SlideShare uma empresa Scribd logo
1 de 12
United Nations
and Cyber
SecurityPeter Pedak
Ministry of Foreign Affairs of Estonia
4 March 2016
Outline of the presentation
• Core of the problem
• Causes of the problem
• Differences worldwide
• Possible solutions
• Sources of information
Core of the problem
• New technologies > new problems
• Malicious use by states and non-state
actors (terrorists and other criminals) –
attacks on government networks, banks,
electricity networks etc
• For the UN: war needs to be prevented,
norms of behaviour have to be agreed
Causes
• Development of ICTs creates benefits
but also similar threats as in the
physical world
• Different interests of states
• Competion for resources (money,
power), struggle between ideologies
and value-systems (democracy vs.
totalitarianism)
Differences
worldwide
• Technologically and economically
advanced countries, “western
democracies“ (NATO, EU etc)
• Shanghai Cooperation Organisation
(RU, CN etc)
• Group of 77, non-aligned movement
Main disputable issues
• What are the main threats – crime,
terrorism, war, hidden functions in
ICTs?
• Content vs. form, information security
vs. cybersecurity
• Sovereignty and non-intervention vs.
human rights and fundamental
freedoms
Cyber security in the UN
• Russian initiative since 1998
• UN GGE (group of governmental experts
on developments in the field of ICTs in
the context of international security) since
2004
• Currently 20 member states in the Group
• UN – global level of compromise
Members of the GGEs
Argentina; Australia; Belarus; Brazil;
Canada; China; Colombia; Egypt;
Estonia; France; Germany; Ghana;
India; Indonesia; Israel; Italy; Japan;
Jordan; Kenya; Malaysia; Mali; Mexico;
Pakistan; Qatar; Russia; South Africa;
South Korea; Spain; UK; US
UN GGE 2015
Successes and
challenges+ agreement that cyberspace is not a
lawless domain; discussion is continued;
awareness and interest among states
have risen; cyber attacks have not lead to
loss of human lives
- ideological differences remain; limited will
for cooperation; limited preparedness of
states to prevent and to respond to
attacks; need for technological
development and transparency (identify
Sources for
information
• http://www.un.org/disarmament/topic
s/informationsecurity/
• https://ccdcoe.org/
• http://ict4peace.org/
• http://www.unidir.org/est-cyber
• https://www.youtube.com/watch?v=z
LG1a7dsQ_Q
Thank you!
Peter Pedak
peter.pedak@mfa.ee

Mais conteúdo relacionado

Mais procurados

Mais procurados (12)

New Threats to Media Pluralism in the Digital Age
New Threats to Media Pluralism in the Digital AgeNew Threats to Media Pluralism in the Digital Age
New Threats to Media Pluralism in the Digital Age
 
Regulating Outer Space
Regulating Outer SpaceRegulating Outer Space
Regulating Outer Space
 
Safety of journalists in the changing media context
Safety of journalists in the changing media contextSafety of journalists in the changing media context
Safety of journalists in the changing media context
 
Protection of journalism - Safety of journalists
Protection of journalism - Safety of journalistsProtection of journalism - Safety of journalists
Protection of journalism - Safety of journalists
 
Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )
 
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
 
Holt CV
Holt CVHolt CV
Holt CV
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Digital challenges to media pluralism - Urska Umek
Digital challenges to media pluralism - Urska UmekDigital challenges to media pluralism - Urska Umek
Digital challenges to media pluralism - Urska Umek
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacks
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
4ce23d472
4ce23d4724ce23d472
4ce23d472
 

Destaque

Programme journées européennes du patrimoine 2016
Programme journées européennes du patrimoine 2016Programme journées européennes du patrimoine 2016
Programme journées européennes du patrimoine 2016Terre et Côte Basques
 
Неделя зимних игр и забав Январь 2016
Неделя зимних игр и забав Январь 2016Неделя зимних игр и забав Январь 2016
Неделя зимних игр и забав Январь 2016romisflasher
 
8 марта рисунки
8 марта рисунки8 марта рисунки
8 марта рисункиromisflasher
 
Foto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolā
Foto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolāFoto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolā
Foto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolāliela_stunda
 
นาฏศิลป์
นาฏศิลป์นาฏศิลป์
นาฏศิลป์Sor Sa
 
Qualità Percepita: Indagine su "Sportello del Cittadino" - Genova
Qualità Percepita: Indagine su "Sportello del Cittadino" - GenovaQualità Percepita: Indagine su "Sportello del Cittadino" - Genova
Qualità Percepita: Indagine su "Sportello del Cittadino" - GenovaNicola Camurri
 
досуг лето
досуг летодосуг лето
досуг летоlicey1568
 
Decorator
DecoratorDecorator
Decoratorukst
 
Смотр – конкурс «Танцы народов мира»
Смотр – конкурс «Танцы народов мира»Смотр – конкурс «Танцы народов мира»
Смотр – конкурс «Танцы народов мира»romisflasher
 
Презентация оказание помощи
Презентация оказание помощиПрезентация оказание помощи
Презентация оказание помощиromisflasher
 
ОСББ: Прийняття спільних рішень
ОСББ: Прийняття спільних рішеньОСББ: Прийняття спільних рішень
ОСББ: Прийняття спільних рішеньukrwomenfund
 
Présentation Bilance Formation & Conseil
Présentation Bilance Formation & ConseilPrésentation Bilance Formation & Conseil
Présentation Bilance Formation & ConseilBeer Bergman
 
L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...
L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...
L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...Philippe Foulquier
 
Executive Functioning Assessment in Psychoeducational Domains
Executive Functioning Assessment in Psychoeducational DomainsExecutive Functioning Assessment in Psychoeducational Domains
Executive Functioning Assessment in Psychoeducational Domainspsychoed
 
Gender equality lesson plan
Gender equality lesson planGender equality lesson plan
Gender equality lesson planliela_stunda
 

Destaque (20)

數位課程製作服務
數位課程製作服務數位課程製作服務
數位課程製作服務
 
Programme journées européennes du patrimoine 2016
Programme journées européennes du patrimoine 2016Programme journées européennes du patrimoine 2016
Programme journées européennes du patrimoine 2016
 
Неделя зимних игр и забав Январь 2016
Неделя зимних игр и забав Январь 2016Неделя зимних игр и забав Январь 2016
Неделя зимних игр и забав Январь 2016
 
8 марта рисунки
8 марта рисунки8 марта рисунки
8 марта рисунки
 
Foto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolā
Foto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolāFoto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolā
Foto reportāža: Pasaules lielākā mācību stunda Rīgas Valda Avotiņa pamatskolā
 
นาฏศิลป์
นาฏศิลป์นาฏศิลป์
นาฏศิลป์
 
Qualità Percepita: Indagine su "Sportello del Cittadino" - Genova
Qualità Percepita: Indagine su "Sportello del Cittadino" - GenovaQualità Percepita: Indagine su "Sportello del Cittadino" - Genova
Qualità Percepita: Indagine su "Sportello del Cittadino" - Genova
 
Live Seminar 37: Famine and War: A Critical Appraisal of the Challenges to Hu...
Live Seminar 37: Famine and War: A Critical Appraisal of the Challenges to Hu...Live Seminar 37: Famine and War: A Critical Appraisal of the Challenges to Hu...
Live Seminar 37: Famine and War: A Critical Appraisal of the Challenges to Hu...
 
досуг лето
досуг летодосуг лето
досуг лето
 
Decorator
DecoratorDecorator
Decorator
 
Смотр – конкурс «Танцы народов мира»
Смотр – конкурс «Танцы народов мира»Смотр – конкурс «Танцы народов мира»
Смотр – конкурс «Танцы народов мира»
 
Thai music8
Thai music8Thai music8
Thai music8
 
Uzvarētāju saraksts
Uzvarētāju sarakstsUzvarētāju saraksts
Uzvarētāju saraksts
 
Презентация оказание помощи
Презентация оказание помощиПрезентация оказание помощи
Презентация оказание помощи
 
ОСББ: Прийняття спільних рішень
ОСББ: Прийняття спільних рішеньОСББ: Прийняття спільних рішень
ОСББ: Прийняття спільних рішень
 
Protection of Civilians
Protection of CiviliansProtection of Civilians
Protection of Civilians
 
Présentation Bilance Formation & Conseil
Présentation Bilance Formation & ConseilPrésentation Bilance Formation & Conseil
Présentation Bilance Formation & Conseil
 
L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...
L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...
L’appétence pour le risque : les nouveaux enjeux pour piloter une entreprise ...
 
Executive Functioning Assessment in Psychoeducational Domains
Executive Functioning Assessment in Psychoeducational DomainsExecutive Functioning Assessment in Psychoeducational Domains
Executive Functioning Assessment in Psychoeducational Domains
 
Gender equality lesson plan
Gender equality lesson planGender equality lesson plan
Gender equality lesson plan
 

Semelhante a Cybersecurity by Mr Peter Pedak

ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalIGF Indonesia
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
Presentation sanjana hattotuwa
Presentation   sanjana hattotuwaPresentation   sanjana hattotuwa
Presentation sanjana hattotuwaSanjana Hattotuwa
 
Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010
Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010
Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010Sanjana Hattotuwa
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Oles Kulchytskyy
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfHasanAlManjur1
 
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Twittercrisis
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyGenève Lab
 
BlueHat v18 || Cybersecurity for the defense of democracy
BlueHat v18 || Cybersecurity for the defense of democracyBlueHat v18 || Cybersecurity for the defense of democracy
BlueHat v18 || Cybersecurity for the defense of democracyBlueHat Security Conference
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Terry Flew
 
Technology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechnology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechSoup Canada
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimesMichalis Mavis, MSc, MSc
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Global Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed OverviewGlobal Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed OverviewKeith Krach
 

Semelhante a Cybersecurity by Mr Peter Pedak (20)

CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
Presentation sanjana hattotuwa
Presentation   sanjana hattotuwaPresentation   sanjana hattotuwa
Presentation sanjana hattotuwa
 
Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010
Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010
Presentation at 3rd International Disaster and Risk Conference IDRC Davos 2010
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdf
 
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
BlueHat v18 || Cybersecurity for the defense of democracy
BlueHat v18 || Cybersecurity for the defense of democracyBlueHat v18 || Cybersecurity for the defense of democracy
BlueHat v18 || Cybersecurity for the defense of democracy
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15
 
Technology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechnology, human rights & movement building around the world
Technology, human rights & movement building around the world
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Persiapan IGF 2018
Persiapan IGF 2018Persiapan IGF 2018
Persiapan IGF 2018
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Global Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed OverviewGlobal Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed Overview
 

Mais de Latvian National Commission for UNESCO

Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...Latvian National Commission for UNESCO
 

Mais de Latvian National Commission for UNESCO (20)

Valodas dienas nolikums
Valodas dienas nolikumsValodas dienas nolikums
Valodas dienas nolikums
 
KTTT Edvarta Virzas 135. jubilejai veltītā konkursa nolikums
KTTT Edvarta Virzas 135. jubilejai veltītā konkursa nolikumsKTTT Edvarta Virzas 135. jubilejai veltītā konkursa nolikums
KTTT Edvarta Virzas 135. jubilejai veltītā konkursa nolikums
 
World Theater Day, Message from Ms Irina Bokova
World Theater Day, Message from Ms Irina BokovaWorld Theater Day, Message from Ms Irina Bokova
World Theater Day, Message from Ms Irina Bokova
 
Katrs piliens ir vērtība
Katrs piliens ir vērtībaKatrs piliens ir vērtība
Katrs piliens ir vērtība
 
UNESCO ASP Latvijā un pasaulē
UNESCO ASP Latvijā un pasaulēUNESCO ASP Latvijā un pasaulē
UNESCO ASP Latvijā un pasaulē
 
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" Nolikums
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" NolikumsKonkursa "Kultūru daudzveidība - dialogam un attīstībai" Nolikums
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" Nolikums
 
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...
Konkursa "Kultūru daudzveidība - dialogam un attīstībai" prezentācija atklāša...
 
100 miljoni koku 2016
100 miljoni koku 2016100 miljoni koku 2016
100 miljoni koku 2016
 
Ikvienam draudzīga klase iekļaujošā skolā, pieņemošā kopienā
Ikvienam draudzīga klase iekļaujošā skolā, pieņemošā kopienāIkvienam draudzīga klase iekļaujošā skolā, pieņemošā kopienā
Ikvienam draudzīga klase iekļaujošā skolā, pieņemošā kopienā
 
Mūsdienīga pieeja dažādībai: Mediju pratība izglītībā
Mūsdienīga pieeja dažādībai: Mediju pratība izglītībāMūsdienīga pieeja dažādībai: Mediju pratība izglītībā
Mūsdienīga pieeja dažādībai: Mediju pratība izglītībā
 
Handbook of the Simulation
Handbook of the SimulationHandbook of the Simulation
Handbook of the Simulation
 
Brīvība!
Brīvība!Brīvība!
Brīvība!
 
Diplomatic Debate in UN
Diplomatic Debate in UNDiplomatic Debate in UN
Diplomatic Debate in UN
 
UN Sustainable Development Goals and Their Importance
UN Sustainable Development Goals and Their ImportanceUN Sustainable Development Goals and Their Importance
UN Sustainable Development Goals and Their Importance
 
Introduction to the United Nations System
Introduction to the United Nations SystemIntroduction to the United Nations System
Introduction to the United Nations System
 
Miers sākas ar mani
Miers sākas ar maniMiers sākas ar mani
Miers sākas ar mani
 
Pasaules lielākā mācību stunda Latvijas skolās
Pasaules lielākā mācību stunda Latvijas skolāsPasaules lielākā mācību stunda Latvijas skolās
Pasaules lielākā mācību stunda Latvijas skolās
 
Zinātnieku nakts 2015
Zinātnieku nakts 2015Zinātnieku nakts 2015
Zinātnieku nakts 2015
 
Pasaules lielākā mācību stunda
Pasaules lielākā mācību stundaPasaules lielākā mācību stunda
Pasaules lielākā mācību stunda
 
1. general information 2015
1. general information 20151. general information 2015
1. general information 2015
 

Último

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Último (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Cybersecurity by Mr Peter Pedak

  • 1. United Nations and Cyber SecurityPeter Pedak Ministry of Foreign Affairs of Estonia 4 March 2016
  • 2. Outline of the presentation • Core of the problem • Causes of the problem • Differences worldwide • Possible solutions • Sources of information
  • 3. Core of the problem • New technologies > new problems • Malicious use by states and non-state actors (terrorists and other criminals) – attacks on government networks, banks, electricity networks etc • For the UN: war needs to be prevented, norms of behaviour have to be agreed
  • 4. Causes • Development of ICTs creates benefits but also similar threats as in the physical world • Different interests of states • Competion for resources (money, power), struggle between ideologies and value-systems (democracy vs. totalitarianism)
  • 5. Differences worldwide • Technologically and economically advanced countries, “western democracies“ (NATO, EU etc) • Shanghai Cooperation Organisation (RU, CN etc) • Group of 77, non-aligned movement
  • 6. Main disputable issues • What are the main threats – crime, terrorism, war, hidden functions in ICTs? • Content vs. form, information security vs. cybersecurity • Sovereignty and non-intervention vs. human rights and fundamental freedoms
  • 7. Cyber security in the UN • Russian initiative since 1998 • UN GGE (group of governmental experts on developments in the field of ICTs in the context of international security) since 2004 • Currently 20 member states in the Group • UN – global level of compromise
  • 8. Members of the GGEs Argentina; Australia; Belarus; Brazil; Canada; China; Colombia; Egypt; Estonia; France; Germany; Ghana; India; Indonesia; Israel; Italy; Japan; Jordan; Kenya; Malaysia; Mali; Mexico; Pakistan; Qatar; Russia; South Africa; South Korea; Spain; UK; US
  • 10. Successes and challenges+ agreement that cyberspace is not a lawless domain; discussion is continued; awareness and interest among states have risen; cyber attacks have not lead to loss of human lives - ideological differences remain; limited will for cooperation; limited preparedness of states to prevent and to respond to attacks; need for technological development and transparency (identify
  • 11. Sources for information • http://www.un.org/disarmament/topic s/informationsecurity/ • https://ccdcoe.org/ • http://ict4peace.org/ • http://www.unidir.org/est-cyber • https://www.youtube.com/watch?v=z LG1a7dsQ_Q