Africa, on the Road to Athens, Cairo 18-21 september 2006 SPAM in Africa: Problems and Solutions? Adel GAALOUL, Président Directeur Général Agence Tunisienne.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
1 Seoul-Melbourne Multilateral MOU on Cooperation in Countering Spam 19 November 2004 Lim, Jae-Myung Spam Response Team Korea Information Security Agency.
Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
The need for global approach to child online protection Dr. Mona Al-achkar Jabbour Pan Arab Observatory for cyber security October.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Spam and E-Security Bruce Matthews Manager, Anti-Spam Team International Training Program 11 September 2006.
Spam / Phishing Björn Bittins Sebastian Kühnau FHTW-Berlin.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
© LogicaCMG All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Luxembourg 12 September Public consultation 12 September 2003 Horst Forster Director, INFSO/E European Commission Safer Internet plus
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Vantage Report 3.0 Product Sales Guide
Malaysia’s strategy to combat SPAM Anti-SPAM Strategies: The Way Forward for the ASEAN Telecommunications Regulators Council (ATRC) Toh Swee Hoe Malaysian.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Module 6 Planning and Deploying Messaging Security.
1 OECD anti-spam initiatives Anti-SPAM Strategies – The Way Forward for the ASEAN Telecommunications Regulators’ Council (ATRC) 3-4 May 2005, Cyberjaya,
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2009 Wipro Ltd - Confidential 1 Security Challenges and Opportunities -Indian ISP Scenario.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
ISC Anti-Spam Activities and Progress Li Hong Internet Society of China.
Network abuse BOF APNIC 14 Kitakyushu, Japan 5 September 2002.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Cybercrime What is it, what does it cost, & how is it regulated?
Spam. Is spam a problem? Bandwidth hogging -> slower, costlier Discourages use of net ( , e-commerce) Productivity -> loss of time and money Receiver.
APEC ANTI-SPAM INITIATIVES Tom Dale Department of Communications, IT & the Arts Australia.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Handling Spam In Government Administration – The Singapore Approach Presented to ICA Annual Conference 2004 Presented by Wu Choy Peng (Ms) 20 October 2004.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
UNECE International Forum on Trade Facilitation
Countering Spam in a Digital World
The Tampere Convention: its importance, and challenges to its ratification and implementation Using ICT for Effective Disaster Management Egypt, Alexandria.
The Challenge of Spam Spam is a harmful, costly, and evolving threat to Internet users. A collaborative approach is needed to provide the best spam-mitigation.
ITU an Overview Combined International SNO and 8th African SNO
E-Commerce for Developing Countries (EC-DC)
Promoting Global Cybersecurity
Richard Hill Partner, Hill & Associates
Presentation transcript:

Africa, on the Road to Athens, Cairo september 2006 SPAM in Africa: Problems and Solutions? Adel GAALOUL, Président Directeur Général Agence Tunisienne d’Internet

Summary 1. What is SPAM ? 2. The Spam’s problem 3. The Tunis Agenda and Spam 4. An Approach to Fight Spam

3 1. What is SPAM? - Definition: The sending, often massive, of electronic messages not solicited - Communications : , Mobile SMS, MMS, Video… - Carried content: Commercial - Offensive and harmful content - Security (Mail Bombing, Viruses, Phishing, Scams, ID Theft…) - A new ecosystem: Low cost entry, high profit, anonymity, not well organised

4 2. The SPAM problem The spam is reaching worrying proportions of traffic

5 2. The Spam problem SPAM source SPAM source (2004)

6 2. The Spam problem Less protected and more vulnerable Narrow bandwidth available Productivity reduction Loss of messages (use of inefficient filtering tools) Reception of fraudulent contents and security risks E-marketing and e-news companies are blacklisted Innovation is killed Impact: African costumer suffers more from Spam

7 2. The Spam problem Operation cost inflation: - filtering software - bandwidth waste - more server / storage capacity Security problems: servers attacks, organization Adequate resources: Need more specialized technicians Quality of service degradation: Blacklisting of gateways Unsatisfied costumers Challenges for African ISPs

8 3. The Tunis Agenda and Spam We call upon all stakeholders, to adopt a multi- pronged approach to counter spam that includes, inter alia, consumer and business education; appropriate legislation, law enforcement authorities and tools; the continued development of technical and self regulatory measures; best practices; and international cooperation. Paragraph 41, Tunis Agenda

9 Anti-SPAM Action Plan Global cooperation Awareness capacity building Trust / confidence Regulation Technical actions 4. Fighting spam, a multi-dimensional approach D CAB

10 A. Regulation system ITU study on anti-spam law covering 58 countries (2005)

11 A. An efficient regulation framework - Anti-spam law Coordination, regulation and arbitration authority Implementation mechanisms Simple mechanisms for complaint deposit and reporting, Online reporting forms Enacting a law that balance between regulation and promotion of electronic messaging, and fights spam - Complementary actions

12 A. An efficient regulation framework - Explicit agreement (opt-in): Messages cannot be sent without the preliminary agreement of the recipients (Australia, Belgium, Germany, UK, Italy, France, Switzerland…) - Assumption of acceptance until refusal (opt-out): Sending of messages to people who do not oppose to it (Switzerland, Japan, Korea, USA…) Two approaches of the legislation

13 A. An efficient regulation framework Explicit un-subscription must be included Prohibition to falsify or hides origin and heading informations Use of special labels to add in the subject for commercial, adult messages (for example ADV…) Define legitimate mass mailing conditions (newsletter…) Content of legislation  Messages constraints:

14 A. An efficient regulation framework Sending, ordering, authorizing or gaining through spam activity Sale, purchase and use of software for electronic addresses collection Dictionary attacks and personal data automatically generated lists Illegal access in order to send messages Sending spam containing malware, misleading or fraudulent contents, scams, fishing, and other frauds… Content of legislation  Prohibition and sanction :

15 B. Technical actions Optimise messaging gateways configuration Checking of compliance with SMTP protocol RFC 2821… Restrictions on address, host name and IP address Protection against -bombing and limitation of s flow ( per unit of time, recipients per unit of time, errors…) Protection against dictionary attacks Protection of customers infrastructure against attacks and relaying Infrastructure optimisation and Security

16 B. Technical actions Implementation of International Blacklists (RBL, RHBL) and Setting up National Blacklists Setting up white lists for mass mailing users and an authentication SMTP gateways Installation of anti-spam and antivirus filters at ISP level Distribution of anti-spam tools for end user (possibly open source) Setting up tools and methods for spam reporting and collaboration Staff for managing spam incidents Spam management system

17 C. Awareness and capacity building Inform and develop understanding of spam, fishing problem, Open relays … Integrating security modules in children education curriculum for positive use of ICT Capacity building programs (specialist, business, teacher education …) Disseminate information via Website: Anti-spam toolkits, training materials… Reinforce awareness and capacity building

18 D. Global cooperation Define charters: messaging services use, commercial mailing services and direct marketers Set up cooperation between ISPs and other stakeholders: anti- spam platforms, experience sharing (blacklisting, white listing, tools…), best practices… Develop join capacity building program Set up reaction and emergency plans Procedure of data and statistic collection Establishing Anti-spam Taskforce:

19 D. Global cooperation Many existing frameworks: APEC Anti-Spam Strategy, London Action Plan OECD tool kit, ITU activities Coordinate international cooperation nationally Need of anti-spam African cooperation (Anti-spam Network) Reinforce International cooperation

20 THANK YOU MERCI شكرا