O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Bpf on cybersecurity 2017 call for contributions by shreedeep rayamajhi

32 visualizações

Publicada em

This paper was submitted to IGF2017 BPF in context of cyber security issues and situation in Asia Pacific August 2017

Publicada em: Internet
  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

Bpf on cybersecurity 2017 call for contributions by shreedeep rayamajhi

  1. 1. BPF on Cybersecurity 2017 - Call for Contributions  How does good cybersecuritycontribute to the growth of and trust in ICTs and Internet Technologies,andtheir abilityto support the Sustainable DevelopmentGoals(SDGs)? Cybersecurityisnotjust the sense of beingsafe,it’sthe overallconfidenceof beingsafe where people knowwhatisrightandwrong.Theyare more responsible tothe systemandtheyactupon. Thishelpsthemtofurthercerate and innovate betterenvironment of creatingbettersolutions. Sustainable DevelopmentGoalscertainlysupportthe role of capacitybuilding,betterawareness program anddiscussingaboutthe developingcore valuesatgrassrootslevel.Butone thingwe have to understand isMultistakeholderisnotjustaboutdiversityorparticipation,itismore about inclusion andreachingouttothe marginalizedand unreachable communities.Socertainly Itsmore like cybersecurityhelpstobuildconfidence andconfidencehelpstobuildthe motivationandSDGs drivesthatenergytowardsachievingthe goals.  How does poor cybersecurityhinderthe growth of and trust inICTs and Internet Technologies,andtheir abilityto support the Sustainable DevelopmentGoals(SDGs)? The poor cybersecurityhindersthe growthandtrustin ICTsand internettechnologyatvariouslevels -PolicyLevel -LeadershipLevel -Individual Level At policylevelwithlackof propercybersecurity properpolicies wouldnotbe able todevelop.There are manyissuesof sovereigntyandsecurityof acountry whichneedsprivacyandcertainlevel of secrecyintermsof policylevel.These decisionsof leadershipnotonlydecidethe future of the countrybut are strategicassumptionof itspositionwhichneedstoplevel securityandprecision. At leadershiplevel if thereisnocybersecuritythe countriespositioncanbe compromisedwithno optionof process. At individual levelif the there isnoleadershipandpolicythere isnodirectionandpeoplefollow leaders So lackof propercybersecuritycertainlyeffectsthe abilitytosupportSDGsand itsimplementation  Assessmentofthe CENB Phase II policyrecommendationsidentifiedafewclearthreats. Do you see particular policy optionsto help address,with particular attention to the multi- stakeholderenvironment,the followingcybersecuritychallenges: -Denial of Service attacks and other cybersecurityissuesthat impact the reliabilityand access to Internetservices -Securityof mobile devices,whichare the vehicle ofInternet growth in many countries,and fulfill critical goals such as payments -Potential abuse by authorities,includingsurveillance ofInternetusage,or the use ofuser- provideddata for differentpurposesthanintended
  2. 2. BPF on Cybersecurity 2017 - Call for Contributions -Confidentialityandavailabilityofsensitive information,inparticular in medical and health services -Online abuse and gender-basedviolence -Securityrisks of shared critical servicesthat support Internetaccess, such as the Domain Name System(DNS),and Internet Exchange Point (IXP) communities -Vulnerabilitiesinthe technologiessupportingindustrial control systems -Use ofinformation collectedfora particular purpose,beingrepurposedfor other, inappropriate purposes.For instance,theftof informationfrom smart meters,smart grids and Internetof Things devicesfor competitive reasons,or the de-anonymizationof improperlyanonymizedcitizendata -The lack of Secure DevelopmentProcessescombinedwithan immense growthin the technologiesbeingcreatedand usedon a dailybasis -Unauthorizedaccessto devicesthat take an increasingrole in people’sdailylives -Other:describe a cybersecurityissue critical to developingthe SDGsin ways not listed above relevantto your stakeholdercommunity (100 words or less) -Social media and its interventionsandinterpretation I think more or lessthe above issuesare correlated withthe internetof todaysbutwiththe evolution of social mediaandcyberterrorismadaptingandcreating vacuumto reach out,there seemstobe a great threatintermsof howthe social mediaistransformingin today’sworld.Forinstant Cyber Terrorism- The extremistgroupare targetingthe vulnerable communityandreachoutusing variousplatformtodisseminateandcreate a largernetworkof access Online safety- There are varioussocial mediaplatformwhichare evolvingthatare targetedorbeing wronglyusedforcyberbullying,pornographyandasa tool of online harassment.These thingsmay looksmall butwhenlookedatfromthe genderandotherlensthe crack theyare creatingare very vast andunrepairable We have workon a greaterheightedawarenessandcapacitybuildingprogramthatcan empower people tolookbeyondthe problemandactaccordingly.  Many Internetdevelopmentsdonot happenin a highlycoordinatedway - a technology may be developedinthe technical community or private sector, and usedby other communitiesand interact in unexpectedways.Stakeholdersare managing complexity. This both shows the strength and opportunitiesof ICTs and InternetTechnologies,butalso the potential risks.New technologiesmaybe insufficientlysecure,resultinginharms when they are deployed:converselywe may adopt securityrequirementsor measuresthat preventthe development, deployment,orwidespreaduse oftechnologiesthat would generate unforeseenbenefits.Where doyouthink liesthe responsibilityofeach stakeholdercommunityin helpingensure cybersecuritydoesnot hinderfuture Internet development? Humanssurvivedthe 4.5 billionyearsevolutionnotbecause theyare smartor theyhave the attitude. Theysurveyedbecause theycouldlearnandbytheirnature of innovationandadaptation. We are progressive beingswherewe trial andtestnew technologyusingoureffectivenessandefficiencyto directthe collaboration.We learnandwe destroy,the ideologyof destructionisnotjustaboutending but aboutcreatingbetter.Istronglybelieve it’sinournature of not beingsatisfiedandthat’swhat
  3. 3. BPF on Cybersecurity 2017 - Call for Contributions drivesus.The current competitionandaspectof beingincontrol isthe currentproblembutas I said destructionisnotthe end,it’sa newbeginningthatisthe reasonwhywe are alwayslookingatbetter waysof evolution.Potentialriskare inevitablesituationwhichcannot be escapedbutcanbe further workedandcollaboratedinadaptationprocess. Similarly,talkingaboutTechnologyandmultistakeholderismit’sthe mainissuesof how we will developedthe core values.Asthe worldbelievesindemocracyandpeople’spower wheretechnology drivesthe systemandcore valuesdrive the peopleandpeople are drivenbyleaderswithbettercore values. So the priorityisto workon developinggreatersetof core valueswhichwillguildthe systemin creatingbetterwaysof securinginternetandcreatingbettervaluesforcybersecurity. The responsibilitiesliesatthe basiclevel of how we acceptstandardization andadopt unifiedsetof valuesintermsof equality,cooperationandcollaborationforall One worldinternetandone religionHumanity The firstissue intermsof developingnationistodevelopbettercore valuesandcreatingbetter awarenessprogramsforleadershipinunderstandingmultistakeholderisminthe internetecosystem As an outside expertconsultationorconsolidationcannothelpthe adaptationprocessratheritwill create loophole.The adaptationneedtobe done at firststage of how internetisperceivedorused creatingbroaderpicture of adaptingglobal standards. As the internetis changingdaybyday thingsneedtobe smart and precise.The whole processof adaptationandstandardizationneedstobe inbasic core valueswhere there needstobe equalityand conceptof collaborationof creatingbettervalues.  What is for you the most critical cybersecurityissue that needssolvingand wouldbenefit most from a multi-stakeholderapproach withinthis BPF? Shouldany stakeholdersbe specificallyinvitedinorderfor this issue to be addressed? I thinkfora countrylike Nepal we needtodevelopbettercore valuesandwe need recognizedas individualcountrywhere ourissuesare uniquefromanyothercountryinthe region.The current state of developednationpushingdevelopingandleastdevelopedcountrieshascreateda gapwhich caters externalities.ForexampleAsiainglobal IGF orplatformiseitherleadbyIndiaor chinaor any otherbigcountry where asinrealitythese countryhave strongerpolicy mechanism, awareness level and adaptationprocess whichneedsnorecognition. FromMAGappointmenttootherIGFleading processmembersfromleastdevelopedcountriesare marginalizedinwaysof geography,population and otherinterventions. But at groundrealitysmallerandleastdevelopedcountriessufferthe burdenandconsequencesof beinglimitedwithintheirlimitation.The standardizationandadaptationprocesscreatessmallerways of interventionwhere itislimitedbyresistingattitudeindrivingthe industry.Technologyhasjust beenpassedonto the developingorleast developingcountriesjustforthe sake where fromourside we playedourpart of makingitthe technologyof today but whenitcomesto representationand opportunities.We are marginalizedinvariousways. We needrepresentationandopportunity at global IG process. Thoughleastdevelopedcountriesname hasbeenhighlightedinthe IGFmandate butif youcheck it
  4. 4. BPF on Cybersecurity 2017 - Call for Contributions fromparticipation,representationwe have been. ShreedeepRayamajhi

×