Session: Cybercrime Strategies

Time: 
Wed, 2011-09-28 14:30 - 16:00

Concise Description:
Cybersecurity has become a policy priority of many governments. This is reflected in cybersecurity policies or strategies that have been adopted or that are in preparation in all regions of the world.

Such cybersecurity strategies combine political and technical dimensions:
 protection of economic and other national interests and national security
 protection of the confidentiality, integrity and availability of information and communication technology to enhance security, resilience, reliability and trust.
Priority is given to public and private sector critical information infrastructure that is to be protected against:
 non-intentional incidents (disasters, technical or human failures)
 intentional attacks by state and non-state actors.

They focus on technical, procedural and institutional measures, such as risk and vulnerability analyses, early warning and response, incident management, information sharing and other measures to ensure protection, mitigation and recovery.
Measures against cybercrime tend to be one element of cybersecurity strategies.

Cybercrime and cybersecurity strategies are not addressing identical issues nor do they cover the same type of measures, but they intersect and complement each other.
Measures against cybercrime are to provide a criminal justice response to ensure that the rule of law and human rights also apply in cyberspace and that legitimate interests are protected.

Cybercrime is about:
 offences against the confidentiality, integrity and availability of computer data and systems
 offences by means of computers, in particular the sexual exploitation and abuse of children, fraud, or offences related to infringements of intellectual property rights.

Any offence may involve ICT and thus electronic evidence on a computer system. Not all of these constitute cybercrime, but measures against cybercrime need to address this challenge.
In many countries this includes for example:
 preventive measures
 cybercrime reporting systems
 legislation (substantive and procedural law harmonised with the Budapest Convention on Cybercrime)
 high-tech crime and other specialised units
 law enforcement and judicial training
 public-private (including law enforcement – service provider) cooperation
 international cooperation
 protection of children
 financial investigations and other measures against fraud.

However, only few governments have designed specific and consistent cybercrime strategies.

The workshop will therefore discuss the following:
► Cybercrime and cybersecurity strategies: What concepts? What differences and intersection? How to ensure synergies and complementarity?
► Cybercrime strategies: Is there a need for specific cybercrime strategies? By public and private sectors? What objectives and measures would make up such strategies?
► Stakeholders: Who is responsible for developing, managing, implementing cybercrime strategies? What role for public and private sector organisations?

From twitter...


DamnThaSOPAMan (DamnThaMan)

Domain name seizures: The end of the dot com dominance? http://t.co/jJbGcF00 #in #icann #igf11 #cdntech #c30 #sop... cc @lamarsmithtx21

2 years 26 weeks ago

asteris (Asteris Masouras)

10' to 3rd #igf11 track of day 2. #115 Cybercrime strategies/CoE, #438 Corp responsibility, #211 FOSS4D, #212 Privacy & infosec/AccessNow

2 years 47 weeks ago