SlideShare a Scribd company logo
Privacy and Protection of Online Identity in
the New Internet Age.
Where there will be more devices connected than people.
Victor Ndonnang
Internet Governance Specialist
Secretary General
Internet Society Cameroon Chapter CTO Cybersecurity Forum 2013
25 – 26 April 2013 Yaounde, Cameroon
About The Internet Society
•The Internet Society is an international cause-
related organization that works for the open
development and evolution of the Internet for all
people.
The Internet is for everyone…
and the Internet Society is for everyone who
cares about the Internet!
•Vision: “The Internet is for Everyone.”
•Founded in 1992 by Internet Pioneers, as an international non-
profit organization
•100+ organization members
•tens of thousands of individual members
•90+ chapters worldwide
•Regional Bureaus: Africa, Europe, Latin America &
Caribbean, North America, South & South East Asia
Who are we?
The Internet Society’s principles
•We see a future in which people everywhere can
use the Internet to improve quality of life:
…when standards, technologies, business practices,
and government policies sustain an open and
universally accessible platform for innovation,
creativity, and economic opportunity.
What makes the Internet Society unique?
•Sole focus is the Internet
•Development, Standards, Policy
•Enable regional capacity and technical
community building throughout the world
•Key player in Internet policy
•Particularly in the Internet Governance Forum
(IGF) and other intergovernmental forums
•Organisational home of the Internet Engineering
Task Force (IETF), Internet Architecture Board
(IAB), and related bodies
A focus on action – some key priorities
•Global outreach
•a worldwide community of experience and
expertise
•Advancing the health of the Internet
•IPv6 deployment, Open internetworking,
DNSSEC
•Next generation of Internet leaders
•advancing tomorrow’s leaders
•Network confidence
•supporting development of user trust
About Internet Society Cameroon Chapter (1)
•incorporated under the laws of Cameroon as an
independent nonprofit organization;
•works for the development, use and open access to
the Internet in Cameroon;
•promote, in a global context, the open
development, evolution and use of the Internet for
the benefit of everyone in Cameroon;
•provides a multistakeholder forum for the exchange
of views and experiences on Internet open
development and use in Cameroon;
•Promotes development of local Internet content;
•promotes best practices on the Internet, security,
protection of privacy, protection of Human Rights,
the fight against cybercrime.
•More on www.internetsociety.cm
About Internet Society Cameroon Chapter (2)
•Voluntary groups of ISOC members, working together
on local issues, with the backing of a global
community
•Successful Chapters create an open, inclusive
environment and bring together people from all
backgrounds:
•technical
•civil society
•law and policy
•education
•business
•Developing solutions to local challenges
What the new Internet Age?
•More Top Level Domain Names with the
NewgTLDs Program
Before 2000, there were only:
•4% of the world connected to the Internet with
2% in the USA
•3 millions web sites;
•7 Generic Top Level Domain (gTLDs like .com,
.net, .org, .edu, .mil…)
Today:
•35% of the world is connected to the Internet;
•635 millions of web sites;
•1905 new gTLDs applications.
What the new Internet Age?
•Everything connected with IPv6
•Some there will be more devices connected than
people in the planet (your car, your medical
device, your home, appliances, …)
We feel lost and unsafe on this new environment
and there is a need to secure.
There is an interesting video on this issue available
on ICANN web site:
https://www.myicann.org/join-strategy-
conversation?language=en
Our privacy in the new Internet Age
Does the Internet makes our lives more private or less?
The Internet and the WWW since the inception were to build
a global community of information sharing. Any party can
share information with another party.
Most of those shared information is about us, the users.
Some of those information can be misused.
If an information is really private, don’t put online; if you put it
online, encrypt it and send decryption only to the authorized
person.
How about your privacy when It comes
to Internet resources?
Some information about us are collected during the
registration of a domain name.
•Registration Data
•WHOIS
Those information can be misused.
Understanding and protecting your
online Identity
•Your online identity is about what you have being
doing online.
•Your identity has value, as do each of your online
partial identities. When your partial identity is with
your bank or a brokerage house, for example, it
may have clear monetary value. When it is with a
social networking site, such as Facebook, twitter,
badoo, or MySpace, the value may be less tangible
but equally important to you.
•Simply by being an active Internet user, you may
find that you accumulate tens or even hundreds of
online partial identifies.
Understanding and protecting your
online Identity
•Identity theft, which results in a loss of control over
one or more of your partial identities, is a natural
concern;
•as the value of your partial identities grows, the
information becomes more attractive to thieves. At
the same time, because each of your online partial
identities contains some information that may be
very private, generally protecting yourself from a
loss of privacy is often equally important.
How can identity theft occur?
Identity theft can happen in several ways. The three
types described here are common and happen
every day:
•You are deceived into disclosing important
personal information to the wrong person;
•Someone (or some entity) is able to guess one or
more of your passwords, or reset a password by
exploiting password-recovery procedures, thereby
unlocking your online identity
•Someone (or some entity) is able to eavesdrop on
you electronically or take control of your computer
without your knowing.
How can I learn to avoid giving the
wrong person my identity?
•A little education and some common sense are the
most important tools you have to avoid divulging
sensitive personal information to individuals or entities
that plan to exploit it. The U.S. Federal Trade
Commissionis a good place to start, even if you don’t
live in the United States. The website at
http://www.ftc.gov/idtheft contains useful information
in English and Spanish aimed at educating
consumers about avoiding identity theft.
•There are also some technologies that can help. For
example, newer versions of most Web browsers have
the ability to check websites and alert you to ones that
are known to be malicious. The Online Trust Alliance
(https://otalliance.org/) has a resource list to help you
learn more about the technologies that can help
protect your identity on the Internet.
How can I keep someone from stealing my
password?
•Use long password. If a password is easy to guess,
then it is easy to steal;
•avoid using the same password for multiple
websites, so if one website is compromised, your
stolen credentials can’t be used at other sites;
How can I keep someone from resetting my
password?
•Password resets are meant to help you when
you’ve lost a password (or have been locked out);
•Every website has a slightly different technique for
resetting a password, but the general idea is that
you ask for your password to be reset, often by
answering some personal “security” questions you
have previously answered;
•avoid using simple questions and answers. The
way, even someone who knows a lot about you will
have trouble answering the questions.
More on: http://www.internetsociety.org/what-we-
do/internet-technology-matters/privacy-identity
Internet is an extraordinary force for
good
•ISOC believes that the Internet is fundamentally
about opportunity, empowerment, knowledge and
freedom.
•The success of the Internet as a global medium for
communication and innovation is derived from the
openness and transparency of the Internet's
technical and policy development.
•Training and awareness are key to make the
Internet safe for users.
The challenge for an emerging Internet community
•The Internet itself is still in its infancy
•There are issues that can’t be ignored, such as
security, safety, privacy, crime…
•But the benefits of the Internet vastly outweigh the
risks and are only possible by embracing the open
nature of the Internet; preserving the users’ ability
to:
•connect
•communicate
•innovate
•share
•choose
Securing the DNS: Internet Society Deploy360 Programme
•The Challenge:
•The IETF creates protocols based on open standards, but
some are not widely known or deployed
•People seeking to implement these protocols are
confused by a lack of clear, concise deployment
information
The Deploy360 Solution:
•Provide hands-on information on IPv6 and DNSSEC to
advance real-world deployment
•Work with first adopters to collect and create technical
resources and distribute these resources to fast following
networks
Deploy360 Components
Web Portal
(Online Knowledge
Repository)
• Technical documents
• Audience-specific
information
• Blogs & social media
Social Media
(Constant Audience
Engagement)
• Twitter
• Facebook
• Google+
• YouTube
• RSS Feeds
Speaking
Engagements
(Come Meet Us or Invite Us to
Speak)
• Consumer Electronics
Show
• IPv6 Summits
• Interop
ION Conferences
(Hands-on Educational
Events)
• Slovenia
• India
• USA
• Canada
• Argentina
Thank you!
Questions?
More Info:
www.InternetSociety.org
http://www.internetsociety.org/what-we-do/internet-technology-
matters/privacy-identity
http://www.internetsociety.org/deploy360/
www.InternetSociety.cm
ndonnang@internetsociety.cm

More Related Content

PPTX
Internet Privacy
realpeterz
 
PDF
Online Privacy
IWMW
 
PPTX
Ethics and privacy ppt 3rd period
charvill
 
PPTX
Internet privacy presentation
Matthew Momney
 
PDF
Knowledge management for professionals
Esteban Romero Frías
 
PPTX
Judy Taylour's Digital Privacy Day 2014 Presentation
Greater Cleveland PC Users Group
 
PDF
Infocom Security
mmavis
 
PPTX
Securing, Buying, and buying computers 4-H
jmoore55
 
Internet Privacy
realpeterz
 
Online Privacy
IWMW
 
Ethics and privacy ppt 3rd period
charvill
 
Internet privacy presentation
Matthew Momney
 
Knowledge management for professionals
Esteban Romero Frías
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Greater Cleveland PC Users Group
 
Infocom Security
mmavis
 
Securing, Buying, and buying computers 4-H
jmoore55
 

What's hot (20)

PDF
What every product manager needs to know about security
AIPMM Administration
 
PDF
Young People and Internet Literacy and Safety
CTIC Technology Centre
 
PDF
ISACA UW Handbook 2016
Daniel Kapellmann Zafra
 
PPT
Elet5e ch09
DeAnna Gossett
 
PDF
001 ho basic computer
Franklin Sondakh
 
PPTX
Chapter 3
Jennifer Polack
 
PDF
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
PDF
New literacies, new challenges
madaboutelt
 
PPT
Computer Ethics
Kodok Ngorex
 
PPS
Microsoft (Projects)
Vinayak Hegde
 
PPTX
Chapter 5
Nada G.Youssef
 
PDF
Vincent O. Mwando - Encryption
Vincent Mwando
 
PPTX
Cie 2 cyber law
Mahua Narayan
 
PDF
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Mwando
 
PPT
Social media risk
Mosoco Ltd
 
PPTX
20160317 ARMA Wyoming Social Media Security Threats
Jesse Wilkins
 
PDF
Keynote presentation for Conference: Vounteering in a Digital Age
Sangeet Bhullar
 
PPT
CYP E-Safety
Cliff Ashcroft
 
PPTX
Data privacy over internet
devashishicai
 
PPTX
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
What every product manager needs to know about security
AIPMM Administration
 
Young People and Internet Literacy and Safety
CTIC Technology Centre
 
ISACA UW Handbook 2016
Daniel Kapellmann Zafra
 
Elet5e ch09
DeAnna Gossett
 
001 ho basic computer
Franklin Sondakh
 
Chapter 3
Jennifer Polack
 
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
New literacies, new challenges
madaboutelt
 
Computer Ethics
Kodok Ngorex
 
Microsoft (Projects)
Vinayak Hegde
 
Chapter 5
Nada G.Youssef
 
Vincent O. Mwando - Encryption
Vincent Mwando
 
Cie 2 cyber law
Mahua Narayan
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Mwando
 
Social media risk
Mosoco Ltd
 
20160317 ARMA Wyoming Social Media Security Threats
Jesse Wilkins
 
Keynote presentation for Conference: Vounteering in a Digital Age
Sangeet Bhullar
 
CYP E-Safety
Cliff Ashcroft
 
Data privacy over internet
devashishicai
 
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
Ad

Viewers also liked (19)

PDF
John Sannizzaro & John Kelly GCC 2016
GWT
 
PDF
Збірник диктантів
Marina Efremova
 
PPTX
Sharing Your Treasure By: Josie Walker
josiewalker33
 
PPT
Calles deEncinasola (2)
JOSE DOMINGUEZ
 
PPTX
тиждень психолог. знань
PolinaMokrushina
 
PDF
National Cyber Security Policy 2013
Network Intelligence India
 
PPTX
Cervantes, juventud y las tic’s
maravillas1
 
PPTX
Presentación power point.
melendezoralia7
 
PPTX
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDA
firmanahyuda
 
PPT
Toan 1 bai 3 giới hạn hàm số bookbooming
bookbooming
 
PDF
Loan Modification – Workout Plans and Modification
Kaufman & Canoles
 
PPTX
Presentacion
melendezoralia7
 
PPTX
Amante liberal. presentación
maravillas1
 
DOCX
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
firmanahyuda
 
PDF
2016 Yahoo Taiwan Mobile Developer Conference
Flurry, Inc.
 
PDF
Rinconete y cortadillo cuento 419
maravillas1
 
PPT
Mobile applications
Shweta Jain
 
John Sannizzaro & John Kelly GCC 2016
GWT
 
Збірник диктантів
Marina Efremova
 
Sharing Your Treasure By: Josie Walker
josiewalker33
 
Calles deEncinasola (2)
JOSE DOMINGUEZ
 
тиждень психолог. знань
PolinaMokrushina
 
National Cyber Security Policy 2013
Network Intelligence India
 
Cervantes, juventud y las tic’s
maravillas1
 
Presentación power point.
melendezoralia7
 
Ppt PERAN PENTING SURFAKTAN FIRMAN AHYUDA
firmanahyuda
 
Toan 1 bai 3 giới hạn hàm số bookbooming
bookbooming
 
Loan Modification – Workout Plans and Modification
Kaufman & Canoles
 
Presentacion
melendezoralia7
 
Amante liberal. presentación
maravillas1
 
PDF PROPOSAL RANCANG BAGUN ALAT PENCETAK BRIKET DENGAN MENGGUNAKAN SISTEM PRE...
firmanahyuda
 
2016 Yahoo Taiwan Mobile Developer Conference
Flurry, Inc.
 
Rinconete y cortadillo cuento 419
maravillas1
 
Mobile applications
Shweta Jain
 
Ad

Similar to Privacy and Protection of Online Identity in the New Internet Age CTO Cybersecurity Forum 2013 Victor-Ndonnang_CTO Cybersecurity Forum 2013 (20)

PPTX
Building a secure cyberspace for innovative enterprise, a collective responsi...
Kayode Yussuf
 
PPTX
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 
PPTX
Digital literacy
Luísa Lima
 
PPTX
Digital citizenship pp
Katie Ward
 
PPTX
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
PPTX
Cyber citizenship imen tekaya
imen Tekaya Bouaziz
 
PPTX
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
PPTX
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
PDF
Module 1 Introduction to cryptography...
22ss02it069
 
PPTX
E commerce
DrSelvamohanaK
 
PPT
Computer Security and safety
Sadaf Walliyani
 
PPTX
Epowerment technologies lesson ICT for a change.pptx
vsalibaton
 
PPTX
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
DOCX
REVIEWER ETECH
TrixieAnneAlindao
 
DOCX
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
DOCX
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
DOCX
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
DOCX
REVIEWER-FOR-ETECH.docx
DineLiwan
 
DOCX
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
DOCX
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Kayode Yussuf
 
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 
Digital literacy
Luísa Lima
 
Digital citizenship pp
Katie Ward
 
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
Cyber citizenship imen tekaya
imen Tekaya Bouaziz
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Module 1 Introduction to cryptography...
22ss02it069
 
E commerce
DrSelvamohanaK
 
Computer Security and safety
Sadaf Walliyani
 
Epowerment technologies lesson ICT for a change.pptx
vsalibaton
 
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH.docx
DineLiwan
 
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 

More from Commonwealth Telecommunications Organisation (20)

PDF
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Telecommunications Organisation
 
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Telecommunications Organisation
 
PDF
we.learn.it - February 2015
Commonwealth Telecommunications Organisation
 
PDF
Reflections on scale up and transferability
Commonwealth Telecommunications Organisation
 
PDF
Planning your learning expedition final
Commonwealth Telecommunications Organisation
 
PDF
Session 6.2 Cécile Barayre El Shami
Commonwealth Telecommunications Organisation
 
PDF
Session 5.3 Alexander Ntoko
Commonwealth Telecommunications Organisation
 
PDF
Session 5.2 Martin Koyabe
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Telecommunications Organisation
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth Telecommunications Organisation
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Telecommunications Organisation
 
Reflections on scale up and transferability
Commonwealth Telecommunications Organisation
 
Planning your learning expedition final
Commonwealth Telecommunications Organisation
 
Session 6.2 Cécile Barayre El Shami
Commonwealth Telecommunications Organisation
 

Recently uploaded (20)

PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Software Development Company | KodekX
KodekX
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
This slide provides an overview Technology
mineshkharadi333
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 

Privacy and Protection of Online Identity in the New Internet Age CTO Cybersecurity Forum 2013 Victor-Ndonnang_CTO Cybersecurity Forum 2013

  • 1. Privacy and Protection of Online Identity in the New Internet Age. Where there will be more devices connected than people. Victor Ndonnang Internet Governance Specialist Secretary General Internet Society Cameroon Chapter CTO Cybersecurity Forum 2013 25 – 26 April 2013 Yaounde, Cameroon
  • 2. About The Internet Society •The Internet Society is an international cause- related organization that works for the open development and evolution of the Internet for all people. The Internet is for everyone… and the Internet Society is for everyone who cares about the Internet! •Vision: “The Internet is for Everyone.”
  • 3. •Founded in 1992 by Internet Pioneers, as an international non- profit organization •100+ organization members •tens of thousands of individual members •90+ chapters worldwide •Regional Bureaus: Africa, Europe, Latin America & Caribbean, North America, South & South East Asia Who are we?
  • 4. The Internet Society’s principles •We see a future in which people everywhere can use the Internet to improve quality of life: …when standards, technologies, business practices, and government policies sustain an open and universally accessible platform for innovation, creativity, and economic opportunity.
  • 5. What makes the Internet Society unique? •Sole focus is the Internet •Development, Standards, Policy •Enable regional capacity and technical community building throughout the world •Key player in Internet policy •Particularly in the Internet Governance Forum (IGF) and other intergovernmental forums •Organisational home of the Internet Engineering Task Force (IETF), Internet Architecture Board (IAB), and related bodies
  • 6. A focus on action – some key priorities •Global outreach •a worldwide community of experience and expertise •Advancing the health of the Internet •IPv6 deployment, Open internetworking, DNSSEC •Next generation of Internet leaders •advancing tomorrow’s leaders •Network confidence •supporting development of user trust
  • 7. About Internet Society Cameroon Chapter (1) •incorporated under the laws of Cameroon as an independent nonprofit organization; •works for the development, use and open access to the Internet in Cameroon; •promote, in a global context, the open development, evolution and use of the Internet for the benefit of everyone in Cameroon; •provides a multistakeholder forum for the exchange of views and experiences on Internet open development and use in Cameroon; •Promotes development of local Internet content; •promotes best practices on the Internet, security, protection of privacy, protection of Human Rights, the fight against cybercrime. •More on www.internetsociety.cm
  • 8. About Internet Society Cameroon Chapter (2) •Voluntary groups of ISOC members, working together on local issues, with the backing of a global community •Successful Chapters create an open, inclusive environment and bring together people from all backgrounds: •technical •civil society •law and policy •education •business •Developing solutions to local challenges
  • 9. What the new Internet Age? •More Top Level Domain Names with the NewgTLDs Program Before 2000, there were only: •4% of the world connected to the Internet with 2% in the USA •3 millions web sites; •7 Generic Top Level Domain (gTLDs like .com, .net, .org, .edu, .mil…) Today: •35% of the world is connected to the Internet; •635 millions of web sites; •1905 new gTLDs applications.
  • 10. What the new Internet Age? •Everything connected with IPv6 •Some there will be more devices connected than people in the planet (your car, your medical device, your home, appliances, …) We feel lost and unsafe on this new environment and there is a need to secure. There is an interesting video on this issue available on ICANN web site: https://www.myicann.org/join-strategy- conversation?language=en
  • 11. Our privacy in the new Internet Age Does the Internet makes our lives more private or less? The Internet and the WWW since the inception were to build a global community of information sharing. Any party can share information with another party. Most of those shared information is about us, the users. Some of those information can be misused. If an information is really private, don’t put online; if you put it online, encrypt it and send decryption only to the authorized person.
  • 12. How about your privacy when It comes to Internet resources? Some information about us are collected during the registration of a domain name. •Registration Data •WHOIS Those information can be misused.
  • 13. Understanding and protecting your online Identity •Your online identity is about what you have being doing online. •Your identity has value, as do each of your online partial identities. When your partial identity is with your bank or a brokerage house, for example, it may have clear monetary value. When it is with a social networking site, such as Facebook, twitter, badoo, or MySpace, the value may be less tangible but equally important to you. •Simply by being an active Internet user, you may find that you accumulate tens or even hundreds of online partial identifies.
  • 14. Understanding and protecting your online Identity •Identity theft, which results in a loss of control over one or more of your partial identities, is a natural concern; •as the value of your partial identities grows, the information becomes more attractive to thieves. At the same time, because each of your online partial identities contains some information that may be very private, generally protecting yourself from a loss of privacy is often equally important.
  • 15. How can identity theft occur? Identity theft can happen in several ways. The three types described here are common and happen every day: •You are deceived into disclosing important personal information to the wrong person; •Someone (or some entity) is able to guess one or more of your passwords, or reset a password by exploiting password-recovery procedures, thereby unlocking your online identity •Someone (or some entity) is able to eavesdrop on you electronically or take control of your computer without your knowing.
  • 16. How can I learn to avoid giving the wrong person my identity? •A little education and some common sense are the most important tools you have to avoid divulging sensitive personal information to individuals or entities that plan to exploit it. The U.S. Federal Trade Commissionis a good place to start, even if you don’t live in the United States. The website at http://www.ftc.gov/idtheft contains useful information in English and Spanish aimed at educating consumers about avoiding identity theft. •There are also some technologies that can help. For example, newer versions of most Web browsers have the ability to check websites and alert you to ones that are known to be malicious. The Online Trust Alliance (https://otalliance.org/) has a resource list to help you learn more about the technologies that can help protect your identity on the Internet.
  • 17. How can I keep someone from stealing my password? •Use long password. If a password is easy to guess, then it is easy to steal; •avoid using the same password for multiple websites, so if one website is compromised, your stolen credentials can’t be used at other sites;
  • 18. How can I keep someone from resetting my password? •Password resets are meant to help you when you’ve lost a password (or have been locked out); •Every website has a slightly different technique for resetting a password, but the general idea is that you ask for your password to be reset, often by answering some personal “security” questions you have previously answered; •avoid using simple questions and answers. The way, even someone who knows a lot about you will have trouble answering the questions. More on: http://www.internetsociety.org/what-we- do/internet-technology-matters/privacy-identity
  • 19. Internet is an extraordinary force for good •ISOC believes that the Internet is fundamentally about opportunity, empowerment, knowledge and freedom. •The success of the Internet as a global medium for communication and innovation is derived from the openness and transparency of the Internet's technical and policy development. •Training and awareness are key to make the Internet safe for users.
  • 20. The challenge for an emerging Internet community •The Internet itself is still in its infancy •There are issues that can’t be ignored, such as security, safety, privacy, crime… •But the benefits of the Internet vastly outweigh the risks and are only possible by embracing the open nature of the Internet; preserving the users’ ability to: •connect •communicate •innovate •share •choose
  • 21. Securing the DNS: Internet Society Deploy360 Programme •The Challenge: •The IETF creates protocols based on open standards, but some are not widely known or deployed •People seeking to implement these protocols are confused by a lack of clear, concise deployment information The Deploy360 Solution: •Provide hands-on information on IPv6 and DNSSEC to advance real-world deployment •Work with first adopters to collect and create technical resources and distribute these resources to fast following networks
  • 22. Deploy360 Components Web Portal (Online Knowledge Repository) • Technical documents • Audience-specific information • Blogs & social media Social Media (Constant Audience Engagement) • Twitter • Facebook • Google+ • YouTube • RSS Feeds Speaking Engagements (Come Meet Us or Invite Us to Speak) • Consumer Electronics Show • IPv6 Summits • Interop ION Conferences (Hands-on Educational Events) • Slovenia • India • USA • Canada • Argentina