Presentation is loading. Please wait.

Presentation is loading. Please wait.

Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.

Similar presentations


Presentation on theme: "Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard."— Presentation transcript:

1 Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard Giragosian Armenian Center for National and International Studies (ACNIS) Yerevan, Armenia 8-9 December 2010

2 2 Outline Framing the issue: cyber security Framing the issue: cyber security Significance of cyber securitySignificance of cyber security Fundamentals of cyber securityFundamentals of cyber security Cyber crime Cyber crime Implications for Armenia Implications for Armenia Social/politicalSocial/political EconomicEconomic Military/securityMilitary/security Critical infrastructure Critical infrastructure Cyber challenges & cyber security goals Cyber challenges & cyber security goals Conclusions Conclusions

3 3 Framing the Issue: A Comprehensive Approach to Cyber Security Cyber security requires shared solutions to shared threats Cyber security requires shared solutions to shared threats Cyber security is a dynamic, not static process Cyber security is a dynamic, not static process Cyber threats know no borders Cyber threats know no borders

4 4 Significance of Cyber Security Cyber Security provides three elements: Engagement: foundation for economic, social and political developmentEngagement: foundation for economic, social and political development Empowerment: platform for activism and social networking for “netizens”Empowerment: platform for activism and social networking for “netizens” Entrepreneurship: incentive for technological innovation and R&DEntrepreneurship: incentive for technological innovation and R&D Cyber Security is also necessary for the development of a knowledge-based economy

5 5 Fundamentals of Cyber Security Cyber threat preparation: raising awareness and public education of prudent and safe use of Internet Cyber threat perception: understanding the nature of cyber threats Cyber Threat prevention: defending against cyber threats before, not after cyber attacks Cyber Threat prevention: defending against cyber threats before, not after cyber attacks

6 6 Cyber Crime Cyber Crime is the use or targeting of a computer network (and the Internet) for criminal enterprise or offense Cyber Crime is the use or targeting of a computer network (and the Internet) for criminal enterprise or offense Cyber Crime is not new, and is constantly changing as criminals use advances in technology to commit new, more sophisticated crimes Cyber Crime is not new, and is constantly changing as criminals use advances in technology to commit new, more sophisticated crimes Information is the only commodity that can be stolen without being taken

7 7 Cyber Crime Today Serious cyber criminals: more organized, more global, more sophisticated Serious methods: Cyber Criminals can strike ANYONE, ANYWHERE, ANYTIME Law enforcement needs more tools, training & resources, but there is also a need for greater public awareness and for education and training of specialists Law enforcement needs more tools, training & resources, but there is also a need for greater public awareness and for education and training of specialists

8 8 Cyber Crime & Cyber Security Cyber Crime is directly linked to cyber security; Cyber Crime is directly linked to cyber security; Cyber security is directly linked to national security Cyber security is directly linked to national security The cyber threat is a dynamic and growing threat to security and spans many types of crimes (terrorist financing, money laundering, identity theft, etc.) The cyber threat is a dynamic and growing threat to security and spans many types of crimes (terrorist financing, money laundering, identity theft, etc.)

9 9 Cyber Crime as a Global Threat Cyber crime is rooted in globalization & the expansion of the networked Internet Cyber crime is rooted in globalization & the expansion of the networked Internet Cyber crime has no borders or boundaries, and can attack many countries at once Cyber crime has no borders or boundaries, and can attack many countries at once Cyber crime has no limits: it can target anyone, anywhere, anytime Cyber crime has no limits: it can target anyone, anywhere, anytime

10 10 The Center of Gravity: The Computer a computer can be the target of crime, attacked to damage or steal information from a computer or computer network a computer can be the target of crime, attacked to damage or steal information from a computer or computer network a computer can be a technique to commit crime, used for fraud or theft a computer can be a technique to commit crime, used for fraud or theft a computer can be a tool to fight crime, by analyzing evidence (a “forensic footprint”) a computer can be a tool to fight crime, by analyzing evidence (a “forensic footprint”)

11 11 The New Cyber Threat The Internet is a critical, global infrastructure for economic, political and military power The Internet is a critical, global infrastructure for economic, political and military power Cyber technology creates new dependencies & interdependencies Cyber technology creates new dependencies & interdependencies Cyber technologies redefined security: physical attacks have cyber consequences and cyber attacks have physical consequences Cyber technologies redefined security: physical attacks have cyber consequences and cyber attacks have physical consequences

12 12 Implications for Armenia Social/Political: credibility, efficacy & legitimacy of government efforts Social/Political: credibility, efficacy & legitimacy of government efforts Economic: consumer confidence & trust, investment climate Economic: consumer confidence & trust, investment climate Military/Security: cyber war & cyberspace as the new battlefield; protecting critical infrastructure Military/Security: cyber war & cyberspace as the new battlefield; protecting critical infrastructure

13 13 Social/Political Implications Credibility & efficacy: combating cyber crime also bolsters state anti-corruption efforts Credibility & efficacy: combating cyber crime also bolsters state anti-corruption efforts Legitimacy & trust: failure to confront cyber crime leads to a loss of confidence and erosion of trust in government Legitimacy & trust: failure to confront cyber crime leads to a loss of confidence and erosion of trust in government Global responsibility: fighting cyber crime is an essential global obligation Global responsibility: fighting cyber crime is an essential global obligation

14 14 Economic Implications for Armenia Without adequate cyber security, several economic trends emerge: consumer confidence & trust erodes consumer confidence & trust erodes business reputations and the national business environment declines business reputations and the national business environment declines foreign investment is reduced foreign investment is reduced global economic integration is hindered global economic integration is hindered economic development is impeded economic development is impeded

15 15 Military Implications for Armenia Cyber Space as a new battlefield Adversaries are well aware of cyber warfare; new doctrine Adversaries are well aware of cyber warfare; new doctrine Terrorists developing cyber capabilities Terrorists developing cyber capabilities Military communications & critical infrastructure are vulnerable; Military communications & critical infrastructure are vulnerable; and prone to an over-reliance on existing civilian networks

16 16 Critical Infrastructure Telecommunications Telecommunications Banking & financial services Banking & financial services Government services: E-Government Government services: E-Government Energy networks & safety systems Energy networks & safety systems Transportation- air safety & border security Transportation- air safety & border security Defense & security: data networks and communications Defense & security: data networks and communications

17 17 Cyber Challenges To see cyber security being as important as physical security To see cyber security being as important as physical security Recognition of the real threat environment Recognition of the real threat environment Understand that the threat is as diversified as the targets Understand that the threat is as diversified as the targets The threat will change as rapidly as technology The threat will change as rapidly as technology

18 18 Cyber Security Goals Need to raise public awareness of cyber security & safe, prudent use of Internet Need to raise public awareness of cyber security & safe, prudent use of Internet Assess new cyber trends, threats & vulnerabilities Assess new cyber trends, threats & vulnerabilities Incorporate lessons learned & international best practices Incorporate lessons learned & international best practices Develop counter measures & safeguards Develop counter measures & safeguards Adopt and pursue comprehensive approach to cyber security Adopt and pursue comprehensive approach to cyber security

19 19 Conclusion Cyber threats are real & growing Cyber threats are real & growing New technologies forge new vulnerabilities New vulnerabilities foster new threats As the nature of national security has changed, the response must also adapt As the nature of national security has changed, the response must also adapt And the most important pipelines in this region transport neither oil nor gas…..they carry data, the most significant pipelines are fiber optic And the most important pipelines in this region transport neither oil nor gas…..they carry data, the most significant pipelines are fiber optic


Download ppt "Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard."

Similar presentations


Ads by Google