Cyber Security Strategy and Cyber Cooperation of Russian Federation

Size: px
Start display at page:

Download "Cyber Security Strategy and Cyber Cooperation of Russian Federation"

Transcription

1 , pp Cyber Security Strategy and Cyber Cooperation of Russian Federation Daeun Sung Dasan Building r.202a, Bakebeom-ro 35, Mapo-gu Seoul, Republic of Korea Abstract. In today s world, cyber security has become an important international agenda. As the information age has arrived, the need of cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and the East, composed of China and Russia, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn t yet to reach an agreement on cyber security. In other words, the difference between both sides on the strategies and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the Russia s cyber diplomacy policy. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US led international community have met with their boundaries, and when the legitimacy of them have been challenged. Keywords: Cyber Security, Cyber Security Strategy, Cyber Security of Russian Federation, Cyber Coopertion 1 Introduction The allegation that the Kremlin might have intervened the US presidential election through cyber-attack in 2016 shows the competition among nations is not only physically confined to geography, but it is now spread on to the cyber-field, being carried out elaborately. Thus, it is fair to claim that the national cyber-strategy could yield meaningful results in reality, and accordingly, cyber security has become one of the pillars of national security. For the appearance of cyber security, the subject of security-threat and its spectrum have expanded; and the value of information have risen; and the information is introduced as a new standard for measuring national power. As the worth of ISSN: ASTL Copyright 2018 SERSC

2 information valued more, the threats and attacks on the cyber space accordingly have increased. Hence, the claims have been made to fortify the deterrence ability on cyber space. But for the traditional deterrence model is not applicable, international cooperation is furthermore needed on cyber space. Though, it is not easy to yield the cyber cooperation in international society because each nation has its own standards of perception, strategy, ability, and norm on cyber security. Russia is the classic rival of the US in cyber security. At this point, Russia forges counter-axis with China against Western powers, led by the US, under the protectionist standpoint that it requires national power on internet and web space. But on the other hand, it differentiates with China in that it does not control the cyber space thoroughly. In short, the Russian cyber security policy seems rather undervalued in that its national interest toward both the sovereignty and international cooperation in cyber space is considered to be the rational stance to achieve the institutionalization of the international cyber norms. 2 Russia s Cyber Security 2.1 Information Security and Cyber Security Russia uses both information security and cyber security as a definition of cyber security. 1 Looking into the official documents of Russian cyber policy, it shows that the word cyber security is adopted rather recently. Generally speaking, information security is used as a comprehensive term, so that it covers cyber security as its subordinate part. Russia s official documents states that the term cyber security cannot be separated from the domain of information security. Despite these facts, the reason behind the adoption of the term cyber security is that thorough national control and regulation on cyber space is almost impossible, and that Russia seeks conformity in naming with those of other nations. Thus, the adoption and usage of cyber security means that Russia has full intention to construct the international norms and cooperation on cyber space(concept of Russia s Cyber Security Strategy 2014). 2.2 Cyber Security Perspective and Strategy One of the most remarking traits of Russian cyber security is that it claims national sovereignty on cyber or information space. So, the cyber sovereignty, the nation involving in information space, is the fundamental notion of Russian cyber security. This sovereignty rules over the Russia cyber security strategy: nation-centric regulation and control. This interventionist strategy becomes controversial in building international norms on cyber security. 1 Computer security is often used as rather narrower term of it. Copyright 2018 SERSC 81

3 In order to understand Russian s perspective and strategy on information and cyber security, it is necessary to look into the national official documents. Those documents include Information Security Doctrine of the Russian Federation(2016); Concept of Russia s Cyber Security Strategy(2014); Basic Principles for State Policy of the Russian Federation in the Field of International Information Security(2013), and many others. Information Security Doctrine of the Russian Federation 2 defines and introduces key terms that used in Russian information security. And among them is the assurance of information security, which shows the intention of Russian government to lead the field of assuring cyber security. The method of the assurance introduces legal, institutional, technological, and other methods term, which is very comprehensive, and it also suggests the clear standard on the subject of the assurance of information security, which is a national institution or public officials and regional governments with the power to determine the legislation of Russian Federation on information security. Russian government tries to hold the power of regulation and protection in cyber security. For this reason, Russia is not free from the criticisms of Western powers like the US. that it is an excessive control on cyber space. However, the fact that guarantee of freedom and constitutional rights of citizens to information is stipulated as the first principle of Russian cyber security strategy raises hopes that Russia would not indiscreetly and imprudently abuse the sovereignty on cyber space to the level of total control, but at most to the level of censorship. 2.3 Cyber Security Coorporation In cyber security, Russia maintains cooperative relationship with China through the process like Russo-Sino Cyber Security agreement(2015.5) and Shanghai Cooperation Organisation(SCO), while it has intermittently cooperative but basically competitive relationship with the US. Russia has kept insisting to found the international cyber norms through international societal cooperation. Because perspectives between Russia and the Western powers on creating international cyber norms contrast much. And in that bottom of the cognitive difference is the notion of cyber space and cyber sovereignty. Table 1. Views on cyber space Category The US & the UK Russia, China, etc On cyber space Anarchical space Sovereign space On regulation Private-centered (No necessary for the governmental involvement) Nation-centered (Necessary for the governmental involvement) Copyright 2018 SERSC

4 Internet governance model The participation of multi stakeholders (Multi-stakeholder Model) The participation of Nations (New norms, International organizations, etc) source: Sangbae Kim et al. 2017: 33 The difference between the West and Russia on wielding sovereign power on cyber space stems from the dissimilar perceptions on cyber threats. Russia defines the cyber threats under the broader term as information security threats. Russia separates the information security threats between the external and internal ones before to list the whole threats. This is where the US and Russia s views on cyber threats diverge. The threats that the US terms as external cyber threats generally accepted as such in Russia. However, adding internally oriented cyber threats to the information security threats means that Russia is more sensitive to cyber threats, and it is seriously concerned the influence that cyber threats would bring to domestic politics. 3 This gap between the two makes it even harder to create unified international cyber norms. 3 Conclusion At this point, Russia forges counter-axis with China against Western powers, led by the US, under the protectionist standpoint that it requires national power on internet and web space. Russian government tries to hold the power of regulation and protection in cyber security. For this reason, Russia is not free from the criticisms of Western powers like the US. that it is an excessive control on cyber space. However, the fact that guarantee of freedom and constitutional rights of citizens to information is stipulated as the first principle of Russian cyber security strategy raises hopes that Russia would not indiscreetly and imprudently abuse the sovereignty on cyber space to the level of total control, but at most to the level of censorship. Russia s cyber security that does not overtly control the cyber space, but still does claim national sovereignty over it and stress international cooperation could be the cross bridge between disparate Chinese and American cyber security strategies and stances. Thus, the Russian cyber security policy is the rational compromise proposal for current institutionalization of international cyber norms, and it needs to be reviewed without criticisms that deem Russian policy as simple controls or statistics or censorship. 3 Russian information security s internal threats are following: 1) illegal activities of generation, transmission, and use of information under political and economic structures, 2) illegal actions of state structures, apparatus, leading to violation of legitimate rights of citizens and organizations in the information sphere, 3) violations of regulations on collection, processing, and transmission of information, 4) intended actions of information system units and unintended malfunction and errors, 5) the failures of hardware and software of information and communication system(concept of Russia s Cyber Security Strategy 2014). Copyright 2018 SERSC 83

5 References 1. Doctrine of Information Security of the Russian Federation (2016), 2. Concept of Russia s Cyber Security Strategy (2014), 3. Beomsik Shin: Russia s Strategy on the Cyber Security. The Korean Association of Clavic Studies, Slave newspaper 32(1), , pp (2017) 4. Fischer, Eric A.: Cybersecurity Issues and Challenges: In Brief. CRS Report No. R (2016) 84 Copyright 2018 SERSC

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Japan s Cyber Diplomacy

Japan s Cyber Diplomacy Japan s Cyber Diplomacy As the importance of cyberspace is increasing, cyber threats are rapidly growing. The Ministry of Foreign Affairs (MOFA) needs to lead international discussions on how to ensure

More information

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

DETERMINANTS OF SOUTH AFRICA S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA

DETERMINANTS OF SOUTH AFRICA S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA DETERMINANTS OF SOUTH AFRICA S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA 9 MAY, 2009: SOUTH AFRICA Jacob Zuma is inaugurated as the new president of South Africa 1 APRIL,

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 The Cybersecurity Act of 2012, S. 3414, has not been the subject of a legislative hearing and has skipped regular order. HSGAC has not marked

More information

IMPORTANT GLOBAL CYBERLAW TRENDS 2017

IMPORTANT GLOBAL CYBERLAW TRENDS 2017 IMPORTANT GLOBAL CYBERLAW TRENDS 2017 BY PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA PRESIDENT, CYBERLAWS.NET HEAD, PAVAN DUGGAL ASSOCIATES, ADVOCATES The year 2017 promises to be a year of tremendous

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

Pakistan-India SCO Membership: Challenges & Opportunities

Pakistan-India SCO Membership: Challenges & Opportunities INSTITUTE OF STRATEGIC STUDIES web: www.issi.org.pk phone: +92-920-4423, 24 fax: +92-920-4658 Issue Brief (Views expressed in the brief are those of the author, and do not represent those of ISSI) Pakistan-India

More information

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative

More information

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified - 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February

More information

Economy Report [CHINA] 24 rd APLMF Meeting Siem Reap, Cambodia. BeiJing, China. Report developed/approved by Position

Economy Report [CHINA] 24 rd APLMF Meeting Siem Reap, Cambodia. BeiJing, China. Report developed/approved by Position 24 rd APLMF Meeting Siem Reap, Cambodia Economy Report - 2017 [CHINA] Report developed/approved by Position Organisation Contact details Xie.Jun BeiJing, China Department of Metrology, AQSIQ No.9 Madian

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

Stakeholder Participation Guidance

Stakeholder Participation Guidance Climate, Community & Biodiversity Alliance, Verra Stakeholder Participation Guidance Guidance to support stakeholder participation in design, implementation and assessment of policies and actions May 2018

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036 US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

DIGITAL GENEVA CONVENTION IN TIMES OF CYBER (IN)SECURITY? Panelová debata: Monitorování internetu. Máme se bát o své soukromí? DO WE NEED A "DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY? Microsoft Internet Advertising Conference 2017 2 Internet Advertising

More information

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your

More information

Radio Research and Development Institute (NIIR) Moscow, Russian Federation

Radio Research and Development Institute (NIIR) Moscow, Russian Federation Radio Research and Development Institute (NIIR) Moscow, Russian Federation Proposals to ITU CWG-Internet open consultations on "Public Policy considerations for OTTs" September, 2017 In accordance with

More information

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration Statement Comments by the electrical industry on the EU Cybersecurity Act manufacturer s declaration industrial security Cybersecurity Quality basis security LED-Modul Statement P January 2018 German Electrical

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

LAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION»

LAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION» April 27\ 99 Draft LAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION» This Law shall establish legal basis of certification of products, quality systems and production, (further processes), works and

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), General appreciation of the issues of information security The

More information

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Risk Management Theory Application in national information security risk control Analysis of the relationship

More information

Cybersecurity eit. Software. Certification. Industrial Security Embedded System

Cybersecurity eit. Software. Certification. Industrial Security Embedded System Statement Benefits and limitations of certifications and labels in the context of cyber security Arguments for a balance between customer information and industrial suitability Industrial Security Embedded

More information

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service The Readlyn Telephone Company, dba RTC Communications (the Company) Acceptable Use Policy

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

CYBERSECURITY LEGISLATION IT OUT!

CYBERSECURITY LEGISLATION IT OUT! ATTEMPTS TO PASS US U.S. CYBERSECURITY LEGISLATION YOU NEED A SCORECARD TO FIGURE YOU NEED A SCORECARD TO FIGURE IT OUT! Professor Pauline C. Reich Waseda University School of Law cyberasia2@gmail.com

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

10007/16 MP/mj 1 DG D 2B

10007/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual. Sandra Braman

Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual. Sandra Braman Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual Sandra Braman The Argument Points of disagreement among the international group of experts responsible for the Tallinn

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India 'Cybersecurity' Threat or Opportunity Saikat Datta Policy Director Centre for Internet & Society, India 2nd China-India Think Tank Forum Beijing, 24-25 June 2017 'Themes' Voices from the 2 nd China-India

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Cyber Security Roadmap

Cyber Security Roadmap Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different

More information

Information Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship

Information Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship Information Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship Jon R. Lindsay University of California Institute on Global Conflict and Cooperation jrlindsay@ucsd.edu Jiakun

More information

European Directives and reglements for Information security

European Directives and reglements for Information security Е а а И ац а *** European Directives and reglements for Information security Krassi BOGDANOVA LISO for the Secretariat-General, the Cabinets of Commissioners and the European Political Strategy Centre,

More information

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

Delegations will find in an Annex a non-paper of the Presidency.

Delegations will find in an Annex a non-paper of the Presidency. Council of the European Union Brussels, 9 February 2016 (OR. en) 5797/16 CYBER 9 RELEX 78 JAIEX 12 TELECOM 12 COPS 35 NOTE From: To: Subject: Presidency Delegations Non-paper: Developing a joint EU diplomatic

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 University of Michigan Deep Blue deepblue.lib.umich.edu 2010-08 SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 Blumenthal, Don Blumenthal, D. (2010,

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation I. Introduction At the 2+2 U.S.-Japan Security Consultative Committee (SCC) meeting in Tokyo on October 3, 2013,

More information

Strategy for information security in Sweden

Strategy for information security in Sweden Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information

More information

IGF 2019 CALL FOR ISSUES SNAPSHOT RAW SUBMISSIONS AS RECEIVED

IGF 2019 CALL FOR ISSUES SNAPSHOT RAW SUBMISSIONS AS RECEIVED IGF 2019 CALL FOR ISSUES SNAPSHOT RAW SUBMISSIONS AS RECEIVED 350 submissions in response to call Categories/Baskets in descending order: Cybersecurity, Trust & Privacy [67] Evolution of Internet Governance

More information

CYBER SECURITY RECOMMENDATIONS FOR THE NEXT ADMINISTRATION

CYBER SECURITY RECOMMENDATIONS FOR THE NEXT ADMINISTRATION Statement before the House Committee on Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology CYBER SECURITY RECOMMENDATIONS FOR THE NEXT ADMINISTRATION A Statement

More information

International Cooperation in Cybercrime Investigations

International Cooperation in Cybercrime Investigations International Cooperation in Cybercrime Investigations Joel Schwarz Computer Crime & Intellectual Property Section Criminal Division, US Department of Justice Joel.schwarz@usdoj.gov Criminal Investigations

More information

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the

More information

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European

More information

Comparison of WiBro and TD-LTE through the Social Network Analysis

Comparison of WiBro and TD-LTE through the Social Network Analysis ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? Comparison of WiBro and TD-LTE through the Social Network Analysis Dong-hyu Kim Yonsei University, Republic of Korea hugh1225@gmail.com

More information

Re: McAfee s comments in response to NIST s Solicitation for Comments on Draft 2 of Cybersecurity Framework Version 1.1

Re: McAfee s comments in response to NIST s Solicitation for Comments on Draft 2 of Cybersecurity Framework Version 1.1 January 19, 2018 VIA EMAIL: cyberframework@nist.gov Edwin Games National Institute of Standards and Technology 100 Bureau Drive, Mail Stop 8930 Gaithersburg, MD 20899 Re: McAfee s comments in response

More information

Protecting Critical Information Infrastructure in times of increasing cyber conflict

Protecting Critical Information Infrastructure in times of increasing cyber conflict Protecting Critical Information Infrastructure in times of increasing cyber conflict Jan Neutze Director of Cybersecurity Policy (Europe/Middle East/Africa) Microsoft Critical Infrastructures are under

More information

Where s My Data? Managing the Data Residency Challenge

Where s My Data? Managing the Data Residency Challenge Where s My Data? Managing the Data Residency Challenge Claude Baudoin & Geoff Rayner 27 February 2018 2/26/2018 Copyright 2018 OMG. All rights reserved. 1 Speakers Tracie Berardi Director of Program Management,

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

The Global Cybercrime Industry

The Global Cybercrime Industry Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and

More information

Mozilla position paper on the legislative proposal for an EU Cybersecurity Act

Mozilla position paper on the legislative proposal for an EU Cybersecurity Act Mozilla position paper on the legislative proposal for an EU Cybersecurity Act Enhancing cybersecurity through government vulnerability disclosure I. INTRODUCTION This paper provides an overview of Mozilla

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Control System Security for Social Infrastructure

Control System Security for Social Infrastructure 277 Hitachi Review Vol. 63 (201), No. 5 Featured Articles Control System Security for Social Infrastructure Toshihiko Nakano, Ph.D. Katsuhito Shimizu Tsutomu Yamada Tadashi Kaji, Dr. Info. OVERVIEW: The

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER

More information

E-Signature Law of Iraq no. ( 78) of 2012

E-Signature Law of Iraq no. ( 78) of 2012 INTER-REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Muscat, Oman, 11-12 December 2017 E-Signature Law of Iraq no. ( 78) of 2012 Halah Alrubaye Projects follow-up manager, Ministry

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

The commission communication "towards a general policy on the fight against cyber crime"

The commission communication towards a general policy on the fight against cyber crime MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition

More information

OAS Cybersecurity Capacity Building Efforts

OAS Cybersecurity Capacity Building Efforts OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of

More information

Data Protection and Cybercrime Challenges

Data Protection and Cybercrime Challenges Data Protection and Cybercrime Challenges (Preliminary Presentation) Sigrid Arzt Commissioner IFAI, Mexico Octopus Conference 6-8 June 2012 Strasbourg, France DATA PROTECTION IN MEXICO: A BRIEF OVERVIEW.

More information

Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011

Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011 Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011 Issue Benefits of the Internet & Cloud Computing Aspen Institute IDEA (9/12/11 draft) An unfettered flow of

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Issues of Designing Energy System Integration in Northeast Asia

Issues of Designing Energy System Integration in Northeast Asia Issues of Designing Energy System Integration in Northeast Asia Sang Yul Shim Korea Energy Economics Institute March 16, 2004 Topics of Presentation Background to energy system integration: vision, potential,

More information

AMM and legal implications for the electricity market

AMM and legal implications for the electricity market AMM and legal implications for the electricity market Václav Stupka Institute of Law and Technology, Faculty of Law, Masaryk University, Brno, Czech Repulic vaclav.stupka@law.muni.cz Abstract. This paper

More information

A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System

A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System , pp.197-202 http://dx.doi.org/10.14257/astl.2014.51.45 A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System Young-Kwan Choi 1,1, In-Soo Kim 1, Sung-Taek

More information

Review of the Canadian Anti-Spam Legislation

Review of the Canadian Anti-Spam Legislation Review of the Canadian Anti-Spam Legislation Rogers Communications Brief October 17, 2017 1 Rogers Communications Deborah Evans 350 Bloor Street East Toronto, Ontario M4W 0A1 RCI.Regulatory@rci.rogers.com

More information

Cybersecurity. Topic Background

Cybersecurity. Topic Background Cybersecurity Topic Background The growth of the Internet has allowed nations, organizations, and people to connect in ways previously unimagined. This new interconnectivity has allowed for collaboration,

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a

More information

NATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations)

NATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations) NATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations) Boris Jevrić Agency for Electronic Communications and Postal Services

More information

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES

SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES 10TH UNITED NATIONS WORKSHOP ON SPACE LAW September 5-8, 2016 SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES Deborah Housen-Couriel Interdisciplinary Cyber Research Center, Tel Aviv University

More information

Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia. Bernie Trudel Chairman, Asia Cloud Computing Association

Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia. Bernie Trudel Chairman, Asia Cloud Computing Association Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia Bernie Trudel Chairman, Asia Cloud Computing Association 1 Data, Regulation, Jurisdiction and Cloud: A New Geography Lesson Cloud Data

More information

Regulating for a Digital Economy

Regulating for a Digital Economy Regulating for a Digital Economy Discussant s Remarks by Ambassador Asoke Kumar Mukerji, former Permanent Representative of India to the United Nations At Brookings India, New Delhi 20 April 2018 3 Issues

More information

The Global Voice of the Lighting Industry

The Global Voice of the Lighting Industry The Global Voice of the Lighting Industry Jan Denneman President Global Lighting Association Vice-President Philips Lighting President European Lamp Company federation (since 2001) President Global Lighting

More information

DRAFT MEMORANDUM OF UNDERSTANDING ON COOPERATION BETWEEN UNESCO AND THE SECRETARIAT OF THE SHANGHAI COOPERATION ORGANIZATION ( ) SUMMARY

DRAFT MEMORANDUM OF UNDERSTANDING ON COOPERATION BETWEEN UNESCO AND THE SECRETARIAT OF THE SHANGHAI COOPERATION ORGANIZATION ( ) SUMMARY Executive Board Two hundred and fourth session 204 EX/24 PARIS, 9 March 2018 Original: English Item 24 of the provisional agenda DRAFT MEMORANDUM OF UNDERSTANDING ON COOPERATION BETWEEN UNESCO AND THE

More information