A_Global_Protocol_on_Cybersecurity_and_Cybercrime.pdf

In order to be able to x decrease the number of

Info icon This preview shows pages 20–23. Sign up to view the full content.

View Full Document Right Arrow Icon
In order to be able to: x Decrease the number of vulnerabilities of digital environments; x Define, design, produce, and implement efficient security tools and measures of protection and reaction to support availability, integrity and confidentiality of ICT infrastructures and develop confidence into e-services. Security Technologies should be: x Cost effective; x User friendly; x Transparent; x Auditable; x Third party controllable.
Image of page 20

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
12 Social dimension Any citizen should: x Understand threats for the end-user (virus, spam, identity usurpation, fraud, swindle, privacy offence, etc…) and their impacts; x Understand how to adopt a security behaviour for a safe use of ICT resources; x Understand how to build a global cybersecurity culture based on well recognized international standards and recommendations, involving several kinds of stakeholders; In order to raise awareness among all interested parties. So to empower human resource in a global perspective, a general, modular and flexi- ble educational framework in cybersecurity should exist to answer the needs of increased public awareness and provide a deeper education for particular professionals. This con- cern as well developed country or less developed ones. Education is the key factor to become an actor of the information society and it is the cornerstone of a knowledge-based society. Thanks to education the digital divide and the cybersecurity divide could be reduced. Therefore, to enhance confidence and security in the use of ICT and cybersecurity education should not be considered as an option. An international approach Because of the global nature of cyberthreats and of the interconnected ICT infrastruc- tures, an international approach of cybersecurity is needed. This could be done by adop- tion of international standards, and good practices in all the dimensions of cybersecurtiy. A universal approach of information security is useful to: x Have a common understanding of what cybersecurity means to all; x Contribute to build a global response for a safe and interrelated information society; x Facilitate definition and deployment of national cybersecurity strategies and international cooperation; x Create local know how based on well recognized standards, to answer specific local needs by integrating local cultural values in national standards derived from international standards and well recognised good practices; x Avoid duplication of works and efforts; x Optimize cooperation between the actors.
Image of page 21
13 International standards should be applicable at national and regional, levels and com- patible at the international level. Answering a global challenge by a local answer The ICT level of penetration or internet uses can vary from country to country, and even if cybersecurity problems are similar, the way to deal with those problems will depend, for example, on local culture, contexts, and national legal frameworks. But even if each country is different, some countries at a regional level might have the same level of Inter- net penetration and have similar cybersecurity needs. So sometimes, having a regional
Image of page 22

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 23
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern