1 / 21

T R U S T A N D C O N F I D E N C E

T R U S T A N D C O N F I D E N C E. I N C Y B E R S P A C E. William McCrum Phone: +1 613-990-4493 Fax: +1 613-957-8845 Email: McCrum.William@ic.gc.ca. TSACC - 2. T R U S T A N D C O N F I D E N C E. C a n a d a i s a N e t w o r k e d N a t i o n.

iain
Download Presentation

T R U S T A N D C O N F I D E N C E

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. T R U S T A N D C O N F I D E N C E I N C Y B E R S P A C E William McCrumPhone: +1 613-990-4493Fax: +1 613-957-8845Email: McCrum.William@ic.gc.ca

  2. TSACC -2

  3. T R U S T A N D C O N F I D E N C E C a n a d a i s a N e t w o r k e d N a t i o n • 100% of schools and libraries connected • 400,000 computers to schools • 12,000 volunteer organizations • 7,000 CAP sites • 12 Smart Communities • CA*net3: World’s 1st research optical Internet backbone-40GHz • CA*net4: Initial network capacity of 4-8 times CA*net3 • 62% Households (HIUS 2003) & 75% SMEs Use the Internet (CFIB 2003) • Amongst lowest communications costs in the OECD (OECD, 2003) • # 1 in GOL (Accenture 2001, 2002, 2003) C i t i z e n s, B u s i n e s s e s a n d G o v e r n m e n t s a r e G o i n g O n – L i n e TSACC-3

  4. T R U S T A N D C O N F I D E N C E B r o a d b a n d, T h e N e x t C h a l l e n g e e-health e-business Platform for Innovation and Inclusion e-learning e-content e-government e-meeting e-research B r o a d b a n d ,T h e N e x t O p p o r t u n I t y TSACC -4

  5. Served Community 1584 (29%) Unserved Community 3842 (71%) Total 5426 1000 km T R U S T A N D C O N F I D E N C E Broadband Access Uneven South Korea TSACC -5

  6. T R U S T A N D C O N F I D E N C E N e w T e c h n o l o g I e s . . . • Smart Dust (RFID) • New Satellites • Satellite Radio • Digital Audio Broadcasts • DTV/HDTV • PVR • Video On Demand • Grid Computing • Quantum Computing • Bio Computing • Nanotechnology • Next Generation Networks • Voice Over IP • Peer to Peer • GPS • WiFi • Mesh Networks • 3G • Ultra Wide Band • Broadband Power Line (BPL) • Software Defined Radio N e w V u l n e r a b i l i t y a n d S e c u r i t y I s s u e s TSACC -6

  7. T R U S T A N D C O N F I D E N C E C h a l l e n g e s o f C y b e r s p a c e Privacy Legal Framework User Enforcement Content Infrastructure Threats Vulnerability I n c r e a s e d C o n n e c t i v i t y = D e c r e a s e d S e c u r i t y TSACC -7

  8. T R U S T A N D C O N F I D E N C E C h a l l e n g e s F o r G o v e r n m e n t • Telecom Infrastructure • Information Security • Privacy • Spam • Illegal and Offensive Content • Extraterritoriality • “War Driving” • Black/Grey Market • Lawful Access • Cyber Attacks TSACC -8

  9. T R U S T A N D C O N F I D E N C E T e l e c o m I n f r a s t r u c t u r e C h a l l e n g e s • Effects of Deregulation • Reduced trust • Reduced profit margins • Reduced investment • Reduced security • Vulnerable Architecture S e c u r e T e l e c o m I n f r a s t r u c t u r e i s F u n d a m e n t a l t o S o c i e t y TSACC -9

  10. T R U S T A N D C O N F I D E N C E P r i v a c y C h a l l e n g e s • Privacy/Security tensions • Ensure security, but minimize information collected, used and disclosed • International harmonization • Promote global privacy standards such as OECD Privacy Guidelines D e l i c a t e B a l a n c e B e t w e e n P r i v a c y a n d S e c u r i t y TSACC -10

  11. 900 780 Million 800 700 677 Million 600 500 400 300 200 100 0 2000 2001 2002 2003 T R U S T A N D C O N F I D E N C E S p a m , T h e “ K I L L E R " A p p l i c a t i o n Spam e-mails blocked daily E-mails delivered daily to subscribers Source: AOL A O L ‘ s D a i l y S p a m P r o b l e m s TSACC -11

  12. T R U S T A N D C O N F I D E N C E “ W a r D r i v i n g ” • Hijacking of someone else’s Wi-Fi connection • Using hijacked connection for illegal activities (e.g. child pornography) • November 24, 2003, Toronto • First Canadian Charges for Theft of Telecommunications • This problem will only intensify: • 2002 revenue of Wi-Fi sales was $2 billion • Compounded annual growth rate of 30% is projected through to 2006. • Source: Infonetics Research, San Jose W h o ’ s U s I n g Y o u r N e t w o r k . . .F o r W h a t ? TSACC -12

  13. Aug Jan Mar May Jul Sep Nov Jan Mar May Jul Sep Nov Jan Mar May Jul Oct 2001 2002 2003 T R U S T A N D C O N F I D E N C E A t t a c k s O n O u r N e t w o r k s I n c r e a s i n g 400 Incidents Reported to CanCERT Apr 2000 - Oct 2003 350 300 250 Incidents Reported 200 150 100 50 0 This graph depicts the number of incidents reported to CanCERT (Canada’s Computer Emergency Response Team), per month, during the period 1 April 2000 to 31 October 2003. The majority of these incidents are reported to CanCERT by international incident response teams who are members of FIRST (Forum of Incident Response and Security Teams), or by Canadian businesses and schools. TSACC -13

  14. T R U S T A N D C O N F I D E N C E G o v e r n m e n t R o l e • Coordinated national strategies for cyber security • Collaborate with industry to develop countermeasure strategies • Develop plan to enable emergency response • Develop education and prevention policy • Coordinate international cooperation L e a d e r s h i p TSACC -14

  15. T R U S T A N D C O N F I D E N C E I n C a n a d a • Established: • New Ministry of Public Safety and Emergency Preparedness • Office of Critical Infrastructure Protection and Emergency Preparedness (OCIPEP) • Legal framework and enforcement capability • Close co-operation with Industry N e w G o v e r n m e n tN e w A p p r o a c h TSACC -15

  16. T R U S T A N D C O N F I D E N C E W e M u s t C o n t i n u e T o W o r k T o g e t h e r • Must have the right policy environment to ensure trust and confidence • The road ahead includes engagement at: • OAS • ITU • WTSA 2004 • WSIS • Other forums M u s t D e m o n s t r a t e P r o g r e s sW o r l d S u m m i t o n t h e I n f o r m a t i o n S o c i e t y ( W S I S ) T u n i s 2 0 0 5 TSACC -16

  17. T R U S T A N D C O N F I D E N C E C y b e r S e c u r i t y S ymposium a t W T S A 2 0 0 4 • Information sharing event on Cyber Security planned for 4th October, 2004: • Security and vulnerability issues in telecommunications and information interchange • Raise awareness of the critical nature of these issues • Sponsored by ITU-T C y b e r S e c u r i t y Symposium i n F l o r i a n o p o l i s i s an e x c e l l e n t o p p o r t u n i t y f o r C I T E L c o u n t r i e s t o p a r t i c i p a t e a n d s h a r e v i e w s f r o m t h e R e g i o n. TSACC -17

  18. T R U S T A N D C O N F I D E N C E C y b e r S e c u r i t y Symposium a t W T S A 2 0 0 4 ( C o n t ‘ d ) • Target audience: • Senior management responsible for telecom system design, deployment, operation, policy, regulation, standards and related matters • Issues covered include: • Technical – networks architectures and protocols, telecom network infrastructure • Policy, regulation, legal framework, user responsibilities, etc. S ymposium R e p o r t w i l l b e s u b m i t t ed t o t h e W T S A for information and action as appropriate. TSACC -18

  19. T R U S T A N D C O N F I D E N C E R e s o l u t i o n o n C y b e r s e c u r i t y Recognizing: • The crucial importance of the telecommunications infrastructure to practically all forms of social and economic activity • That the legacy PSTN network has a level of inherent security properties because of its hierarchical structure and built-in management systems • That IP networks with their flat architecture provide much reduced separation between users and network components • That the converged legacy network and IP networks is therefore potentially more vulnerable to intrusion TSACC -19

  20. T R U S T A N D C O N F I D E N C E R e s o l u t i o n o n C y b e r s e c u r i t y( C o n t ’ d ) Further recognizing: • That the number of cyber attacks in terms of worms, viruses, malicious intrusion and thrill-seeker intrusions is on the increase Resolves: • To recommend to the ITU-T that current recommendations, and especially signaling and communications protocol Recommendations be evaluated with respect to their robustness of design and potential for exploitation by malicious parties to interfere destructively with their deployment in the global telecommunications infrastructure. TSACC -20

  21. T R U S T A N D C O N F I D E N C E F o r F u r t h e r I n f o r m a t i o n Industry Canada - www.ic.gc.ca Connecting Canadians - www.connect.gc.ca Consumer Connection - www.strategis.gc.ca Strategis - www.strategis.gc.ca Electronic Commerce - www.e-com.ic.gc.ca Innovation Strategy - www.innovationstrategy.gc.ca Dot Force - www.dotforce.org Broadband - broadband.gc.ca Smart Communities - www.smartcommunities.ic.gc.ca Investment Partnership Canada - www.investincanada.gc.ca Cybertipline - www.cybertip.ca Illegal and Offensive Content - www.cyberwise.gc.ca TSACC -21

More Related