Developing Secure Arcgis Enterprise Solutions

Total Page:16

File Type:pdf, Size:1020Kb

Developing Secure Arcgis Enterprise Solutions DevelopingDeveloping SecureSecure ArcGISArcGIS EnterpriseEnterprise SolutionsSolutions John Alsup Randy Jones Sam Juarez David Kaiser Wittaker Mathot Rand Woolley OverviewOverview •• WelcomeWelcome •• EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole •• DemoDemo IntroductionIntroduction •• ArcGISArcGIS ClientClient // ServerServer SecuritySecurity – Client / Server Demo •• ArcGISArcGIS WebWeb ApplicationApplication SecuritySecurity – Web Application Demo •• ArcGISArcGIS WebWeb ServicesServices SecuritySecurity – Web Services Demo •• QuestionsQuestions DevelopingDeveloping SecureSecure ArcGISArcGIS EnterpriseEnterprise SolutionsSolutions SecuritySecurity isis notnot aa product,product, butbut aa process;process; notnot aa destination,destination, butbut aa journeyjourney …. SQL Server Security Distilled, second edition, by Morris Lewis EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Challenge •• DynamicDynamic – ID Vulnerabilities (Users, Software Developers, Hackers, etc) – US-CERT (http://www.us-cert.gov) Security Bulletins – Exploit Vulnerabilities (Hackers) • Internet is a Endless Resource – Security Patches (Software Providers) • Release Schedules – Monthly – Quarterly – As Needed EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Challenge AnAn unun--patchedpatched WindowsWindows PCPC connectedconnected toto thethe InternetInternet willwill ““survivesurvive”” forfor onlyonly 2929 minutesminutes beforebefore thethe machinemachine isis likelylikely compromisedcompromised byby malwaremalware.. (Source: Internet Storm Center, July, 2005 -- http://isc.sans.org ) EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Challenge • Many Methods of Attack – Malicious Code (Trojan Horses, Trap Doors, Logic Bombs) – Denial of Service (Render a system unusable) – Physical Attacks (Physical Access to system) – Buffer Overflows (Extra code placed in Buffer to perform actions) – Spamming (Unsolicited E-mail) – Brute Force (Attempting all possible password combinations) – The list goes on …… • Historical View of Enterprise Security -- “The Soft Chewy Inside…” – Secure the Perimeter EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Challenge 52%52% ofof SecuritySecurity ExecutivesExecutives saysay theythey havehave aa ““moatmoat andand castlecastle”” approachapproach toto networknetwork security,security, admittingadmitting thatthat onceonce thethe perimeterperimeter isis penetratedpenetrated thethe innerinner defensesdefenses areare soft.soft. (Source: Preventsys, March 30, 2005) EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Security Is Bigger Than Technology •• EnterpriseEnterprise SecuritySecurity ProgramsPrograms – behavioral controls (policy) – procedural controls (process) – technological controls (technology) •• SecuritySecurity IsIs PartPart ofof thethe OrganizationOrganization FabricFabric – CSO (Chief Security Officer) / CISO (Chief Information Security Officer) 60% of Security Breaches are Internal, but 70% of People are Worried about Hackers on the Outside (Source: San Diego Supercomputing Center) EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Essential Enterprise Security Tasks • Identify Risks (Risk Management) • Identify Vulnerabilities (Vulnerability Management) • Develop Controls • Develop Business Continuity Plan (Document) • Implement Controls • Perform On-Going Risk Assessment (Verify) • Document and Take Action More than one-third (38 percent) of companies do not have comprehensive, integrated disaster recovery and business continuity plans in place. (Source: Veritas) EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Risk Management • Gartner Enterprise Risk Management (ERM) Framework – Definition (formalize risk tolerance into policy) • Define Risk Categories (for example: technical, contractual, regulatory) • Determine Risk Levels (0-5 scale) • Determine Acceptable Risk Level (risk tolerance) • Acceptable risk levels for business units • Define Risk Levels and Categories as formal policy – Planning • Analysis – Risk Identification – Business Impact Analysis – Risk Classification • Mitigation – Avoid / Transfer / Mitigate / Accept – Management • Control (Measurable / Testable / Auditable / Enforceable) • Monitor (Event / Trend / Intelligence / Controls) – Report • Regulatory Compliance • Policy Compliance • Risk Dash boarding • Risk Benchmarking / Optimization EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Hierarchy of Controls •• StructureStructure YOURYOUR EnterpriseEnterprise ControlControl SetSet toto MitigateMitigate YOURYOUR RisksRisks – Security Controls (NIST 800-53 / ISO 17799) • National Institute of Standards and Technology (NIST 800- 53) • International Organization for Standardization (ISO 17799) – IT Controls (COBIT / Software Development Lifecycle) • COBIT – Compliance / Regulatory Controls (SOX / HIPPA) • Sarbanes-Oxley Act of 2002 (SOX) – Financial & Accounting Disclosure • Health Insurance Portability and Accountability Act of 1996 – Health Care Discrimination EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Security Solutions Are Unique •• IdentifyIdentify YOURYOUR EnterpriseEnterprise RisksRisks •• DefineDefine YOURYOUR EnterpriseEnterprise ControlControl SetSet •• ImplementImplement ReasonableReasonable andand AppropriateAppropriate ControlsControls •• PerformPerform OnOn--GoingGoing RiskRisk AssessmentAssessment •• Document,Document, Document,Document, DocumentDocument andand DocumentDocument EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole ESRI Role In Enterprise Security •• EnsureEnsure ArcGISArcGIS softwaresoftware worksworks effectivelyeffectively withinwithin enterpriseenterprise architecturesarchitectures takingtaking fullfull advantageadvantage ofof theirtheir inherentinherent securitysecurity capabilities,capabilities, eithereither throughthrough ArcGISArcGIS featuresfeatures andand customcustom extensionsextensions oror throughthrough integrationintegration withwith thirdthird--partyparty components.components. •• ArcGISArcGIS EnterpriseEnterprise Security:Security: DeliveringDelivering SecureSecure SolutionsSolutions –– JulyJuly 20052005 – http://www.esri.com/library/whitepapers/pdfs/arcgis-security.pdf – [email protected] EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole Defense-In-Depth • ArcGIS Provides Enterprise Security: – Configuration – Integration with Security technologies – Secure Solution Development (Best Practices) • Architectures – Client / Server – Web Application – Web Services • Defense-In-Depth Approach OverviewOverview •• WelcomeWelcome •• EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole •• DemoDemo IntroductionIntroduction •• ArcGISArcGIS ClientClient // ServerServer SecuritySecurity – Client / Server Demo •• ArcGISArcGIS WebWeb ApplicationApplication SecuritySecurity – Web Application Demo •• ArcGISArcGIS WebWeb ServicesServices SecuritySecurity – Web Services Demo •• QuestionsQuestions G8G8 SummitSummit Threat Analysis Demonstration •• JuneJune 2004,2004, 3030th G8G8 SummitSummit waswas heldheld onon SeaSea IslandIsland inin GlynnGlynn County,County, GAGA •• G8G8 ConsistsConsists ofof thethe LeadersLeaders ofof thethe worldworld’’ss majormajor IndustrialIndustrial DemocraciesDemocracies – Canada – France – Germany – Italy – Japan – Russia – United Kingdom – United States G8G8 SummitSummit Fictitious Scenario •• MissionMission Objective:Objective: SupplySupply G8G8 SummitSummit SecuritySecurity PersonnelPersonnel andand OthersOthers withwith AccurateAccurate andand TimelyTimely EventEvent Data.Data. •• LeverageLeverage EnterpriseEnterprise GISGIS toto provideprovide situationsituation awarenessawareness to:to: – Secret Service, FBI, Department of Defense, Federal/State/Local Law Enforcement, Medical, Foreign Dignitary Security Details G8G8 SummitSummit Fictitious Scenario • Enterprise GIS Components – Client / Server Application (Joint Operations Command) • RDBMS (Oracle 10g) – Data Repository • ArcSDE (9.1) – Spatial Database Engine • Geodatabase (9.1) – Management Repository for County GIS and Relevant Business Logic • ArcGIS Desktop (9.1) – Maintenance of Incident Data – Web Application (G8 Support Operations) • Web Application (Java Integration Tool Kit) – User Interface • Web Application Server (Tomcat / IIS) – Brokers Transactions between users and applications • ArcIMS (9.1) – Delivery of dynamic incident maps – Web Services (G8 Dignitary Operations) • Web Application Server (Tomcat / IIS) • Web Service (.Net) • ArcGIS Server (9.1) G8G8 SummitSummit Fictitious Scenario •• ClientClient // ServerServer – Microsoft Active Directory Integration – Fine Grained Access to ArcGIS Desktop Functionality based on Role Assignment G8G8 SummitSummit Fictitious Scenario •• WebWeb ApplicationApplication – Secure Communications between Web Client / Server / ArcIMS – Custom Web Application Content Based on Users Role in the Organization G8G8 SummitSummit Fictitious Scenario •• WebWeb ServicesServices – Secure Web Service (WSE) Used To Assist in Network Analysis OverviewOverview •• WelcomeWelcome •• EnterpriseEnterprise SecuritySecurity && ESRIESRI’’SS RoleRole •• DemoDemo IntroductionIntroduction •• ArcGISArcGIS ClientClient // ServerServer SecuritySecurity – Client / Server Demo •• ArcGISArcGIS WebWeb ApplicationApplication SecuritySecurity – Web Application Demo •• ArcGISArcGIS WebWeb ServicesServices SecuritySecurity – Web Services Demo •• QuestionsQuestions ArcGISArcGIS ClientClient // SeverSever
Recommended publications
  • IN the MOUNTIES WE TRUST: a Study of Royal Canadian Mounted
    IN THE MOUNTIES WE TRUST: A Study of Royal Canadian Mounted Police Accountability by STEPHEN LORENZ WETTLAUFER A thesis submitted to the Department of Sociology in conformity with the requirements for the degree of Master of Arts Queen’s University Kingston, Ontario, Canada July, 2011 Copyright © Stephen Lorenz Wettlaufer, 2011 Abstract Police and Canadian citizens often clash during protests sometimes resulting in violent outcomes. Due to the nature of those altercations, there are few other events that require oversight more than the way police clash with protesters and there is a history of such oversight resulting in a number of Federal Parliamentary documents, Parliamentary Committee reports Task Force reports, reports arising from Public Interest Hearings of the Commission for Complaints Against the RCMP, and testimony at various hearings and inquiries which have produced particular argumentative discourses. Argumentative discourses that have a great effect on the construction of a civilian oversight agency of the RCMP is the focus of this thesis. This thesis examines how it is that different discourses, as represented by argumentative themes in these reports, intersect with one another in the process of creating a system of accountability for the RCMP. Through the lens of complaints that arise from protest and police clashes one may conclude that the current system of accountability does not adhere to a practice of protecting the most fundamental rights as prescribed by the Canadian Charter of Rights and Freedoms; nor would the currently proposed legislation contained within Bill C‐38 alter the system in a substantial way to allow for such protections. The power dynamic between the Commissioner of the Force and the Commission for Complaints Against the RCMP favours the police force in the current and proposed system.
    [Show full text]
  • VIP Visits DIPLOMATIC BLUEBOOK 2006
    VIP Visits DIPLOMATIC BLUEBOOK 2006 VIP Visits January 1, 2005-December 31, 2005 <VIP Visits covered in this table and notes> 1. The period covered in this table is from January 1, 2005 to December 31, 2005. 2. Regarding visits by Japanese VIPs, the visits to other countries have been listed for the Imperial Family, the Prime Minister, Special Envoys of the Prime Minister, Cabinet Ministers, Senior-Vice Ministers for Foreign Affairs, Parliamentary Secretaries for Foreign Affairs, the Speaker of the House of Representatives, and the President of the House of Councillors. 3. Regarding visits by VIPs from other countries and institutions, this list principally includes VIPs of or above the rank of foreign minister in each country as well as the heads of each international organization who 1) either met with Japanese VIPs of or above the rank of Minister for Foreign Affairs or 2) had the purpose of attending international conferences held in Japan. 4. Meetings that were held with VIPs from third-party countries on occasions when Japanese VIPs attended international conferences are listed in the column “Purpose of visit and main schedule” of the visits to the host country of the conference. 5. The titles of VIPs are those held at the time when the visits were made. 6. The period refers to the duration of stay in the country or region that VIPs were visiting. Name of country or region Name of VIP Period Purpose of visit and main schedule (1) Asia and the Pacific Australia ToSenior Vice-Foreign Minister 2/10-2/13 Attendance at the Third Australia-Japan
    [Show full text]
  • B Efforts Aimed at Realizing Prosperity in the International Community
    CHAPTER 3 JAPAN’S FOREIGN POLICY IN MAJOR DIPLOMATIC FIELDS BEfforts Aimed at Realizing Prosperity in the International Community Asia-Pacific Economic Cooperation (APEC) and the Overview Asia-Europe Meeting (ASEM), and of multilayered eco- The global economy in 2004 generally made a steady re- nomic relations, including those between Japan and the covery, despite instability caused by rising crude oil United States (US) as well as Japan and Europe. The prices and some other factors. fourth is strengthening economic security, including in Under these circumstances, Japan has promoted the areas of energy, food, marine issues, piracy, and fish- economic foreign policy focusing on the following five eries (including whaling). The final one is support for issues as its priorities, with the objective of further Japanese companies overseas and the promotion of in- strengthening the economies of both Japan and the vestments to Japan. world. The first is maintaining and strengthening the Moreover, while the international community ac- multilateral trading system (global efforts) and promot- knowledges the importance of science and technology ing economic partnership at the regional and bilateral to resolve various global issues, Japan has been advanc- levels to complement the multilateral trading system. ing bilateral and multilateral cooperation, using its ex- The second is active participation in international efforts perience as the world leader in science and technology. on globalization aimed at coping effectively with global While Japan has been making efforts to enhance its issues, such as working on world economic growth and own economic interests, it also endeavors to respond ef- sustainable development. The third is strengthening fectively to these various issues in pursuit of the pros- frameworks for interregional cooperation such as the perity of the international community.
    [Show full text]
  • Fast Policy Facts
    Fast Policy Facts By Paul Dufour In collaboration with Rebecca Melville - - - As they appeared in Innovation This Week Published by RE$EARCH MONEY www.researchmoneyinc.com from January 2017 - January 2018 Table of Contents #1: January 11, 2017 The History of S&T Strategy in Canada ........................................................................................................................... 4 #2: January 18, 2017 Female Science Ministers .................................................................................................................................................... 5 #3: February 1, 2017 AG Science Reports ................................................................................................................................................................ 6 #4: February 8, 2017 The deadline approaches… ................................................................................................................................................. 7 #5: February 15, 2017 How about a couple of key moments in the history of Business-Education relations in Canada? .............. 8 #6: February 22, 2017 Our True North ........................................................................................................................................................................ 9 #7: March 8, 2017 Women in Science - The Long Road .............................................................................................................................. 11 #8: March 15, 2017 Reflecting on basic
    [Show full text]
  • 5–25–04 Vol. 69 No. 101 Tuesday May 25, 2004 Pages 29651–29844
    5–25–04 Tuesday Vol. 69 No. 101 May 25, 2004 Pages 29651–29844 VerDate jul 14 2003 20:17 May 24, 2004 Jkt 203001 PO 00000 Frm 00001 Fmt 4710 Sfmt 4710 E:\FR\FM\25MYWS.LOC 25MYWS 1 II Federal Register / Vol. 69, No. 101 / Tuesday, May 25, 2004 The FEDERAL REGISTER (ISSN 0097–6326) is published daily, SUBSCRIPTIONS AND COPIES Monday through Friday, except official holidays, by the Office PUBLIC of the Federal Register, National Archives and Records Administration, Washington, DC 20408, under the Federal Register Subscriptions: Act (44 U.S.C. Ch. 15) and the regulations of the Administrative Paper or fiche 202–512–1800 Committee of the Federal Register (1 CFR Ch. I). The Assistance with public subscriptions 202–512–1806 Superintendent of Documents, U.S. Government Printing Office, Washington, DC 20402 is the exclusive distributor of the official General online information 202–512–1530; 1–888–293–6498 edition. Periodicals postage is paid at Washington, DC. Single copies/back copies: The FEDERAL REGISTER provides a uniform system for making Paper or fiche 202–512–1800 available to the public regulations and legal notices issued by Assistance with public single copies 1–866–512–1800 Federal agencies. These include Presidential proclamations and (Toll-Free) Executive Orders, Federal agency documents having general FEDERAL AGENCIES applicability and legal effect, documents required to be published Subscriptions: by act of Congress, and other Federal agency documents of public interest. Paper or fiche 202–741–6005 Documents are on file for public inspection in the Office of the Assistance with Federal agency subscriptions 202–741–6005 Federal Register the day before they are published, unless the issuing agency requests earlier filing.
    [Show full text]
  • The World Economic Forum – a Partner in Shaping History
    The World Economic Forum A Partner in Shaping History The First 40 Years 1971 - 2010 The World Economic Forum A Partner in Shaping History The First 40 Years 1971 - 2010 © 2009 World Economic Forum All rights reserved No part of this publication may be reproduced or transmitted in any form or by any means, including photocopying or recording, or by any information storage and retrieval system. World Economic Forum 91-93 route de la Capite CH-1223 Cologny/Geneva Switzerland Tel.: +41 (0)22 869 1212 Fax +41 (0)22 786 2744 e-mail: [email protected] www.weforum.org Photographs by swiss image.ch, Pascal Imsand and Richard Kalvar/Magnum ISBN-10: 92-95044-30-4 ISBN-13: 978-92-95044-30-2 “Until one is committed, there is hesitancy, the chance to draw back, always ineffective, concerning all acts of initiative (and creation). There is one elementary truth the ignorance of which kills countless ideas and splendid plans: that the moment one definitely commits oneself, then providence moves too. All sorts of things occur to help one that would never otherwise have occurred. A whole stream of events issues from the decision, raising in one’s favour all manner of unforeseen incidents and meetings and material assistance which no man could have dreamed would have come his way. Whatever you can do or dream you can, begin it. Boldness has genius, power and magic in it. Begin it now.” Goethe CONTENTS Foreword 1 Acknowledgements 3 1971 – The First Year 5 1972 – The Triumph of an Idea 13 1973 – The Davos Manifesto 15 1974 – In the Midst of Recession 19
    [Show full text]
  • Abridged Final Report of the Eighteenth Session
    World Meteorological Congress Abridged Final Report of the Eighteenth Session Geneva 3–14 June 2019 WEATHER CLIMATE WATER CLIMATE WEATHER WMO-No. 1236 World Meteorological Congress Abridged Final Report of the Eighteenth session Geneva 3–14 June 2019 WEATHER CLIMATE WATER CLIMATE WEATHER WMO-No. 1236 WMO-No. 1236 © World Meteorological Organization, 2019 The right of publication in print, electronic and any other form and in any language is reserved by WMO. Short extracts from WMO publications may be reproduced without authorization, provided that the complete source is clearly indicated. Editorial correspondence and requests to publish, reproduce or translate this publication in part or in whole should be addressed to: Chair, Publications Board World Meteorological Organization (WMO) 7 bis, avenue de la Paix Tel.: +41 (0) 22 730 84 03 P.O. Box 2300 Fax: +41 (0) 22 730 81 17 CH-1211 Geneva 2, Switzerland Email: [email protected] ISBN 978-92-63-11236-1 NOTE The designations employed in WMO publications and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of WMO concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. The mention of specific companies or products does not imply that they are endorsed or recommended by WMO in preference to others of a similar nature which are not mentioned or advertised. This report contains the text as adopted by Plenary and has been issued without formal editing. Acronyms used in this report may be found in METEOTERM, the WMO terminology database, at http://public.wmo.int/en/resources/meteoterm.
    [Show full text]
  • Part 2-Chap3
    will vigorously address these new challenges to fulfill its Chapter 3 responsibilities commensurate with its national strength and its standing in the international community. In this regard, it is References important to have public support for ODA. It is essential to effectively implement ODA, fully taking into account the domestic economic and fiscal situation as well as the views of the Japanese people. Against this background, the Government of Japan has revised the ODA Charter, with the aim of enhancing the strategic value, flexibility, transparency, and efficiency of ODA. The revision also has the aim of encouraging wide public participation and of deepening the understanding of Japan's ODA policies both within Japan and abroad. Japan's Official Development Assistance Charter Vytautas Magnus University, to which Japan provided Japanese language laboratory equipment, which former- I. Philosophy: Objectives, Policies, and ly was a Japanese Consulate during World War II and later became the Sugihara House commemorating Priorities Japanese diplomat Chiune Sugihara who granted visas to Jewish people who fled the Nazis (Lithuania). (Photo: JICS) 1. Objectives The objectives of Japan's ODA are to contribute to the 1. Japan's Official Development peace and development of the international community, and Assistance Charter (Approved thereby to help ensure Japan's own security and prosperity. by the Cabinet in August 2003) Taking advantage of Japan's experience as the first nation in Asia to become a developed country, Japan has utilized its Revision of Japan's Official Develop- ODA to actively support economic and social infrastructure ment Assistance Charter development, human resource development, and institution building.
    [Show full text]
  • Aligned Movement Baku, the Republic of Azerbaijan 25
    Original: English NAM 2019/CoB/Doc.1 18th Summit of Heads of State and Government of the Non- Aligned Movement Baku, the Republic of Azerbaijan 25 - 26 October 2019 FINAL DOCUMENT Baku, Azerbaijan 25-26 October 2019 Original: English NAM 2019/CoB/Doc.1 FINAL DOCUMENT TABLE OF CONTENTS INTRODUCTION ................................................................................................................. 5 CHAPTER I: GLOBAL ISSUES ............................................................................................. 6 Review of the International Situation ..................................................................................... 6 Non-Aligned Movement: Role and Methods of Work ................................................................. 9 International Law ............................................................................................................... 14 Promotion, Preservation and Revitalization of Multilateralism .................................... 19 Peaceful Settlement of Disputes, and Non-Use or Threat of Use of Force .............................. 23 Culture of Peace, Dialogue among Civilizations, Religions and Cultures, and Cultural Diversity ................................................................................................................................ 25 Defamation of Religions ........................................................................................................ 32 Right to Self-Determination and Decolonization ..................................................................
    [Show full text]
  • Nuclear Security in Times of Crisis Handbook
    CENTRE FOR SCIENCE & SECURITY STUDIES Nuclear Security in Times of Crisis Geoffrey Chapman, Rebecca Earnhardt, Christopher Hobbs, Nickolas Roth, Daniel Salisbury, Amelie Stoetzel and Sarah Tzinieris 2021 2 Nuclear Security in Times of Crisis | 2021 Table of Contents Table of Contents Commonly Used Abbreviations...............................................................................................................................4 Acknowledgements...................................................................................................................................................5 Overview and Executive Summary...................................................................................................................... 6 Nuclear Security, Organisational Crises and Resilience................................................................................ 9 Case Studies Case Study I Maintaining Nuclear Security during the Cerro Grande Wildfire in the United States...............................................13 Case Study II Nuclear Security in Russia following the Break-up of the Soviet Union......................................................................21 Case Study III Maintaining Nuclear Security Confidence amid a Perceived Terrorist Threat in Belgium .........................................32 Case Study IV Nuclear Security Reform in Japan following the 2011 Nuclear Disaster......................................................................42 Conclusion..............................................................................................................................................................
    [Show full text]
  • G Africa (Sub-Sahara)
    DIPLOMATIC BLUEBOOK 2006 G Africa (Sub-Sahara) enhanced its own assistance to Africa and attempted to Overview further strengthen its relationship with Africa. In 2005, as in the previous year, Africa made progress in the process of peace and democratization, with many (a) Principles and Basic Policies of countries taking first steps toward peace and stability, Diplomacy toward Africa: which are the foundation for development. These steps Why Africa? included the holding of the first democratic elections or (1) The Importance of Africa constitutional referenda after the end of civil wars or Japan is carrying out proactive diplomacy toward Africa coups d’etat, and the successful completion of UN based on the following viewpoints. Peacekeeping Operations (PKO).1 However, conflicts First, in the conviction that “there will be no persist in some regions2 and peace is still fragile in many stability and prosperity in the world unless the African countries.3 One of the biggest challenges facing Africa issues are resolved,” Japan, as a responsible member of now is to make such fragile peace more stable and lasting. the international community, is extending assistance to On the economy side, Africa’s overall performance Africa to resolve these issues. Africa suffers a great many was encouraging as well. In 2004, 14 African countries problems such as poverty and conflict (see the chart, recorded growth of over 5%, and inflation fell to a fifth “African Issues” in Figures), and it is the only continent of the level a decade ago.4 that is forecast to achieve none of the MDGs. The grave Nonetheless, Africa still faces many socio-economic African issues cannot be ignored for humanitarian challenges including severe poverty.
    [Show full text]
  • Climate Finance for Addressing Loss and Damage
    91 STUDY Analysis Climate Finance for Addressing Loss and Damage How to Mobilize Support for Developing Countries to Tackle Loss and Damage Published by Brot für die Welt Evangelisches Werk für Diakonie und Entwicklung e. V. Caroline-Michaelis-Straße 1 10115 Berlin Phone: +49 30 65211 0 [email protected] www.brot-fuer-die-welt.de Lead Author Thomas Hirsch, Climate & Development Advice With contributions from Mizanur Rahman Bijoy, Ojelel Benjamin Etubi, Lilian Kantei Joseph Imuton, Genevieve Jiva, Andrew Masaba, Sabine Minninger, Sixbert Mwanga, Kenedy Orach, Mohammad Mahbubur Rahman, Wande Rajabu, Gerold Schmidt Editors Elena Cedillo, Johannes Grün, Sebastian Landsberger, Maike Lukow, Athena Peralta, Lisa Binder, Isaiah Toroitich Legally responsible for content Klaus Seitz Photos Jörg Böthling (p. 41); Climate Action Network Tanzania (p. 18); Jens Grossmann (p. 24, 47, cover); Thomas Lohnes (p. 34); Lutheran World Federation (p. 16); Network on Climate Change, Bangladesh (p. 13); Frank Schultze (p. 5); Thomas Venker (p. 11) Layout Katja Tränkner (Write Now) Printed by Druckhaus Berlin-Mitte Art. Nr. 129 503 060 Donations Brot für die Welt Bank für Kirche und Diakonie IBAN: DE10 1006 1006 0500 5005 00 BIC: GENODED1KDB November 2019 STUDY Climate Finance for Addressing Loss and Damage How to Mobilize Support for Developing Countries to Tackle Loss and Damage Content Preface ..........................................................................3 Executive summary ...............................................................5
    [Show full text]