[AfrICANN-discuss] TR:Contribute to the IGF 2017 BPF on Cybersecurity!
alfamamadou at hotmail.com
Tue Sep 5 16:25:31 UTC 2017
De : Outreach_com_2015 <outreach_com_2015-bounces at intgovforum.org> de la part de Eleonora Anna MAZZUCCHI <EMAZZUCCHI at unog.ch>
Envoyé : mardi 5 septembre 2017 16:09
À : bp_cybersec_2016 at intgovforum.org; bp_gender at intgovforum.org; bpf-localcontent at intgovforum.org; dc at intgovforum.org; intersessional_2015 at intgovforum.org; outreach_com_2015 at intgovforum.org; maarten at first.org; solugbile at gmail.com; Markus Kummer
Objet : [Outreach_com_2015] Reminder: Contribute to the IGF 2017 BPF on Cybersecurity!
This is a reminder of the open call for contributions<https://www.intgovforum.org/multilingual/content/bpf-on-cybersecurity-2017-call-for-contributions> (included below) from the IGF 2017 BPF on Cybersecurity<https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1>. All stakeholders are invited and encouraged to submit their written inputs by Friday 15 September. Contributions outlining best practices and case studies in response to the questions below are welcome from both individuals and organizations.
We look forward to hearing from many of you, and please do reach out with any questions on making a submission!
From: Eleonora Anna MAZZUCCHI/UNOG/GVA/UNO
To: bp_cybersec_2016 at intgovforum.org, bp_gender at intgovforum.org, bpf-localcontent at intgovforum.org, dc at intgovforum.org, intersessional_2015 at intgovforum.org, igfregionals at intgovforum.org, outreach_com_2015 at intgovforum.org, maarten at first.org, solugbile at gmail.com, Markus Kummer <kummer.markus at gmail.com>
Date: 15/08/2017 18:40
Subject: Cybersecurity BPF - Call for Inputs Now Open!
On behalf of the IGF 2017 Best Practice Forum (BPF) on Cybersecurity, we are pleased to inform you that the BPF has opened a call for contributions until 15 September 2017.
All stakeholders are now invited to make their submissions using the questionnaire below.
This year's BPF work focuses on the cybersecurity implications of policies for universal access and achieving the Sustainable Development Goals (SDGs) - we would be grateful for your inputs on these important issues! All submission instructions are included in the call details below and available on the IGF's website<https://www.intgovforum.org/multilingual/content/bpf-on-cybersecurity-2017-call-for-contributions>.
For any questions, please do reach out to the Secretariat, BPF lead expert Maarten van Horenbeeck, and/or co-facilitators Segun Olugbile and Markus Kummer.
We look forward to receiving your contributions!
BPF on Cybersecurity 2017 - Call for Contributions
All stakeholders are invited to submit written contributions addressing the below questions and issues to the 2017 IGF<https://www.intgovforum.org/multilingual/lexicon/8> BPF<https://www.intgovforum.org/multilingual/lexicon/8> on Cybersecurity mailing list (subscribe: https://www.intgovforum.org/mailman/listinfo/bp_cybersec_2016_intgovforum.org<http://www.intgovforum.org/mailman/listinfo/bp_cybersec_2016_intgovforum.org>) by 15 September 2017. While it is envisioned that initial drafting of the output document will begin on 15 September, this should be considered a soft deadline as contributions will be welcome after the 15th of September, particularly contributions from IGF National and Regional Initiatives (NRIs) and from other relevant entities or organisations who may be holding meetings relating to cybersecurity prior to the IGF annual meeting in December.
Contributions will then be compiled and synthesized by the Secretariat, and further circulated to the community for comment and further work towards an output document for the BPF to be presented at the 12th IGF in Geneva, Switzerland from 18-21 December.
All individuals and organizations are asked to kindly try to keep their contributions to no more than 2-3 pages, and are encouraged to include URLs/Links to relevant information/examples/best practices as applicable. When including specific examples or detailed proposals, those may be included as an Appendix to the document. Please attach contributions as Word Documents (or other applicable non-PDF text).
During 2015 and 2016, the Policy Options for Connecting and Enabling the Next Billion(s) (CENB) activity within the Internet Governance Forum identified two major elements:
· Which policy options are effective at creating an enabling environment, including deploying infrastructure, increasing usability, enabling users and ensuring affordability;
· How Connecting and Enabling the Next Billion(s) contributes to reaching the new Sustainable Development Goals (SDGs).
The Best Practice Forum on Cybersecurity realizes that making Internet access more universal, and thus it supporting the SDGs, has significant cybersecurity implications. Well-developed cybersecurity helps contribute to meeting the SDGs. Poor cybersecurity can reduce the effectiveness of these technologies, and thus limit our opportunities to helping achieve the SDGs.
BPF participants have conducted an initial study of how the policy proposals compiled as part of CENB Phase I and II may affect, or be affected by, cybersecurity implications.
As part of this ongoing effort, the IGF is now calling for public input to collect additional risks and cybersecurity policy recommendations that can help mitigate security impacts, and help ensure ICTs and the Internet continue to help contribute to achieving the SDGs.
Summary Records of the BPF
UN Sustainable Development Goals - http://www.un.org/sustainabledevelopment/sustainable-development-goals/
Policy Options for Connecting & Enabling the Next Billion(s) - Phase II
Security focused reading of CENB Phase I -
Security focused analysis of CENB Phase II -
· How does good cybersecurity contribute to the growth of and trust in ICTs and Internet Technologies, and their ability to support the Sustainable Development Goals (SDGs)?
· How does poor cybersecurity hinder the growth of and trust in ICTs and Internet Technologies, and their ability to support the Sustainable Development Goals (SDGs)?
· Assessment of the CENB Phase II policy recommendations identified a few clear threats. Do you see particular policy options to help address, with particular attention to the multi-stakeholder environment, the following cybersecurity challenges:
o Denial of Service attacks and other cybersecurity issues that impact the reliability and access to Internet services
o Security of mobile devices, which are the vehicle of Internet growth in many countries, and fulfill critical goals such as payments
o Potential abuse by authorities, including surveillance of Internet usage, or the use of user-provided data for different purposes than intended
o Confidentiality and availability of sensitive information, in particular in medical and health services
o Online abuse and gender-based violence
o Security risks of shared critical services that support Internet access, such as the Domain Name System (DNS), and Internet Exchange Point (IXP) communities
o Vulnerabilities in the technologies supporting industrial control systems
o Use of information collected for a particular purpose, being repurposed for other, inappropriate purposes. For instance, theft of information from smart meters, smart grids and Internet of Things devices for competitive reasons, or the de-anonymization of improperly anonymized citizen data
o The lack of Secure Development Processes combined with an immense growth in the technologies being created and used on a daily basis
o Unauthorized access to devices that take an increasing role in people’s daily lives
o Other: describe a cybersecurity issue critical to developing the SDGs in ways not listed above relevant to your stakeholder community (100 words or less)
· Many Internet developments do not happen in a highly coordinated way - a technology may be developed in the technical community or private sector, and used by other communities and interact in unexpected ways. Stakeholders are managing complexity.
This both shows the strength and opportunities of ICTs and Internet Technologies, but also the potential risks. New technologies may be insufficiently secure, resulting in harms when they are deployed: conversely we may adopt security requirements or measures that prevent the development, deployment, or widespread use of technologies that would generate unforeseen benefits. Where do you think lies the responsibility of each stakeholder community in helping ensure cybersecurity does not hinder future Internet development?
· Where do you think lies the responsibility of each stakeholder community in helping ensure cybersecurity does not hinder future Internet development?
· What is for you the most critical cybersecurity issue that needs solving and would benefit most from a multi-stakeholder approach within this BPF? Should any stakeholders be specifically invited in order for this issue to be addressed?
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the AfrICANN