strengthening cyber security measures cultural dimensions in … · 2013. 9. 9. · wcit-12 dubai,...
TRANSCRIPT
Dr. Basuki Yusuf IskandarSecretary GeneralMinistry of Communication and Information Technology
Delivered at ARF Workshop on Measures to Enhance Cyber Security –
Legal and Cultural Aspects
11-12 September 2013
Beijing , China
Strengthening Cyber Security Measures Cultural Dimensions in Cyberspace
AGENDA
National Cyber Security
Strategies
Cultural Dimensions in
Cyber Space
Discussion
Introduction
What is Cyberspace
Council of Europe, Cybercrime Convention (2001)
[…] By connecting to communication and information services users create a kind of COMMON SPACE, called "cyber-space", which is used for legitimate purposes
but may also be the subject of misuse […]”.
UNITAR (2005)
“Cyber-space is part of the common heritage of mankind. Access to
its benefits is a legitimate right for all peoples. The object of
legislation is not to limit that right, but only to limit or eliminate all
abuses of that right.”
President Barack Obama, May 29, 2009
“This world—cyberspace—is a world that we depend on every single
day... [it] has made us more interconnected than at any time in human
history.”
Quite useful start for a definition
The Development of technology “ Access, Network, Applications,
and Content” creates new space called Cyberspace ”
Our Thoughts : Cyberspace
Networks& OTT-Contents
Cyber Space(63 million Internet
Users, 5 Billion devices)
Cyber Threat(Number of Social Media and Mobile
Device etc.)
Cyber Attack(Web Deface,
Malware, Phishing etc.)
Cyber Security
Index KAMI, Gov. CSIRT, IDSIRTII)
Cyber Crime(Pornography, Illegal
Access, Data
Interference etc.)
Cyber Law(ITE Act 2008, Gov. Regulation 2012,
Telecom Act 1999)
INDONESIA
CYBER POWER
AGENDA
National Cyber Security
Strategies
Cultural Dimensions in
Cyber Space
Discussion
Introduction
7
Cybersecurity
Ecosystem
Critical
InfrastructureLaw Enforcement
National Security
Organization/
Communities
International
Security
Organization
Cybersecurity Ecosystem
Cybersecurity StrategyCybersecurity is broader than just Cybercrime
INDONESIAGlobal Cybersecurity
Agenda (ID-GCA)
Technical and
Procedural
Measures
Capacity
Building
Organizational
Structures
International
Cooperation
Legal
Measures1
2
34
5
Cybercrime may even be
the dominant part
(international cooperation
in Cybercrime
investigations) *
Cybercrime legislation
is in many country the
most complex part of a
Cybersecurity legal
framework*
CERT for instance are not solely
related to Cybercrime. It can be
important tasks for a CERT. But
not all work of a CERT will be
related to Cybercrime*
ICTs is a vital tool that
becoming generally linked to
organised crime on the Internet
Develop
culture of
Cybersecurity
to prevent
cybercrime
Source: *Prof. Dr. Marco Gercke, International Security Measures in Cyberspace, 2012
Ag
en
da 1
L
eg
al M
easu
res
Cyber Security Legal Framework
Government Regulation No.82/2012(Electronic System Provider and Electronic
Transaction)
Ministerial
CirculationMinisterial
Regulation
Information and Transaction Electronic Act,
No.11/ 2008
Telecommunication Act, No. 36/1999
Ele
ctr
on
ic S
ys
tem
Go
ve
rna
nc
e a
nd
Ris
k M
an
ag
em
en
t
Ele
ctr
on
ic
Sig
na
ture
Tru
stw
ort
hin
ess
Cert
ific
ation B
ody
Ele
ctr
on
ic A
ge
nt,
Ce
rtific
atio
n,
Syste
m, T
ran
sa
ction
Se
rvic
es P
rovid
er
Sp
am
&
Do
main
Nam
e
Th
rou
gh
De
ve
lop
me
nt o
f
Info
rma
tio
n S
ecu
rity
Aw
are
ne
ss
Monitoring,
Co
mp
lian
ce
an
d
Enfo
rcem
ent
Other Supporting Law and Regulation
Ag
en
da
2T
ec
hn
ica
l an
d P
roc
ed
ura
l M
ea
su
res Monitoring by ID-SIRTII/Gov-SCIRTFilter Internet : Trust Positive
Forensic Laboratory Malware Analyst
Indonesian National Standard SNI/ISO IEC 27001-2009 Information Security Index
Ag
en
da
3
Org
an
izatio
nal S
tructu
res
Regulator• Directorate Information
Security- Kominfo
• IDSIRTI (Indonesia Security
Incident Response Team on
Internet Infrastructure) –
Kominfo
• National Crypto Agency
Defense/Military
• Ministry of Defense
• TNI (Indonesian National Armed Forces)
Law Enforcement
• Police
• Ministry of Legal Affairs
• Attorney
• Justice
Intelligence
• BIN (National Intelligence Agency)
• BAIS TNI (Indonesian Military's Strategic Intelligence Agency)
National
Cybersecurity
Institution
Workshops
and
Training
Public Private
Partnership
CertificationAwareness
Education
Member of ASEAN Network Security Action Council Working Group
Member of International Telecommunication Union (ITU)
Bilateral Cooperation in Cyber Security
Steering Committee Asia Pacific Computer Emergency Response Team (APCERT).
Member of FIRST (Forum of Incident Response and Security Teams)
AGENDA
Cybersecurity Strategies
to address Cybercrime
Cultural Dimentions in
Cyber Space
Discussion
Introduction
Source : ITU-GCA
GLOBAL CULTURE OF CYBER SECURITY
Cyber Security Culture Actors
General Understanding
of Cyber Security Culture
Awareness
Responsibility
Response
Ethics
DemocracyRisk
assessment
Security design and
implementation
Security management
Reassessment
Resolution adopted by the General Assembly
57/239. Creation of a global culture of cybersecurity
UN
GA
57/2
39,
Cre
ati
on
of
a g
lob
al cu
ltu
re o
f cyb
ers
ecu
rity
Law Code
Norms Market
Constraints on Cyberspace
High Level Meeting in Pre-IGF 2013
“GLOBAL MULTI-STAKEHOLDER CYBER ETHICS PRINCIPLES TO ACHIEVE A
SAFE, PEACE, AND HARMONY IN CYBERSPACE
a. Formulate minimum list of the Bali Declaration of Cyber Ethics Principles
that may be accepted by people around the world within all cultures and
religions, not as a replacement for their beliefs, but as an acceptance of
global ethics in cyberspace.
b. Develop global principles relating to the Bali Declaration of Cyber Ethics
Principles which respect to local culture and values, content provision,
privacy universal access, digital properties, security, and other relevant
issues.
c. Conduct declaration of global multi-stakeholder Bali Declaration of Cyber
Ethics Principles to achieve a safe, peace, and harmony in cyberspace
DISCUSSION
20
Cross-Border Investigation &
Evidential Matters
Slide 20
Issues
Issues and Challenges in the Borderless World
Te
ch
no
log
y R
ela
ted
Th
rea
ts
Hacking
Fraud & Spam
Denial of Service Attack
Malicious Code
Cyb
er
Co
nte
nt
Re
late
d T
hre
ats
Threat to National Security
Defamation
Offensive
Online Porn
Global Legal Framework Proposed
21
Regional Legal System
Individual
Country
States
International Organisations
Transnational Corporations
Citizens
State remains
most important
regulator
Who Governs &
is Governed in Cyberspace?
ITU Council 2012
23
WCIT-12 Dubai, December 2012
24
ITU Council 2013
Thank You
Should there any questions, please contact us at below address
Email :
“Toward a better Justice in Cyberspace”