21
1 7 7 th th Workshop on the Cross-border Workshop on the Cross-border Disaster eResponse in the Disaster eResponse in the eRegion eRegion Human Aspects of Cross- Human Aspects of Cross- border Disaster eResponse – border Disaster eResponse – A Part of the Regional A Part of the Regional Security and Defence Security and Defence Radica A. Gareva, PhD Radica A. Gareva, PhD Ministry of Defense of The Republic of Ministry of Defense of The Republic of Macedonia Macedonia Skopje, May 5, 2009 Skopje, May 5, 2009

Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

Embed Size (px)

DESCRIPTION

7 th Workshop on the Cross-border Disaster eResponse in the eRegion Human Aspects of Cross-border Disaster eResponse – A Part of the Regional Security and Defence. Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009. - PowerPoint PPT Presentation

Citation preview

Page 1: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

11

77thth Workshop on the Cross-border Workshop on the Cross-border Disaster eResponse in the eRegionDisaster eResponse in the eRegion

Human Aspects of Cross-border Human Aspects of Cross-border Disaster eResponse –Disaster eResponse –

A Part of the Regional Security A Part of the Regional Security and Defenceand Defence

Radica A. Gareva, PhDRadica A. Gareva, PhD

Ministry of Defense of The Republic of Ministry of Defense of The Republic of MacedoniaMacedonia

Skopje, May 5, 2009Skopje, May 5, 2009

Page 2: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

22

The rapid advancement of the The rapid advancement of the computer technology has a great computer technology has a great influence over the Dynamic arm influence over the Dynamic arm competition, thus changing the competition, thus changing the

safety environment and the safety environment and the national values and interests.national values and interests.

Cyber Security – New aspect Cyber Security – New aspect of the Regional Security and of the Regional Security and

the Human being safety the Human being safety

Page 3: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

33

WHY?WHY?

Third wave of development – Third wave of development – INFORMATION SOCIETY:INFORMATION SOCIETY:• Digital &Digital &• NetworkedNetworked

The KEY FOR SUCCESS IN IT The KEY FOR SUCCESS IN IT SOCIETY:SOCIETY:

““INFORMATION DOMINANCE”.INFORMATION DOMINANCE”.

Page 4: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

44

WE HAVE TO FACE WITH: WE HAVE TO FACE WITH: TRENDS, CHALLENGES & TRENDS, CHALLENGES &

PRIORITIES PRIORITIES OF THE REGIONAL SECURITY OF THE REGIONAL SECURITY

IN 21st CENTURYIN 21st CENTURY

Page 5: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

55

TRENDS:TRENDS:

Globalization;Globalization;Cooperation & integration of the world Cooperation & integration of the world

politics;politics;Internet;Internet;IT influence on the economy; IT influence on the economy; SHARED SERVICES – A Key TrendSHARED SERVICES – A Key TrendCYBERSPACE – NEW Unconventional Disaster CYBERSPACE – NEW Unconventional Disaster

BATTLEFIELD;BATTLEFIELD;Cyber Crime – global terrorist trendCyber Crime – global terrorist trendChanged National interests and values Changed National interests and values

under the wave of IT;under the wave of IT;

Page 6: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

66

CHALLENGES CHALLENGES (1):(1):

Societal Development – iGovernment Societal Development – iGovernment Modernization of the IT Modernization of the IT

Infrastructure;Infrastructure; Efficiency and Transparency Efficiency and Transparency

IncreasingIncreasing Government Service Delivery Government Service Delivery

TransformationTransformation

Page 7: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

77

CHALLENGES CHALLENGES (2):(2):

CYBERWAR – “the fifth dimension of CYBERWAR – “the fifth dimension of the war”;the war”;

Humanbeing in the focus of the Humanbeing in the focus of the Cross-border Disaster eResponseCross-border Disaster eResponse

Page 8: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

88

CYBERWARCYBERWAR

A serial of consecutive actions according A serial of consecutive actions according the national military strategy for the national military strategy for information superiority and jeopardizing information superiority and jeopardizing enemy’s information systems;enemy’s information systems;

Achievement of goals by IT;Achievement of goals by IT;Societal level which could cause organized Societal level which could cause organized

conflict between two parties, or two or more conflict between two parties, or two or more nations, among widespread and connected nations, among widespread and connected information and communication means.information and communication means.

Page 9: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

99

CYBERTHERORIZMCYBERTHERORIZM

Violence or threaten to innocent Violence or threaten to innocent victims because of political or social victims because of political or social goals, by IT. goals, by IT.

Page 10: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1010

CYBERCRIME:CYBERCRIME:Criminal action which is planned, coordinated Criminal action which is planned, coordinated

and executed in the cyberspace, by methods, and executed in the cyberspace, by methods, skills and IT knowledge, because of some skills and IT knowledge, because of some subjective, political or economic goals. subjective, political or economic goals.

CRIMINAL ACTION in cyberspace is:CRIMINAL ACTION in cyberspace is: Unauthorized access to computer networks and Unauthorized access to computer networks and

systems;systems; Disruption of computer’s programs or data;Disruption of computer’s programs or data; Computer sabotage;Computer sabotage; Computer espionage;Computer espionage; Unauthorized communication interruption;Unauthorized communication interruption; Theft of invisible assets; etc.Theft of invisible assets; etc.

Page 11: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1111

CYBERCRIME CATHEGORIES:CYBERCRIME CATHEGORIES:

Crimes which cause physical harm or Crimes which cause physical harm or potentional physical harm and potentional physical harm and violence; &violence; &

Crimes without harm and violence.Crimes without harm and violence.

Page 12: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1212

Crimes which cause harms Crimes which cause harms and/or potentional physical loss and/or potentional physical loss and violence, by Internet and and violence, by Internet and other IT tools:other IT tools:

Cyberterrorism; Cyberterrorism; Attack by threat, by e-mail;Attack by threat, by e-mail;Cyber stalking;Cyber stalking;Child pornography;Child pornography;

Page 13: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1313

UNVIOLENCED UNVIOLENCED CYBERCRIME:CYBERCRIME:Unauthorized access to the computer Unauthorized access to the computer

systems, because of entertainment or systems, because of entertainment or personal attacker challenge;personal attacker challenge;

Cyberspace theft, which includes:Cyberspace theft, which includes:Transfer of money from the company’s bill to Transfer of money from the company’s bill to

the own bill of the attacker, by internal the own bill of the attacker, by internal attacker;attacker;

Endorse of checks, documents, etc. from Endorse of checks, documents, etc. from external intruders; external intruders;

Corporative / industrial espionage;Corporative / industrial espionage;Plagiarism;Plagiarism;Identity theft;Identity theft;Unauthorized network services interruption;Unauthorized network services interruption;

Page 14: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1414

Destructive attacks which Destructive attacks which mainstream is only services mainstream is only services disruption, without information disruption, without information thefttheft, as:, as:

• hacking;hacking;• hacking and web-site vandalizing;hacking and web-site vandalizing;• viruses, worms & Trojans; etc.viruses, worms & Trojans; etc.• Cyber prostitution with virtual sexual services;Cyber prostitution with virtual sexual services;• Betting, which is connected with risk of money;Betting, which is connected with risk of money;• Illegal international transfer of money, Illegal international transfer of money,

documents, cryptographic software, etc. documents, cryptographic software, etc.

Page 15: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1515

PRIORITIES: PRIORITIES:

Paradigm of Security Strategy Paradigm of Security Strategy Changing;Changing;

Awareness and global security Awareness and global security culture developing in the new culture developing in the new security environment;security environment;

Critical Information Infrastructure Critical Information Infrastructure Threats and Risks management;Threats and Risks management;

Page 16: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1616

WHO HAS TO FIGHT AGAINST THE WHO HAS TO FIGHT AGAINST THE CYBER CRIME and TO PROTECT CYBER CRIME and TO PROTECT THE HUMANBEING ?THE HUMANBEING ?The Government, politicians and The Government, politicians and

jurisdictional institutions;jurisdictional institutions;Professionals from the Criminality Professionals from the Criminality

Department;Department;IT professionals; &IT professionals; &The whole community in general and The whole community in general and

IT Society separated. IT Society separated.

Page 17: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1717

WHERE to start from? WHERE to start from? (1)(1)

Global culture and Cyber space security Global culture and Cyber space security awareness developing in the Region and wider;awareness developing in the Region and wider;

Corporative security policies developing in the Corporative security policies developing in the RM & Region, with aim procedures and best RM & Region, with aim procedures and best cyber security management practices to be cyber security management practices to be shared;shared;

Paradigm security strategy changing;Paradigm security strategy changing;Threats & Risks Management Paradigm Threats & Risks Management Paradigm

creating;creating;G8 principles Implementation;G8 principles Implementation;

Page 18: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1818

WHERE to start from? WHERE to start from? (2)(2)

““Framework for Cooperation on Cyber Framework for Cooperation on Cyber Defense between NATO and Partner Defense between NATO and Partner Nations” based on the principles set out in Nations” based on the principles set out in the:the:- “NATO Policy on Cyber Defense” &- “NATO Policy on Cyber Defense” &

- “Council Guidelines for Cooperation on - “Council Guidelines for Cooperation on Cyber Defense with Partner Nations and Cyber Defense with Partner Nations and International Organizations,International Organizations,

which were approved by the NAC in which were approved by the NAC in January and July 2008, respectively. January and July 2008, respectively.

Page 19: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

1919

WHERE to start from?WHERE to start from? (3)(3)

INDIVIDUAL SECURITY – nucleus of National INDIVIDUAL SECURITY – nucleus of National Security;Security;

CYBER SECURITY – nucleus of corporative CYBER SECURITY – nucleus of corporative security; security;

INDIVIDUAL & CYBER SECURITY – INDIVIDUAL & CYBER SECURITY – fundament of National & Regional Security.fundament of National & Regional Security.

Page 20: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

2020

That’s why, understanding the Human That’s why, understanding the Human Aspects of Cross-border Disaster Aspects of Cross-border Disaster eResponse as A Part of the Regional eResponse as A Part of the Regional Security and Defense, an extended Security and Defense, an extended concept of the National and Regional concept of the National and Regional Security is suggested:Security is suggested: Political aspect;Political aspect;Economic aspect;Economic aspect;Societal aspect;Societal aspect;Military aspect; Military aspect; Ecological aspect; &Ecological aspect; &Cyber aspect. Cyber aspect.

Page 21: Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009

2121

THANK YOU FOR YOUR THANK YOU FOR YOUR ATTENTION !!!ATTENTION !!!