Preview

Arab Leqgue Resolution

Best Essays
Open Document
Open Document
334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Arab Leqgue Resolution
DRAFT RESOLUTION

RESOLUTION: JDC I/___(written by the chair when the resolution is introduced)
COUNCIL: Joint Defense Council
TOPIC: Assessing the current state of cyber-security and its implications for regional defense and economic interests
SPONSORS: Syria

Alarmed by the lack of cyber-security demonstrated by recent cyber attacks: Qatar in September 2012, Saudi Arabia in October 2012,

Aware that steps are being made towards progress: 1995 Barcelona Project, created Institutional and Sector Modernization Facility (ISMF), in which Syria and EU began research and development on Syria’s ICT, Information and Communication Technology, standards. Syria’s Ministry of Communications and Technology implemented the ICT standards in 2003. International Telecommunications Union (ITU) member since 1924, also a member of the International Multilateral Partnership Against Cyber Threats (IMPACT) the cyber security executing arm of the UN, founded in 2008. Delegates attend events sponsored by IMPACT, ITU, and INTERPOL concerning cyber security. ITU Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection (CIIP) & Cybersecurity Forensics Workshop, Doha, Qatar, 18-21 February 2008 Internet Governance Forum (IGF) 2009, Sharm El-Sheikh, Egypt, November 2009. Microsoft Critical Information Infrastructure Protection Seminar, IMPACT Global HQ, Cyberjaya, Malaysia, December 2009. Meridian 2011 International Conference, Qatar, 24-26 October 2011 Connect Arab Summit, Qatar, 5-7 March 2012 World Conference on International Telecommunications (WCIT-12) , Dubai, UAE, 3-14 December 2012

Realizing the international community has failed to address the nature of this problem,

Be it hereby resolved that the League of Arab States:

1. Continue an active role in ITU, IMPACT and INTERPOL; 2. Establish a Center for Training and

You May Also Find These Documents Helpful

  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    |Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Career Advancement Opportunities for Cybersecurity Professionals. (2013, January 1). Retrieved January 1, 2015, from https://missioncriticalinstitute.org/cybersecurity-professionals/…

    • 1485 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Best Essays

    There is an exigent need for creative ideas leading to the next generation of cyber security capability. Existing approaches are simply not able to meet the demands of a global society growing in cyberspace on the current path. New business models are forcing greater interdependency between people, organisations and nation states in order to successfully manage cyber risk. Success will necessarily require an ability to anticipate, deter, detect, resist and tolerate attacks, understand and predict cyber risks, and respond and recover effectively at all levels, whether individual, enterprise, national or across international markets. In order to meet the demands of the future we will require new understanding, governance, regulation, partnerships, skills, and tools.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Best Essays

    1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Public E Procurement

    • 19840 Words
    • 80 Pages

    IDA (http://europa.eu.int/ispo/ida) is a European Commission driven strategic initiative using advances in information and communication technology to support rapid electronic exchange of information between Member State administrations. The objective is to improve Community decision-making, facilitate operation of the internal market and accelerate policy implementation. Its mission is to co-ordinate the establishment of transEuropean telematic networks by: Promoting implementation of sectoral networks in priority areas Developing network interoperability measures Extending network benefits to EU industry and citizens Co-operating with Member States authorities and Community services Promoting convergence towards a common telematic interface. If you would like to comment on this report or related issues, please e-mail to ida-central@cec.eu.int.…

    • 19840 Words
    • 80 Pages
    Powerful Essays
  • Good Essays

    Blythe, S. E., 2010. Fine-Tuning the E-commerce Law of the United Arab Emirates: Achieving the Most Secure Cyber Transactions in the Middle East. International Journal of Business and Social Science, p. Vol 1 No 1.…

    • 1080 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The emergence of information and communication technologies has brought a lot of changes to the way things are done in the world. These changes are across the spectrum; the way private companies do business, the way universities do things, the way governments provide services to their citizens and the way they interact with stakeholders at large.…

    • 1552 Words
    • 7 Pages
    Powerful Essays