SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
INTERNATIONAL SECURITY MEASURES
 IN CYBERSPACE
 Indonesia Information Security Forum
 10.10.2012, Bandung, Indonesia
 Prof. Dr. Marco Gercke




Cybercrime                              Page: 1
WHAT ARE CYBER SECURITY MEASURES
 BRINGING CYBER SECURITY AND CYBERCRIME INTO CONTEXT




Cybercrime                                             Page: 2
CYBERCRIME / CYBERSECURITY

 •  Cybersecurity is broader than just         Components of Cybersecurity
    Cybercrime                                 Strategy (based on ITU GCA)

 •  If a government employee accidentally
    drops an external storage device with
    important data that were not included in
    backup-plans it is a serious
    Cybersecurity incident – but not a crime
 •  Based on the ITU Global Cybersecurity
    Agenda (GCA) it is possible to divide
    between 5 different pillars related to
    Cybersecurity (legal measures, technical
                                                Measures
                                                Legal


                                                           Measures
                                                           Techn. / Proced.


                                                                              Structures
                                                                              Organizational


                                                                                               Building
                                                                                               Capacity


                                                                                                          Cooperation
                                                                                                          International
    and procedural measures, organizational
    structures, capacity building and
    international cooperation


Cybercrime                                                                                                                Page: 3
CYBERCRIME / CYBERSECURITY

 •  Within all pillars Cybercrime needs to be    Components of Cybersecurity
    addressed                                    Strategy (based on ITU GCA)

 •  In some pillars (such as international
    cooperation) Cybercrime may even be the
    dominant part (international cooperation
    in Cybercrime investigations)

 •  The same is relevant with regard to legal
    measures. Cybercrime legislation is in
    many country the most complex part of a
    Cybersecurity legal framework

                                                  Measures
                                                  Legal


                                                             Measures
                                                             Techn. / Proced.


                                                                                Structures
                                                                                Organizational


                                                                                                 Building
                                                                                                 Capacity


                                                                                                            Cooperation
                                                                                                            International
 •  But it is important to always keep in mind
    that in each pillar other issues will need
    to be addressed.



Cybercrime                                                                                                                  Page: 4
CYBERCRIME / CYBERSECURITY

 •  And it is important to see that some         Components of Cybersecurity
    components are not solely related to         Strategy (based on ITU GCA)
    Cybercrime
 •  Example: CERT
 •  Preventing Cybercrime, analysing trends
    related to Cybercrime, development of
    tools in the fight against Cybercrime,
    capacity building and support of law
                                                                                CERT
    enforcement agencies in fighting
    Cybercrime can be important tasks for a
    cert
                                                  Measures
                                                  Legal


                                                             Measures
                                                             Techn. / Proced.


                                                                                Structures
                                                                                Organizational


                                                                                                 Building
                                                                                                 Capacity


                                                                                                            Cooperation
                                                                                                            International
 •  But not all work of a CERT will be related
    to Cybercrime



Cybercrime                                                                                                                  Page: 5
GLOBAL STANDARDS




Cybercrime          page: 6
TCP/IP

 •  The Internet uses globally applicable
    technical standards

 •  Whoever does not apply the global
    standards is in most cases excluded
    from using the network
                                              Picture removed in print version
                                              Bild zur Druckoptimierung entfernt
 •  With regard to Cybersecurity there is a                            IOL News 2011

    lack in applying global standards




Cybercrime                                                                             Page: 7
WHAT IS COMPUTER CRIME AND CYBERCRIME




Cybercrime                               page: 8
198oth

 •  Increasing use of personal computers

 •  Lead to an increase in the potential
    number of targets

 •  First cases of software piracy

 •  In addition malicious software was more
    frequently produced and distributed
                                              Picture removed in print version
                                              Bild zur Druckoptimierung entfernt
                                                                       Source: Wikipedia with ref to B. Bertram




Cybercrime                                                                                               page: 9
198oth - HISTORY OF VIRUSES

 •  1982 the “Elk Cloner” virus was created
    (by Rich Skrenta). Designed for Apple OS


 •  1986 “Brain Virus” was identified. Virus
    was designed for MS-DOS
                                                Picture removed in print version
                                                Bild zur Druckoptimierung entfernt
                                                                         Example
 •  1986 the the file virus “Virdem” followed


 •  1990 the first polymorph virus attack
    “Tequila” was started




Cybercrime                                                                           Seite: 10
198oth- MATH VIRUS

 •  „Math virus“ stopped the computer after
    30 steps and displays a simple addition
    or subtraction questions

 •  Execution of the program is denied
    unless the correct answer is given by the
    user



                                                Picture removed in print version
                                                Bild zur Druckoptimierung entfernt
                                                                         Math Virus




Cybercrime                                                                            Seite: 11
198oth – WALKER VIRUS

 •  Relatively harmless virus

 •  Walker virus: Displays occasionally an
    animation




                                             Picture removed in print version
                                             Bild zur Druckoptimierung entfernt
                                                                      Walker Virus




Cybercrime                                                                           Seite: 12
199oth

 •  Introduction of the graphical user
    interface WWW (World Wide Web) in
    the 1990th lead to an increasing
    popularity of the network

 •  It became easier to use the services
    offered

 •  In addition it enabled the spreading of
                                              Picture removed in print version
    pictures, audio and video                 Bild zur Druckoptimierung entfernt
                                                                       Source: Wikipedia with ref. to Cailliau

 •  In addition the Internet eased
    transnational communication

 •  Went along with several challenges for
    law enforcement


Cybercrime                                                                                                page: 13
1990th - VIRUS

 •  While in the 1980th the speed of the
    distribution was limited due to the
    distribution by physical data storage
    media exchange it was less limited with
    the intensive use of the Internet

                                              Picture removed in print version
                                              Bild zur Druckoptimierung entfernt
                                                                       Example




Cybercrime                                                                         Seite: 14
ACTIVITIES OF REG. AND INT. ORGANIZATIONS
 RELATED TO CYBERCRIME




Cybercrime                                   page: 15
COMMONWEALTH OF NATIONS

 •  The Commonwealth of Nations is a
    voluntary association of sovereign
    states

 •  Currently 53 associated states

 •  In 2002 the Commonwealth presented      Picture removed in print version
                                            Bild zur Druckoptimierung entfernt
    a model law on Cybercrime that                                   COMMONWEALTH MEMBER STATES
    provides a legal framework to address
    Cybercrime

 •  The model law was intentionally
    drafted in accordance with the
    Convention on Cybercrime




Gercke, Cybercrime                                                                           Page: 16
ECONOMIC COMMUNITY OF WEST AFR.

 •  The Economic Community of West
    African States is a regional group of
    west African Countries

 •  Founded in 1975 it has currently fifteen
    member states
                                               Picture removed in print version
                                               Bild zur Druckoptimierung entfernt
 •  In 2009 ECOWAS adopted the Directive                                ECOWAS MEMBER STATES
    on Fighting Cybercrime in ECOWAS
    that provides a legal framework for the
    member states

 •  Directive includes substantive criminal
    law as well as procedural law




Gercke, Cybercrime                                                                             Page: 17
EAST AFRICAN COMMUNITY

 •  5 Member states (Kenya, Uganda,
    Tanzania, Burundi, Rwanda)

 •  Within the framework of an update of
    ICT legislation (EAC Legal Framework
    for Cyberlaws) EAS also addressed the
    issues of Cybercrime                    Picture removed in print version
                                            Bild zur Druckoptimierung entfernt
                                                                     EAC MEMBER STATES
 •  Provisions dealing with the
    criminalisation of certain conduct
    became part of the draft legislation




Gercke, Cybercrime                                                                       Page: 18
EUROPEAN UNION

 •  The European Union is a political Union
    of 27 member states
 •  One of the mandate of the EU is to
    harmonise legislation in selected areas
 •  It has adopted several Framework
    Decision and Directives to harmonise
                                                Picture removed in print version
    the legislation with regard to Cybercrime   Bild zur Druckoptimierung entfernt

 •  The 27 member states are obliged to                                  EUROPEAN UNION

    implement the legislation within the
    given time period




Gercke, Cybercrime                                                                        Page: 19
EUROPEAN COMMUNITY / UNION
                                                                FD Attacks Information Systems

                                  FD Child Pornography             Dir. Data Retention

                  FD Combating Fraud                                                 Amendment FD Terrorism

Counc. D. Child Pornography                                                                             Draft Directive Child Pornography

                                                                                                                 Draft Directive Attacks Information Systems




     97      98     99    00     01     02    03    04     05      06     07    08       09   10   10      11




                                   Safer Information Society                General Policy Cybercrime

                            eEurope Action Plan

                      Action plan harmful content

          Communication harmful content


     Cybercrime                                                                                                                                      Page: 20
COUNCIL OF EUROPE

 •  Council of Europe is an international
    organisation focusing on the European
    integration

 •  47 member states

 •  Convention on Cybercrime (2001)         Picture removed in print version
                                            Bild zur Druckoptimierung entfernt
                                                                     COUNCIL OF EUROPE
 •  First addition protocol to the
    Convention on Cybercrime (2003)

 •  Convention on the protection of
    children against sexual exploitation
    and sexual abuse (2007)




Gercke, Cybercrime                                                                       Page: 21
UNITED NATIONS

 •  United Nations Organisation is an
    international organisation (192 member
    states)
 •  In 1990 the UN GA adopted a resolution
    dealing with computer crime legislation
 •  In 2000 the UN GA adopted a resolution
                                              Picture removed in print version
    on combating the criminal misuse of       Bild zur Druckoptimierung entfernt
    information technology                                             UNITED NATIONS ORGANISATION

 •  In 2002 the UN GA adopted a second
    resolution on the criminal misuse of
    information technology




Gercke, Cybercrime                                                                               Page: 22
Cybercrime
                                                                                                                                                                                                                                                                                                                                                                                                               Law
                                                                                                                                                                                                                                                                                                                                                                                                               Criminal




                                                                                                                                                                           EU DI Child Pornography (2011)
                                                                                                                                                                                                                                                       EU FD Child Pornography (2003)
                                                                                                                                                                                                                                                                                        EU FD Non-Cash Payment (2001)




                                                    Commonwealth Model Law (2002)
                                                                                                                                                                                                                                                                                                                                                                     CoE Cybercrime Convention (2001)
                                                                                                                                                                                                                                                                                                                                                                                                               Substantive




                                                                                       Draft African Union Convention (2011)




               HIPCAR Cybercrime Model Law (2010)
                                                                                                                               EU Draft DI Attacks Information S. (2011)
                                                                                                                                                                                                                                                                                                                        CoE Convention Protection Children (2007)




                                                                                                                                                                                                            EU FD Attacks Information Systems (2005)
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Access to a Computer




                                                    ✔
                                                                                                                               ✔
                                                                                                                                                                                                            ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Remaining in a Computer

                                                                                                                                                                                                                                                                                                                                                                                                        System Interference




                                                                                                                                                                                                            ✔
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Interception




             ✔ ✔ ✔ ✔
                                                    ✔ ✔
                                                                                    ✔ ✔ ✔ ✔
                                                                                                                               ✔ ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔ ✔


                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Access to Computer Data

                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Data Input




                                                                                    ✔
                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Aquisition of Comp. Data

                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Data Interference




             ✔ ✔
                                                    ✔
                                                                                                                               ✔
                                                                                                                                                                                                            ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Use of Data

                                                                                                                                                                                                                                                                                                                                                                                                        Violation of Data Protection Regul.

                                                                                                                                                                                                                                                                                                                                                                                                        Illegal Devices / Misuse of Devices




                                                    ✔
                                                                                                                               ✔

                                                                                                                                                                                                                                                                                                                                                                                                        Computer-related Fraud
                                                                                                                                                                                                                                                                                        ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Computer-related Forgery



             ✔ ✔ ✔
                                                                                    ✔ ✔ ✔ ✔ ✔ ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔ ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Indecent Material

                                                                                                                                                                                                                                                                                                                                                                                                        Pornography

                                                                                                                                                                                                                                                                                                                                                                                                        Child Pornography
                                                    ✔
                                                                                    ✔ ✔
                                                                                                                                                                                                                                                       ✔
                                                                                                                                                                                                                                                                                                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Solicitation of Children
             ✔
                                                                                                                                                                           ✔ ✔
                                                                                                                                                                                                                                                                                                                        ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Dissemination of Racistic Material
                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Identity-related Crime

                                                                                                                                                                                                                                                                                                                                                                                                        SPAM

                                                                                                                                                                                                                                                                                                                                                                                                        Threat and Harassment
             ✔ ✔ ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Disclosure of an Investigation
                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Copyright Violation
                                                                                                                                                                                                                                                                                                                                                                    ✔




                                                                                                                                                                                                                                                                                                                                                                                                        Violation of Secrecy
                                                                                    ✔




page: 23
UN MEMBER STATES




Cybercrime          Page: 24
UN MEMBER STATES




Cybercrime          Page: 25
COE MEMBER STATES




Cybercrime           Page: 26
COE MEMBER STATES



 WHO WAS INVITED TO DRAFT ?




Cybercrime                    Page: 27
COE MEMBER STATES



             IMPLEMENTATION 10 YEARS




Cybercrime                             Page: 28
BRINGING LEGISLATION INTO CONTEXT




Cybercrime                           page: 29
COMPONENTS




              Substantive Criminal Law

              Procedural Law

              International Cooperation


              Convention on Cybercrime


Cybercrime                                Page: 30
National Cybersecurity
               Strategy




Cybercrime
               Cybercrime                                                                                                              Technology,
               Policy                                                                                                                  CERT, ....    COMPONENTS

                     Criminal                                                                                                  Crime Prevention,
                     Law                                                                                                       Technology




             Liability of ISPs
                                                                                   Procedural Law



                                 Electronic Evidence
                                                                                                    Substantive Criminal Law




                                                       International Cooperation




                     Trained
                     Investigators

                     Equiptment
                     Training
Page: 31
Prof. Dr. Marco Gercke

             Niehler Str. 35
             D-50733 Cologne, Germany
             gercke@cybercrime.de
             www.cybercrime-institute.com




Cybercrime                                  Page: 32

Más contenido relacionado

La actualidad más candente

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 

La actualidad más candente (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
cyber crime
cyber crimecyber crime
cyber crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Network security
Network securityNetwork security
Network security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 

Destacado

Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international securityParas Bhutto
 
The United States Government Has Some New Rules
The United States Government Has Some New RulesThe United States Government Has Some New Rules
The United States Government Has Some New RulesExport Experts, LLC
 
Security and terrorism
Security and terrorismSecurity and terrorism
Security and terrorismRobert Young
 
2013 global security report
2013 global security report2013 global security report
2013 global security reportYury Chemerkin
 

Destacado (20)

Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international security
 
The United States Government Has Some New Rules
The United States Government Has Some New RulesThe United States Government Has Some New Rules
The United States Government Has Some New Rules
 
Security and terrorism
Security and terrorismSecurity and terrorism
Security and terrorism
 
2013 global security report
2013 global security report2013 global security report
2013 global security report
 
Global informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuanGlobal informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuan
 
Chuan weihoo_IISF2011
Chuan weihoo_IISF2011Chuan weihoo_IISF2011
Chuan weihoo_IISF2011
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
 
02. R U Sure U R Secure
02. R U Sure U R Secure02. R U Sure U R Secure
02. R U Sure U R Secure
 
Summary report cc brti
Summary report cc brtiSummary report cc brti
Summary report cc brti
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk IndonesiaDR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-GovernmentTasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
 
Developing a Legal Framework for Privacy
Developing a Legal Framework for PrivacyDeveloping a Legal Framework for Privacy
Developing a Legal Framework for Privacy
 
04. SAKTTI Introduction
04. SAKTTI Introduction04. SAKTTI Introduction
04. SAKTTI Introduction
 
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi NasionalSkema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
 

Similar a INTERNATIONAL SECURITY MEASURES IN CYBERSPACE

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseIOSR Journals
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Delivering enterprise architecture
Delivering enterprise architectureDelivering enterprise architecture
Delivering enterprise architectureBas van Gils
 
Architecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapArchitecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapiCMG International
 
Comparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docxComparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docxmaxinesmith73660
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkIJCSIS Research Publications
 
Pariveda ECM Patterns for Large Enterprises - chicago
Pariveda   ECM Patterns for Large Enterprises - chicagoPariveda   ECM Patterns for Large Enterprises - chicago
Pariveda ECM Patterns for Large Enterprises - chicagomsteinbergtx
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moserNASAPMC
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moserNASAPMC
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Daljit Banger
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Daljit Banger
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherEOTSS
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJSherry Jones
 
Ontology engineering ESTC2008
Ontology engineering ESTC2008Ontology engineering ESTC2008
Ontology engineering ESTC2008Elena Simperl
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...Health Level Seven
 

Similar a INTERNATIONAL SECURITY MEASURES IN CYBERSPACE (20)

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an Enterprise
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Delivering enterprise architecture
Delivering enterprise architectureDelivering enterprise architecture
Delivering enterprise architecture
 
Architecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapArchitecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmap
 
Comparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docxComparison ResultsThe two articles are 88 unique. Executive s.docx
Comparison ResultsThe two articles are 88 unique. Executive s.docx
 
I018115768
I018115768I018115768
I018115768
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
Pariveda ECM Patterns for Large Enterprises - chicago
Pariveda   ECM Patterns for Large Enterprises - chicagoPariveda   ECM Patterns for Large Enterprises - chicago
Pariveda ECM Patterns for Large Enterprises - chicago
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moser
 
Bryan.moser
Bryan.moserBryan.moser
Bryan.moser
 
111.pptx
111.pptx111.pptx
111.pptx
 
CeBIT-Preview Hamburg
CeBIT-Preview HamburgCeBIT-Preview Hamburg
CeBIT-Preview Hamburg
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better Together
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
Ontology engineering ESTC2008
Ontology engineering ESTC2008Ontology engineering ESTC2008
Ontology engineering ESTC2008
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
 

Más de Directorate of Information Security | Ditjen Aptika

Más de Directorate of Information Security | Ditjen Aptika (20)

Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor KesehatanSosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor Kesehatan
 
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan TelekomunikasiSosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
 
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor TranportasiSosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
 
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan UdaraSosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
 
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan BatubaraSosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
 
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang KetenagalistrikanSosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
 
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118
 
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasiStandar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior LazuardiDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim GautamaDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
 
Teguh arifiyadi ls skse
Teguh arifiyadi ls skseTeguh arifiyadi ls skse
Teguh arifiyadi ls skse
 
Konny sagala skema kelaikan se
Konny sagala skema kelaikan seKonny sagala skema kelaikan se
Konny sagala skema kelaikan se
 
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronikIntan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
 
Uji Publik RPM SMPI Fetri Miftah
Uji Publik RPM SMPI  Fetri MiftahUji Publik RPM SMPI  Fetri Miftah
Uji Publik RPM SMPI Fetri Miftah
 
RPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim GautamaRPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim Gautama
 
SNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar SiregarSNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar Siregar
 
RPM SMPI
RPM SMPIRPM SMPI
RPM SMPI
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

INTERNATIONAL SECURITY MEASURES IN CYBERSPACE

  • 1. INTERNATIONAL SECURITY MEASURES IN CYBERSPACE Indonesia Information Security Forum 10.10.2012, Bandung, Indonesia Prof. Dr. Marco Gercke Cybercrime Page: 1
  • 2. WHAT ARE CYBER SECURITY MEASURES BRINGING CYBER SECURITY AND CYBERCRIME INTO CONTEXT Cybercrime Page: 2
  • 3. CYBERCRIME / CYBERSECURITY •  Cybersecurity is broader than just Components of Cybersecurity Cybercrime Strategy (based on ITU GCA) •  If a government employee accidentally drops an external storage device with important data that were not included in backup-plans it is a serious Cybersecurity incident – but not a crime •  Based on the ITU Global Cybersecurity Agenda (GCA) it is possible to divide between 5 different pillars related to Cybersecurity (legal measures, technical Measures Legal Measures Techn. / Proced. Structures Organizational Building Capacity Cooperation International and procedural measures, organizational structures, capacity building and international cooperation Cybercrime Page: 3
  • 4. CYBERCRIME / CYBERSECURITY •  Within all pillars Cybercrime needs to be Components of Cybersecurity addressed Strategy (based on ITU GCA) •  In some pillars (such as international cooperation) Cybercrime may even be the dominant part (international cooperation in Cybercrime investigations) •  The same is relevant with regard to legal measures. Cybercrime legislation is in many country the most complex part of a Cybersecurity legal framework Measures Legal Measures Techn. / Proced. Structures Organizational Building Capacity Cooperation International •  But it is important to always keep in mind that in each pillar other issues will need to be addressed. Cybercrime Page: 4
  • 5. CYBERCRIME / CYBERSECURITY •  And it is important to see that some Components of Cybersecurity components are not solely related to Strategy (based on ITU GCA) Cybercrime •  Example: CERT •  Preventing Cybercrime, analysing trends related to Cybercrime, development of tools in the fight against Cybercrime, capacity building and support of law CERT enforcement agencies in fighting Cybercrime can be important tasks for a cert Measures Legal Measures Techn. / Proced. Structures Organizational Building Capacity Cooperation International •  But not all work of a CERT will be related to Cybercrime Cybercrime Page: 5
  • 7. TCP/IP •  The Internet uses globally applicable technical standards •  Whoever does not apply the global standards is in most cases excluded from using the network Picture removed in print version Bild zur Druckoptimierung entfernt •  With regard to Cybersecurity there is a IOL News 2011 lack in applying global standards Cybercrime Page: 7
  • 8. WHAT IS COMPUTER CRIME AND CYBERCRIME Cybercrime page: 8
  • 9. 198oth •  Increasing use of personal computers •  Lead to an increase in the potential number of targets •  First cases of software piracy •  In addition malicious software was more frequently produced and distributed Picture removed in print version Bild zur Druckoptimierung entfernt Source: Wikipedia with ref to B. Bertram Cybercrime page: 9
  • 10. 198oth - HISTORY OF VIRUSES •  1982 the “Elk Cloner” virus was created (by Rich Skrenta). Designed for Apple OS •  1986 “Brain Virus” was identified. Virus was designed for MS-DOS Picture removed in print version Bild zur Druckoptimierung entfernt Example •  1986 the the file virus “Virdem” followed •  1990 the first polymorph virus attack “Tequila” was started Cybercrime Seite: 10
  • 11. 198oth- MATH VIRUS •  „Math virus“ stopped the computer after 30 steps and displays a simple addition or subtraction questions •  Execution of the program is denied unless the correct answer is given by the user Picture removed in print version Bild zur Druckoptimierung entfernt Math Virus Cybercrime Seite: 11
  • 12. 198oth – WALKER VIRUS •  Relatively harmless virus •  Walker virus: Displays occasionally an animation Picture removed in print version Bild zur Druckoptimierung entfernt Walker Virus Cybercrime Seite: 12
  • 13. 199oth •  Introduction of the graphical user interface WWW (World Wide Web) in the 1990th lead to an increasing popularity of the network •  It became easier to use the services offered •  In addition it enabled the spreading of Picture removed in print version pictures, audio and video Bild zur Druckoptimierung entfernt Source: Wikipedia with ref. to Cailliau •  In addition the Internet eased transnational communication •  Went along with several challenges for law enforcement Cybercrime page: 13
  • 14. 1990th - VIRUS •  While in the 1980th the speed of the distribution was limited due to the distribution by physical data storage media exchange it was less limited with the intensive use of the Internet Picture removed in print version Bild zur Druckoptimierung entfernt Example Cybercrime Seite: 14
  • 15. ACTIVITIES OF REG. AND INT. ORGANIZATIONS RELATED TO CYBERCRIME Cybercrime page: 15
  • 16. COMMONWEALTH OF NATIONS •  The Commonwealth of Nations is a voluntary association of sovereign states •  Currently 53 associated states •  In 2002 the Commonwealth presented Picture removed in print version Bild zur Druckoptimierung entfernt a model law on Cybercrime that COMMONWEALTH MEMBER STATES provides a legal framework to address Cybercrime •  The model law was intentionally drafted in accordance with the Convention on Cybercrime Gercke, Cybercrime Page: 16
  • 17. ECONOMIC COMMUNITY OF WEST AFR. •  The Economic Community of West African States is a regional group of west African Countries •  Founded in 1975 it has currently fifteen member states Picture removed in print version Bild zur Druckoptimierung entfernt •  In 2009 ECOWAS adopted the Directive ECOWAS MEMBER STATES on Fighting Cybercrime in ECOWAS that provides a legal framework for the member states •  Directive includes substantive criminal law as well as procedural law Gercke, Cybercrime Page: 17
  • 18. EAST AFRICAN COMMUNITY •  5 Member states (Kenya, Uganda, Tanzania, Burundi, Rwanda) •  Within the framework of an update of ICT legislation (EAC Legal Framework for Cyberlaws) EAS also addressed the issues of Cybercrime Picture removed in print version Bild zur Druckoptimierung entfernt EAC MEMBER STATES •  Provisions dealing with the criminalisation of certain conduct became part of the draft legislation Gercke, Cybercrime Page: 18
  • 19. EUROPEAN UNION •  The European Union is a political Union of 27 member states •  One of the mandate of the EU is to harmonise legislation in selected areas •  It has adopted several Framework Decision and Directives to harmonise Picture removed in print version the legislation with regard to Cybercrime Bild zur Druckoptimierung entfernt •  The 27 member states are obliged to EUROPEAN UNION implement the legislation within the given time period Gercke, Cybercrime Page: 19
  • 20. EUROPEAN COMMUNITY / UNION FD Attacks Information Systems FD Child Pornography Dir. Data Retention FD Combating Fraud Amendment FD Terrorism Counc. D. Child Pornography Draft Directive Child Pornography Draft Directive Attacks Information Systems 97 98 99 00 01 02 03 04 05 06 07 08 09 10 10 11 Safer Information Society General Policy Cybercrime eEurope Action Plan Action plan harmful content Communication harmful content Cybercrime Page: 20
  • 21. COUNCIL OF EUROPE •  Council of Europe is an international organisation focusing on the European integration •  47 member states •  Convention on Cybercrime (2001) Picture removed in print version Bild zur Druckoptimierung entfernt COUNCIL OF EUROPE •  First addition protocol to the Convention on Cybercrime (2003) •  Convention on the protection of children against sexual exploitation and sexual abuse (2007) Gercke, Cybercrime Page: 21
  • 22. UNITED NATIONS •  United Nations Organisation is an international organisation (192 member states) •  In 1990 the UN GA adopted a resolution dealing with computer crime legislation •  In 2000 the UN GA adopted a resolution Picture removed in print version on combating the criminal misuse of Bild zur Druckoptimierung entfernt information technology UNITED NATIONS ORGANISATION •  In 2002 the UN GA adopted a second resolution on the criminal misuse of information technology Gercke, Cybercrime Page: 22
  • 23. Cybercrime Law Criminal EU DI Child Pornography (2011) EU FD Child Pornography (2003) EU FD Non-Cash Payment (2001) Commonwealth Model Law (2002) CoE Cybercrime Convention (2001) Substantive Draft African Union Convention (2011) HIPCAR Cybercrime Model Law (2010) EU Draft DI Attacks Information S. (2011) CoE Convention Protection Children (2007) EU FD Attacks Information Systems (2005) Illegal Access to a Computer ✔ ✔ ✔ ✔ Illegal Remaining in a Computer System Interference ✔ Illegal Interception ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ Illegal Access to Computer Data Illegal Data Input ✔ Illegal Aquisition of Comp. Data Illegal Data Interference ✔ ✔ ✔ ✔ ✔ ✔ Illegal Use of Data Violation of Data Protection Regul. Illegal Devices / Misuse of Devices ✔ ✔ Computer-related Fraud ✔ ✔ Computer-related Forgery ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ Indecent Material Pornography Child Pornography ✔ ✔ ✔ ✔ ✔ Solicitation of Children ✔ ✔ ✔ ✔ ✔ Dissemination of Racistic Material ✔ Identity-related Crime SPAM Threat and Harassment ✔ ✔ ✔ Disclosure of an Investigation ✔ Copyright Violation ✔ Violation of Secrecy ✔ page: 23
  • 27. COE MEMBER STATES WHO WAS INVITED TO DRAFT ? Cybercrime Page: 27
  • 28. COE MEMBER STATES IMPLEMENTATION 10 YEARS Cybercrime Page: 28
  • 29. BRINGING LEGISLATION INTO CONTEXT Cybercrime page: 29
  • 30. COMPONENTS Substantive Criminal Law Procedural Law International Cooperation Convention on Cybercrime Cybercrime Page: 30
  • 31. National Cybersecurity Strategy Cybercrime Cybercrime Technology, Policy CERT, .... COMPONENTS Criminal Crime Prevention, Law Technology Liability of ISPs Procedural Law Electronic Evidence Substantive Criminal Law International Cooperation Trained Investigators Equiptment Training Page: 31
  • 32. Prof. Dr. Marco Gercke Niehler Str. 35 D-50733 Cologne, Germany gercke@cybercrime.de www.cybercrime-institute.com Cybercrime Page: 32