06f4e492864918770f080e35d0b726b1.ppt
- Количество слайдов: 21
7 th Workshop on the Cross-border Disaster e. Response in the e. Region Human Aspects of Cross-border Disaster e. Response – A Part of the Regional Security and Defence Radica A. Gareva, Ph. D Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009 1
The rapid advancement of the computer technology has a great influence over the Dynamic arm competition, thus changing the safety environment and the national values and interests. Cyber Security – New aspect of the Regional Security and the Human being safety 2
WHY? ØThird wave of development – INFORMATION SOCIETY: • Digital & • Networked ØThe KEY FOR SUCCESS IN IT SOCIETY: “INFORMATION DOMINANCE”. 3
ØWE HAVE TO FACE WITH: TRENDS, CHALLENGES & PRIORITIES OF THE REGIONAL SECURITY IN 21 st CENTURY 4
TRENDS: ØGlobalization; ØCooperation & integration of the world politics; ØInternet; ØIT influence on the economy; ØSHARED SERVICES – A Key Trend ØCYBERSPACE – NEW Unconventional Disaster BATTLEFIELD; ØCyber Crime – global terrorist trend ØChanged National interests and values the wave of IT; under 5
CHALLENGES (1): ØSocietal Development – i. Government q Modernization of the IT Infrastructure; q Efficiency and Transparency Increasing q Government Service Delivery Transformation 6
CHALLENGES (2): ØCYBERWAR – “the fifth dimension of the war”; ØHumanbeing in the focus of the Crossborder Disaster e. Response 7
CYBERWAR ØA serial of consecutive actions according the national military strategy for information superiority and jeopardizing enemy’s information systems; ØAchievement of goals by IT; ØSocietal level which could cause organized conflict between two parties, or two or more nations, among widespread and connected information and communication means. 8
CYBERTHERORIZM ØViolence or threaten to innocent victims because of political or social goals, by IT. 9
CYBERCRIME: ØCriminal action which is planned, coordinated and executed in the cyberspace, by methods, skills and IT knowledge, because of some subjective, political or economic goals. CRIMINAL ACTION in cyberspace is: Ø Unauthorized access to computer networks and systems; Ø Disruption of computer’s programs or data; Ø Computer sabotage; Ø Computer espionage; Ø Unauthorized communication interruption; Ø Theft of invisible assets; etc. 10
CYBERCRIME CATHEGORIES: ØCrimes which cause physical harm or potentional physical harm and violence; & ØCrimes without harm and violence. 11
Crimes which cause harms and/or potentional physical loss and violence, by Internet and other IT tools: ØCyberterrorism; ØAttack by threat, by e-mail; ØCyber stalking; ØChild pornography; 12
UNVIOLENCED CYBERCRIME: ØUnauthorized access to the computer systems, because of entertainment or personal attacker challenge; ØCyberspace theft, which includes: ØTransfer of money from the company’s bill to the own bill of the attacker, by internal attacker; ØEndorse of checks, documents, etc. from external intruders; ØCorporative / industrial espionage; ØPlagiarism; ØIdentity theft; ØUnauthorized network services interruption; 13
ØDestructive attacks which mainstream is only services disruption, without information theft, • • • as: hacking; hacking and web-site vandalizing; viruses, worms & Trojans; etc. Cyber prostitution with virtual sexual services; Betting, which is connected with risk of money; Illegal international transfer of money, documents, cryptographic software, etc. 14
PRIORITIES: ØParadigm of Security Strategy Changing; ØAwareness and global security culture developing in the new security environment; ØCritical Information Infrastructure Threats and Risks management; 15
WHO HAS TO FIGHT AGAINST THE CYBER CRIME and TO PROTECT THE HUMANBEING ? ØThe Government, politicians and jurisdictional institutions; ØProfessionals from the Criminality Department; ØIT professionals; & ØThe whole community in general and IT Society separated. 16
WHERE to start from? (1) ØGlobal culture and Cyber space security awareness developing in the Region and wider; ØCorporative security policies developing in the RM & Region, with aim procedures and best cyber security management practices to be shared; ØParadigm security strategy changing; ØThreats & Risks Management Paradigm creating; ØG 8 principles Implementation; 17
WHERE to start from? (2) Ø“Framework for Cooperation on Cyber Defense between NATO and Partner Nations” based on the principles set out in the: - “NATO Policy on Cyber Defense” & - “Council Guidelines for Cooperation on Cyber Defense with Partner Nations and International Organizations, which were approved by the NAC in January and July 2008, respectively. 18
WHERE to start from? (3) ØINDIVIDUAL SECURITY – nucleus of National Security; ØCYBER SECURITY – nucleus of corporative security; ØINDIVIDUAL & CYBER SECURITY – fundament of National & Regional Security. 19
That’s why, understanding the Human Aspects of Cross-border Disaster e. Response as A Part of the Regional Security and Defense, an extended concept of the National and Regional Security is suggested: ØPolitical aspect; ØEconomic aspect; ØSocietal aspect; ØMilitary aspect; ØEcological aspect; & ØCyber aspect. 20
THANK YOU FOR YOUR ATTENTION !!! 21
06f4e492864918770f080e35d0b726b1.ppt