on a nation’s citizenry by civilians to personalize war

cyber surveillance Digitally mediated and covert information monitoring or collection NDTV Convergence Limited

cyberactivism “hacktivism” Digitally-mediated protest against commercial or non-commercial entities or a nation state a group or individual

cybervandalism Digitally-mediated destruction of, or damage to, commercial or non- commercial entities or a nation state a group or individual

activities are rarely “exclusively ciber” activities in cyberspace are not that unique from activities in the physical world the Internet is the shared playing field consider M M O – means, motive, opportunity – and you’ll find it easy to distinguish activities

questions?