Privacy and Protection of Online Identity in
the New Internet Age.
Where there will be more devices connected than people.
Victor Ndonnang
Internet Governance Specialist
Secretary General
Internet Society Cameroon Chapter CTO Cybersecurity Forum 2013
25 – 26 April 2013 Yaounde, Cameroon
About The Internet Society
•The Internet Society is an international cause-
related organization that works for the open
development and evolution of the Internet for all
people.
The Internet is for everyone…
and the Internet Society is for everyone who
cares about the Internet!
•Vision: “The Internet is for Everyone.”
•Founded in 1992 by Internet Pioneers, as an international non-
profit organization
•100+ organization members
•tens of thousands of individual members
•90+ chapters worldwide
•Regional Bureaus: Africa, Europe, Latin America &
Caribbean, North America, South & South East Asia
Who are we?
The Internet Society’s principles
•We see a future in which people everywhere can
use the Internet to improve quality of life:
…when standards, technologies, business practices,
and government policies sustain an open and
universally accessible platform for innovation,
creativity, and economic opportunity.
What makes the Internet Society unique?
•Sole focus is the Internet
•Development, Standards, Policy
•Enable regional capacity and technical
community building throughout the world
•Key player in Internet policy
•Particularly in the Internet Governance Forum
(IGF) and other intergovernmental forums
•Organisational home of the Internet Engineering
Task Force (IETF), Internet Architecture Board
(IAB), and related bodies
A focus on action – some key priorities
•Global outreach
•a worldwide community of experience and
expertise
•Advancing the health of the Internet
•IPv6 deployment, Open internetworking,
DNSSEC
•Next generation of Internet leaders
•advancing tomorrow’s leaders
•Network confidence
•supporting development of user trust
About Internet Society Cameroon Chapter (1)
•incorporated under the laws of Cameroon as an
independent nonprofit organization;
•works for the development, use and open access to
the Internet in Cameroon;
•promote, in a global context, the open
development, evolution and use of the Internet for
the benefit of everyone in Cameroon;
•provides a multistakeholder forum for the exchange
of views and experiences on Internet open
development and use in Cameroon;
•Promotes development of local Internet content;
•promotes best practices on the Internet, security,
protection of privacy, protection of Human Rights,
the fight against cybercrime.
•More on www.internetsociety.cm
About Internet Society Cameroon Chapter (2)
•Voluntary groups of ISOC members, working together
on local issues, with the backing of a global
community
•Successful Chapters create an open, inclusive
environment and bring together people from all
backgrounds:
•technical
•civil society
•law and policy
•education
•business
•Developing solutions to local challenges
What the new Internet Age?
•More Top Level Domain Names with the
NewgTLDs Program
Before 2000, there were only:
•4% of the world connected to the Internet with
2% in the USA
•3 millions web sites;
•7 Generic Top Level Domain (gTLDs like .com,
.net, .org, .edu, .mil…)
Today:
•35% of the world is connected to the Internet;
•635 millions of web sites;
•1905 new gTLDs applications.
What the new Internet Age?
•Everything connected with IPv6
•Some there will be more devices connected than
people in the planet (your car, your medical
device, your home, appliances, …)
We feel lost and unsafe on this new environment
and there is a need to secure.
There is an interesting video on this issue available
on ICANN web site:
https://www.myicann.org/join-strategy-
conversation?language=en
Our privacy in the new Internet Age
Does the Internet makes our lives more private or less?
The Internet and the WWW since the inception were to build
a global community of information sharing. Any party can
share information with another party.
Most of those shared information is about us, the users.
Some of those information can be misused.
If an information is really private, don’t put online; if you put it
online, encrypt it and send decryption only to the authorized
person.
How about your privacy when It comes
to Internet resources?
Some information about us are collected during the
registration of a domain name.
•Registration Data
•WHOIS
Those information can be misused.
Understanding and protecting your
online Identity
•Your online identity is about what you have being
doing online.
•Your identity has value, as do each of your online
partial identities. When your partial identity is with
your bank or a brokerage house, for example, it
may have clear monetary value. When it is with a
social networking site, such as Facebook, twitter,
badoo, or MySpace, the value may be less tangible
but equally important to you.
•Simply by being an active Internet user, you may
find that you accumulate tens or even hundreds of
online partial identifies.
Understanding and protecting your
online Identity
•Identity theft, which results in a loss of control over
one or more of your partial identities, is a natural
concern;
•as the value of your partial identities grows, the
information becomes more attractive to thieves. At
the same time, because each of your online partial
identities contains some information that may be
very private, generally protecting yourself from a
loss of privacy is often equally important.
How can identity theft occur?
Identity theft can happen in several ways. The three
types described here are common and happen
every day:
•You are deceived into disclosing important
personal information to the wrong person;
•Someone (or some entity) is able to guess one or
more of your passwords, or reset a password by
exploiting password-recovery procedures, thereby
unlocking your online identity
•Someone (or some entity) is able to eavesdrop on
you electronically or take control of your computer
without your knowing.
How can I learn to avoid giving the
wrong person my identity?
•A little education and some common sense are the
most important tools you have to avoid divulging
sensitive personal information to individuals or entities
that plan to exploit it. The U.S. Federal Trade
Commissionis a good place to start, even if you don’t
live in the United States. The website at
http://www.ftc.gov/idtheft contains useful information
in English and Spanish aimed at educating
consumers about avoiding identity theft.
•There are also some technologies that can help. For
example, newer versions of most Web browsers have
the ability to check websites and alert you to ones that
are known to be malicious. The Online Trust Alliance
(https://otalliance.org/) has a resource list to help you
learn more about the technologies that can help
protect your identity on the Internet.
How can I keep someone from stealing my
password?
•Use long password. If a password is easy to guess,
then it is easy to steal;
•avoid using the same password for multiple
websites, so if one website is compromised, your
stolen credentials can’t be used at other sites;
How can I keep someone from resetting my
password?
•Password resets are meant to help you when
you’ve lost a password (or have been locked out);
•Every website has a slightly different technique for
resetting a password, but the general idea is that
you ask for your password to be reset, often by
answering some personal “security” questions you
have previously answered;
•avoid using simple questions and answers. The
way, even someone who knows a lot about you will
have trouble answering the questions.
More on: http://www.internetsociety.org/what-we-
do/internet-technology-matters/privacy-identity
Internet is an extraordinary force for
good
•ISOC believes that the Internet is fundamentally
about opportunity, empowerment, knowledge and
freedom.
•The success of the Internet as a global medium for
communication and innovation is derived from the
openness and transparency of the Internet's
technical and policy development.
•Training and awareness are key to make the
Internet safe for users.
The challenge for an emerging Internet community
•The Internet itself is still in its infancy
•There are issues that can’t be ignored, such as
security, safety, privacy, crime…
•But the benefits of the Internet vastly outweigh the
risks and are only possible by embracing the open
nature of the Internet; preserving the users’ ability
to:
•connect
•communicate
•innovate
•share
•choose
Securing the DNS: Internet Society Deploy360 Programme
•The Challenge:
•The IETF creates protocols based on open standards, but
some are not widely known or deployed
•People seeking to implement these protocols are
confused by a lack of clear, concise deployment
information
The Deploy360 Solution:
•Provide hands-on information on IPv6 and DNSSEC to
advance real-world deployment
•Work with first adopters to collect and create technical
resources and distribute these resources to fast following
networks
Deploy360 Components
Web Portal
(Online Knowledge
Repository)
• Technical documents
• Audience-specific
information
• Blogs & social media
Social Media
(Constant Audience
Engagement)
• Twitter
• Facebook
• Google+
• YouTube
• RSS Feeds
Speaking
Engagements
(Come Meet Us or Invite Us to
Speak)
• Consumer Electronics
Show
• IPv6 Summits
• Interop
ION Conferences
(Hands-on Educational
Events)
• Slovenia
• India
• USA
• Canada
• Argentina
Thank you!
Questions?
More Info:
www.InternetSociety.org
http://www.internetsociety.org/what-we-do/internet-technology-
matters/privacy-identity
http://www.internetsociety.org/deploy360/
www.InternetSociety.cm
ndonnang@internetsociety.cm

More Related Content

PPTX
Internet Privacy
PDF
Online Privacy
PPTX
Ethics and privacy ppt 3rd period
PPTX
Internet privacy presentation
PDF
Knowledge management for professionals
PPTX
Judy Taylour's Digital Privacy Day 2014 Presentation
PDF
Infocom Security
PPTX
Securing, Buying, and buying computers 4-H
Internet Privacy
Online Privacy
Ethics and privacy ppt 3rd period
Internet privacy presentation
Knowledge management for professionals
Judy Taylour's Digital Privacy Day 2014 Presentation
Infocom Security
Securing, Buying, and buying computers 4-H

What's hot (20)

PDF
What every product manager needs to know about security
PDF
Young People and Internet Literacy and Safety
PDF
ISACA UW Handbook 2016
PPT
Elet5e ch09
PDF
001 ho basic computer
PPTX
Chapter 3
PDF
Center for Identity Webcast: The Internet of Things
PDF
New literacies, new challenges
PPT
Computer Ethics
PPS
Microsoft (Projects)
PPTX
Chapter 5
PDF
Vincent O. Mwando - Encryption
PPTX
Cie 2 cyber law
PDF
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
PPT
Social media risk
PPTX
20160317 ARMA Wyoming Social Media Security Threats
PDF
Keynote presentation for Conference: Vounteering in a Digital Age
PPT
CYP E-Safety
PPTX
Data privacy over internet
PPTX
Cybersecurity Risk Perception and Communication
What every product manager needs to know about security
Young People and Internet Literacy and Safety
ISACA UW Handbook 2016
Elet5e ch09
001 ho basic computer
Chapter 3
Center for Identity Webcast: The Internet of Things
New literacies, new challenges
Computer Ethics
Microsoft (Projects)
Chapter 5
Vincent O. Mwando - Encryption
Cie 2 cyber law
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Social media risk
20160317 ARMA Wyoming Social Media Security Threats
Keynote presentation for Conference: Vounteering in a Digital Age
CYP E-Safety
Data privacy over internet
Cybersecurity Risk Perception and Communication
Ad

Viewers also liked (19)

PDF
John Sannizzaro & John Kelly GCC 2016
 
PDF
Збірник диктантів
PPTX
Sharing Your Treasure By: Josie Walker
PPT
Calles deEncinasola (2)
PPTX
тиждень психолог. знань
PDF
National Cyber Security Policy 2013
PPTX
Cervantes, juventud y las tic’s
PPTX
Presentación power point.
PPTX
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDA
PPT
Toan 1 bai 3 giới hạn hàm số bookbooming
PDF
Loan Modification – Workout Plans and Modification
PPTX
Presentacion
PPTX
Amante liberal. presentación
DOCX
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
PDF
2016 Yahoo Taiwan Mobile Developer Conference
PDF
Rinconete y cortadillo cuento 419
PPT
Mobile applications
John Sannizzaro & John Kelly GCC 2016
 
Збірник диктантів
Sharing Your Treasure By: Josie Walker
Calles deEncinasola (2)
тиждень психолог. знань
National Cyber Security Policy 2013
Cervantes, juventud y las tic’s
Presentación power point.
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDA
Toan 1 bai 3 giới hạn hàm số bookbooming
Loan Modification – Workout Plans and Modification
Presentacion
Amante liberal. presentación
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
2016 Yahoo Taiwan Mobile Developer Conference
Rinconete y cortadillo cuento 419
Mobile applications
Ad

Similar to Privacy and Protection of Online Identity in the New Internet Age CTO Cybersecurity Forum 2013 Victor-Ndonnang_CTO Cybersecurity Forum 2013 (20)

PPTX
Building a secure cyberspace for innovative enterprise, a collective responsi...
PPTX
INTERNET SAFER DAY-2021.pptx
PPTX
Digital literacy
PPTX
Digital citizenship pp
PPTX
[r]evolution Digital Literacy Workshop Slides
PPTX
Cyber citizenship imen tekaya
PPTX
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
PPTX
CyberSecurity - Computers In Libraries 2024
PDF
Module 1 Introduction to cryptography...
PPTX
E commerce
PPT
Computer Security and safety
PPTX
Epowerment technologies lesson ICT for a change.pptx
PPTX
Securing & Safeguarding Your Library Setup.pptx
DOCX
REVIEWER ETECH
DOCX
REVIEWER-FOR-ETECH (1).docx
DOCX
Empowerment Technology
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH (1).docx
Building a secure cyberspace for innovative enterprise, a collective responsi...
INTERNET SAFER DAY-2021.pptx
Digital literacy
Digital citizenship pp
[r]evolution Digital Literacy Workshop Slides
Cyber citizenship imen tekaya
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
CyberSecurity - Computers In Libraries 2024
Module 1 Introduction to cryptography...
E commerce
Computer Security and safety
Epowerment technologies lesson ICT for a change.pptx
Securing & Safeguarding Your Library Setup.pptx
REVIEWER ETECH
REVIEWER-FOR-ETECH (1).docx
Empowerment Technology
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH (1).docx

More from Commonwealth Telecommunications Organisation (20)

PDF
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
PDF
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
PDF
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
PDF
PDF
Reflections on scale up and transferability
PDF
Planning your learning expedition final
PDF
Session 6.2 Cécile Barayre El Shami
PDF
PDF
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Reflections on scale up and transferability
Planning your learning expedition final
Session 6.2 Cécile Barayre El Shami

Recently uploaded (20)

PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Examining Bias in AI Generated News Content.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
Internet of Everything -Basic concepts details
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Decision Optimization - From Theory to Practice
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
substrate PowerPoint Presentation basic one
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
Ensemble model-based arrhythmia classification with local interpretable model...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Build Real-Time ML Apps with Python, Feast & NoSQL
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Examining Bias in AI Generated News Content.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Internet of Everything -Basic concepts details
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Decision Optimization - From Theory to Practice
Rapid Prototyping: A lecture on prototyping techniques for interface design
substrate PowerPoint Presentation basic one
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
The AI Revolution in Customer Service - 2025
4 layer Arch & Reference Arch of IoT.pdf
LMS bot: enhanced learning management systems for improved student learning e...

Privacy and Protection of Online Identity in the New Internet Age CTO Cybersecurity Forum 2013 Victor-Ndonnang_CTO Cybersecurity Forum 2013

  • 1. Privacy and Protection of Online Identity in the New Internet Age. Where there will be more devices connected than people. Victor Ndonnang Internet Governance Specialist Secretary General Internet Society Cameroon Chapter CTO Cybersecurity Forum 2013 25 – 26 April 2013 Yaounde, Cameroon
  • 2. About The Internet Society •The Internet Society is an international cause- related organization that works for the open development and evolution of the Internet for all people. The Internet is for everyone… and the Internet Society is for everyone who cares about the Internet! •Vision: “The Internet is for Everyone.”
  • 3. •Founded in 1992 by Internet Pioneers, as an international non- profit organization •100+ organization members •tens of thousands of individual members •90+ chapters worldwide •Regional Bureaus: Africa, Europe, Latin America & Caribbean, North America, South & South East Asia Who are we?
  • 4. The Internet Society’s principles •We see a future in which people everywhere can use the Internet to improve quality of life: …when standards, technologies, business practices, and government policies sustain an open and universally accessible platform for innovation, creativity, and economic opportunity.
  • 5. What makes the Internet Society unique? •Sole focus is the Internet •Development, Standards, Policy •Enable regional capacity and technical community building throughout the world •Key player in Internet policy •Particularly in the Internet Governance Forum (IGF) and other intergovernmental forums •Organisational home of the Internet Engineering Task Force (IETF), Internet Architecture Board (IAB), and related bodies
  • 6. A focus on action – some key priorities •Global outreach •a worldwide community of experience and expertise •Advancing the health of the Internet •IPv6 deployment, Open internetworking, DNSSEC •Next generation of Internet leaders •advancing tomorrow’s leaders •Network confidence •supporting development of user trust
  • 7. About Internet Society Cameroon Chapter (1) •incorporated under the laws of Cameroon as an independent nonprofit organization; •works for the development, use and open access to the Internet in Cameroon; •promote, in a global context, the open development, evolution and use of the Internet for the benefit of everyone in Cameroon; •provides a multistakeholder forum for the exchange of views and experiences on Internet open development and use in Cameroon; •Promotes development of local Internet content; •promotes best practices on the Internet, security, protection of privacy, protection of Human Rights, the fight against cybercrime. •More on www.internetsociety.cm
  • 8. About Internet Society Cameroon Chapter (2) •Voluntary groups of ISOC members, working together on local issues, with the backing of a global community •Successful Chapters create an open, inclusive environment and bring together people from all backgrounds: •technical •civil society •law and policy •education •business •Developing solutions to local challenges
  • 9. What the new Internet Age? •More Top Level Domain Names with the NewgTLDs Program Before 2000, there were only: •4% of the world connected to the Internet with 2% in the USA •3 millions web sites; •7 Generic Top Level Domain (gTLDs like .com, .net, .org, .edu, .mil…) Today: •35% of the world is connected to the Internet; •635 millions of web sites; •1905 new gTLDs applications.
  • 10. What the new Internet Age? •Everything connected with IPv6 •Some there will be more devices connected than people in the planet (your car, your medical device, your home, appliances, …) We feel lost and unsafe on this new environment and there is a need to secure. There is an interesting video on this issue available on ICANN web site: https://www.myicann.org/join-strategy- conversation?language=en
  • 11. Our privacy in the new Internet Age Does the Internet makes our lives more private or less? The Internet and the WWW since the inception were to build a global community of information sharing. Any party can share information with another party. Most of those shared information is about us, the users. Some of those information can be misused. If an information is really private, don’t put online; if you put it online, encrypt it and send decryption only to the authorized person.
  • 12. How about your privacy when It comes to Internet resources? Some information about us are collected during the registration of a domain name. •Registration Data •WHOIS Those information can be misused.
  • 13. Understanding and protecting your online Identity •Your online identity is about what you have being doing online. •Your identity has value, as do each of your online partial identities. When your partial identity is with your bank or a brokerage house, for example, it may have clear monetary value. When it is with a social networking site, such as Facebook, twitter, badoo, or MySpace, the value may be less tangible but equally important to you. •Simply by being an active Internet user, you may find that you accumulate tens or even hundreds of online partial identifies.
  • 14. Understanding and protecting your online Identity •Identity theft, which results in a loss of control over one or more of your partial identities, is a natural concern; •as the value of your partial identities grows, the information becomes more attractive to thieves. At the same time, because each of your online partial identities contains some information that may be very private, generally protecting yourself from a loss of privacy is often equally important.
  • 15. How can identity theft occur? Identity theft can happen in several ways. The three types described here are common and happen every day: •You are deceived into disclosing important personal information to the wrong person; •Someone (or some entity) is able to guess one or more of your passwords, or reset a password by exploiting password-recovery procedures, thereby unlocking your online identity •Someone (or some entity) is able to eavesdrop on you electronically or take control of your computer without your knowing.
  • 16. How can I learn to avoid giving the wrong person my identity? •A little education and some common sense are the most important tools you have to avoid divulging sensitive personal information to individuals or entities that plan to exploit it. The U.S. Federal Trade Commissionis a good place to start, even if you don’t live in the United States. The website at http://www.ftc.gov/idtheft contains useful information in English and Spanish aimed at educating consumers about avoiding identity theft. •There are also some technologies that can help. For example, newer versions of most Web browsers have the ability to check websites and alert you to ones that are known to be malicious. The Online Trust Alliance (https://otalliance.org/) has a resource list to help you learn more about the technologies that can help protect your identity on the Internet.
  • 17. How can I keep someone from stealing my password? •Use long password. If a password is easy to guess, then it is easy to steal; •avoid using the same password for multiple websites, so if one website is compromised, your stolen credentials can’t be used at other sites;
  • 18. How can I keep someone from resetting my password? •Password resets are meant to help you when you’ve lost a password (or have been locked out); •Every website has a slightly different technique for resetting a password, but the general idea is that you ask for your password to be reset, often by answering some personal “security” questions you have previously answered; •avoid using simple questions and answers. The way, even someone who knows a lot about you will have trouble answering the questions. More on: http://www.internetsociety.org/what-we- do/internet-technology-matters/privacy-identity
  • 19. Internet is an extraordinary force for good •ISOC believes that the Internet is fundamentally about opportunity, empowerment, knowledge and freedom. •The success of the Internet as a global medium for communication and innovation is derived from the openness and transparency of the Internet's technical and policy development. •Training and awareness are key to make the Internet safe for users.
  • 20. The challenge for an emerging Internet community •The Internet itself is still in its infancy •There are issues that can’t be ignored, such as security, safety, privacy, crime… •But the benefits of the Internet vastly outweigh the risks and are only possible by embracing the open nature of the Internet; preserving the users’ ability to: •connect •communicate •innovate •share •choose
  • 21. Securing the DNS: Internet Society Deploy360 Programme •The Challenge: •The IETF creates protocols based on open standards, but some are not widely known or deployed •People seeking to implement these protocols are confused by a lack of clear, concise deployment information The Deploy360 Solution: •Provide hands-on information on IPv6 and DNSSEC to advance real-world deployment •Work with first adopters to collect and create technical resources and distribute these resources to fast following networks
  • 22. Deploy360 Components Web Portal (Online Knowledge Repository) • Technical documents • Audience-specific information • Blogs & social media Social Media (Constant Audience Engagement) • Twitter • Facebook • Google+ • YouTube • RSS Feeds Speaking Engagements (Come Meet Us or Invite Us to Speak) • Consumer Electronics Show • IPv6 Summits • Interop ION Conferences (Hands-on Educational Events) • Slovenia • India • USA • Canada • Argentina