Study Guide Cyber Security
Study Guide Cyber Security
STUDY GUIDE :
THE PROTECTION OF GLOBAL
CYBER SECURITY
INTERNATIONAL THREATS OF
III CYBER SECURITY
VI REFERENCES
Topic Description:
The digital world plays an important role in the improvement of human life.
However, its unintended effects represent a risk to the security of people and
countries around the world. Due to the increase in the severity, frequency,
and sophistication of cyber-enabled threats, global cybersecurity remains
at risk as policy and legal frameworks stand inconsistent and communica-
tions technologies are most vulnerable.
However, digital espionage and cyber-attacks are not the only challenges to
global cybersecurity, as cybercriminals have built a developed marketplace
trading confidential information, people, and illicit goods going against na-
tional and international law.
In addition, terrorist groups are exploiting the power of social media to at-
tract new recruiters, making governments and individuals grow as targets
for cybercrime.
Fittingly, the appearance of the first computer worm led to the first cyberse-
curity effort to eliminate an unapproved program. An American computer
programmer named Ray Tomlinson, the inventor of the first networked mail
messaging system was also working for BBN Technologies at the time. He saw
this idea and liked it. He tinkered with the program and made it self-recrea-
ting "the first computer worm." He named the program Reaper, the first anti-
virus software which would discovered copies of The Creeper and erase it.
Current Situation:
On this day, almost 3 billion individuals (40%) have access to the Internet.
The endless possibilities combined with the immense amount of users have
made the Internet an ideal spot for cybercrime. The scope of hacking attacks
can range from small-scale personal websites to national security informa-
tion.
As conventional online protection programs that distinguished potential dan-
gers based on their "signature" started to fail, the first "next-gen" antivirus pro-
gramming started using big data analysis to identify malware by taking a
broad, holistic view of user behaviours, network traffic, and application actvity.
in 2019.
Another issue is cyber theft, where trade secrets and intellectual property
rights are stolen.
With the United States proclaiming that China is violating its commitments
under the WTO Agreement on Trade-Related Aspects of Intellectual Property
Rights (TRIPs) by failing to protect trade secrets, around the years of
2014-2015, the issue of cyber theft and cyber espionage is becoming more
common in the global trade arena.
Important events:
We cannot talk about events in Cybersecurity without mentioning the events
that radically changed cybersecurity:
1) First computer Virus, the 1970s: “Creeper” a self-replicating program and
led to the creation of the first antivirus.
2) Largest insider attack, 1976-2006: for over thirty years, ‘Greg Chung Boeing’
stole 2 $ billion worth of aerospace documents and gave them to the
Chinese government.
3) The Snowden effects, 2013: ‘Edward Snowden’, a former contractor for the
US government, copied and leaked classified information from the national
security agency.
4) Largest data breach, 2013-2014: Yahoo reported a breach that jeopar-
dized the accounts of all 3 billion users.
5) OPM data breach, 2015: the US office of personnel management fell victim
to an attack that stole 4.2 million personal files of formal and current go-
vernment employees.
GCI-CGI
2 0 2018
6
1 8 generally
g e n e racorrelates
lly co rrewith
la te s wBank
World ith Doing
Wo rld Ba nScore,
Business k Doexcept
in g
for in the Americas
Bu sin e ss sco re s, e xce p t fo r in th e Am e rica s
7
- National cybersecurity strategies (NCS) rarely address trade issues
- An NCS defines the maintenance of resilient and national critical informa-
tion infrastructures including the security and the safety of citizens
- 104 Member States have national strategies related to cybersecurity
- Common features identified in cybersecurity policies include:
* The protection of critical information infrastructure
*A national resiliency plan
*Some have a clear action plan for government implementa
tion on cybersecurity governance
*Cybersecurity Responsible Agencies are responsible for imple
menting the national cybersecurity strategy/policy
Russia:
By presenting a resolution to the UN First Committee in 1998 Russia was the
first country to address cybersecurity in the UN formally. In 2010, Russian de-
legates considered the issue of cyber-attacks the most genuine of difficul-
ties in the 21st century and followed up in 2011 by publishing a convention on
International Information Security. However, Russia was accused, in 2008, of
hacking various eastern European nations. It was once again under the
spotlight after the events of Edward Snowden and WikiLeaks.
In December 2018, UN General Assembly adopted 2 important Russian-pro-
posed resolutions on international information security -- “Developments in
the field of information and telecommunications in the context of interna-
tional security” and "Countering the use of information and communica-
tions technologies for criminal purposes", thus opening a new chapter in
the global discussion on international cyber security.
France:
France's mission statement is as follows: “operational cooperation needs to
be stepped up between EU Member States. The aim is to build up pan-Euro-
pean instruments to share technical data on dangers, supporting planning
and quick reaction in the occasion of cyber assaults. The creation in 2017 of
the EU Cyber Diplomacy Toolbox (CDT) to battle cyber-attacks is an unde-
niable part of this participation."
The French Prime Minister introduced, in October 2015, the French national di-
gital security strategy, which was designed to support the digital transition of
French society. Such innovative strategy has placed France as a leader, offe-
ring a guidline for European digital strategic autonomy.
UK:
UK members of parliament have stated the following, “Cyber is a Tier 1
threat to the UK’s economic and national security. The policies, institutions,
and initiatives developed under the previous strategy have helped to esta-
blish the UK as a leading global player in cybersecurity. However, the scale
and dynamic nature of cyber threats, and the expanding reliance of our
economy and society on digital items and services mean that our current
way to deal with cybersecurity should be additionally reinforced. Therefore,
the Government is today distributing the new five year National Cyber Se-
curity Strategy, which characterizes our vision and desire for accompli-
shing a UK that is secure and tough to cyber threats; prosperous and
confident in the digital world.”
China:
China has been blamed for cyber warfare on countries including Australia,
India, Canada and the USA. Recently, China has suspended the Cybersecu-
rity Cooperation with the USA subsequent to being accused of cybercrime.
China was really one of the 20 primary nations alongside Russia to raise the
issue in the first place. Moreover, it has carried out numerous laws too to
keep this from occurring.
Circumstantially, this has started debate around the world about how much
freedom people will give up to keep up securely online: Initially, the Internet
was totally free where people could express themselves and feel free to
come up with applications never thought of before. As the innovation has
gotten more accessible, dangers have arisen. There is a huge discussion
concerning how much freedom ought to be permitted in cyberspace. If go-
vernments took more control over cyberspace, they could most assuredly
be more successful in improving cybersecurity; however, there is a risk they
would decrease the level of freedom permissible on the Internet. This
debate is especially pertinent in the European Union where individuals are
asking where to draw the line between security and freedom of expression.
Questions to consider:
• What measures can be taken to improve the monitoring of cyberspace?
• How can international actors be held accountable when they are found to
have taken part in cybercrimes?
• How can Cybersecurity adapt to the new machine learning and Artificial
intelligence attacks?
• IoT devices are devices that can autonomously transmit data over a
network. Attacking these devices can cause the loss of sensitive user data
and gaining access to these devices can trigger other hostile attacks. So
will the cybersecurity be able to prevent the user data attacks in the upco-
ming years?
@TIMUNSFAX
@TIMUN Sfax