Upload
martin-foreman
View
36
Download
0
Tags:
Embed Size (px)
DESCRIPTION
7 th Workshop on the Cross-border Disaster eResponse in the eRegion Human Aspects of Cross-border Disaster eResponse – A Part of the Regional Security and Defence. Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009. - PowerPoint PPT Presentation
Citation preview
11
77thth Workshop on the Cross-border Workshop on the Cross-border Disaster eResponse in the eRegionDisaster eResponse in the eRegion
Human Aspects of Cross-border Human Aspects of Cross-border Disaster eResponse –Disaster eResponse –
A Part of the Regional Security A Part of the Regional Security and Defenceand Defence
Radica A. Gareva, PhDRadica A. Gareva, PhD
Ministry of Defense of The Republic of Ministry of Defense of The Republic of MacedoniaMacedonia
Skopje, May 5, 2009Skopje, May 5, 2009
22
The rapid advancement of the The rapid advancement of the computer technology has a great computer technology has a great influence over the Dynamic arm influence over the Dynamic arm competition, thus changing the competition, thus changing the
safety environment and the safety environment and the national values and interests.national values and interests.
Cyber Security – New aspect Cyber Security – New aspect of the Regional Security and of the Regional Security and
the Human being safety the Human being safety
33
WHY?WHY?
Third wave of development – Third wave of development – INFORMATION SOCIETY:INFORMATION SOCIETY:• Digital &Digital &• NetworkedNetworked
The KEY FOR SUCCESS IN IT The KEY FOR SUCCESS IN IT SOCIETY:SOCIETY:
““INFORMATION DOMINANCE”.INFORMATION DOMINANCE”.
44
WE HAVE TO FACE WITH: WE HAVE TO FACE WITH: TRENDS, CHALLENGES & TRENDS, CHALLENGES &
PRIORITIES PRIORITIES OF THE REGIONAL SECURITY OF THE REGIONAL SECURITY
IN 21st CENTURYIN 21st CENTURY
55
TRENDS:TRENDS:
Globalization;Globalization;Cooperation & integration of the world Cooperation & integration of the world
politics;politics;Internet;Internet;IT influence on the economy; IT influence on the economy; SHARED SERVICES – A Key TrendSHARED SERVICES – A Key TrendCYBERSPACE – NEW Unconventional Disaster CYBERSPACE – NEW Unconventional Disaster
BATTLEFIELD;BATTLEFIELD;Cyber Crime – global terrorist trendCyber Crime – global terrorist trendChanged National interests and values Changed National interests and values
under the wave of IT;under the wave of IT;
66
CHALLENGES CHALLENGES (1):(1):
Societal Development – iGovernment Societal Development – iGovernment Modernization of the IT Modernization of the IT
Infrastructure;Infrastructure; Efficiency and Transparency Efficiency and Transparency
IncreasingIncreasing Government Service Delivery Government Service Delivery
TransformationTransformation
77
CHALLENGES CHALLENGES (2):(2):
CYBERWAR – “the fifth dimension of CYBERWAR – “the fifth dimension of the war”;the war”;
Humanbeing in the focus of the Humanbeing in the focus of the Cross-border Disaster eResponseCross-border Disaster eResponse
88
CYBERWARCYBERWAR
A serial of consecutive actions according A serial of consecutive actions according the national military strategy for the national military strategy for information superiority and jeopardizing information superiority and jeopardizing enemy’s information systems;enemy’s information systems;
Achievement of goals by IT;Achievement of goals by IT;Societal level which could cause organized Societal level which could cause organized
conflict between two parties, or two or more conflict between two parties, or two or more nations, among widespread and connected nations, among widespread and connected information and communication means.information and communication means.
99
CYBERTHERORIZMCYBERTHERORIZM
Violence or threaten to innocent Violence or threaten to innocent victims because of political or social victims because of political or social goals, by IT. goals, by IT.
1010
CYBERCRIME:CYBERCRIME:Criminal action which is planned, coordinated Criminal action which is planned, coordinated
and executed in the cyberspace, by methods, and executed in the cyberspace, by methods, skills and IT knowledge, because of some skills and IT knowledge, because of some subjective, political or economic goals. subjective, political or economic goals.
CRIMINAL ACTION in cyberspace is:CRIMINAL ACTION in cyberspace is: Unauthorized access to computer networks and Unauthorized access to computer networks and
systems;systems; Disruption of computer’s programs or data;Disruption of computer’s programs or data; Computer sabotage;Computer sabotage; Computer espionage;Computer espionage; Unauthorized communication interruption;Unauthorized communication interruption; Theft of invisible assets; etc.Theft of invisible assets; etc.
1111
CYBERCRIME CATHEGORIES:CYBERCRIME CATHEGORIES:
Crimes which cause physical harm or Crimes which cause physical harm or potentional physical harm and potentional physical harm and violence; &violence; &
Crimes without harm and violence.Crimes without harm and violence.
1212
Crimes which cause harms Crimes which cause harms and/or potentional physical loss and/or potentional physical loss and violence, by Internet and and violence, by Internet and other IT tools:other IT tools:
Cyberterrorism; Cyberterrorism; Attack by threat, by e-mail;Attack by threat, by e-mail;Cyber stalking;Cyber stalking;Child pornography;Child pornography;
1313
UNVIOLENCED UNVIOLENCED CYBERCRIME:CYBERCRIME:Unauthorized access to the computer Unauthorized access to the computer
systems, because of entertainment or systems, because of entertainment or personal attacker challenge;personal attacker challenge;
Cyberspace theft, which includes:Cyberspace theft, which includes:Transfer of money from the company’s bill to Transfer of money from the company’s bill to
the own bill of the attacker, by internal the own bill of the attacker, by internal attacker;attacker;
Endorse of checks, documents, etc. from Endorse of checks, documents, etc. from external intruders; external intruders;
Corporative / industrial espionage;Corporative / industrial espionage;Plagiarism;Plagiarism;Identity theft;Identity theft;Unauthorized network services interruption;Unauthorized network services interruption;
1414
Destructive attacks which Destructive attacks which mainstream is only services mainstream is only services disruption, without information disruption, without information thefttheft, as:, as:
• hacking;hacking;• hacking and web-site vandalizing;hacking and web-site vandalizing;• viruses, worms & Trojans; etc.viruses, worms & Trojans; etc.• Cyber prostitution with virtual sexual services;Cyber prostitution with virtual sexual services;• Betting, which is connected with risk of money;Betting, which is connected with risk of money;• Illegal international transfer of money, Illegal international transfer of money,
documents, cryptographic software, etc. documents, cryptographic software, etc.
1515
PRIORITIES: PRIORITIES:
Paradigm of Security Strategy Paradigm of Security Strategy Changing;Changing;
Awareness and global security Awareness and global security culture developing in the new culture developing in the new security environment;security environment;
Critical Information Infrastructure Critical Information Infrastructure Threats and Risks management;Threats and Risks management;
1616
WHO HAS TO FIGHT AGAINST THE WHO HAS TO FIGHT AGAINST THE CYBER CRIME and TO PROTECT CYBER CRIME and TO PROTECT THE HUMANBEING ?THE HUMANBEING ?The Government, politicians and The Government, politicians and
jurisdictional institutions;jurisdictional institutions;Professionals from the Criminality Professionals from the Criminality
Department;Department;IT professionals; &IT professionals; &The whole community in general and The whole community in general and
IT Society separated. IT Society separated.
1717
WHERE to start from? WHERE to start from? (1)(1)
Global culture and Cyber space security Global culture and Cyber space security awareness developing in the Region and wider;awareness developing in the Region and wider;
Corporative security policies developing in the Corporative security policies developing in the RM & Region, with aim procedures and best RM & Region, with aim procedures and best cyber security management practices to be cyber security management practices to be shared;shared;
Paradigm security strategy changing;Paradigm security strategy changing;Threats & Risks Management Paradigm Threats & Risks Management Paradigm
creating;creating;G8 principles Implementation;G8 principles Implementation;
1818
WHERE to start from? WHERE to start from? (2)(2)
““Framework for Cooperation on Cyber Framework for Cooperation on Cyber Defense between NATO and Partner Defense between NATO and Partner Nations” based on the principles set out in Nations” based on the principles set out in the:the:- “NATO Policy on Cyber Defense” &- “NATO Policy on Cyber Defense” &
- “Council Guidelines for Cooperation on - “Council Guidelines for Cooperation on Cyber Defense with Partner Nations and Cyber Defense with Partner Nations and International Organizations,International Organizations,
which were approved by the NAC in which were approved by the NAC in January and July 2008, respectively. January and July 2008, respectively.
1919
WHERE to start from?WHERE to start from? (3)(3)
INDIVIDUAL SECURITY – nucleus of National INDIVIDUAL SECURITY – nucleus of National Security;Security;
CYBER SECURITY – nucleus of corporative CYBER SECURITY – nucleus of corporative security; security;
INDIVIDUAL & CYBER SECURITY – INDIVIDUAL & CYBER SECURITY – fundament of National & Regional Security.fundament of National & Regional Security.
2020
That’s why, understanding the Human That’s why, understanding the Human Aspects of Cross-border Disaster Aspects of Cross-border Disaster eResponse as A Part of the Regional eResponse as A Part of the Regional Security and Defense, an extended Security and Defense, an extended concept of the National and Regional concept of the National and Regional Security is suggested:Security is suggested: Political aspect;Political aspect;Economic aspect;Economic aspect;Societal aspect;Societal aspect;Military aspect; Military aspect; Ecological aspect; &Ecological aspect; &Cyber aspect. Cyber aspect.
2121
THANK YOU FOR YOUR THANK YOU FOR YOUR ATTENTION !!!ATTENTION !!!