radica a gareva phd ministry of defense of the republic of macedonia skopje may 5 2009 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009 PowerPoint Presentation
Download Presentation
Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

Loading in 2 Seconds...

play fullscreen
1 / 21

Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009 - PowerPoint PPT Presentation


  • 68 Views
  • Uploaded on

7 th Workshop on the Cross-border Disaster eResponse in the eRegion Human Aspects of Cross-border Disaster eResponse – A Part of the Regional Security and Defence. Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009' - martin-foreman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
radica a gareva phd ministry of defense of the republic of macedonia skopje may 5 2009

7th Workshop on the Cross-border Disaster eResponse in the eRegionHuman Aspects of Cross-border Disaster eResponse –A Part of the Regional Security and Defence

Radica A. Gareva, PhD

Ministry of Defense of The Republic of Macedonia

Skopje, May 5, 2009

cyber security new aspect of the regional security and the human being safety

The rapid advancement of the computer technology has a great influence over the Dynamic arm competition, thus changing the safety environment and the national values and interests.

Cyber Security – New aspect of the Regional Security and the Human being safety

slide3
WHY?
  • Third wave of development – INFORMATION SOCIETY:
    • Digital &
    • Networked
  • The KEY FOR SUCCESS IN IT SOCIETY:

“INFORMATION DOMINANCE”.

trends
TRENDS:
  • Globalization;
  • Cooperation & integration of the world politics;
  • Internet;
  • IT influence on the economy;
  • SHARED SERVICES – A Key Trend
  • CYBERSPACE – NEW Unconventional Disaster BATTLEFIELD;
  • Cyber Crime – global terrorist trend
  • Changed National interests and values under the wave of IT;
challenges 1
CHALLENGES (1):
  • Societal Development – iGovernment
    • Modernization of the IT Infrastructure;
    • Efficiency and Transparency Increasing
    • Government Service Delivery Transformation
challenges 2
CHALLENGES (2):
  • CYBERWAR – “the fifth dimension of the war”;
  • Humanbeing in the focus of the Cross-border Disaster eResponse
cyberwar
CYBERWAR
  • A serial of consecutive actions according the national military strategy for information superiority and jeopardizing enemy’s information systems;
  • Achievement of goals by IT;
  • Societal level which could cause organized conflict between two parties, or two or more nations, among widespread and connected information and communication means.
cybertherorizm
CYBERTHERORIZM
  • Violence or threaten to innocent victims because of political or social goals, by IT.
cybercrime
CYBERCRIME:
  • Criminal action which is planned, coordinated and executed in the cyberspace, by methods, skills and IT knowledge, because of some subjective, political or economic goals.

CRIMINAL ACTION in cyberspace is:

  • Unauthorized access to computer networks and systems;
  • Disruption of computer’s programs or data;
  • Computer sabotage;
  • Computer espionage;
  • Unauthorized communication interruption;
  • Theft of invisible assets; etc.
cybercrime cathegories
CYBERCRIME CATHEGORIES:
  • Crimes which cause physical harm or potentional physical harm and violence; &
  • Crimes without harm and violence.
slide12
Crimes which cause harms and/or potentional physical loss and violence, by Internet and other IT tools:
  • Cyberterrorism;
  • Attack by threat, by e-mail;
  • Cyber stalking;
  • Child pornography;
unviolenced cybercrime
UNVIOLENCED CYBERCRIME:
  • Unauthorized access to the computer systems, because of entertainment or personal attacker challenge;
  • Cyberspace theft, which includes:
  • Transfer of money from the company’s bill to the own bill of the attacker, by internal attacker;
  • Endorse of checks, documents, etc. from external intruders;
  • Corporative / industrial espionage;
  • Plagiarism;
  • Identity theft;
  • Unauthorized network services interruption;
slide14
Destructive attacks which mainstream is only services disruption, without information theft, as:
  • hacking;
  • hacking and web-site vandalizing;
  • viruses, worms & Trojans; etc.
  • Cyber prostitution with virtual sexual services;
  • Betting, which is connected with risk of money;
  • Illegal international transfer of money, documents, cryptographic software, etc.
priorities
PRIORITIES:
  • Paradigm of Security Strategy Changing;
  • Awareness and global security culture developing in the new security environment;
  • Critical Information Infrastructure Threats and Risks management;
who has to fight against the cyber crime and to protect the humanbeing
WHO HAS TO FIGHT AGAINST THE CYBER CRIME and TO PROTECT THE HUMANBEING ?
  • The Government, politicians and jurisdictional institutions;
  • Professionals from the Criminality Department;
  • IT professionals; &
  • The whole community in general and IT Society separated.
where to start from 1
WHERE to start from? (1)
  • Global culture and Cyber space security awareness developing in the Region and wider;
  • Corporative security policies developing in the RM & Region, with aim procedures and best cyber security management practices to be shared;
  • Paradigm security strategy changing;
  • Threats & Risks Management Paradigm creating;
  • G8 principles Implementation;
where to start from 2
WHERE to start from? (2)
  • “Framework for Cooperation on Cyber Defense between NATO and Partner Nations” based on the principles set out in the:

- “NATO Policy on Cyber Defense” &

- “Council Guidelines for Cooperation on Cyber Defense with Partner Nations and International Organizations,

which were approved by the NAC in January and July 2008, respectively.

where to start from 3
WHERE to start from?(3)
  • INDIVIDUAL SECURITY – nucleus of National Security;
  • CYBER SECURITY – nucleus of corporative security;
  • INDIVIDUAL & CYBER SECURITY – fundament of National & Regional Security.
slide20

That’s why, understanding the Human Aspects of Cross-border Disaster eResponse as A Part of the Regional Security and Defense, an extended concept of the National and Regional Security is suggested:

  • Political aspect;
  • Economic aspect;
  • Societal aspect;
  • Military aspect;
  • Ecological aspect; &
  • Cyber aspect.