Model United Nations 2005-2006 - Switzerland – Cyber Terrorism.

Slides:



Advertisements
Similar presentations
UNODC & the Global Response to Cybercrime
Advertisements

ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
MEDIA LAW Copenhagen University Session 9 Dirk VOORHOOF Ghent University (->contact)
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Connection of Piracy and Export and import control International preview Experience of Armenia.
THE OECD’S GLOBAL RELATIONS PROGRAMME IN TAXATION
PSC 357 AMERICAN FOREIGN POLICY SURVEY RESULT: ECONOMIC INSTRUMENTS SPRING, 2014.
Economic Policy Fixed Exchange Rates. Daniels and VanHooseEconomic Policy2 Annual Growth of Per Capital Real GDP Canada France
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
INTERVICT International Victimology Institute Tilburg Legal developments in the field of violence against women in Western Europe Renée Römkens UNODC-UNDAW.
A Politics of Vulnerability Reporting Black Hat Briefings, Europe 2001 Scott Blake Director of Security Strategy BindView Corporation/RAZOR Research.
The Nonproliferation Treaty. Atoms for Peace December 8, 1953 President Eisenhower spoke to the UN suggesting that peaceful uses of the atom be promoted.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Conference for LGBT families in Europe Overview of the work of the Council of Europe in the field of family law Sabrina Cajoly - Council of Europe Directorate.
Barriers to outward mobility and how to overcome them Kevin Van-Cauter Higher Education Adviser British Council, Manchester.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Policies and Tech VAW 15 August 2015 Mary Kiio.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
ADAPTING INFRASTRUCTURE TO CLIMATE CHANGE: A CASE FOR TECHNOLOGY TRANSFER UNFCCC Tobago. June Ian Burton (with Heather Auld and Don MacIver)
What is Arbora? An international group, established in 1989, of owner-managed companies specialising in: C areer development O utplacement services E.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Workshop Positions Data Collection /Assessment Thursday, June 2 nd How Can We Make “International Strategy for Cyberspace” Acceptable?
Cooperation against terrorism, corruption and organised crime C o u n c i l o f E u r o p e 1 Denis Bribosia (Counter-terrorism Task Force)
Eclipse Foundation, Inc. Eclipse Developer Demographic Profile Information Source Company: Genuitec LLC Product : MyEclispe Enterprise Workbench - 160,000.
Doctors Without Borders. Who are they? ● independent international medical humanitarian organization ● deliver emergency aid to people affected by - Armed.
Company LOGO Cluster Development in ICT sector in the Baltic’s (LATVIA) BALTIC IT&T FORUM 2007 Janis Bergs IS Cluster, Chairman of Board
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Sumbited by: Dina Mitkees LIBYA AND EUROPE : ECONOMIC REALISM AT THE RESCUE OF THE QADDAFI AUTHORITARIAN REGIME.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Systems of Government. Anarchy No Government Can occur after a civil war when a government is destroyed and rival groups fight for power Believe government.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Introduction to the OECD. 4 key questions Who are we? What do we do? How do we do it? What happens next?
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
1 CALIN-RADU ANCUTA Export Controls Department - ANCEX MINISTRY OF FOREIGN AFFAIRS ROMANIA Romania Nuclear Power Sector Reverse Trade Mission (RTM) USA,
Caritas of Archdiocese of Prague Migration Centre Joint Staff Training Event Meeting in Prague 23 th – 27 th 2015.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
USD billion
1 Belfast, Horst Forster European Commission Belfast,
Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Cyber Security and Georgia. New Challenges
with the global Rotary family
Monitoring and Detecting Online Hate Speech
Seminar On Cyber Crime Submitted To: Submitted By:
The Most Visited Countries
Snapshot of Global PV Markets
Forensic and Investigative Accounting
Chapter 21:Security Beyond Computer Networks: Information Assurance
AVI AFRIQUE October 2018 Tshepo Peege
Spain your partner in Europe
Forensic and Investigative Accounting
Cybercrime legislation and policies in Africa: Issues for discussion
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
International Environment and Commitments in Regulating Export Control
Deborah Housen-Couriel, ADV.
2006 Rank Adjusted for Purchasing Power
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Model United Nations Switzerland – Cyber Terrorism

Cyber Terrorism the politically motivated attack against information, computer systems, programs, and data which result in violence.

Dangerous computerization national defense the stock market or an economy

What should nations do? latest technology international collaboration battle for harmonization

What have Swiss government done? The Council of Europe meeting Enacted legislations The Wassenaar Arrangement International information exchange Support experts and partner organizations

The Council of Europe meeting an international convention on cyber terrorism Cybercrime Convention cooperation with United States, Canada and Japan. pursue a common policy

Enacted legislations setting up a special bureau Article 143bis Criminal Code : unauthorized access of computers. create a programme with intent to damage or destroy any computer system or software or data Sections 3 (1), 7 (1) Swiss Criminal Code : pornography and hate speech

The Wassenaar Arrangement cryptography compulsory decryption of information export Controls for Conventional Arms and Dual-Use Goods and Technologies Australia, France, Germany, Switzerland, UK, USA

International information exchange fighting cyber crimes CIS (Commonwealth of Independent States) countries, Europe and the USA.

Q & A section

Reference ecpe/intsec/wrkshp/cybsec.ContentPar.0059.UpF ile.tmp/agenda_yymmdd_ _l.pdfhttp:// ecpe/intsec/wrkshp/cybsec.ContentPar.0059.UpF ile.tmp/agenda_yymmdd_ _l.pdf ecpe/intsec.htmlhttp:// ecpe/intsec.html n_ct.htmhttp:// n_ct.htm

That’s the end of our presentation. Thank you for your attention! By Alicia Lam Kristen Mo