World Internet Development Report 2017 by Unknown
Author:Unknown
Language: eng
Format: epub
ISBN: 9783662575246
Publisher: Springer Berlin Heidelberg
4.4.4 Enhancement of Cyber Security Supervision
The governments of all countries take initiative measures for cyber security supervision to reduce the risks and challenges resulting from cyber threats. First, measures have been taken to enhance content security supervision. Germany has passed an act targeting social network platforms like Facebook and Twitter, which will be fined 50 million euros at the highest if they fail to eliminate the “obviously illegal” expressions of hatreds and slanders. Russian Duma has passed an act, requiring to completely forbid VPN and other agent services throughout the country. Indonesia has announced that they will block the “telegram” application of social network, because the police of the country hold, through long-term intelligence analysis, that the “telegram” application has become the transmission platform for information threatening the national security due to its point-to-point encryption. The Thai Government has released the Report and Option on Social Media Use and Reform, which points out that social media prevalent in Thailand have caused many malicious incidents. The Government encourages to develop localized social media software to reduce cyber crimes. Secondly, cyber security censorship is enhanced. Swedish Transport Administration has outsourced the information technology maintenance to IBM in recent years, which has given rise to an unprecedentedly large-scale data breach in Swedish history, with personal data of millions of citizens and large amounts of confidential information having been disclosed. To prevent similar incidents from happening, Sweden is formulating laws with stricter provisions on outsourcing concerning national security. Russian Federal Security Bureau (FSB) requires Western technical giants like Cisco, IBM and McAfee of the United States and SAP of Germany to provide the source codes of security products for the convenience of censorship. In this way, they can avoid the codes being duplicated or changed, and thus guarantee no “backdoor” used for espionage. Most businesses allow Russian authorities to examine the source codes of their products used as security facilities.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
International Integration of the Brazilian Economy by Elias C. Grivoyannis(71758)
The Radium Girls by Kate Moore(11585)
Turbulence by E. J. Noyes(7677)
Nudge - Improving Decisions about Health, Wealth, and Happiness by Thaler Sunstein(7213)
The Black Swan by Nassim Nicholas Taleb(6732)
Rich Dad Poor Dad by Robert T. Kiyosaki(6140)
Pioneering Portfolio Management by David F. Swensen(6051)
Man-made Catastrophes and Risk Information Concealment by Dmitry Chernov & Didier Sornette(5616)
Zero to One by Peter Thiel(5463)
Secrecy World by Jake Bernstein(4355)
Millionaire: The Philanderer, Gambler, and Duelist Who Invented Modern Finance by Janet Gleeson(4062)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Skin in the Game by Nassim Nicholas Taleb(3951)
The Money Culture by Michael Lewis(3817)
Bullshit Jobs by David Graeber(3803)
Skin in the Game: Hidden Asymmetries in Daily Life by Nassim Nicholas Taleb(3708)
The Dhandho Investor by Mohnish Pabrai(3542)
The Wisdom of Finance by Mihir Desai(3504)
Blockchain Basics by Daniel Drescher(3308)
