SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
INTERNATIONAL SECURITY MEASURES
 IN CYBERSPACE
 Indonesia Information Security Forum
 10.10.2012, Bandung, Indonesia
 Prof. Dr. Marco Gercke




Cybercrime                              Page: 1
WHAT ARE CYBER SECURITY MEASURES
 BRINGING CYBER SECURITY AND CYBERCRIME INTO CONTEXT




Cybercrime                                             Page: 2
CYBERCRIME / CYBERSECURITY

 •  Cybersecurity is broader than just         Components of Cybersecurity
    Cybercrime                                 Strategy (based on ITU GCA)

 •  If a government employee accidentally
    drops an external storage device with
    important data that were not included in
    backup-plans it is a serious
    Cybersecurity incident – but not a crime
 •  Based on the ITU Global Cybersecurity
    Agenda (GCA) it is possible to divide
    between 5 different pillars related to
    Cybersecurity (legal measures, technical
                                                Measures
                                                Legal


                                                           Measures
                                                           Techn. / Proced.


                                                                              Structures
                                                                              Organizational


                                                                                               Building
                                                                                               Capacity


                                                                                                          Cooperation
                                                                                                          International
    and procedural measures, organizational
    structures, capacity building and
    international cooperation


Cybercrime                                                                                                                Page: 3
CYBERCRIME / CYBERSECURITY

 •  Within all pillars Cybercrime needs to be    Components of Cybersecurity
    addressed                                    Strategy (based on ITU GCA)

 •  In some pillars (such as international
    cooperation) Cybercrime may even be the
    dominant part (international cooperation
    in Cybercrime investigations)

 •  The same is relevant with regard to legal
    measures. Cybercrime legislation is in
    many country the most complex part of a
    Cybersecurity legal framework

                                                  Measures
                                                  Legal


                                                             Measures
                                                             Techn. / Proced.


                                                                                Structures
                                                                                Organizational


                                                                                                 Building
                                                                                                 Capacity


                                                                                                            Cooperation
                                                                                                            International
 •  But it is important to always keep in mind
    that in each pillar other issues will need
    to be addressed.



Cybercrime                                                                                                                  Page: 4
CYBERCRIME / CYBERSECURITY

 •  And it is important to see that some         Components of Cybersecurity
    components are not solely related to         Strategy (based on ITU GCA)
    Cybercrime
 •  Example: CERT
 •  Preventing Cybercrime, analysing trends
    related to Cybercrime, development of
    tools in the fight against Cybercrime,
    capacity building and support of law
                                                                                CERT
    enforcement agencies in fighting
    Cybercrime can be important tasks for a
    cert
                                                  Measures
                                                  Legal


                                                             Measures
                                                             Techn. / Proced.


                                                                                Structures
                                                                                Organizational


                                                                                                 Building
                                                                                                 Capacity


                                                                                                            Cooperation
                                                                                                            International
 •  But not all work of a CERT will be related
    to Cybercrime



Cybercrime                                                                                                                  Page: 5
GLOBAL STANDARDS




Cybercrime          page: 6
TCP/IP

 •  The Internet uses globally applicable
    technical standards

 •  Whoever does not apply the global
    standards is in most cases excluded
    from using the network
                                              Picture removed in print version
                                              Bild zur Druckoptimierung entfernt
 •  With regard to Cybersecurity there is a                            IOL News 2011

    lack in applying global standards




Cybercrime                                                                             Page: 7
WHAT IS COMPUTER CRIME AND CYBERCRIME




Cybercrime                               page: 8
198oth

 •  Increasing use of personal computers

 •  Lead to an increase in the potential
    number of targets

 •  First cases of software piracy

 •  In addition malicious software was more
    frequently produced and distributed
                                              Picture removed in print version
                                              Bild zur Druckoptimierung entfernt
                                                                       Source: Wikipedia with ref to B. Bertram




Cybercrime                                                                                               page: 9
198oth - HISTORY OF VIRUSES

 •  1982 the “Elk Cloner” virus was created
    (by Rich Skrenta). Designed for Apple OS


 •  1986 “Brain Virus” was identified. Virus
    was designed for MS-DOS
                                                Picture removed in print version
                                                Bild zur Druckoptimierung entfernt
                                                                         Example
 •  1986 the the file virus “Virdem” followed


 •  1990 the first polymorph virus attack
    “Tequila” was started




Cybercrime                                                                           Seite: 10
198oth- MATH VIRUS

 •  „Math virus“ stopped the computer after
    30 steps and displays a simple addition
    or subtraction questions

 •  Execution of the program is denied
    unless the correct answer is given by the
    user



                                                Picture removed in print version
                                                Bild zur Druckoptimierung entfernt
                                                                         Math Virus




Cybercrime                                                                            Seite: 11
198oth – WALKER VIRUS

 •  Relatively harmless virus

 •  Walker virus: Displays occasionally an
    animation




                                             Picture removed in print version
                                             Bild zur Druckoptimierung entfernt
                                                                      Walker Virus




Cybercrime                                                                           Seite: 12
199oth

 •  Introduction of the graphical user
    interface WWW (World Wide Web) in
    the 1990th lead to an increasing
    popularity of the network

 •  It became easier to use the services
    offered

 •  In addition it enabled the spreading of
                                              Picture removed in print version
    pictures, audio and video                 Bild zur Druckoptimierung entfernt
                                                                       Source: Wikipedia with ref. to Cailliau

 •  In addition the Internet eased
    transnational communication

 •  Went along with several challenges for
    law enforcement


Cybercrime                                                                                                page: 13
1990th - VIRUS

 •  While in the 1980th the speed of the
    distribution was limited due to the
    distribution by physical data storage
    media exchange it was less limited with
    the intensive use of the Internet

                                              Picture removed in print version
                                              Bild zur Druckoptimierung entfernt
                                                                       Example




Cybercrime                                                                         Seite: 14
ACTIVITIES OF REG. AND INT. ORGANIZATIONS
 RELATED TO CYBERCRIME




Cybercrime                                   page: 15
COMMONWEALTH OF NATIONS

 •  The Commonwealth of Nations is a
    voluntary association of sovereign
    states

 •  Currently 53 associated states

 •  In 2002 the Commonwealth presented      Picture removed in print version
                                            Bild zur Druckoptimierung entfernt
    a model law on Cybercrime that                                   COMMONWEALTH MEMBER STATES
    provides a legal framework to address
    Cybercrime

 •  The model law was intentionally
    drafted in accordance with the
    Convention on Cybercrime




Gercke, Cybercrime                                                                           Page: 16
ECONOMIC COMMUNITY OF WEST AFR.

 •  The Economic Community of West
    African States is a regional group of
    west African Countries

 •  Founded in 1975 it has currently fifteen
    member states
                                               Picture removed in print version
                                               Bild zur Druckoptimierung entfernt
 •  In 2009 ECOWAS adopted the Directive                                ECOWAS MEMBER STATES
    on Fighting Cybercrime in ECOWAS
    that provides a legal framework for the
    member states

 •  Directive includes substantive criminal
    law as well as procedural law




Gercke, Cybercrime                                                                             Page: 17
EAST AFRICAN COMMUNITY

 •  5 Member states (Kenya, Uganda,
    Tanzania, Burundi, Rwanda)

 •  Within the framework of an update of
    ICT legislation (EAC Legal Framework
    for Cyberlaws) EAS also addressed the
    issues of Cybercrime                    Picture removed in print version
                                            Bild zur Druckoptimierung entfernt
                                                                     EAC MEMBER STATES
 •  Provisions dealing with the
    criminalisation of certain conduct
    became part of the draft legislation




Gercke, Cybercrime                                                                       Page: 18
EUROPEAN UNION

 •  The European Union is a political Union
    of 27 member states
 •  One of the mandate of the EU is to
    harmonise legislation in selected areas
 •  It has adopted several Framework
    Decision and Directives to harmonise
                                                Picture removed in print version
    the legislation with regard to Cybercrime   Bild zur Druckoptimierung entfernt

 •  The 27 member states are obliged to                                  EUROPEAN UNION

    implement the legislation within the
    given time period




Gercke, Cybercrime                                                                        Page: 19
EUROPEAN COMMUNITY / UNION
                                                                FD Attacks Information Systems

                                  FD Child Pornography             Dir. Data Retention

                  FD Combating Fraud                                                 Amendment FD Terrorism

Counc. D. Child Pornography                                                                             Draft Directive Child Pornography

                                                                                                                 Draft Directive Attacks Information Systems




     97      98     99    00     01     02    03    04     05      06     07    08       09   10   10      11




                                   Safer Information Society                General Policy Cybercrime

                            eEurope Action Plan

                      Action plan harmful content

          Communication harmful content


     Cybercrime                                                                                                                                      Page: 20
COUNCIL OF EUROPE

 •  Council of Europe is an international
    organisation focusing on the European
    integration

 •  47 member states

 •  Convention on Cybercrime (2001)         Picture removed in print version
                                            Bild zur Druckoptimierung entfernt
                                                                     COUNCIL OF EUROPE
 •  First addition protocol to the
    Convention on Cybercrime (2003)

 •  Convention on the protection of
    children against sexual exploitation
    and sexual abuse (2007)




Gercke, Cybercrime                                                                       Page: 21
UNITED NATIONS

 •  United Nations Organisation is an
    international organisation (192 member
    states)
 •  In 1990 the UN GA adopted a resolution
    dealing with computer crime legislation
 •  In 2000 the UN GA adopted a resolution
                                              Picture removed in print version
    on combating the criminal misuse of       Bild zur Druckoptimierung entfernt
    information technology                                             UNITED NATIONS ORGANISATION

 •  In 2002 the UN GA adopted a second
    resolution on the criminal misuse of
    information technology




Gercke, Cybercrime                                                                               Page: 22
Cybercrime
                                                                                                                                                                                                                                                                                                                                                                                                               Law
                                                                                                                                                                                                                                                                                                                                                                                                               Criminal




                                                                                                                                                                           EU DI Child Pornography (2011)
                                                                                                                                                                                                                                                       EU FD Child Pornography (2003)
                                                                                                                                                                                                                                                                                        EU FD Non-Cash Payment (2001)




                                                    Commonwealth Model Law (2002)
                                                                                                                                                                                                                                                                                                                                                                     CoE Cybercrime Convention (2001)
                                                                                                                                                                                                                                                                                                                                                                                                               Substantive




                                                                                       Draft African Union Convention (2011)




               HIPCAR Cybercrime Model Law (2010)
                                                                                                                               EU Draft DI Attacks Information S. (2011)
                                                                                                                                                                                                                                                                                                                        CoE Convention Protection Children (2007)




                                                                                                                                                                                                            EU FD Attacks Information Systems (2005)
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Access to a Computer




                                                    ✔
                                                                                                                               ✔
                                                                                                                                                                                                            ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Remaining in a Computer

                                                                                                                                                                                                                                                                                                                                                                                                        System Interference




                                                                                                                                                                                                            ✔
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Interception




             ✔ ✔ ✔ ✔
                                                    ✔ ✔
                                                                                    ✔ ✔ ✔ ✔
                                                                                                                               ✔ ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔ ✔


                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Access to Computer Data

                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Data Input




                                                                                    ✔
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Aquisition of Comp. Data

                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Data Interference




             ✔ ✔
                                                    ✔
                                                                                                                               ✔
                                                                                                                                                                                                            ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Use of Data

                                                                                                                                                                                                                                                                                                                                                                                                        Violation of Data Protection Regul.

                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Devices / Misuse of Devices




                                                    ✔
                                                                                                                               ✔

                                                                                                                                                                                                                                                                                                                                                                                                        Computer-related Fraud
                                                                                                                                                                                                                                                                                        ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Computer-related Forgery



             ✔ ✔ ✔
                                                                                    ✔ ✔ ✔ ✔ ✔ ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔ ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Indecent Material

                                                                                                                                                                                                                                                                                                                                                                                                        Pornography

                                                                                                                                                                                                                                                                                                                                                                                                        Child Pornography
                                                    ✔
                                                                                    ✔ ✔
                                                                                                                                                                                                                                                       ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Solicitation of Children
             ✔
                                                                                                                                                                           ✔ ✔
                                                                                                                                                                                                                                                                                                                        ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Dissemination of Racistic Material
                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Identity-related Crime

                                                                                                                                                                                                                                                                                                                                                                                                        SPAM

                                                                                                                                                                                                                                                                                                                                                                                                        Threat and Harassment
             ✔ ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Disclosure of an Investigation
                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Copyright Violation
                                                                                                                                                                                                                                                                                                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Violation of Secrecy
                                                                                    ✔




page: 23
UN MEMBER STATES




Cybercrime          Page: 24
UN MEMBER STATES




Cybercrime          Page: 25
COE MEMBER STATES




Cybercrime           Page: 26
COE MEMBER STATES



 WHO WAS INVITED TO DRAFT ?




Cybercrime                    Page: 27
COE MEMBER STATES



             IMPLEMENTATION 10 YEARS




Cybercrime                             Page: 28
BRINGING LEGISLATION INTO CONTEXT




Cybercrime                           page: 29
COMPONENTS




              Substantive Criminal Law

              Procedural Law

              International Cooperation


              Convention on Cybercrime


Cybercrime                                Page: 30
National Cybersecurity
               Strategy




Cybercrime
               Cybercrime                                                                                                              Technology,
               Policy                                                                                                                  CERT, ....    COMPONENTS

                     Criminal                                                                                                  Crime Prevention,
                     Law                                                                                                       Technology




             Liability of ISPs
                                                                                   Procedural Law



                                 Electronic Evidence
                                                                                                    Substantive Criminal Law




                                                       International Cooperation




                     Trained
                     Investigators

                     Equiptment
                     Training
Page: 31
Prof. Dr. Marco Gercke

             Niehler Str. 35
             D-50733 Cologne, Germany
             gercke@cybercrime.de
             www.cybercrime-institute.com




Cybercrime                                  Page: 32

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

cyber security
cyber securitycyber security
cyber security
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
cyber security
cyber security cyber security
cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 

Destaque

Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international securityParas Bhutto
 
The United States Government Has Some New Rules
The United States Government Has Some New RulesThe United States Government Has Some New Rules
The United States Government Has Some New RulesExport Experts, LLC
 
Security and terrorism
Security and terrorismSecurity and terrorism
Security and terrorismRobert Young
 
2013 global security report
2013 global security report2013 global security report
2013 global security reportYury Chemerkin
 

Destaque (20)

Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international security
 
The United States Government Has Some New Rules
The United States Government Has Some New RulesThe United States Government Has Some New Rules
The United States Government Has Some New Rules
 
Security and terrorism
Security and terrorismSecurity and terrorism
Security and terrorism
 
2013 global security report
2013 global security report2013 global security report
2013 global security report
 
Global informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuanGlobal informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuan
 
Chuan weihoo_IISF2011
Chuan weihoo_IISF2011Chuan weihoo_IISF2011
Chuan weihoo_IISF2011
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
 
02. R U Sure U R Secure
02. R U Sure U R Secure02. R U Sure U R Secure
02. R U Sure U R Secure
 
Summary report cc brti
Summary report cc brtiSummary report cc brti
Summary report cc brti
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk IndonesiaDR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-GovernmentTasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
 
Developing a Legal Framework for Privacy
Developing a Legal Framework for PrivacyDeveloping a Legal Framework for Privacy
Developing a Legal Framework for Privacy
 
04. SAKTTI Introduction
04. SAKTTI Introduction04. SAKTTI Introduction
04. SAKTTI Introduction
 
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi NasionalSkema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
 

Semelhante a INTERNATIONAL SECURITY MEASURES IN CYBERSPACE

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseIOSR Journals
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Delivering enterprise architecture
Delivering enterprise architectureDelivering enterprise architecture
Delivering enterprise architectureBas van Gils
 
Architecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapArchitecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapiCMG International
 
Comparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docxComparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docxmaxinesmith73660
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkIJCSIS Research Publications
 
Pariveda ECM Patterns for Large Enterprises - chicago
Pariveda   ECM Patterns for Large Enterprises - chicagoPariveda   ECM Patterns for Large Enterprises - chicago
Pariveda ECM Patterns for Large Enterprises - chicagomsteinbergtx
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moserNASAPMC
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moserNASAPMC
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Daljit Banger
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Daljit Banger
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherEOTSS
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJSherry Jones
 
Ontology engineering ESTC2008
Ontology engineering ESTC2008Ontology engineering ESTC2008
Ontology engineering ESTC2008Elena Simperl
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...Health Level Seven
 

Semelhante a INTERNATIONAL SECURITY MEASURES IN CYBERSPACE (20)

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an Enterprise
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Delivering enterprise architecture
Delivering enterprise architectureDelivering enterprise architecture
Delivering enterprise architecture
 
Architecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapArchitecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmap
 
Comparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docxComparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docx
 
I018115768
I018115768I018115768
I018115768
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
Pariveda ECM Patterns for Large Enterprises - chicago
Pariveda   ECM Patterns for Large Enterprises - chicagoPariveda   ECM Patterns for Large Enterprises - chicago
Pariveda ECM Patterns for Large Enterprises - chicago
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moser
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moser
 
111.pptx
111.pptx111.pptx
111.pptx
 
CeBIT-Preview Hamburg
CeBIT-Preview HamburgCeBIT-Preview Hamburg
CeBIT-Preview Hamburg
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better Together
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
Ontology engineering ESTC2008
Ontology engineering ESTC2008Ontology engineering ESTC2008
Ontology engineering ESTC2008
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
 

Mais de Directorate of Information Security | Ditjen Aptika

Mais de Directorate of Information Security | Ditjen Aptika (20)

Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor KesehatanSosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor Kesehatan
 
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan TelekomunikasiSosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
 
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor TranportasiSosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
 
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan UdaraSosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
 
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan BatubaraSosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
 
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang KetenagalistrikanSosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
 
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118
 
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasiStandar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior LazuardiDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim GautamaDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
 
Teguh arifiyadi ls skse
Teguh arifiyadi ls skseTeguh arifiyadi ls skse
Teguh arifiyadi ls skse
 
Konny sagala skema kelaikan se
Konny sagala skema kelaikan seKonny sagala skema kelaikan se
Konny sagala skema kelaikan se
 
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronikIntan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
 
Uji Publik RPM SMPI Fetri Miftah
Uji Publik RPM SMPI  Fetri MiftahUji Publik RPM SMPI  Fetri Miftah
Uji Publik RPM SMPI Fetri Miftah
 
RPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim GautamaRPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim Gautama
 
SNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar SiregarSNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar Siregar
 
RPM SMPI
RPM SMPIRPM SMPI
RPM SMPI
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

INTERNATIONAL SECURITY MEASURES IN CYBERSPACE

  • 1. INTERNATIONAL SECURITY MEASURES IN CYBERSPACE Indonesia Information Security Forum 10.10.2012, Bandung, Indonesia Prof. Dr. Marco Gercke Cybercrime Page: 1
  • 2. WHAT ARE CYBER SECURITY MEASURES BRINGING CYBER SECURITY AND CYBERCRIME INTO CONTEXT Cybercrime Page: 2
  • 3. CYBERCRIME / CYBERSECURITY •  Cybersecurity is broader than just Components of Cybersecurity Cybercrime Strategy (based on ITU GCA) •  If a government employee accidentally drops an external storage device with important data that were not included in backup-plans it is a serious Cybersecurity incident – but not a crime •  Based on the ITU Global Cybersecurity Agenda (GCA) it is possible to divide between 5 different pillars related to Cybersecurity (legal measures, technical Measures Legal Measures Techn. / Proced. Structures Organizational Building Capacity Cooperation International and procedural measures, organizational structures, capacity building and international cooperation Cybercrime Page: 3
  • 4. CYBERCRIME / CYBERSECURITY •  Within all pillars Cybercrime needs to be Components of Cybersecurity addressed Strategy (based on ITU GCA) •  In some pillars (such as international cooperation) Cybercrime may even be the dominant part (international cooperation in Cybercrime investigations) •  The same is relevant with regard to legal measures. Cybercrime legislation is in many country the most complex part of a Cybersecurity legal framework Measures Legal Measures Techn. / Proced. Structures Organizational Building Capacity Cooperation International •  But it is important to always keep in mind that in each pillar other issues will need to be addressed. Cybercrime Page: 4
  • 5. CYBERCRIME / CYBERSECURITY •  And it is important to see that some Components of Cybersecurity components are not solely related to Strategy (based on ITU GCA) Cybercrime •  Example: CERT •  Preventing Cybercrime, analysing trends related to Cybercrime, development of tools in the fight against Cybercrime, capacity building and support of law CERT enforcement agencies in fighting Cybercrime can be important tasks for a cert Measures Legal Measures Techn. / Proced. Structures Organizational Building Capacity Cooperation International •  But not all work of a CERT will be related to Cybercrime Cybercrime Page: 5
  • 7. TCP/IP •  The Internet uses globally applicable technical standards •  Whoever does not apply the global standards is in most cases excluded from using the network Picture removed in print version Bild zur Druckoptimierung entfernt •  With regard to Cybersecurity there is a IOL News 2011 lack in applying global standards Cybercrime Page: 7
  • 8. WHAT IS COMPUTER CRIME AND CYBERCRIME Cybercrime page: 8
  • 9. 198oth •  Increasing use of personal computers •  Lead to an increase in the potential number of targets •  First cases of software piracy •  In addition malicious software was more frequently produced and distributed Picture removed in print version Bild zur Druckoptimierung entfernt Source: Wikipedia with ref to B. Bertram Cybercrime page: 9
  • 10. 198oth - HISTORY OF VIRUSES •  1982 the “Elk Cloner” virus was created (by Rich Skrenta). Designed for Apple OS •  1986 “Brain Virus” was identified. Virus was designed for MS-DOS Picture removed in print version Bild zur Druckoptimierung entfernt Example •  1986 the the file virus “Virdem” followed •  1990 the first polymorph virus attack “Tequila” was started Cybercrime Seite: 10
  • 11. 198oth- MATH VIRUS •  „Math virus“ stopped the computer after 30 steps and displays a simple addition or subtraction questions •  Execution of the program is denied unless the correct answer is given by the user Picture removed in print version Bild zur Druckoptimierung entfernt Math Virus Cybercrime Seite: 11
  • 12. 198oth – WALKER VIRUS •  Relatively harmless virus •  Walker virus: Displays occasionally an animation Picture removed in print version Bild zur Druckoptimierung entfernt Walker Virus Cybercrime Seite: 12
  • 13. 199oth •  Introduction of the graphical user interface WWW (World Wide Web) in the 1990th lead to an increasing popularity of the network •  It became easier to use the services offered •  In addition it enabled the spreading of Picture removed in print version pictures, audio and video Bild zur Druckoptimierung entfernt Source: Wikipedia with ref. to Cailliau •  In addition the Internet eased transnational communication •  Went along with several challenges for law enforcement Cybercrime page: 13
  • 14. 1990th - VIRUS •  While in the 1980th the speed of the distribution was limited due to the distribution by physical data storage media exchange it was less limited with the intensive use of the Internet Picture removed in print version Bild zur Druckoptimierung entfernt Example Cybercrime Seite: 14
  • 15. ACTIVITIES OF REG. AND INT. ORGANIZATIONS RELATED TO CYBERCRIME Cybercrime page: 15
  • 16. COMMONWEALTH OF NATIONS •  The Commonwealth of Nations is a voluntary association of sovereign states •  Currently 53 associated states •  In 2002 the Commonwealth presented Picture removed in print version Bild zur Druckoptimierung entfernt a model law on Cybercrime that COMMONWEALTH MEMBER STATES provides a legal framework to address Cybercrime •  The model law was intentionally drafted in accordance with the Convention on Cybercrime Gercke, Cybercrime Page: 16
  • 17. ECONOMIC COMMUNITY OF WEST AFR. •  The Economic Community of West African States is a regional group of west African Countries •  Founded in 1975 it has currently fifteen member states Picture removed in print version Bild zur Druckoptimierung entfernt •  In 2009 ECOWAS adopted the Directive ECOWAS MEMBER STATES on Fighting Cybercrime in ECOWAS that provides a legal framework for the member states •  Directive includes substantive criminal law as well as procedural law Gercke, Cybercrime Page: 17
  • 18. EAST AFRICAN COMMUNITY •  5 Member states (Kenya, Uganda, Tanzania, Burundi, Rwanda) •  Within the framework of an update of ICT legislation (EAC Legal Framework for Cyberlaws) EAS also addressed the issues of Cybercrime Picture removed in print version Bild zur Druckoptimierung entfernt EAC MEMBER STATES •  Provisions dealing with the criminalisation of certain conduct became part of the draft legislation Gercke, Cybercrime Page: 18
  • 19. EUROPEAN UNION •  The European Union is a political Union of 27 member states •  One of the mandate of the EU is to harmonise legislation in selected areas •  It has adopted several Framework Decision and Directives to harmonise Picture removed in print version the legislation with regard to Cybercrime Bild zur Druckoptimierung entfernt •  The 27 member states are obliged to EUROPEAN UNION implement the legislation within the given time period Gercke, Cybercrime Page: 19
  • 20. EUROPEAN COMMUNITY / UNION FD Attacks Information Systems FD Child Pornography Dir. Data Retention FD Combating Fraud Amendment FD Terrorism Counc. D. Child Pornography Draft Directive Child Pornography Draft Directive Attacks Information Systems 97 98 99 00 01 02 03 04 05 06 07 08 09 10 10 11 Safer Information Society General Policy Cybercrime eEurope Action Plan Action plan harmful content Communication harmful content Cybercrime Page: 20
  • 21. COUNCIL OF EUROPE •  Council of Europe is an international organisation focusing on the European integration •  47 member states •  Convention on Cybercrime (2001) Picture removed in print version Bild zur Druckoptimierung entfernt COUNCIL OF EUROPE •  First addition protocol to the Convention on Cybercrime (2003) •  Convention on the protection of children against sexual exploitation and sexual abuse (2007) Gercke, Cybercrime Page: 21
  • 22. UNITED NATIONS •  United Nations Organisation is an international organisation (192 member states) •  In 1990 the UN GA adopted a resolution dealing with computer crime legislation •  In 2000 the UN GA adopted a resolution Picture removed in print version on combating the criminal misuse of Bild zur Druckoptimierung entfernt information technology UNITED NATIONS ORGANISATION •  In 2002 the UN GA adopted a second resolution on the criminal misuse of information technology Gercke, Cybercrime Page: 22
  • 23. Cybercrime Law Criminal EU DI Child Pornography (2011) EU FD Child Pornography (2003) EU FD Non-Cash Payment (2001) Commonwealth Model Law (2002) CoE Cybercrime Convention (2001) Substantive Draft African Union Convention (2011) HIPCAR Cybercrime Model Law (2010) EU Draft DI Attacks Information S. (2011) CoE Convention Protection Children (2007) EU FD Attacks Information Systems (2005) Illegal Access to a Computer ✔ ✔ ✔ ✔ Illegal Remaining in a Computer System Interference ✔ Illegal Interception ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ Illegal Access to Computer Data Illegal Data Input ✔ Illegal Aquisition of Comp. Data Illegal Data Interference ✔ ✔ ✔ ✔ ✔ ✔ Illegal Use of Data Violation of Data Protection Regul. Illegal Devices / Misuse of Devices ✔ ✔ Computer-related Fraud ✔ ✔ Computer-related Forgery ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ Indecent Material Pornography Child Pornography ✔ ✔ ✔ ✔ ✔ Solicitation of Children ✔ ✔ ✔ ✔ ✔ Dissemination of Racistic Material ✔ Identity-related Crime SPAM Threat and Harassment ✔ ✔ ✔ Disclosure of an Investigation ✔ Copyright Violation ✔ Violation of Secrecy ✔ page: 23
  • 27. COE MEMBER STATES WHO WAS INVITED TO DRAFT ? Cybercrime Page: 27
  • 28. COE MEMBER STATES IMPLEMENTATION 10 YEARS Cybercrime Page: 28
  • 29. BRINGING LEGISLATION INTO CONTEXT Cybercrime page: 29
  • 30. COMPONENTS Substantive Criminal Law Procedural Law International Cooperation Convention on Cybercrime Cybercrime Page: 30
  • 31. National Cybersecurity Strategy Cybercrime Cybercrime Technology, Policy CERT, .... COMPONENTS Criminal Crime Prevention, Law Technology Liability of ISPs Procedural Law Electronic Evidence Substantive Criminal Law International Cooperation Trained Investigators Equiptment Training Page: 31
  • 32. Prof. Dr. Marco Gercke Niehler Str. 35 D-50733 Cologne, Germany gercke@cybercrime.de www.cybercrime-institute.com Cybercrime Page: 32