Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats:
1 / 19

Addressing Terrorist Use of the Internet - PowerPoint PPT Presentation

  • Updated On :

Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security. Richard Giragosian Armenian Center for National and International Studies (ACNIS) Yerevan, Armenia 8-9 December 2010. Outline.

Related searches for Addressing Terrorist Use of the Internet

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Addressing Terrorist Use of the Internet' - PamelaLan

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Slide1 l.jpg

Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security

Richard Giragosian

Armenian Center for National and International Studies (ACNIS)

Yerevan, Armenia

8-9 December 2010

Outline l.jpg
Outline Other Threats:

  • Framing the issue: cyber security

    • Significance of cyber security

    • Fundamentals of cyber security

  • Cyber crime

  • Implications for Armenia

    • Social/political

    • Economic

    • Military/security

  • Critical infrastructure

  • Cyber challenges & cyber security goals

  • Conclusions

Framing the issue a comprehensive approach to cyber security l.jpg
Framing the Issue: A Comprehensive Approach to Cyber Security

  • Cyber security requires shared solutions to shared threats

  • Cyber security is a dynamic, not static process

  • Cyber threats know no borders

Significance of cyber security l.jpg
Significance of Cyber Security Security

Cyber Security provides three elements:

  • Engagement: foundation for economic, social and political development

  • Empowerment: platform for activism and social networking for “netizens”

  • Entrepreneurship: incentive for technological innovation and R&D

    Cyber Security is also necessary for the development of a knowledge-based economy

Fundamentals of cyber security l.jpg
Fundamentals of Cyber Security Security

  • Cyber threat preparation: raising awareness and public education of prudent and safe use of Internet

  • Cyber threat perception: understanding the nature of cyber threats

  • Cyber Threat prevention: defending against cyber threats before, not after cyber attacks

Cyber crime l.jpg
Cyber Crime Security

  • Cyber Crime is the use or targeting of a computer network (and the Internet) for criminal enterprise or offense

  • Cyber Crime is not new, and is constantly changing as criminals use advances in technology to commit new, more sophisticated crimes

  • Information is the only commodity that can be stolen without being taken

Cyber crime today l.jpg
Cyber Crime Today Security

  • Serious cyber criminals: more organized, more global, more sophisticated

  • Serious methods: Cyber Criminals can strike ANYONE, ANYWHERE, ANYTIME

  • Law enforcement needs more tools, training & resources, but there is also a need for greater public awareness and for education and training of specialists

Cyber crime cyber security l.jpg
Cyber Crime & Cyber Security Security

  • Cyber Crime is directly linked to cyber security;

  • Cyber security is directly linked to national security

  • The cyber threat is a dynamic and growing threat to security and spans many types of crimes (terrorist financing, money laundering, identity theft, etc.)

Cyber crime as a global threat l.jpg
Cyber Crime as a Global Threat Security

  • Cyber crime is rooted in globalization & the expansion of the networked Internet

  • Cyber crime has no borders or boundaries, and can attack many countries at once

  • Cyber crime has no limits: it can target anyone, anywhere, anytime

The center of gravity the computer l.jpg
The Center of Gravity: SecurityThe Computer

  • a computer can be the target of crime, attacked to damage or steal information from a computer or computer network

  • a computer can be a technique to commit crime, used for fraud or theft

  • a computer can be a tool to fight crime, by analyzing evidence (a “forensic footprint”)

The new cyber threat l.jpg
The New Cyber Threat Security

  • The Internet is a critical, global infrastructure for economic, political and military power

  • Cyber technology creates new dependencies & interdependencies

  • Cyber technologies redefined security: physical attacks have cyber consequences and cyber attacks have physical consequences

Implications for armenia l.jpg
Implications for Armenia Security

  • Social/Political: credibility, efficacy & legitimacy of government efforts

  • Economic: consumer confidence & trust, investment climate

  • Military/Security: cyber war & cyberspace as the new battlefield; protecting critical infrastructure

Social political implications l.jpg
Social/Political Implications Security

  • Credibility & efficacy: combating cyber crime also bolsters state anti-corruption efforts

  • Legitimacy & trust: failure to confront cyber crime leads to a loss of confidence and erosion of trust in government

  • Global responsibility: fighting cyber crime is an essential global obligation

Economic implications for armenia l.jpg
Economic Implications for Armenia Security

Without adequate cyber security, several economic trends emerge:

  • consumer confidence & trust erodes

  • business reputations and the national business environment declines

  • foreign investment is reduced

  • global economic integration is hindered

  • economic development is impeded

Military implications for armenia l.jpg
Military Implications for Armenia Security

Cyber Space as a new battlefield

  • Adversaries are well aware of cyber warfare; new doctrine

  • Terrorists developing cyber capabilities

  • Military communications & critical infrastructure are vulnerable;

    and prone to an over-reliance on existing civilian networks

Critical infrastructure l.jpg

Telecommunications Security

Banking & financial services

Government services: E-Government

Energy networks & safety systems

Transportation- air safety & border security

Defense & security: data networks and communications

Critical Infrastructure

Cyber challenges l.jpg
Cyber Challenges Security

  • To see cyber security being as important as physical security

  • Recognition of the real threat environment

  • Understand that the threat is as diversified as the targets

  • The threat will change as rapidly as technology

Cyber security goals l.jpg
Cyber Security Goals Security

  • Need to raise public awareness of cyber security & safe, prudent use of Internet

  • Assess new cyber trends, threats & vulnerabilities

  • Incorporate lessons learned & international best practices

  • Develop counter measures & safeguards

  • Adopt and pursue comprehensive approach to cyber security

Conclusion l.jpg
Conclusion Security

  • Cyber threats are real & growing

  • New technologies forge new vulnerabilities

  • New vulnerabilities foster new threats

  • As the nature of national security has changed, the response must also adapt

  • And the most important pipelines in this region transport neither oil nor gas…..they carry data, the most significant pipelines are fiber optic