A_Global_Protocol_on_Cybersecurity_and_Cybercrime.pdf

So sometimes having a regional answer could be

Info icon This preview shows pages 22–24. Sign up to view the full content.

View Full Document Right Arrow Icon
net penetration and have similar cybersecurity needs. So sometimes, having a regional answer could be appropriate in specific contexts. Any global strategy to develop a cyber- security culture has to be adapted to local needs. When developing cybersecurity culture, one of the main challenges is to identify cor- rectly what are the global and international issues and what are the local specific needs for a cybersecurity culture. International standards can only contribute to identifying the global and generic main issues related to a cybersecurity culture because cultures rely upon local and temporal factors. A unique and exclusive cybersecurity culture could be prejudicial to specific in- formation society environments and visions. It could fail to respond adequately to the multitude of end-user backgrounds, points of views, and needs. Promoting a culture of cybersecurity that will touch the entire population needs to rely upon an appropriate political vision and will and efficient private and public partnerships . It is too soon yet, to assess the long term effects of the several existing awareness and edu- cational initiatives. There are no real theories or methodologies related to how to design, to communicate, to validate or to control the adequacy of a cybersecurity culture. Evalu- ating the effectiveness of cybersecurity culture, from policies and guidelines to practice, is very difficult. But at the same time we know that if the public and private sectors do not support such initiatives together as soon as possible, there will be a long term negative effect on economic development and the ability to ensure the security of goods and peo- ple. Let us remember the following guidelines from the Organization for Economic Co- operation and Development; OECD’s 2002 guidelines for the security of information sys-
Image of page 22

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
14 tems and networks – “Towards a culture of security” 4 , which are a starting point for ex- amining security issues. The first two points mentioned are : Awareness : Participants should be aware of the need for securing information sys- tems and networks and what can be done to enhance security; and Responsibility: All participants are responsible for the security of information systems and networks”. There is a global responsibility to provide citizens with the appropriate information re- lated to cybersecurity issues. Sufficient awareness and education will contribute to that and to prevent incompetent or incorrect behaviours. It will also assist the development of trust and confidence in ICT infrastructures, services, security mechanisms and controls. It will also avoid to built security based on fear. Fear is a selling argument when dealing with security issues but is not always rational and does not lead to the best investments and efficiency in security. It can, however, be synonymous with excessive control that will impact the preservation of human rights and privacy.
Image of page 23
Image of page 24
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern