Difference between revisions of "Call for Topics 2019 - Cybersecurity"

From IGF-USA Wiki
Jump to: navigation, search
 
Line 1: Line 1:
 +
[[Call for Topics 2019 - Submissions|<- Back to All Topics]]
 
{{#cargo_query:
 
{{#cargo_query:
 
  tables=Submission2019
 
  tables=Submission2019

Latest revision as of 14:00, 13 February 2019

<- Back to All Topics

Timestamp Submission Number Submission Issue Areas Comments SG
Timestamp Submission Number Submission Issue Areas Comments SG
2019-01-28 10:48:09 AM 2019 Submission 2 Network Security Cybersecurity Intrusion Prevention System Civil Society / Academia
2019-01-28 7:54:02 PM 2019 Submission 5 1) Impact of Culture & Language on Internet UX, architecture, and business opportunities 2) The need and importance of Authenticationf Cybersecurity 1) Culture and Language: How do these things impact what people want from the Internet and how Internet-centered businesses best deliver Internet experiences to the end-user? (Submitted last year resubmitting this year.) 2) Last year, trust was spoken about as a problem throughout the panel sessions, but the best possible solution is authentication. Can authentication (i.e., handshakes, access management, identities, verification of information, etc.) How can authentication be improved to provide better cybersecurity, functionality, data persistence, and help fight social problems (i.e., crime, fake news, psychological disorders etc.) arriving from the lack Authenticity. Civil Society / Academia
2019-02-03 2:15:23 PM 2019 Submission 13 Protecting Consumers Against Phone Phising Cybersecurity As people have more information about themselves available online, with more data breaches occurring, it is simple for scammers to use credible information to build trust and initiate spear phasing attacks, leaving the victim with their personal identity information compromised and or financially distressed. Social engineering attacks are difficult to combat, and especially difficult to recover from in terms of financially, psychologically, and more. How might we help people protect themselves from theses phasing scams, particularly when they use social engineering tactics? This project will explore potential solutions to better protect consumers based on data collected on “VISHING’ (VOICE PHISING) attacks. The first phase will entail information gathering through in-depth interviews and scraping online sources, and the second phase will include designing a prototype of a tool for consumers to protect themselves against social engineering tactics and testing its plausibility with users. Source-Michelle Chen,, Master of Information Management and System (MIMS), School of Information, UC Berkeley Private Sector
2019-02-04 11:41:15 AM 2019 Submission 17 Cyber Threat Intelligence Capture and Response Cybersecurity I think the IGF might like to consider the current state of play on threat intelligence and how this critical area of WWW development might be developed to make the internet a safer place for everyone to interact with. Technical Community
2019-02-04 12:15:39 PM 2019 Submission 19 1. Merits and risks of consumer-driven privacy models.

2. Election infrastructure and security.

3. Info/ed session: device security/privacy
Cybersecurity Private Sector
2019-02-04 8:55:13 PM 2019 Submission 25 Unreasonable to have both public and private (Grid, ..) connected on the internet. There should be parallel structures like Intranet. Cybersecurity Private structures like the Grid, Power Plants and Banks should have its own and not provide access to their secure information and controls online. Civil Society / Academia
2019-02-06 9:33:51 AM 2019 Submission 31 Attribution and incontrovertible digital identity Cybersecurity Digital Identity to counter identity theft. Attribution, and provenance of sources and facts, to counter "fake news" and public opinion manipulation. Private Sector
2019-02-08 5:30:37 PM 2019 Submission 42 Principles Underpinning Norms for Cyberstability Cybersecurity As part of its mission the Global Commission on the Stability of Cyberspace (GCSC, https://cyberstability.org) is documenting a set of principles that guide stakeholders in achieving cyber stability and that are the foundation for norms proposed by the commission. Norms such as "the Call to Protect the Public Core of the Internet" (https://cyberstability.org/research/call-to-protect/), and those published in the 'Singapore Norm Package"(https://cyberstability.org/wp-content/uploads/2018/11/GCSC-Singapore-Norm-Package-3MB.pdf) . During this session, members of the GCSC want to engage in a conversation with the US IGF community in order to inform their work. Technical Community
2019-02-11 8:44:39 AM 2019 Submission 45 Assume you will cover areas of cybersecurity policy, fake news vs. freedom of expression, GDPR vs. U.S. 'data as product' controversies, net Cybersecurity neutrality status. Note: I am moving to Washington end February, interested in participating in committee once the chaos of the move is over. Technical Community
2019-02-11 9:05:55 AM 2019 Submission 46 Internet of Things Governance Cybersecurity Norms of Internet governance (open standards, multistakeholder coordination, immunity from intermediary liability) are being challenged by cyber- physical systems. At the same time, these systems are creating unprecedented security and privacy problems with cascading effects on the entire Internet. What needs to happen now? Civil Society / Academia
2019-02-11 9:16:08 AM 2019 Submission 49 DNS Hijacking Cybersecurity Consider the following: https://cyber.dhs.gov/ed/19-01/. The bottom line here is that it's time for an upgrade of security employed to protect domain name registrations. Even DNSSEC is weakened by this category of failure. At least "important" domain names should consider registration security requirements. Technical Community
2019-02-11 9:25:40 AM 2019 Submission 52 IDN Homographic Attacks Cybersecurity Consider the following: https://static.ptbl.co/static/attachments/191691/1540208800.pdf?1540208800. That presentation is somewhat technical but the concern is easily motivated and described. We need better user tools and applications that account for this directly, and they are possible. This is a universal acceptance issue. Technical Community
2019-02-11 3:00:45 PM 2019 Submission 67 Weighing Security & Privacy Issues In Debate on DNS over HTTPS Cybersecurity Mozilla, CloudFlare, Tucows, British Telecom, and PowerDNS would be examples of great candidates to discuss this important issue, and I'd be happy to help pull something like this together. Private Sector