Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Suggestions of International Cooperation For Cyber Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Essay Title Category Name

Suggestions of International Cooperation for Cyber Security Cybersecurity and Cybercrime Eugene Song Sungha Park Ji Young Heo

1. Introduction: Why cyber security is necessary? Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear. This is a part of A Cyberspace Independence Declaration1 published in 1996 by John Perry Barlow, a cyberspace activist and a founder of Electronic Frontier Foundation. It is a statement reflected right the situation of those days. The people at that time thought internet as a free space with full of data but no legal regulation. Nowadays, activities in cyber space have a strong influence real world. So, it is necessary to keep order in cyber space. Now, many countries including US, China, and UK recognize the importance of cyber security and make an effort to construct national system and alternative. But still there remain many problems. The most serious problem is that there has no international cooperation system against the attack, even though attacking on cyber space happens regardless of time and country. 2. Why close international cooperation is important? Spatial autonomy on cyber space Border between countries in cyber space is obscure. It is possible to draw border between nations through internet web consisting of TCP/IP. But it is different between Internet where is accessible with only some mouse clicks and real space where needs visa to go. Thus, this characteristic is called as spatial autonomy in this study,

https://projects.eff.org/~barlow/Declaration-Final.html

Spatial autonomy authorizes character to various activities on cyber space. Most malignant codes are spread to the target of attack by way of many countries. It is very rare that a cyber activity is limited to a country. Here, it is doubt whether it is effective for a country alone to investigate. What happen if regulations on cyber space are different from countries in the process of cooperation for counter plan and search for the person in charge? This is not a national problem but an international matter needed for cooperation.

4. Analysis of cyber security system of major countries-control tower and information sharing system There are two things in common between cyber securities in major countries. First, they consider the public-private-military cooperation against cyber threat and the control tower for that to be important. Second, they establish the information sharing system for the purpose of monitoring the cyber space and sharing information effectively. Here, we briefly will check common features of cyber security system in US, UK, Australia, and Korea for the basis of international cooperation model. country US Control tower Cyber Security Coordinator (CSC) Information sharing system National Cybersecurity and Communcation Integration Center (NCCIC) UK Office of Cyber Security (OCS) Australia Advanced Cyber Security Centre (ACSC) Cyber Security Operations Centre (CSOC) Cyber Security Operations Centre (CSOC)

Table 1. Control tower and information sharing system in US, UK, and Australia UK set a goal to be resilient to cyber attacks and protect cyber security through national cooperation2. For the purpose, Cyber Security Operations Centre (CSOC) as a coordinating authority for cyber security policy, and Office of Cyber Security (OCS) to counteract effectively against the cyber attack, crime, and terror were established. Australia selected the cyber security as one of top priority among national and
2

Kim Jin Sung and Lee Kyungho. Study on National Cyber Security Systems development

established Computer Emergency Response Team (CERT) and Cyber Security Operation Centre (CSOC) 3. There are Cyber Security Coordinator (CSC) and National Cybersecurity and Communcation Integration Center (NCCIC) in the US. CSC sets up policy development and legislative directions, decides priority among cyber security policies, and coordinates cooperation. NCCIC organizes general operation of national cyber space and communication, and cyber terror response efforts4. Korea, after cyber terror5 on March 20th, tried to establish National Cyber Terrorism Prevention Act which organizes National Intelligence Service (NIS) as the center for cyber security system against cyber threats. However, it has not been established because of disputes on the central role of NIS. Obviously, Korea recognizes the importance of information sharing system.

5. Suggestions of international cooperation for cyber security As the necessity for cyber security is emerging, international guidelines were suggested in the National Cyber Security Framework Manual and Tallinn Manual on the International Law applicable to Cyber Warfare. In addition, cyber security will be discussed as a key issue in Seoul Defense Dialogue this year. However, the discussion is mainly for developed country oriented partial cooperation and systemic centered cooperation approach including most nations is not available yet. It will be very complicated and not be effective to discuss on detailed policy thorough solving all of country-by-country gap. Thus, here we will suggest the international cooperation model through comprehensive way and explain the necessary part in addition. 1) Suggestions of international cooperation model

Lee Gang Gyu. Cybersecurity strategy and our policy direction. Communication Policy Research.

23(16): 1-27. 2011


4

Lee Jaeil. Major cyber security strategies and policy implication. Journal of Information Science.

30(1): 9-16. 2012


5

Cyber terror on March 20: the cyber attack against Koreas financial institutions on March 20

done by the North after building a very detailed plan at least eight months beforehand.

There are two things to suggest the international cooperation model. First, it is necessary for central decision making organization and the treaty. This models basically United Nations. It is necessary of decision making organization on which many countries agree like UN. Minimum order and regulation approved by each nation as in the Charter of the UN should be arranged. For this purpose, permanent council for cyber security as well as interim council for cross-national cyber accidents should be organized. These councils would play a role for international communication. It is also necessary for every nation to arrange the councils and the decision making organization like UN General Assembly since control tower has the highest right to command in the cyber security system. Second, it is also needed for cross-national information sharing system. With establishment of information sharing system armed with the principles of reciprocity and trust, it is possible to improve the standard on cyber security among nations and counteract immediately and precisely against a specific threat. It could acts as an execution organization which has deterrent power against the wrongdoers of illegal or irrational cyber attacks and secure credibility on the treaty or resolution with enforcement. 2) Necessity and reciprocity of Official Development Assistance (ODA) On May 28th, 2012, Mao Shaotian, the president of China International Strategy, pointed out the increased information gap as one of cyber security problems. Existing gap between developed and underdeveloped country changed to the gap according to the development on information and communication technology. As a result, developing country like China suffers difficulty to cope with cyber security. Developing country can get support on the information technology and/or the technique and policy on the information protection thorough ODA program by developed country. Thus, should the developed country continue ODA program only for the world peace as nobles oblige and without profits? This is out of reciprocity in international society and couldnt be continued long. However, developed country didnt always give everything Recent increasing concerns on cyber security among the developed countries are due to the fact that the countries with developed computer networks are more vulnerable to the threat such as cyber attacks or terrors. But developing countries should cooperate because starting point or passageway of the attack could be located on every nation. To draw the agreement on cyber security cooperation by developing country through the ODA program

also is able to draw world peace as well as to implement national security. Otherwise, it is possible to gain natural resources or other things in return of the support for information security as is the case of ODA. Meanwhile, it is a characteristic of international society today that it became important of the role by the middle power nation which can lead solution and discussion about agenda or issue as the former world powers including US are recessing after the cold war. It will be good examples that G8 nations cope with global economic crisis and that European countries more than the US lead discussion in UN Security Council about the pro democracy movement in Egypt and Libya6. Therefore, if close cooperative relations on cyber security between developing and developed countries are established, middle power nation will have great momentum to lead the international society, which could be a driving force for world peace. 3) The role of UN It has existed various change and expansion in the area of national security according to the globalization and the rapid changes on information development. Above all, the importance of comprehensive security, which totally includes military, politics, and economy, emerged. The concept that security should secure territorial and political safety and remove all harm elements for individual existence, welfare, and dignity is expanded. Especially, non-traditional security threats compared with traditional military security intimidate safety of neighboring country over the territorial border and go further to cause regional or global problems. So, it is necessary for multilateral approach rather than independent effort or mutual relations7 Thus, it needs to develop new national security view, discussion, and policy in order to meet with new international security environment which represents diversification of security issues and wrongdoers. It is necessary for us to make an effort for establishment of strategy
6

Lee Seo Hyang.

UN, Korea, and world peace. 2nd symposium for development of International

organizations series_past, present and future of International Organizations and UN and world peace. p. 251. 2013
7

Lee Sin Hwa. Duty and activity of UN. 2nd symposium for development of International

organizations series_past, present and future of International Organizations and UN and world peace. pp. 170. 2013

and implementation plan in the comprehensive security framework8. Actually, in December of 2011, Economic and Social Council (ECOSOC) of UN hosted a meeting to cope with issues and problem regarding cyber security and cyber crime in concurrence with DESA and ITU. ECOSOC raised awareness at the international policy level with a picture of the current situation and challenges concerning cyber security and it links to development, and discussed about international options for a global response to rising cyber crime. However, it is reality that no council or no organization in the UN discusses on cyber security properly. So, we firmly assert that UN as a supranational organization should elevate its recognition on cyber security Millennium Development Goals (MDG) presented in 2000 by UN will be end in 2015. Now, it is hotly debated on what contents should be included in the new MDG. It is necessary for cyber security to be included as cooperation and discussion on the issue of cyber security are less considered than its importance. Cyber security is surrounded with multifaceted issues. It is necessary for member states of UN, the private sector, civil society organizations and law enforcement agencies should work in concert to manage the risks of our increasing interconnectivity.

6. Conclusion Here, we discussed about the necessity, principles, and measures of international cooperation on cyber security. The importance of cyber security which comprises nontraditional security issue is emerging as a vital element for national security. Activities in cyber space not merely steal information but exert influence on everywhere computer system is installed such as computer based industrial and military facilities. The more computer system and automation develops, the more important the cyber security will be. International control tower centered cooperation system to prevent cyber crime, cooperation through ODA, and organization establishment for cyber security will be a good approach to realize the security of cyber space. Eventually, reinforcement of international cooperation and concern on cyber security will be able to open the way to accomplish world peace.

Keohane RO and Nye JS, Power and Interdependence, 3rd edition. New York, Longman, 2001

References 1. https://projects.eff.org/~barlow/Declaration-Final.html 2. Lee Gang Gyu. Cybersecurity strategy and our policy direction. Communication Policy Research. 23(16): 1-27. 2011 3. Lee Jaeil. Major cyber security strategies and policy implication. Journal of Information Science. 30(1): 9-16. 2012 4. Kim Jin Sung and Lee Kyungho. Study on National Cyber Security Systems development 5. Lee Seo Hyang. UN, Korea, and world peace. 2nd symposium for development of International organizations series_past, present and future of International Organizations and UN and world peace. p 251. 2013 6. Lee Sin Hwa. Duty and activity of UN. 2nd symposium for development of International organizations series_past, present and future of International Organizations and UN and world peace. pg 170. 2013 7. Keohane RO and Nye JS, Power and Interdependence, 3rd edition. New York, Longman, 2001

You might also like