Cyber security one of top 5 world risks
SECURITYBy BiztechAfrica - Feb. 3, 2012, 9:52 a.m.
The World Economic Forum meeting in Davos has identified cyber security as one of the top five risks in the world, but experts have cautioned against restricting the internet as a result.
Delegates at the conference heard that a new piece of malicious software is introduced every 30 seconds.
Over 2 million viruses, worms, back doors or Trojans have emerged over the past two years, and the threats are constantly growing. People used to hack computers for notoriety, and then as a criminal activity. Today, companies and nation-states are also behind cyber attacks, in the form of industrial and military espionage, respectively.
Attribution is a fundamental issue in addressing the problem, experts said. The biggest challenge is identifying who is behind a cyber attack and from where it comes, since cyber criminals are anonymous and operate without boundaries.
Experts noted that more international cooperation is needed to investigate cyber attacks and try to solve the attribution problem. With 4.5 billion users around the world, a sophisticated international framework may be one way to address the issue.
Rod A. Beckstrom, President and Chief Executive Officer, Internet Corporation for Assigned Names and Numbers (ICANN), USA, said: “Everything attached to a network can be hacked and everything is being attached to a network.”
Collaboration is the key to addressing the ongoing arms race between cybercriminals and the corporations, lawmakers and governments who oppose them, Beckstrom said.
Neelie Kroes, Vice-President and Commissioner for the Digital Agenda, European Commission, Brussels, described her belief that the future economy is inherently coupled to the Internet, so much so that cyber risk should be added to standard corporate reporting.
However, the COO of social networking site Facebook, Sheryl Sandberg, was one of those who noted that while security was paramount, there was still a need for a free and open internet platform. She said the internet and the social media had emerged as a major platform for freedom of speech.
Outlined at the event, a Partnership for Cyber Resilience highlighted key principles for cyber resilience, which were developed by Deloitte through multistakeholder dialogue across multiple regions and sectors.
In summary, the Principles are:
-Recognition of interdependence: All parties have a role in fostering a resilient shared digital space
-Role of leadership: Ensure executive-level awareness and leadership of cyber risk management
-Integrated risk management: Develop a practical and effective implementation programme
-Promote uptake: Where appropriate, encourage suppliers and customers to develop a similar level of awareness and commitment
MORE SECURITY NEWS
2014 Banking and ICT summits pegged for Uganda, Zambia and EthiopiaCyber Security Africa has announced that its 2014 Banking and ICT summits will be hosted in Uganda, Zambia and Ethiopia. Read More
Security in 2014: Money and MayhemIT security stands at the frontier of a fight for wealth and information, says Andrew Kirkland, Regional Director Africa, Trustwave. Read More
McAfee delivers on Intel vision of free mobile securityMcAfee has announced details of free protection for consumers on any Android and iOS mobile device. Read More
Botswana financial institutions exposed to cyber crimeBotswana’s financial institutions face a growing risk of cyber fraud, says BIC MD Dziki Nganunu. Read More
New Android threat risesThe AndroRAT is an example of how cyber criminals can manipulate apps for their own gain, says Intact Security. Read More
Arbor Networks partners with Networks Unlimited in SSAArbor Networks has announced a new partnership with Networks Unlimited to help organisations better mitigate and defend against the growing DDoS threat to their customers’ businesses. Read More
Trend Micro’s 2013 threat roundup highlights private data profitabilityAccording to Trend Micro Incorporated’s 2013 annual threat roundup report, “security breaches, cyber criminals, and organised attacks made it nearly impossible to keep personal and financial data private. Read More
Hardcore goons use mobiles to scare, extort KenyansHardcore criminals in prison are reported to be using mobile phones to extort money and scare Kenyan civilians. Read More
Phone scammers back in businessMicrosoft has warned of scam artists who defraud PC users by pretending to work for Microsoft. Read More
ADT, McAfee study finds parallels between physical, digital securityMcAfee has released the results of a survey that takes a look at the important parallels between personal and online security. Read More
FEATURED STORYMACRA demystifies spectrum management
Malawi's regulator explains the issues around spectrum allocation. Gregory Gondwe reports.
BEST READ NEWS
IN DEPTHYouthConnekt launches Mobile Apps for Human Development Challenge in Rwanda
Rwanda’s Ministry of Youth and ICT and the UNDP, in close collaboration with Motorola Solutions, will power a Mobile App Challenge that will be implemented by YouthConnekt.