Cyber Security Strategy and Cyber Cooperation of Russian Federation
|
|
- Gervais Norris
- 5 years ago
- Views:
Transcription
1 , pp Cyber Security Strategy and Cyber Cooperation of Russian Federation Daeun Sung Dasan Building r.202a, Bakebeom-ro 35, Mapo-gu Seoul, Republic of Korea Abstract. In today s world, cyber security has become an important international agenda. As the information age has arrived, the need of cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and the East, composed of China and Russia, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn t yet to reach an agreement on cyber security. In other words, the difference between both sides on the strategies and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the Russia s cyber diplomacy policy. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US led international community have met with their boundaries, and when the legitimacy of them have been challenged. Keywords: Cyber Security, Cyber Security Strategy, Cyber Security of Russian Federation, Cyber Coopertion 1 Introduction The allegation that the Kremlin might have intervened the US presidential election through cyber-attack in 2016 shows the competition among nations is not only physically confined to geography, but it is now spread on to the cyber-field, being carried out elaborately. Thus, it is fair to claim that the national cyber-strategy could yield meaningful results in reality, and accordingly, cyber security has become one of the pillars of national security. For the appearance of cyber security, the subject of security-threat and its spectrum have expanded; and the value of information have risen; and the information is introduced as a new standard for measuring national power. As the worth of ISSN: ASTL Copyright 2018 SERSC
2 information valued more, the threats and attacks on the cyber space accordingly have increased. Hence, the claims have been made to fortify the deterrence ability on cyber space. But for the traditional deterrence model is not applicable, international cooperation is furthermore needed on cyber space. Though, it is not easy to yield the cyber cooperation in international society because each nation has its own standards of perception, strategy, ability, and norm on cyber security. Russia is the classic rival of the US in cyber security. At this point, Russia forges counter-axis with China against Western powers, led by the US, under the protectionist standpoint that it requires national power on internet and web space. But on the other hand, it differentiates with China in that it does not control the cyber space thoroughly. In short, the Russian cyber security policy seems rather undervalued in that its national interest toward both the sovereignty and international cooperation in cyber space is considered to be the rational stance to achieve the institutionalization of the international cyber norms. 2 Russia s Cyber Security 2.1 Information Security and Cyber Security Russia uses both information security and cyber security as a definition of cyber security. 1 Looking into the official documents of Russian cyber policy, it shows that the word cyber security is adopted rather recently. Generally speaking, information security is used as a comprehensive term, so that it covers cyber security as its subordinate part. Russia s official documents states that the term cyber security cannot be separated from the domain of information security. Despite these facts, the reason behind the adoption of the term cyber security is that thorough national control and regulation on cyber space is almost impossible, and that Russia seeks conformity in naming with those of other nations. Thus, the adoption and usage of cyber security means that Russia has full intention to construct the international norms and cooperation on cyber space(concept of Russia s Cyber Security Strategy 2014). 2.2 Cyber Security Perspective and Strategy One of the most remarking traits of Russian cyber security is that it claims national sovereignty on cyber or information space. So, the cyber sovereignty, the nation involving in information space, is the fundamental notion of Russian cyber security. This sovereignty rules over the Russia cyber security strategy: nation-centric regulation and control. This interventionist strategy becomes controversial in building international norms on cyber security. 1 Computer security is often used as rather narrower term of it. Copyright 2018 SERSC 81
3 In order to understand Russian s perspective and strategy on information and cyber security, it is necessary to look into the national official documents. Those documents include Information Security Doctrine of the Russian Federation(2016); Concept of Russia s Cyber Security Strategy(2014); Basic Principles for State Policy of the Russian Federation in the Field of International Information Security(2013), and many others. Information Security Doctrine of the Russian Federation 2 defines and introduces key terms that used in Russian information security. And among them is the assurance of information security, which shows the intention of Russian government to lead the field of assuring cyber security. The method of the assurance introduces legal, institutional, technological, and other methods term, which is very comprehensive, and it also suggests the clear standard on the subject of the assurance of information security, which is a national institution or public officials and regional governments with the power to determine the legislation of Russian Federation on information security. Russian government tries to hold the power of regulation and protection in cyber security. For this reason, Russia is not free from the criticisms of Western powers like the US. that it is an excessive control on cyber space. However, the fact that guarantee of freedom and constitutional rights of citizens to information is stipulated as the first principle of Russian cyber security strategy raises hopes that Russia would not indiscreetly and imprudently abuse the sovereignty on cyber space to the level of total control, but at most to the level of censorship. 2.3 Cyber Security Coorporation In cyber security, Russia maintains cooperative relationship with China through the process like Russo-Sino Cyber Security agreement(2015.5) and Shanghai Cooperation Organisation(SCO), while it has intermittently cooperative but basically competitive relationship with the US. Russia has kept insisting to found the international cyber norms through international societal cooperation. Because perspectives between Russia and the Western powers on creating international cyber norms contrast much. And in that bottom of the cognitive difference is the notion of cyber space and cyber sovereignty. Table 1. Views on cyber space Category The US & the UK Russia, China, etc On cyber space Anarchical space Sovereign space On regulation Private-centered (No necessary for the governmental involvement) Nation-centered (Necessary for the governmental involvement) Copyright 2018 SERSC
4 Internet governance model The participation of multi stakeholders (Multi-stakeholder Model) The participation of Nations (New norms, International organizations, etc) source: Sangbae Kim et al. 2017: 33 The difference between the West and Russia on wielding sovereign power on cyber space stems from the dissimilar perceptions on cyber threats. Russia defines the cyber threats under the broader term as information security threats. Russia separates the information security threats between the external and internal ones before to list the whole threats. This is where the US and Russia s views on cyber threats diverge. The threats that the US terms as external cyber threats generally accepted as such in Russia. However, adding internally oriented cyber threats to the information security threats means that Russia is more sensitive to cyber threats, and it is seriously concerned the influence that cyber threats would bring to domestic politics. 3 This gap between the two makes it even harder to create unified international cyber norms. 3 Conclusion At this point, Russia forges counter-axis with China against Western powers, led by the US, under the protectionist standpoint that it requires national power on internet and web space. Russian government tries to hold the power of regulation and protection in cyber security. For this reason, Russia is not free from the criticisms of Western powers like the US. that it is an excessive control on cyber space. However, the fact that guarantee of freedom and constitutional rights of citizens to information is stipulated as the first principle of Russian cyber security strategy raises hopes that Russia would not indiscreetly and imprudently abuse the sovereignty on cyber space to the level of total control, but at most to the level of censorship. Russia s cyber security that does not overtly control the cyber space, but still does claim national sovereignty over it and stress international cooperation could be the cross bridge between disparate Chinese and American cyber security strategies and stances. Thus, the Russian cyber security policy is the rational compromise proposal for current institutionalization of international cyber norms, and it needs to be reviewed without criticisms that deem Russian policy as simple controls or statistics or censorship. 3 Russian information security s internal threats are following: 1) illegal activities of generation, transmission, and use of information under political and economic structures, 2) illegal actions of state structures, apparatus, leading to violation of legitimate rights of citizens and organizations in the information sphere, 3) violations of regulations on collection, processing, and transmission of information, 4) intended actions of information system units and unintended malfunction and errors, 5) the failures of hardware and software of information and communication system(concept of Russia s Cyber Security Strategy 2014). Copyright 2018 SERSC 83
5 References 1. Doctrine of Information Security of the Russian Federation (2016), 2. Concept of Russia s Cyber Security Strategy (2014), 3. Beomsik Shin: Russia s Strategy on the Cyber Security. The Korean Association of Clavic Studies, Slave newspaper 32(1), , pp (2017) 4. Fischer, Eric A.: Cybersecurity Issues and Challenges: In Brief. CRS Report No. R (2016) 84 Copyright 2018 SERSC
The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationDraft Resolution for Committee Consideration and Recommendation
Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationJapan s Cyber Diplomacy
Japan s Cyber Diplomacy As the importance of cyberspace is increasing, cyber threats are rapidly growing. The Ministry of Foreign Affairs (MOFA) needs to lead international discussions on how to ensure
More informationProgram 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR
Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationDETERMINANTS OF SOUTH AFRICA S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA
DETERMINANTS OF SOUTH AFRICA S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA 9 MAY, 2009: SOUTH AFRICA Jacob Zuma is inaugurated as the new president of South Africa 1 APRIL,
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationMYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414
MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 The Cybersecurity Act of 2012, S. 3414, has not been the subject of a legislative hearing and has skipped regular order. HSGAC has not marked
More informationIMPORTANT GLOBAL CYBERLAW TRENDS 2017
IMPORTANT GLOBAL CYBERLAW TRENDS 2017 BY PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA PRESIDENT, CYBERLAWS.NET HEAD, PAVAN DUGGAL ASSOCIATES, ADVOCATES The year 2017 promises to be a year of tremendous
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationPakistan-India SCO Membership: Challenges & Opportunities
INSTITUTE OF STRATEGIC STUDIES web: www.issi.org.pk phone: +92-920-4423, 24 fax: +92-920-4658 Issue Brief (Views expressed in the brief are those of the author, and do not represent those of ISSI) Pakistan-India
More informationMs. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations
Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative
More informationState of Israel Prime Minister's Office National Cyber Bureau. Unclassified
- 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February
More informationEconomy Report [CHINA] 24 rd APLMF Meeting Siem Reap, Cambodia. BeiJing, China. Report developed/approved by Position
24 rd APLMF Meeting Siem Reap, Cambodia Economy Report - 2017 [CHINA] Report developed/approved by Position Organisation Contact details Xie.Jun BeiJing, China Department of Metrology, AQSIQ No.9 Madian
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationStakeholder Participation Guidance
Climate, Community & Biodiversity Alliance, Verra Stakeholder Participation Guidance Guidance to support stakeholder participation in design, implementation and assessment of policies and actions May 2018
More informationETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)
ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security
More informationUSA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036
US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More information"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?
Panelová debata: Monitorování internetu. Máme se bát o své soukromí? DO WE NEED A "DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY? Microsoft Internet Advertising Conference 2017 2 Internet Advertising
More information2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope
Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your
More informationRadio Research and Development Institute (NIIR) Moscow, Russian Federation
Radio Research and Development Institute (NIIR) Moscow, Russian Federation Proposals to ITU CWG-Internet open consultations on "Public Policy considerations for OTTs" September, 2017 In accordance with
More informationCybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration
Statement Comments by the electrical industry on the EU Cybersecurity Act manufacturer s declaration industrial security Cybersecurity Quality basis security LED-Modul Statement P January 2018 German Electrical
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationLAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION»
April 27\ 99 Draft LAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION» This Law shall establish legal basis of certification of products, quality systems and production, (further processes), works and
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), General appreciation of the issues of information security The
More informationInternational Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Risk Management Theory Application in national information security risk control Analysis of the relationship
More informationCybersecurity eit. Software. Certification. Industrial Security Embedded System
Statement Benefits and limitations of certifications and labels in the context of cyber security Arguments for a balance between customer information and industrial suitability Industrial Security Embedded
More informationThe Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service
The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service The Readlyn Telephone Company, dba RTC Communications (the Company) Acceptable Use Policy
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationCYBERSECURITY LEGISLATION IT OUT!
ATTEMPTS TO PASS US U.S. CYBERSECURITY LEGISLATION YOU NEED A SCORECARD TO FIGURE YOU NEED A SCORECARD TO FIGURE IT OUT! Professor Pauline C. Reich Waseda University School of Law cyberasia2@gmail.com
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More information10007/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationCyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual. Sandra Braman
Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual Sandra Braman The Argument Points of disagreement among the international group of experts responsible for the Tallinn
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More information'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India
'Cybersecurity' Threat or Opportunity Saikat Datta Policy Director Centre for Internet & Society, India 2nd China-India Think Tank Forum Beijing, 24-25 June 2017 'Themes' Voices from the 2 nd China-India
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationInformation Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship
Information Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship Jon R. Lindsay University of California Institute on Global Conflict and Cooperation jrlindsay@ucsd.edu Jiakun
More informationEuropean Directives and reglements for Information security
Е а а И ац а *** European Directives and reglements for Information security Krassi BOGDANOVA LISO for the Secretariat-General, the Cabinets of Commissioners and the European Political Strategy Centre,
More informationProtecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition
VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationDelegations will find in an Annex a non-paper of the Presidency.
Council of the European Union Brussels, 9 February 2016 (OR. en) 5797/16 CYBER 9 RELEX 78 JAIEX 12 TELECOM 12 COPS 35 NOTE From: To: Subject: Presidency Delegations Non-paper: Developing a joint EU diplomatic
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationSI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010
University of Michigan Deep Blue deepblue.lib.umich.edu 2010-08 SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 Blumenthal, Don Blumenthal, D. (2010,
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationThe Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation
The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation I. Introduction At the 2+2 U.S.-Japan Security Consultative Committee (SCC) meeting in Tokyo on October 3, 2013,
More informationStrategy for information security in Sweden
Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information
More informationIGF 2019 CALL FOR ISSUES SNAPSHOT RAW SUBMISSIONS AS RECEIVED
IGF 2019 CALL FOR ISSUES SNAPSHOT RAW SUBMISSIONS AS RECEIVED 350 submissions in response to call Categories/Baskets in descending order: Cybersecurity, Trust & Privacy [67] Evolution of Internet Governance
More informationCYBER SECURITY RECOMMENDATIONS FOR THE NEXT ADMINISTRATION
Statement before the House Committee on Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology CYBER SECURITY RECOMMENDATIONS FOR THE NEXT ADMINISTRATION A Statement
More informationInternational Cooperation in Cybercrime Investigations
International Cooperation in Cybercrime Investigations Joel Schwarz Computer Crime & Intellectual Property Section Criminal Division, US Department of Justice Joel.schwarz@usdoj.gov Criminal Investigations
More informationCONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE
CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the
More informationΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES
ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationCOMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document
EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European
More informationComparison of WiBro and TD-LTE through the Social Network Analysis
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? Comparison of WiBro and TD-LTE through the Social Network Analysis Dong-hyu Kim Yonsei University, Republic of Korea hugh1225@gmail.com
More informationRe: McAfee s comments in response to NIST s Solicitation for Comments on Draft 2 of Cybersecurity Framework Version 1.1
January 19, 2018 VIA EMAIL: cyberframework@nist.gov Edwin Games National Institute of Standards and Technology 100 Bureau Drive, Mail Stop 8930 Gaithersburg, MD 20899 Re: McAfee s comments in response
More informationProtecting Critical Information Infrastructure in times of increasing cyber conflict
Protecting Critical Information Infrastructure in times of increasing cyber conflict Jan Neutze Director of Cybersecurity Policy (Europe/Middle East/Africa) Microsoft Critical Infrastructures are under
More informationWhere s My Data? Managing the Data Residency Challenge
Where s My Data? Managing the Data Residency Challenge Claude Baudoin & Geoff Rayner 27 February 2018 2/26/2018 Copyright 2018 OMG. All rights reserved. 1 Speakers Tracie Berardi Director of Program Management,
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationRe: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog
April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationThe Global Cybercrime Industry
Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and
More informationMozilla position paper on the legislative proposal for an EU Cybersecurity Act
Mozilla position paper on the legislative proposal for an EU Cybersecurity Act Enhancing cybersecurity through government vulnerability disclosure I. INTRODUCTION This paper provides an overview of Mozilla
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationControl System Security for Social Infrastructure
277 Hitachi Review Vol. 63 (201), No. 5 Featured Articles Control System Security for Social Infrastructure Toshihiko Nakano, Ph.D. Katsuhito Shimizu Tsutomu Yamada Tadashi Kaji, Dr. Info. OVERVIEW: The
More informationACCEPTABLE USE POLICY
Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER
More informationE-Signature Law of Iraq no. ( 78) of 2012
INTER-REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Muscat, Oman, 11-12 December 2017 E-Signature Law of Iraq no. ( 78) of 2012 Halah Alrubaye Projects follow-up manager, Ministry
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationThe commission communication "towards a general policy on the fight against cyber crime"
MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition
More informationOAS Cybersecurity Capacity Building Efforts
OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of
More informationData Protection and Cybercrime Challenges
Data Protection and Cybercrime Challenges (Preliminary Presentation) Sigrid Arzt Commissioner IFAI, Mexico Octopus Conference 6-8 June 2012 Strasbourg, France DATA PROTECTION IN MEXICO: A BRIEF OVERVIEW.
More informationCross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011
Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011 Issue Benefits of the Internet & Cloud Computing Aspen Institute IDEA (9/12/11 draft) An unfettered flow of
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationIssues of Designing Energy System Integration in Northeast Asia
Issues of Designing Energy System Integration in Northeast Asia Sang Yul Shim Korea Energy Economics Institute March 16, 2004 Topics of Presentation Background to energy system integration: vision, potential,
More informationAMM and legal implications for the electricity market
AMM and legal implications for the electricity market Václav Stupka Institute of Law and Technology, Faculty of Law, Masaryk University, Brno, Czech Repulic vaclav.stupka@law.muni.cz Abstract. This paper
More informationA Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System
, pp.197-202 http://dx.doi.org/10.14257/astl.2014.51.45 A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System Young-Kwan Choi 1,1, In-Soo Kim 1, Sung-Taek
More informationReview of the Canadian Anti-Spam Legislation
Review of the Canadian Anti-Spam Legislation Rogers Communications Brief October 17, 2017 1 Rogers Communications Deborah Evans 350 Bloor Street East Toronto, Ontario M4W 0A1 RCI.Regulatory@rci.rogers.com
More informationCybersecurity. Topic Background
Cybersecurity Topic Background The growth of the Internet has allowed nations, organizations, and people to connect in ways previously unimagined. This new interconnectivity has allowed for collaboration,
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593
COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a
More informationNATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations)
NATIONAL BROADBAND STRATEGY IN THE REGION OF CENTRAL AND SOUTH EAST EUROPE (overview, market structure, challenges, recommendations) Boris Jevrić Agency for Electronic Communications and Postal Services
More informationISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description
INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference
More informationBackground Brief. The need to foster the IXPs ecosystem in the Arab region
Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization
More informationSPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES
10TH UNITED NATIONS WORKSHOP ON SPACE LAW September 5-8, 2016 SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES Deborah Housen-Couriel Interdisciplinary Cyber Research Center, Tel Aviv University
More informationLaw & Policy Meets Data in the Cloud: Data Sovereignty Across Asia. Bernie Trudel Chairman, Asia Cloud Computing Association
Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia Bernie Trudel Chairman, Asia Cloud Computing Association 1 Data, Regulation, Jurisdiction and Cloud: A New Geography Lesson Cloud Data
More informationRegulating for a Digital Economy
Regulating for a Digital Economy Discussant s Remarks by Ambassador Asoke Kumar Mukerji, former Permanent Representative of India to the United Nations At Brookings India, New Delhi 20 April 2018 3 Issues
More informationThe Global Voice of the Lighting Industry
The Global Voice of the Lighting Industry Jan Denneman President Global Lighting Association Vice-President Philips Lighting President European Lamp Company federation (since 2001) President Global Lighting
More informationDRAFT MEMORANDUM OF UNDERSTANDING ON COOPERATION BETWEEN UNESCO AND THE SECRETARIAT OF THE SHANGHAI COOPERATION ORGANIZATION ( ) SUMMARY
Executive Board Two hundred and fourth session 204 EX/24 PARIS, 9 March 2018 Original: English Item 24 of the provisional agenda DRAFT MEMORANDUM OF UNDERSTANDING ON COOPERATION BETWEEN UNESCO AND THE
More information