Professional Documents
Culture Documents
OBJECTIVE
relations
Information security
Systems
Cyber defense
National
security
governmental monitoring and filtering (or censorship) of Internet use and
content
Detection System
Cyber war
The cyber-attacks on key infrastructure in Lithuania, Estonia, Georgia and
other countries
Cyber crime
online
fraud
identity theft,
child pornography
intellectual property
Money laundering
Cyber Terrorism
Spamming, phishing, spyware, malware.
LEGAL ASPECTS
TRICKY BALANCE
- Economic interests
(innovation, competition, protection of trade secrets and intellectual
property)
Legislation:
Problematic
situation
Traditional Legislation unable to keep up
Code
-architecture
NEW PARADIGMS
Multilateralism governance
Governments
social
society
private sector
Intergovernmental organizations such as: ITU and UNESCO
Non-governmental bodies such as the Internet Engineering Task
Force (IETF).
RESPONSES TO CROSS-BORDERS
CYBERSECURITY ISSUES
Sovereignty level
National
Regional
International
Economic level
INTERNATIONAL REGULATION
Laws enforced through international treaties such as
the Council of Europes Convention on Cybercrime
Laws enforced through the Internet architecture by the
Internet Corporation for Assigned Names and Numbers
(ICANN)..
Unintentional laws enforced through existing
international mechanisms such as the World Trade
Organization (WTO) ..
KEY INTERNATIONAL
REGULATIONS
INTERNATIONAL REGULATION 2
INTERNATIONAL REGULATION 3
THE COUNCIL OF EUROPE (COE) ADOPTED A CONVENTION ON CYBERCRIME 2001
OTHER TOOLS - 1
OTHER TOOLS -2
CYBER-WAR
LEBANON RESPONSE
-law 133
-law 140
du 26/10/
- Law 75
du
1999 e13/4/199 27/10/19
transactio
9 IP
99
n & etelecom
payment
-law 431
du
22/7/200
2 telecom
organizati
on
- Law 659
de
intellectu
4/2/2005- -Draft
al
protectin law- eproperty
g
transactio Institutio
and cyber
consumer ns & e- nal level:
crime
s in Esignature
office
operation
s