SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
BUILDING INTERNET SAFETY WALL
(BISW) Understanding the imperatives of
national domain names for safe Internet

By

Mrs. Mary Uduma
President, Nigeria Internet Registration
Association
Chairwoman, Multi-Stakeholder Local
Advisory Group NG IGF
CTO FORUM, ABUJA , 7-11 OCT, 2013
THE CONVERSATION
•
•
•
•
•

Introduction
Building Internet Safety Wall (BISW)
Critical Considerations
Imperatives
National Domain Names
INTRODUCTION

BISW consist of two
fundamental concepts
BISW = Internet Safety + Safety Wall
Internet safety
• It is a critical digital culture and a new
tradition which must be embedded into the
mindset of internet users.
• It is a vital component of the responsibility of
all internet community stakeholders – most
especially the Users
• For an effective Cybersecurity ecosystem
Internet Safety capability gap must be fully
entrenched
Internet safety II
.

• No Cybersecurity initiative will work without it, just
like internet without the people.
• It is not a security matter, it is a social response
matter. Why? Security is the welfare responsibility of
the government, while Safety is the responsibility of
people.
• However, government has a big role to play from
policy and guidance perspectives.
Safety Wall
• This is a strong multi-stakeholder ’s frontier network
towards achieving the following;
i.
Safety awareness
ii. Safety advocacy
iii. Safety literacy
iv. Safety readiness (i.e knowing what to do, knowing why
you do it, how to do it, and when to do it, when and
where to do it)
v. Decisive enforcement and
vi. Social/cultural standards significant to Internet safety
paradigm shift
10 Critical Issues Internet
Safety Wall Must Address
The following 10 critical issues have diverse consequences on the
economy, socio-security, development, and innovations.
i.
ii.
iii.
iv.
v.
vi.

Inappropriate contents as duly classified
Online backdoor distributive channels
Misuse and abuse of IT devices and critical internet resources
Users abuse and exploitation materials
User personal vulnerability
Digital harm and exposure risk critical to personal safety and
national image
vii. Digital device safety and mobile protection
viii. Internet security and online safety illiteracy
ix. Vendor neutral safety countermeasures
x. Local internet community safety capability gap
Moving Forward…
How Can We Build an Internet
Safety Wall?
BISW- Imperatives:
Develop a CTO unified framework for Internet Safety
Strategy & Engagement roadmap among member
countries which must harness the following key
components of internet for successful outcome;
i. Multi-dimensional nature of internet
ii. Multi-disciplinary nature of users
BISW- Imperatives:
i.

Multi-lateral intervention vehicle such as
CTO for structural and coordinated
engagement within member country.
ii. Thinking borderless synergy
iii. Multi-stakeholder engagement
BISW – Key Considerations
• Internet Safety measures that spur development of
innovation not killing it under the guise of providing
safety.
• Measures that favour user’s empowerment and
control of over safety issues.
• Measures that recognized user’s right to privacy and
security
BISW – Key Considerations II
• Measures that collaborate national effort on countermeasures on online security incidents
• Measures that work in partnership with industry
regulatory framework
• Measure that seek legislative advocacy /legal approach
for enforcement of nationally acceptable user safety
guidelines and standards
BISW – Key Considerations III
• Measures that seek to transform users through Internet
Safety literacy and public awareness
• Measures that promote Internet Safety Technology as
a lifestyle, culture or tradition
• Measures that incorporate multi-stakeholder, multidimensional and multi-disciplinary nature of internet
Safety wall
• Measures that unite and build consensus among all
stakeholders
Overview of framework for Internet Safety
Wall
• Structural mechanism for the delivery of
Internet Safety –Gov at all levels.
• Building a framework for local internet
safety with safety watch capability
• Public internet safety emergency readiness,
national advocacy and awareness gateway
that will fit into the existing e-security
ecosystem
Overview of framework for Internet Safety
Wall II
• A framework for development of local IT
tools, materials, contents and software
applications appropriate for ensuring safety
of users.
• Creating local Internet Safety wall via multistakeholder framework for
countermeasure, interactions and
engagement.
Overview of framework for Internet
Safety Wall III
• Mechanism for monitoring and
evaluation process to help
safeguard local internet
community .
• A framework for national
capability on internet safety
research and development
Glimpse into Nigeria’s Efforts
Towards Internet Security &
Online Safety e.g.
Nigeria Child Online Protection
www.cop.gov.ng
Country Code Top Level
Domain – Safety Wall
• Domestication of
ccTLD -National
Domain Names
• Community Ownership
• Location of primary
Registry. In-country Vs
Outside
• Use of any cast model
of cctld Registry
• Adoption of DNSSEC in
the cctld Registry
National Domain NamesSafety Wall
• Multi-stakeholder V
Business model
• Easy of resolving
disputes
• National Identity Vs
new gTLD
• User education
• User empowerment
• Safety Awareness
THANK YOU
muduma@nira.org.ng

Mais conteúdo relacionado

Mais procurados

Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e frictionAdrian Hall
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasEmyana Ruth
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Robin Sedeqi
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new releaseElena Zvarici
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of thingsAkib B. Momin
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitolTechU
 

Mais procurados (19)

Mikie
MikieMikie
Mikie
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e friction
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Week 8
Week 8Week 8
Week 8
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new release
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of things
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Destaque

Going from good to great with concept testing
Going from good to great with concept testingGoing from good to great with concept testing
Going from good to great with concept testingBen Crothers
 
Taller sistemas tecnológicos
Taller sistemas tecnológicosTaller sistemas tecnológicos
Taller sistemas tecnológicosinfogolden
 
Chproject2 report
Chproject2 reportChproject2 report
Chproject2 reportlimziahuei
 
Un caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on lineUn caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on linePietro Izzo
 
Separata de religión 3
Separata de religión 3Separata de religión 3
Separata de religión 3La profe Irene
 
Definición de los materiales
Definición de los materialesDefinición de los materiales
Definición de los materialesfernadno espinoza
 
Cirugía en endodoncia
Cirugía  en endodonciaCirugía  en endodoncia
Cirugía en endodonciaUrich Jusepe
 
Società Di Massa E Industria Culturale Ver 4.2 Teorie Marcobinotto
Società Di Massa E Industria Culturale   Ver 4.2   Teorie   MarcobinottoSocietà Di Massa E Industria Culturale   Ver 4.2   Teorie   Marcobinotto
Società Di Massa E Industria Culturale Ver 4.2 Teorie MarcobinottoMarco Binotto
 
Diseño de miembros estructurales en madera
Diseño de miembros estructurales en maderaDiseño de miembros estructurales en madera
Diseño de miembros estructurales en maderaraynelarq
 
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione PercettivaAlcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione PercettivaEleonora Mencarini
 
Hayao Miyazaki
Hayao MiyazakiHayao Miyazaki
Hayao Miyazakicbugs47
 

Destaque (17)

EDI - Photoshop - smartobject
EDI - Photoshop - smartobjectEDI - Photoshop - smartobject
EDI - Photoshop - smartobject
 
Going from good to great with concept testing
Going from good to great with concept testingGoing from good to great with concept testing
Going from good to great with concept testing
 
Taller sistemas tecnológicos
Taller sistemas tecnológicosTaller sistemas tecnológicos
Taller sistemas tecnológicos
 
Questionnaire Analysis
Questionnaire AnalysisQuestionnaire Analysis
Questionnaire Analysis
 
Chproject2 report
Chproject2 reportChproject2 report
Chproject2 report
 
Reference letter Alia
Reference letter AliaReference letter Alia
Reference letter Alia
 
ACTIVITY 1
ACTIVITY 1ACTIVITY 1
ACTIVITY 1
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
Un caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on lineUn caso di comunicazione pubblica on line
Un caso di comunicazione pubblica on line
 
Separata de religión 3
Separata de religión 3Separata de religión 3
Separata de religión 3
 
Volem el que no tenim
Volem el que no tenimVolem el que no tenim
Volem el que no tenim
 
Definición de los materiales
Definición de los materialesDefinición de los materiales
Definición de los materiales
 
Cirugía en endodoncia
Cirugía  en endodonciaCirugía  en endodoncia
Cirugía en endodoncia
 
Società Di Massa E Industria Culturale Ver 4.2 Teorie Marcobinotto
Società Di Massa E Industria Culturale   Ver 4.2   Teorie   MarcobinottoSocietà Di Massa E Industria Culturale   Ver 4.2   Teorie   Marcobinotto
Società Di Massa E Industria Culturale Ver 4.2 Teorie Marcobinotto
 
Diseño de miembros estructurales en madera
Diseño de miembros estructurales en maderaDiseño de miembros estructurales en madera
Diseño de miembros estructurales en madera
 
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione PercettivaAlcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
Alcune Proprietà delle Figure: Staticità e Dinamicità, Organizzazione Percettiva
 
Hayao Miyazaki
Hayao MiyazakiHayao Miyazaki
Hayao Miyazaki
 

Semelhante a Building internet safety wall understanding the imperatives of national domain names for safe internet

Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxYekoyeTigabuYeko
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationShiva Bissessar
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxANA Cyber Security Forensic Pvt. Ltd.
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesSaeed Al Dhaheri
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustAnsgar Koene
 

Semelhante a Building internet safety wall understanding the imperatives of national domain names for safe internet (20)

Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpation
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Session 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip PaulwellSession 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip Paulwell
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User Trust
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 

Mais de Commonwealth Telecommunications Organisation

Mais de Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Building internet safety wall understanding the imperatives of national domain names for safe internet

  • 1. BUILDING INTERNET SAFETY WALL (BISW) Understanding the imperatives of national domain names for safe Internet By Mrs. Mary Uduma President, Nigeria Internet Registration Association Chairwoman, Multi-Stakeholder Local Advisory Group NG IGF CTO FORUM, ABUJA , 7-11 OCT, 2013
  • 2. THE CONVERSATION • • • • • Introduction Building Internet Safety Wall (BISW) Critical Considerations Imperatives National Domain Names
  • 3. INTRODUCTION BISW consist of two fundamental concepts BISW = Internet Safety + Safety Wall
  • 4. Internet safety • It is a critical digital culture and a new tradition which must be embedded into the mindset of internet users. • It is a vital component of the responsibility of all internet community stakeholders – most especially the Users • For an effective Cybersecurity ecosystem Internet Safety capability gap must be fully entrenched
  • 5. Internet safety II . • No Cybersecurity initiative will work without it, just like internet without the people. • It is not a security matter, it is a social response matter. Why? Security is the welfare responsibility of the government, while Safety is the responsibility of people. • However, government has a big role to play from policy and guidance perspectives.
  • 6. Safety Wall • This is a strong multi-stakeholder ’s frontier network towards achieving the following; i. Safety awareness ii. Safety advocacy iii. Safety literacy iv. Safety readiness (i.e knowing what to do, knowing why you do it, how to do it, and when to do it, when and where to do it) v. Decisive enforcement and vi. Social/cultural standards significant to Internet safety paradigm shift
  • 7. 10 Critical Issues Internet Safety Wall Must Address The following 10 critical issues have diverse consequences on the economy, socio-security, development, and innovations. i. ii. iii. iv. v. vi. Inappropriate contents as duly classified Online backdoor distributive channels Misuse and abuse of IT devices and critical internet resources Users abuse and exploitation materials User personal vulnerability Digital harm and exposure risk critical to personal safety and national image vii. Digital device safety and mobile protection viii. Internet security and online safety illiteracy ix. Vendor neutral safety countermeasures x. Local internet community safety capability gap
  • 8. Moving Forward… How Can We Build an Internet Safety Wall?
  • 9. BISW- Imperatives: Develop a CTO unified framework for Internet Safety Strategy & Engagement roadmap among member countries which must harness the following key components of internet for successful outcome; i. Multi-dimensional nature of internet ii. Multi-disciplinary nature of users
  • 10. BISW- Imperatives: i. Multi-lateral intervention vehicle such as CTO for structural and coordinated engagement within member country. ii. Thinking borderless synergy iii. Multi-stakeholder engagement
  • 11. BISW – Key Considerations • Internet Safety measures that spur development of innovation not killing it under the guise of providing safety. • Measures that favour user’s empowerment and control of over safety issues. • Measures that recognized user’s right to privacy and security
  • 12. BISW – Key Considerations II • Measures that collaborate national effort on countermeasures on online security incidents • Measures that work in partnership with industry regulatory framework • Measure that seek legislative advocacy /legal approach for enforcement of nationally acceptable user safety guidelines and standards
  • 13. BISW – Key Considerations III • Measures that seek to transform users through Internet Safety literacy and public awareness • Measures that promote Internet Safety Technology as a lifestyle, culture or tradition • Measures that incorporate multi-stakeholder, multidimensional and multi-disciplinary nature of internet Safety wall • Measures that unite and build consensus among all stakeholders
  • 14. Overview of framework for Internet Safety Wall • Structural mechanism for the delivery of Internet Safety –Gov at all levels. • Building a framework for local internet safety with safety watch capability • Public internet safety emergency readiness, national advocacy and awareness gateway that will fit into the existing e-security ecosystem
  • 15. Overview of framework for Internet Safety Wall II • A framework for development of local IT tools, materials, contents and software applications appropriate for ensuring safety of users. • Creating local Internet Safety wall via multistakeholder framework for countermeasure, interactions and engagement.
  • 16. Overview of framework for Internet Safety Wall III • Mechanism for monitoring and evaluation process to help safeguard local internet community . • A framework for national capability on internet safety research and development
  • 17. Glimpse into Nigeria’s Efforts Towards Internet Security & Online Safety e.g. Nigeria Child Online Protection www.cop.gov.ng
  • 18. Country Code Top Level Domain – Safety Wall • Domestication of ccTLD -National Domain Names • Community Ownership • Location of primary Registry. In-country Vs Outside • Use of any cast model of cctld Registry • Adoption of DNSSEC in the cctld Registry
  • 19. National Domain NamesSafety Wall • Multi-stakeholder V Business model • Easy of resolving disputes • National Identity Vs new gTLD • User education • User empowerment • Safety Awareness