1 Best Practices and Enforcement in Cybersecurity: Legal, Institutional and Technical Measures Mohamed CHAWKI, Ph.D. © 2011.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Security Classification Practical Issues in dealing with different types of cybercrime.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Wonga example Register Question- What risks do you think businesses face due to IT developments?
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Information Warfare Playgrounds to Battlegrounds.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Topic 5: Basic Security.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Warfare Playgrounds to Battlegrounds.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Cybersecurity Test Review Introduction to Digital Technology.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Issues for Computer Users, Electronic Devices, Computer and Safety.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
A Project on CYBER SECURITY
Certified Forensic Investigator
Securing Information Systems
Overview of the Budapest Convention on Cybercrime (2001)
Forensic and Investigative Accounting
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Preventing Information Technology Crimes
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

1 Best Practices and Enforcement in Cybersecurity: Legal, Institutional and Technical Measures Mohamed CHAWKI, Ph.D. © 2011

About the speaker Senior Judge in Egypt. Advisor to the Minister of Military Production. Former advisor to the Chairman of Securities and Exchange Commission. Egyptian Regulator of the Exchange. Holds a Ph.D. in Law from the University of Lyon III in France, for a dissertation on the legal framework to fight cybercrime and to protect data exchange in both Europe and the USA. My domain of interest covers: cybercrime, data protection and national and security. Founder and Chairman of the French Association of Cybercrime Prevention (AILCC). 2

International Association of Cybercrime Prevention Not – for profit organization located in Paris, with 12 chapters worldwide to increase the awareness against cybercrime. We have organized 4 international conferences on cybercrime and information security in: Egypt (2008), Brazil (2009), Lebanon (2009), and the US (2010) and 3 regional conferences in Egypt, South Africa and Morocco. We have organised more than 20 seminars and workshops on cybercrime. Our next international conference takes place in Australia in December 2011, and next regional conference takes place in Malaysia next May

Introduction to Cybercrime Cybercrime refers to a broad range of illegal activities perpetrated through cyberspace by means of information and communication technologies (ICTs). Depending on the role played by technology, other distinctions can be made: - Old crimes can be committed by new tools (Espionage, Identity theft, Terrorism) - New tools can make new crimes possible (Botnets, Phishing, hacking, etc) A growing and evolving form of crime. Cost estimated at $ 100 billion annually. 4

Parker’s Definition of Cybercrime “…any intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” - Parker presents three categories of cybercrime: A computer as the target of a crime (Trespass, Malicious Code, Dos Attacks) The computer used as a tool for conducting a crime (Theft, Fraud, Child pornography) The computer is incidental to the commission of the crime (Blackmailers or Drugs dealers) 5

Cybercrime Vs. Real World Crime Theft Physical Space Theft: Possession of property shifts completely from the victim to the offender. Cyberspace Theft: Property is copied, so both the offender and the victim have the property. 6

Copying as Theft 7 Randal L. Schwartz, former programming consultant for Intel. In July 1995, he was charged with computer theft for copying a password file. Claimed it wasn't theft because Intel still has the passwords. On September 11, 1995, he was sentenced to several years’ probation, a fine of US $ 68,000 and left to pay about US $ 170, 000 in personal legal bills.

Cyberspace “Growing Opportunities for Crime” billion surfers on Internet (June 30, 2010) 6 Trillion Web pages accessible on Internet 2.2 Billion Google searches/month 12% of all global trade now happens online US$ 240 million from global cyber-crime 8

Africa Top 5 Internet Countries Nigeria: 43,982,200 Internet users, 28.9% of the population. Egypt: 17,060,000 Internet users, 21.2% of the population. Morocco: 10,442,500 Internet users, 33.4% of the population. South Africa: 6,800,000 Internet users, 13.8% of the population. Algeria:4,700,000 internet users, 13.6% of the population. 9

10

Cyber Security – Why is it an Important Issue? Although the threats in cyber space remain by and large the same as in the physical world (ex. fraud, theft and terrorism), cyber threats are different due to 3 important developments: Automation has made attacks more profitable. Action at a distance is now possible. Attack technique propagation is now more rapid and easier.

* In security matters, there is nothing like absolute security. * We are only trying to build comfort levels, because security costs money and lack of it costs much more. * Comfort level is a manifestation of efforts as well as a realization of their effectiveness & limitations. Cybercrime and National Security

Growing threat to national security - web espionage becomes increasingly advanced, moving towards well-funded and well- organized operations aimed at not only financial, but also political or technical gain Increasing threat to online services – affecting individuals and industry because of growth of sophistication of attack techniques Emergence of a sophisticated market for software flaws – that can be used to carry out espionage and attacks on Govt. and Critical information infrastructure. Findings indicate a blurred line between legal and illegal sales of software vulnerabilities Recent studies reveal three major findings

Computer-Related Risks and the National Infrastructures 14

Why ? Imagine if… On 9-11, the last image people saw on their TVs was the World TC collapsing and then the phones went dead and the power grid failed Imagine if… On 9-11, after the initial attacks, as all flights were grounded, those planes still in the air could not land because of a series of attacks on the air traffic control system 15

Top Emerging National Security Cyber Threats Cyber Terrorism Botnets Cyber Espionage Cyber attacks against financial services: A - Phishing B - Identity Theft 16

- Cyber Terrorism - Definition: “ Politically motivated, attacks against information, computer systems, computer programs and data which results in violence against non-combatant targets by sub-national groups or clandestine agents” (FBI) 17

Terrorist Cyber Capabilities The FBI reveals various reports about activities of terrorist organizations in the Internet Main activities: - Research - Publishing Information (recruitment) - Communication between members of terrorist groups - Terrorist financing and money laundering AL QAEDA TRAINING MANUAL “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of all information required about the enemy” 18

Objectives of Cyber Attacks - Loss of Integrity - Loss of Availability - Loss of Confidentiality - Physical Destruction 19

- Botnets - - Compromised computers that run under a common control structure - Botnet was started from the IRC bots and computer virus/worm. - Elements of a botnet are: Zombies (bots) IRC control channels Botmaster

21 The Threat from Botnets Functions senders - Spam, phishing, virus DOS attacks Rented out for $300 to $700 per hour Over 10,000 botnets become active each day (Symantec) It has been estimated that up to one quarter of all personal computers connected to the internet may be part of a botnet (BBC, 2007).

- Cyber Espionage - This act involves the unauthorized probing to test a target computer’s configuration or evaluate its systems defenses or the unauthorized viewing and copying of data files. U.S. counterintelligence officials reportedly have stated that about 140 different foreign intelligence organizations regularly attempt to hack into the computer systems of U.S. government agencies and U.S. companies. The Internet, including satellite links and wireless local networks, now offers new, low cost and low risk opportunities for espionage. 22

Echelon Echelon was reportedly set up in 1971 as an electronic monitoring system during the Cold War. European- Union member Britain helps operate the system, which includes listening posts in Canada, Australia, and New Zealand. Echelon is described as a global spy system reportedly capable of intercepting wireless phone calls, , and fax messages made from almost any location around the world. Some government officials warn that criminals now sell or rent malicious code tools for cyber espionage, and the risk for damage to U.S. national security due to cyber espionage conducted by other countries is great. 23

- Phishing- Scam to steal valuable information such as credit cards, social security numbers, user IDs and passwords. Also known as "brand spoofing" Official-looking sent to potential victims : Pretends to be from their ISP, retail store, etc., Due to internal accounting errors or some other pretext, certain information must be updated to continue the service. 24

25 Technology To update your account information and start using our services please click on the link below

Technology 26

Statistics… The number of unique phishing reports received by APWG from consumers and reporting partners in June 2010 is 33,617. The country hosting the most phishing websites is the US. The percentage of computers infected with banking trojans and password stealers rose to 17 percent compared to last year. Source: APWG 27

- Identity Theft - Is the use of other individuals’ information to create a new identity and accounts. Is now # 1 reported crime to the Federal Trade Commission. ICTs improvements make check and credit fraud easier. Oct. – Feb. is peak time for fraud: - Holidays are high time to spend for us. - Holidays are high transaction volume for merchants. 28

Mechanisms of Cyberspace Identity Theft Cyber-Trespass Phishing Websites Spywares Malicious Applications Spoofing 29

How do Thieves Use The Stolen Data? - Producing and using counterfeit checks under your name or an employer’s name. - Securing a driver’s license with their photograph but in your name. - Opening a bank account and writing checks. - Obtaining loans. - Assuming the Identity of another person. 30

Why do Cyber attacks are so Successful? We face many challenges: Anonymity of offenders. Choosing the appropriate jurisdiction. Search and seizure of digital evidence. Logistical and practical barriers. 31

32 National Legal Framework on Cybercrime Source: - Some countries have specific cybercrime laws. - Some countries do not have specific cybercrime laws. - Some countries are debating the adoption of cybercrime laws. RegionNo. of CountriesCountries with Cybercrime Laws Africa526 Asia4423 Europe4636 North & Central America235 Oceania122 South America125

The Republic of Botswana Adopted Cybercrime and Computer Crime Related Act of This law prohibits: A) Unauthorized access to computer system. B) Unauthorized access to computer service. C) Access with intent to commit an offence. D) Unauthorized interference with data. E) Interception of data to facilitate another offence. F) Cyberfraud. 33

South Africa Law No. 25 of 2002 entitled “Electronic Communications and Transactions Act”, was adopted in Articles 85 – 89 prohibits: A) Unauthorized access to computer system. B) Data interference. C) Fraud by computer. 34

Algeria Adopted a new law of 19 articles in July 2009 to fight cybercrime. Articles 3, 4 and 7 give the state powers to censor Internet content and prosecute cases when that is required. Articles 10 and 11 require “Internet service providers” to store all communications and identifying information for a minimum period of one year. Articles 13 and 14 introduce a new body for combating cybercrime. 35

Republic of Senegal Adopted law no – 11 on cybercrime. Articles 431 – 7 to 431 – 65 prohibit: A) Illegal acts against computer systems. B) Illegal acts against personal data. C) Child pornography offences. D) Illegal use of computer service. 36

Zambia In 2004, The Computer Misuse and Crimes law, was passed in Zambia: A) One of the offences is unauthorised access to computer data. B) The second offence is that of access with intent to commit offences. C) Other offences include unauthorised modification of computer material, damaging or denying access to computer system, unlawful possession of devices and data Electronic fraud. 37

Mauritius The Computer Misuse and Cybercrime Act was adopted in The main offences mentioned in this law are: A) Unauthorised access to computer data. B) Access with intent to commit offences. C) Unauthorised access to and interception of computer service. D) Unauthorised modification of computer material. E) Damaging or denying access to computer system. F) Unauthorised disclosure of password. G) Electronic fraud 38

Egypt Didn’t enact specific legislations to fight cybercrime. Some laws may be used to fight cyber offences like: A) Intellectual property law no. 82 – 2002 B) Electronic signature law no. 15 – 2004 C) Telecommunications law no. 10 – 2003 D) Child law no

---Regional level--- OHADA “ The Organisation for the Harmonozation of Business Law”: - Exchange of information between member countries. - Organize workshops to exchange experience between member states. - Participate with the African Union to fight cybercrime. 40

International Convention on Cybercrime The Convention on Cybercrime is the first international treaty seeking to address Computer crime and Internet crimes by harmonizing national laws. The following offences are defined by the Convention: illegal access, illegal interception, data interference, system interference, misuse of devices, computer- related forgery, computer-related fraud, offences related to child pornography and offences related to copyright and neighbouring rights. Opened for signature on 23/11/2001. Number of ratifications: 30 Number of signatures not followed by ratifications: 16 41

Issues for the Future Increase the awareness about changing threats due to the growing technical skills of extremists and terrorist groups. Develop more accurate methods for measuring the effects of cybercrime. Help to determine appropriate responses by law enforcement to cyberattacks. Explore ways to increase security education and awareness for businesses and home PC users; and Find ways for private industry and government to coordinate to protect against cyberattacks. 42