Cybersecurity

Updates

15 Nov 2017 | The White House releases details on its vulnerability disclosure process

The White House has released an updated version of its Vulnerability Equity Process (VEP), an internal procedure according the which the government decides which software vulnerabilities it will disclose to vendors, and which it will withhold for its own use in cyber-attacks. While VEP was developed over several years since 2008, previous versions were largely classified and have raised numerous concerns by the private and civil sector. The updated version still has some parts classified -  namely, the annex related to the exceptions due to restrictions by partner agreements and sensitive operations - yet the other parts are now unclassified. Justifying the existence of VEP and acknowledging the increased transparency about it, Rob Joyce, the White House Cybersecurity Coordinator, emphasised several guiding principles the government needs to respect: taking into account the interests of all stakeholders, accountability of the process and those who operate it, and informed and vigorous dialogue. Joyce reported that the government discloses more than 90% of the vulnerabilities it finds; yet Edward Snowden warned that the 10% withheld could be the most harmless. The improved version of VEP responds to criticism of some experts, such as Bruce Schneier, on the previous version, and now includes detailing of departments and agencies involved in the process, the criteria for decisions, mechanisms for objections by involved institutions, and issuing annual reports with at least an executive summary made public. The concerns remain, however, that the non-disclosed vulnerabilities could be leaked and again cause global havoc, as the WannaCry ransomware did, Wired reports.

8 Nov 2017 | CoE and Kaspersky Lab sign agreement on human rights

The Council of Europe (CoE) and Russian antivirus software developer Kaspersky Lab, as well as other IT and Internet companies signed an agreement during the World Forum for Democracy 'on protection of human rights and guaranteeing compliance with laws in the Internet', according to Kaspersky Lab. The signed agreement is a step of the CoE Internet Governance Strategy for 2016-2019. The strategy supports and protects citizens on the Internet, 'guaranteeing respect for their rights, ensuring equality and freedom of expression, and combating cybercrime and terrorism,' according to the statement.

 

 

5 Nov 2017 | One third of IPv4 addresses affected by DoS over past two years

A study conducted by a team of researchers at the University of Carolina San Diego, Saarland University, and University of Twente has revealed that one third of all IPv4 address space estimated to be in use have been affected by at least one denial-of-service (DoS) attack over the past two years. The researchers based their study on data from four global Internet measurement sources: backscatter traffic to a large network telescope; logs from amplification honeypots; a Domain Name System (DNS) measurement platform covering 60% of the current namespace; and a DNS-based data set focusing on DDoS Protection Services (DPS) adoption. Other main findings of the report: often targets are simultaneously hit by different types of attack; web servers were the most prominent DoS attack target; and an average of 3% of domain names registered in .com, .net, and .org were involved in DoS attacks daily; the most commonly targeted countries were the USA, China, Russia, France, and Germany.

Pages

Cybersecurity is among the main concerns of governments, Internet users, technical and business communities. Cyberthreats and cyberattacks are on the increase, and so is the extent of the financial loss. 

Yet, when the Internet was first invented, security was not a concern for the inventors. In fact, the Internet was originally designed for use by a closed circle of (mainly) academics. Communication among its users was open.

Cybersecurity came into sharper focus with the Internet expansion beyond the circle of the Internet pioneers. The Internet reiterated the old truism that technology can be both enabling and threatening. What can be used to the advantage of society can also be used to its disadvantage.

Today, the cybersecurity framework includes policy principles, instruments, and institutions dealing with cybersecurity. It is an umbrella concept covering (a) critical information infrastructure protection (CIIP), (b) cybercrime, and (c) cyberconflict.

As a policy space, cybersecurity is in its formative phase, with the ensuing conceptual and terminological confusion. We often hear about other terms that are used without the necessary policy precision: cyber-riots, cyberterrorism, cybersabotage, etc. In particular, cyberterrorism came into sharper focus after 9/11, when an increasing number of cyberterrorist attacks were reported. Cyberterrorists use similar tools to cybercriminals, but for a different end. While cybercriminals are motivated mainly by financial gain, cyberterrorists aim to cause major public disruption and chaos.

Cybersecurity policy initiatives

Cybersecurity is tackled through various national, regional, and global initiatives. The main ones are described below.

At national level, a growing volume of legislation and jurisprudence deals with cybersecurity, with a focus on combating cybercrime, and more and more the protection of critical information infrastructure from sabotage and attacks as a result of terrorism or conflicts. It is difficult to find a developed country without some initiative focusing on cybersecurity.

At international level, the ITU is the most active organisation; it has produced a large number of security frameworks, architectures, and standards, including X.509, which provides the basis for the public key infrastructure (PKI), used, for example, in the secure version of HTTP(S) (HyperText Transfer Protocol (Secure)). The ITU moved beyond strictly technical aspects and launched the Global Cybersecurity Agenda. This initiative encompasses legal measures, policy cooperation, and capacity building. Furthermore, at WCIT-12, new articles on security and robustness of networks and on unsolicited bulk electronic communications (usually referred to as spam) were added to the ITRs.

A major international legal instrument related to cybersecurity is the Council of Europe’s Convention on Cybercrime, which entered into force on 1 July 2004. Some countries have established bilateral arrangements. The USA has bilateral agreements on legal cooperation in criminal matters with more than 20 other countries (Mutual Legal Assistance in Criminal Matters Treaties (MLATs)). These agreements also apply in cybercrime cases.

The Commonwealth Cybercrime Initiative (CCI) was given its mandate from Heads of government of the Commonwealth in 2011 to improve legislation and the capacity of member states to tackle cyber crime. Dozens of partners involved with CCI assist interested countries with providing scoping missions, capacity building programmes, and model law outlines in the fields of cybercrime and cybersecurity in general.

The G8 also has a few initiatives in the field of cybersecurity designed to improve cooperation between law enforcement agencies. It formed a Subgroup on High Tech Crime to address the establishment of 24/7 communication between the cybersecurity centres of member states, to train staff, and to improve state-based legal systems that will combat cybercrime and promote cooperation between the ICT industry and law enforcement agencies.

The United Nations General Assembly passed several resolutions on a yearly basis on ‘developments in the field of information and telecommunications in the context of international security’, specifically resolutions 53/70 in 1998, 54/49 in 1999, 55/28 in 2000, 56/19 in 2001, 57/239 in 2002, and 58/199 in 2003. Since 1998, all subsequent resolutions have included similar content, without any significant improvement. Apart from these routine resolutions, the main breakthrough was in the recent set of recommendations for negotiations of the cybersecurity treaty, which were submitted to the UN Secretary General by 15 member states, including all permanent members of the UN Security Council.

Events

Actors

(EBU)

In an environment increasingly characterised by digital convergence, the EBU is working on supporting its memb

...

In an environment increasingly characterised by digital convergence, the EBU is working on supporting its members in their digital transformation processes, in promoting and making use of digital channels, and in identifying viable investment solutions for over-the-top (OTT) services. The organisation has a Digital Media Steering Committee, focused on ‘defining the role of public service media in the digital era, with a special focus on how to interact with big digital companies’. It also develops a bi-annual roadmap for technology and innovation activities, as well as a Strategic Programme on Broadcaster Internet Services, and it has a dedicated Project Group on OTT services.

(GCSP)

As part of its Emerging Security Challenges Programme, the GCSP has a

...

As part of its Emerging Security Challenges Programme, the GCSP has a cybersecurity cluster which tackles cybersecurity issues through education and training activities, as well as policy analysis and events. The cluster also provides a platform for dialogue and exchanges on cyber challenges, among cyber experts from the public, private, and civil society sectors. The training and education activities cover areas such as cybersecurity strategy formulation, cyber diplomacy, and broader capacity building initiatives (e.g. workshops and student challenges). Policy papers produced by the GCSP examine issues such as computer network defence, future challenges in cyberspace.

(ICT4Peace)

In the area of online content policy, the ICT for Peace Foundation is engaged in activities concerning the use

...

In the area of online content policy, the ICT for Peace Foundation is engaged in activities concerning the use of the Internet for terrorist purposes. The Foundation is organising events and producing publications on this issue, with the main aim of raising awareness and promoting a multistakeholder dialogue on possible solutions for countering terrorist use of the Internet. Together with the United Nations Counter-Terrorism Executive Directorate, the organisation runs a global engagement project working with other stakeholders to develop community standards around the prevention of violent extremism online, consistent with UN principles, including in the area of human rights.

(UNIDIR)

As part of its Emerging Security Issues Programme, UNIDIR carries out research and provides exp

...

As part of its Emerging Security Issues Programme, UNIDIR carries out research and provides expertise and support to advance policy processes in the area of cybersecurity. The Institute acts as expert consultant to the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. It also organises an Annual Cyber Stability Conference, which discusses possible steps towards a more stable and predictable cybersecurity environment. The research undertaken by the Institute focuses on new cybersecurity challenges, and it is mainly aimed at assisting states in better understanding these challenges as they span across traditional legal and national boundaries.

(WEF)

Within the framework of its Digital Economy and Society initiative, WEF has launched the

...

Within the framework of its Digital Economy and Society initiative, WEF has launched the Internet for All project, aimed at bringing online tens of millions of Internet users by the end of 2019, initially through programmes targeted at the Northern Corridor in Africa, Argentina, and India. In addition to this project, WEF also undertakes research on Internet-access-related issues. One notable example is the annual Global Information Technology Report and the related Networked Readiness Index, which measures, among others, the rates of Internet deployment worldwide. Internet access and the digital divide are also addressed in the framework of various WEF initiatives such as its annual meetings and regional events.

(GCSCC)

The Global Cyber Security Capacity Centre has developed the 

...

The Global Cyber Security Capacity Centre has developed the Cybersecurity Capacity Maturity Model for Nations, a model to review cybersecurity capacity maturity across five dimensions, which aims to enable nations to self-assess, benchmark, better plan investments and national cybersecurity strategies, and set priorities for capacity development. GCSCC is also developing a model for understanding the harm experienced by nations as result of a lack of capacities. The Cybersecurity capacity portal, developed by the GCSCC in partnership with the Global Forum on Cyber Expertise (GFCE), is a global resource for cyber capacity building which enables sharing of practices and experiences.

Article 19
(Article 19)

Microsoft
(Microsoft)

Interpol
(Interpol)

G20
(G20 )

CyberGreen Initiative
(CyberGreen)

Instruments

Conventions

Resolutions & Declarations

Wuzhen World Internet Conference Declaration (2015)
IPU Resolution on the Contribution of new information and communication technologies to good governance, the improvement of parliamentary democracy and the management of globalization (2003)

Standards

Recommendations

Other Instruments

2015 Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (2015)
2013 Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (2013)

Resources

Articles

Apple vs FBI: A Socratic Dialogue on Privacy and Security (2016)
The UN GGE on Cybersecurity: The Important Drudgery of Capacity Building (2015)

Publications

Internet Governance Acronym Glossary (2015)
An Introduction to Internet Governance (2014)

Papers

From Articulation to Implementation: Enabling Progress on Cybersecurity Norms (2016)
Expert and Non-Expert Attitudes towards (Secure) Instant Messaging (2016)
International Cybersecurity Norms. Reducing Conflict in an Internet-dependent World (2014)
A Security Analysis of Emerging Web Standards. HTML5 and Friends, from Specification to Implementation (2012)

Reports

Towards a secure cyberspace via regional co-operation (2017)
Technology, Media and Telecommunications Predictions 2017 (2017)
State of DNSSEC Deployment 2016 (2016)
Comparative analysis of the Malabo Convention of the African Union and the Budapest Convention on Cybercrime (2016)
Enabling Growth and Innovation in the Digital Economy (2016)
One Internet (2016)
Blue Skies Ahead? The State of Cloud Adoption (2016)
Cybersecurity Competence Building Trends (2016)
Automotive IoT Security: Countering the Most Common Forms of Attack (2016)
Stocktaking, Analysis and Recommendations on the Protection of CIIs (2016)
The Global Risks Report 2016 (2016)
Best Practice Forum on Establishing and Supporting Computer Security Incident Response Teams (CSIRT) for Internet Security (2015) (2015)
NI Trend Watch 2016 (2015)
OECD Digital Economy Outlook 2015 (2015)
Global Internet Report 2015 (2015)
Best Practices to Address Online, Mobile, and Telephony Threats (2015)
Global Cybersecurity Index & Cyberwellness Profiles (2015)
Security: The Vital Element of The Internet of Things (2015)
Cybersecurity Capacity Building in Developing Countries. Challenges and Opportunities (2015)
Riding the Digital Wave. The Impact of Cyber Capacity Development on Human Development (2014)
Best Practice Forum on Establishing and Supporting Computer Security Incident Response Teams (CSIRT) for Internet Security (2014) (2014)

GIP event reports

The Proposal for a Digital Geneva Convention – Implications for Human Rights (2017)
GPW 2017: Summary of Discussions on Conflict Prevention and New Technologies (2017)
Roundtable Discussion: A New Digital Geneva Convention? (2017)
Recent Cyber Incidents - Patterns, Vulnerabilities and Concerns (2017)
Preventing Cyber Conflicts: Do We Need a Cyber Treaty? (2017)
Looking Ahead: What to Expect in the Cyber Realm (2017)
Launch of the SCION Pilot Server (2017)
How Can Technological Solutions Advance Cybersecurity? (2017)
DNS Abuse Discussions at ICANN60 (2017)
Geneva Digital Talks: What can Geneva offer in Global Digital Governance? (2017)
Digital citizenship, Integration, and Participation (2017)
At-Large Advisory Committee (ALAC) and Regional Leaders Wrap Up – Part 1 (2017)
Keynote Speech at EuroDIG 2017 – Göran Marby, ICANN (2017)
EuroDIG 2017 Welcoming Address (2017)
Alice in Wonderland – Mapping the Cybersecurity Landscape in Europe and beyond (2017)
Domain Names Innovation and Competition (2017)
Cybersecurity – The Technical Realities Behind the Headlines (2017)
Global Survey of Internet User Perceptions (2017)
Cybersecurity and Cybercrime: New Tools for Better Cyber Protection (2017)
Report for Symposium on The Future Networked Car (2017)
Report for World Economic Forum Annual Meeting 2017 (2017)
Report for Violent Extremism Online – A Challenge to Peace and Security (2017)

Other resources

Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy (2016)
The CEO's Guide to Securing the Internet of Things - Exploring IoT Security (2016)
GSMA IoT Security Guidelines (2016)
Combating Spam and Mobile Threats - Tutorials (2016)
Cyber Security Guidelines for Smart City Technology Adoption (2015)
Symantec 2015 Internet Security Threat Report (2015)
Security Guidance for Early Adopters of the Internet of Things (2015)
DNSSEC: Securing your Domain Names (2014)
Symantec Monthly Threat Report
M3AAWG Best Practices
DNSSEC Deployment Report

Processes

Sessions at WSIS Forum 2016

Sessions at IGF 2015

IGF 2016 Report

 

The Best Practice Forum (BPF) on cybersecurity was an opportunity to link various communities, and mainly focused on discussions about the multistakeholder process (Best Practice Forum on Cybersecurity - Creating Spaces for Multistakeholder Dialogue in Cybersecurity Processes) and again looked at how to define cybersecurity from various perspectives (Best Practice Forum - Cybersecurity). Several other sessions also shared useful experiences from developing coun- tries in capacity, especially with regard to Computer Emergency Response Team (CERT) capabilities (Cybersecurity - Initiatives in and by the Global South - WS26) and awareness-raising campaigns (What Makes Cybersecurity Awareness Campaigns Effective? - WS113).

The role of the technical community and the private sector was outlined in assisting the implementations of cyber-norms and confidence-building measures by the UN, regional organisations, and governments. While the IGF was seen as the place to encounter all stakeholders, and the proposal made that a dedicated (possibly even main) session is scheduled at IGF 2017, it was suggested that the Internet governance community meets the security community within the framework of the Global Conference on Cyber Space (GCCS) in 2017, with support of the Global Forum on Cyber Expertise - GFCE (NetGov, Please Meet Cybernorms. Opening the debate - WS132).

The contribution of cybersecurity to economic development and the overall SDGs was recognised, and the roles the OECD and World Bank could play were emphasised (How do Cybersecurity, Development and Governance Interact? - WS115). The need to incentivise the Internet industry in implementing high Internet standards was noted, and the GFCE was suggested as a forum for discussion (Building Trust and Confidence: Implement Internet Standards - WS240). Security of the IoT was underlined, as was the strong link between human rights and encryption (On Cybersecurity, Who Has Got Our Back?: A Debate - WS196). A clear link between cybersecurity and human rights was reiterated throughout several sessions, and particularly by the contributions of the Freedom Online Coalition - FOC (Open Forum: Freedom Online Coalition - OF27).

WSIS Forum 2016 Report

 

As the demands of ICT-related SDGs need to be met with capacity-building initiatives, cybersecurity was identified as one of the eight core digital skills people need in the twenty-first century. Internet Governance, Security, Privacy and the Ethical Dimension of ICTs in 2030 (session 150) suggested that the interpretation of vast amounts of information and big data that Internet of Things (IoT) will bring could result in an innovative multi-trillion-dollar economy. Examples of solutions that can both boost the economy and increase security were raised in From Cybersecurity to ‘Cyber’ Safety and Security (session 172); these included the use of social media for managing disasters. 

Ensuring trust in cyberspace through collaboration between governments, the industry, and users was outlined as fundamental for utilising economic opportunities necessary for fulfilling the SDGs during discussions in Action Line C5 (Building Confidence and Security in the Use of ICTs) - National Cybersecurity Strategies for Sustainable Development (session 120). Such cooperation in the area of cybersecurity, however, should be built on trust between the public and private sectors. A Trusted Internet Through the Eyes of Youth (session 151) warned that trust on the Internet is highly fragmented due to the diverse interests of stakeholders, and especially due to surveillance programmes. Multistakeholder dialogue and shaping policies by consensus were mentioned as ways to strengthen mutual trust.

When it comes to practical suggestions for improving cooperation in cybersecurity, panellists of session 120 also suggested cooperation in incident response that can include both compulsory and voluntary reporting on cyber-incidents. Session 170 on The Contribution IFIP IP3 Makes to WSIS SDGs, with an Emphasis on Providing Trustworthy ICT Infrastructure and Services invited companies to invest more in education, professionalism, and security. Providing good quality legal and technical information and data to decision-makers was added to the list of suggested measures by the discussants of session 172. 

Various emerging risks were also discussed in several sessions. Session 172 raised concerns about the emerging face of terrorism which increasingly uses new technologies including commercial drones. 

Session 150 warned that big data should be accompanied by ‘big judgment’ and awareness of communities of the risks of ‘uberveillance’ - becoming possible due to brain-to-computer interfaces (BCIs) and and sub-dermal implants - that can have an irreversible impact on society. On the other hand, session 120 commented on encryption as a useful concept that can enhance individual security, and suggested that law enforcement agencies can benefit greatly from other digital evidence. 

IGF 2015 Report

 

With a rise in cybercrime and a sharper focus on cybersecurity by policymakers worldwide, it is no surprise that the issue was discussed at great length during the IGF 2015. Cyberattacks, which are on the rise and are evolving with the growth in infrastructure, mobile money transfers, and social media, affect the economic growth and sustainable development of many countries. The real economic cost of cyberattacks is considerable. However, as the discussion during Managing Security Risks for Sustainable Development (WS 160) concluded, it was hard to identify and calculate the cost of each cyberattack due to multiple tangible and intangible effects, with one of the consequences being the limited availability of global statistics on cyberattacks.

With regard to cybersecurity strategies, the speakers made reference to the OECD’s recommendation on Digital Security Risk Management for Economic and Social Prosperity which seeks to ensure that risk management is considered an important facet when decisions are made on digital issues. They said, however, that existing cybersecurity strategies are too focused on technology and are missing the human element. In Commonwealth Approach on National Cybersecurity Strategies (WS 131), the speakers agreed that cybersecurity should be tackled by governments in partnership with the private sector, regulators, and other governments. It requires legal frameworks, the use of technology to enforce cybersecurity, harmonisation of regional laws, and cooperation among states to tackle cross-border cybercrime.

The issue of trust (as well as other issues, such as privacy and freedom of expression, which are discussed below) was a main theme that intersected with security. Discussed predominantly during the main session dedicated to Enhancing Cybersecurity and Building Digital Trust, the panel agreed that multistakeholder approaches and private-public partnerships should be used to address the challenges. ‘If you want total security, go to prison’, said one panellist. On the other hand, surveillance and censorship cannot be used to justify cybersecurity. Surprisingly, a panellist in Cybersecurity, Human Rights and Internet Business Triangle (WS 172) revealed that 80% of actionable intelligence comes from publically available resources.

 

The GIP Digital Watch observatory is provided by

in partnership with

and members of the GIP Steering Committee



 

GIP Digital Watch is operated by

Scroll to Top