Climate Change Adaptation in the Arab States Best Practices and Lessons Learned
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cyber Security Practices and Challenges at Selected Critical Infrastructures in Ethiopia: Towards Tailoring Cyber Security Framework
ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By TEWODROS GETANEH JUNE, 2018 ADDIS ABABA, ETHIOPIA ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK A Thesis Submitted to School of Graduate Studies of Addis Ababa University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Information Science By: TEWODROS GETANEH Advisor: Tebebe Beshah (PhD) JUNE, 2018 Addis Ababa, Ethiopia ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCE SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By: Tewodros Getaneh Name and signature of Members of the Examining Board Tebebe Beshah (PhD) __________ _________ Advisor Signature Date Lemma Lenssa (PhD) ___________ __________ Examiner Signature Date Dereje Teferi (PhD) __________ _________ Examiner Signature Date Declaration This thesis has not previously been accepted for any degree and is not being concurrently submitted in candidature for any degree in any university. I declare that the thesis is a result of my own investigation, except where otherwise stated. I have undertaken the study independently with the guidance and support of my research advisor. Other sources are acknowledged by citations giving explicit references. A list of references is appended. Signature: ________________________ Tewodros Getaneh This thesis has been submitted for examination with my approval as university advisor. Advisor’s Signature: ________________________ Tebebe Beshah (PhD) i | P a g e Dedication This work is dedicated to my beloved sister Eleni Getaneh. -
1 CHAPTER I INTRODUCTION 1.1 Background the Yemen Civil War Is
CHAPTER I INTRODUCTION 1.1 Background The Yemen civil war is currently in its fifth year, but tensions within the country have existed for many years. The conflict in Yemen has been labelled as the worst humanitarian crisis in the world by the United Nations (UN) and is categorized as a man-made phenomenon. According to the UN, 80% of the population of Yemen need humanitarian assistance, with 2/3 of its population considered to be food insecure while 1/3 of its population is suffering from extreme levels of hunger and most districts in Yemen at risk of famine. As the conditions in Yemen continue to deteriorate, the world’s largest cholera outbreak occurred in Yemen in 2017 with a reported one million infected.1 Prior to the conflict itself, Yemen has been among the poorest countries in the Arab Peninsula. However, that is contradictory considering the natural resources that Yemen possess, such as minerals and oil, and its strategical location of being adjacent to the Red Sea.2 Yemen has a large natural reserve of natural gasses and minerals, with over 490 billion cubic meters as of 2010. These minerals include the likes of silver, gold, zinc, cobalt and nickel. The conflict in Yemen is a result of a civil war between the Houthi, with the help of Former President Saleh, and the Yemen government that is represented by 1 UNOCHA. “Yemen.” Humanitarian Needs Overview 2019, 2019. https://reliefweb.int/sites/reliefweb.int/files/resources/2019_Yemen_HNO_FINAL.pdf. 2 Sophy Owuor, “What Are The Major Natural Resources Of Yemen?” WorldAtlas, February 19, 2019. -
Planning and Implementing Ecosystem Based Adaptation (Eba) in Djibouti’S Dikhil and Tadjourah Regions
5/6/2020 WbgGefportal Project Identification Form (PIF) entry – Full Sized Project – GEF - 7 Planning and implementing Ecosystem based Adaptation (EbA) in Djibouti’s Dikhil and Tadjourah regions Part I: Project Information GEF ID 10180 Project Type FSP Type of Trust Fund LDCF CBIT/NGI CBIT NGI Project Title Planning and implementing Ecosystem based Adaptation (EbA) in Djibouti’s Dikhil and Tadjourah regions Countries Djibouti Agency(ies) UNEP Other Executing Partner(s) Executing Partner Type Ministry of Habitat, Urbanism, and Environment Government GEF Focal Area Climate Change Taxonomy Biodiversity, Biomes, Climate Change, Climate Change Adaptation, Focal Areas, Sustainable Land Management, Land Degradation, Land Degradation Neutrality, Private Sector, Type of Engagement, Civil Society, Stakeholders, Communications, Gender Mainstreaming, Gender Equality, Gender results areas, Food Security in Sub-Sahara Africa, Integrated Programs, Sustainable Cities, Capacity, Knowledge and Research, Knowledge Generation, Food Security, Land Productivity, Income Generating Activities, Community-Based Natural Resource Management, Sustainable Livelihoods, Sustainable Agriculture, Improved Soil and Water Management Techniques, Ecosystem Approach, Drought Mitigation, Wetlands, Least Developed Countries, Livelihoods, Mainstreaming adaptation, Climate resilience, Community-based adaptation, Ecosystem-based Adaptation, Beneficiaries, Participation, Information Dissemination, Consultation, Behavior change, Awareness Raising, Public Campaigns, SMEs, Community Based -
Horn of Africa Crisis Situation Report No
Horn of Africa Crisis Situation Report No. 28 23 December 2011 This report is produced by OCHA Eastern Africa in collaboration with humanitarian partners. It is issued by OCHA in New York. It covers the period from 16 to 23 December. The next report will be issued on 30 December. I. HIGHLIGHTS/KEY PRIORITIES • Tensions remain high in North Eastern Province of Kenya following a series of explosive attacks targeting military and police convoys in the area. • Aid workers have further reduced operations in the Dadaab refugee camps following heightened insecurity. • WHO has called on health partners to intensify cholera preventative activities in Mogadishu following an increase in cases. II. Situation Overview While drought conditions have eased in many locations due to the recent rains, drought conditions are expected to worsen in parts of the Horn of Africa in the coming months as the dry season sets in. A new food security analysis of the Integrated Food Security Phase Classification (IPC) system in Djibouti has indicated that the food security situation in Obock Region has deteriorated from ‘Stressed’ (IPC Phase 2) to ‘Crisis’ (IPC Phase 3).Deterioration in food security conditions is now likely in coastal and southeast areas as well. In Ethiopia, even as the seasonal deyr (October-December) rains continue in most lowland areas of southern and south-eastern Ethiopia, drought conditions are expected to worsen in the northernmost parts of the Afar Region and parts of northern Somali Region in the coming month. On the other hand, drought conditions in the northern, north-eastern and southern parts of Kenya have significantly eased following good rainfall received in the October-December short rains season.In Somalia, while the deyr rains have subsided in many parts of Lower and Middle Juba regions, flooding continues to affect many settlements in Middle Juba. -
Significant Cyber Incidents Since 2006 This List Is a Work in Progress That We Update As New Incidents Come to Light. If You H
Significant Cyber Incidents Since 2006 This list is a work in progress that we update as new incidents come to light. If you have suggestions for additions, send them to [email protected]. Significance is in the eye of the beholder, but we focus on successful attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars. 1. May 2006. The Department of State’s networks were hacked, and unknown foreign intruders downloaded terabytes of information. If Chinese or Russian spies backed a truck up to the State Department, smashed the glass doors, tied up the guards and spend the night carting off file cabinets it would be an act of war, but when it happens in cyberspace we barely notice. 2. August 2006. A senior Air Force Officer stated publicly that, “China has downloaded 10 to 20 terabytes of data from the NIPRNet (the unclassified military network).” 3. November 2006. Hackers attempted to penetrate U.S. military War College networks, resulting in a two week shutdown at one institution while infected machines are restored. 4. December 2006. NASA was forced to block emails with attachments before shuttle launches out of fear they would be hacked. Business Week reported that the plans for the latest U.S. space launch vehicles were obtained by unknown foreign intruders. 5. 2006. Chinese hackers were thought to be responsible for shutting down the House of Commons computer system. 6. April 2007. The Department of Commerce had to take the Bureau of Industrial Security’s networks offline for several months because its networks were hacked by unknown foreign intruders. -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide -
BACKGROUND BRIEF1 Brussels, 17 January 2019 FOREIGN AFFAIRS COUNCIL 21 January 2019
PRESS Council of the European Union EN BACKGROUND BRIEF1 Brussels, 17 January 2019 FOREIGN AFFAIRS COUNCIL 21 January 2019 The Foreign Affairs Council, chaired by the EU High Representative for Foreign Affairs and Security Policy, Federica Mogherini, will start at 9.00 with a discussion on current affairs allowing ministers to review pressing issues on the international agenda. Foreign ministers will discuss the action plan against disinformation presented by the European Commission on 5 December 2018. They will exchange views on the implementation of the action plan. Ministers are expected to focus on the external aspects of the challenges of disinformation. The Council will have a preparatory discussion for the EU-League of Arab States ministerial meeting to be held in Brussels on 4 February 2019, ahead of the summit foreseen on 24 and 25 February 2019 in Egypt. The Council will also discuss the 22nd EU-ASEAN ministerial meeting, that will take place on the same day in Brussels. The Council is expected to adopt conclusions on EU-ASEAN relations. The Council is expected to adopt a number of decisions and conclusions without debate, including conclusions on the situation in Nicaragua. Press opportunities: Monday 21 January +/- 08.45 Doorstep by High Representative Federica Mogherini +/- 12.45 Press conference following the Foreign Affairs Council +/- 18.15 Press conference following the EU-ASEAN ministerial meeting Tuesday 22 January +/- 13.00 Press conference following the EU-AU ministerial meeting Press conferences and public events via video streaming Video coverage in broadcast quality (MPEG4) and photo gallery 1 This note has been drawn up under the responsibility of the press office. -
E-Commerce Security and Fraud Issues and Protections 10
E-Commerce Security and Fraud Issues and Protections 10 C o n t e n t s Learning Objectives Opening Case: How State University of New York College at Old Westbury Upon completion of this chapter, you will be Controls Its Internet Use ...................................... 458 able to: 10.1 The Information Security Problem .......... 459 1. Understand the importance and scope of security of information systems for EC. 10.2 Basic E-Commerce Security Issues and Landscape ........................................... 465 2. Describe the major concepts and terminol- ogy of EC security. 10.3 Technical Malware Attack Methods: From Viruses to Denial of Service ............ 471 3. Understand about the major EC security threats, vulnerabilities, and technical attacks. 10.4 Nontechnical Methods: From Phishing to Spam and Fraud .................... 476 4. Understand Internet fraud, phishing, and spam. 10.5 The Information Assurance Model 5. Describe the information assurance security and Defense Strategy ................................. 484 principles. 10.6 The Defense I: Access Control, 6. Identify and assess major technologies Encryption, and PKI ................................. 488 and methods for securing EC access and 10.7 The Defense II: Securing communications. E-Commerce Networks ............................. 494 7. Describe the major technologies for protec- 10.8 The Defense III: General Controls, tion of EC networks. Spam, Pop Ups, Fraud, and Social 8. Describe various types of controls and special Engineering Controls................................. 497 defense mechanisms. 10.9 Implementing Enterprisewide 9. Describe consumer and seller protection from E-Commerce Security ............................... 500 fraud. Managerial Issues.................................................. 504 10. Discuss enterprisewide implementation issues Closing Case: How One Bank Stopped Scams, for EC security. Spams, and Cybercriminals ................................. 509 11. Understand why it is so diffi cult to stop computer crimes. -
Just Below the Surface: Israel, the Arab Gulf States and the Limits of Cooperation
Middle East Centre JUST BELOW THE SURFACE ISRAEL, THE ARAB GULF STATES AND THE LIMITS OF COOPERATION IAN BLACK LSE Middle East Centre Report | March 2019 About the Middle East Centre The Middle East Centre builds on LSE’s long engagement with the Middle East and provides a central hub for the wide range of research on the region carried out at LSE. The Middle East Centre aims to enhance understanding and develop rigorous research on the societies, economies, polities and international relations of the region. The Centre promotes both special- ised knowledge and public understanding of this crucial area, and has outstanding strengths in interdisciplinary research and in regional expertise. As one of the world’s leading social science institutions, LSE comprises departments covering all branches of the social sciences. The Middle East Centre harnesses this expertise to promote innova- tive research and training on the region. Middle East Centre Just Below the Surface: Israel, the Arab Gulf States and the Limits of Cooperation Ian Black LSE Middle East Centre Report March 2019 About the Author Ian Black is a former Middle East editor, diplomatic editor and European editor for the Guardian newspaper. He is currently Visiting Senior Fellow at the LSE Middle East Centre. His latest book is entitled Enemies and Neighbours: Arabs and Jews in Palestine and Israel, 1917–2017. Abstract For over a decade Israel has been strengthening links with Arab Gulf states with which it has no diplomatic relations. Evidence of a convergence of Israel’s stra- tegic views with those of Saudi Arabia, the United Arab Emirates (UAE) and Bahrain has accumulated as all displayed hostility to Iran’s regional ambitions and to United States President Barack Obama’s policies during the Arab Spring. -
China and Yemen's Forgotten
UNITED STATES INSTITUTE OF PEACE PEACEBRIEF241 United States Institute of Peace • www.usip.org • Tel. 202.457.1700 • @usip January 2018 I-WEI JENNIFER CHANG China and Yemen’s Forgotten War Email: [email protected] Summary • China’s position on the Yemen conflict is driven primarily by its interest in maintaining close strategic relations with Saudi Arabia. As a result, Beijing has acquiesced to the Saudi-led military campaign in Yemen. • Although not taking a prominent leadership role, China has supported regional and interna- tional initiatives to mitigate the conflict, including the Gulf Cooperation Council Initiative, the National Dialogue Conference, and UN-led peace talks. • As Yemen’s major trade partner, China has an outsized economic presence in the country and can play a significant economic role in Yemen’s postwar reconstruction through its Belt and Road Initiative. Introduction China is playing a supportive, though low-key, role in international efforts to propel Yemen’s peace process in response to one of the world’s greatest humanitarian crises. The Chinese government has China’s response to the backed the political transition process led by the Gulf Cooperation Council (GCC) as well as the peace “Saudi-led airstrikes, which talks brokered by the United Nations. Beijing, however, has been unwilling to challenge the Saudi-led were militarily supported by air campaign against opposition groups that has killed civilians in a spiraling conflict that has already taken over ten thousand lives—including, in December 2017, that of former president Ali Abdullah the United States and United Saleh by the Houthi rebels.1 Kingdom, was muted. -
CIS 381: Social & Ethical Issues of Computing
CIS 381: Social & Ethical Issues of Computing Security Dr. David Koop D. Koop, CIS 381, Spring 2019 Hackers, Past and Present • Original meaning of hacker: explorer, risk taker, system innovator (e.g. MIT’s Tech Model Railroad Club in 1950s) • Change in meaning from electronics to computers and networks • WarGames (1983): Hacking military supercomputer • Modern meaning of hacker: someone who gains unauthorized access to computers and computer networks [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !2 Password Advice • Do not use short passwords • Do not rely solely on words from the dictionary • Do not rely on substituting numbers for letters • Do not reuse passwords • Give ridiculous answers to security questions • Enable two-factor authentication if available • Have password recoveries sent to a secure email address [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !3 Case Study: Firesheep • October 2010: Eric Butler released Firesheep extension to Firefox browser • Firesheep made it possible for ordinary computer users to easily sidejack Web sessions • More than 500,000 downloads in first week • Attracted great deal of media attention • Early 2011: Facebook and Twitter announced options to use their sites securely • Evaluate: Was this a good action? [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !4 Viruses • Virus: Piece of self-replicating code embedded within another program (host) • Viruses associated with program files - Hard disks, floppy disks, CD- ROMS - Email attachments • How viruses spread - Diskettes or CDs - Email - Files downloaded from Internet [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !5 Worm • Worm: - Self-contained program 7.3 Malware 329 - Spreads via computer network - Exploits security holes W • Tappen's Internet Worm W W - Released worm onto Internet from W MIT computer - Spread to significant numbers of Unix computers W - Infected computers kept crashing or became unresponsive Figure 7.4 A worm spreads to other computers by exploiting security holes in computer networks. -
How to Improve Data Security and Reduce Potential Liability for Data Breaches
How to Improve Data Security and Reduce Potential Liability for Data Breaches Randy Gainer, Attorney, CISSP February 12, 2014 Topics . The risks of cyber attacks – Identifying threats – Conducting risk assessments . Choosing cost-effective security measures . Evaluating cyber insurance coverage 2 Identifying threats . If your business processes payment cards, card data thieves are targeting your customers’ card data: Trustwave 2013 Global Security Report, 8. 3 Identifying threats . Targeted malware – Deployed by phishing, poisoned websites, poisoned ads, watering hole attacks, and poorly protected third-party access tools. E.g., • Remote access accounts for service vendors that rely on weak passwords; and • Phished credentials for access to the cardholder data environment (“CDE”). 4 Identifying threats . Targeted malware – Programmed to find, copy, store, encrypt, and exfiltrate payment card data – Customized to avoid detection – Allows attacker to persistently communicate with, and exercise command and control of, the malware inside the target network – Permits an attacker to adapt to defenses (e.g., installs multiple backdoors to maintain attacker’s access). 5 Identifying threats . Targeted malware – Used to find assets on the network to steal: Insight Enterprise Intelligence tool. Used with permission. 6 Identifying threats 7 Identifying threats 8 Identifying threats 9 Identifying threats 10 Identifying threats 11 Identifying threats 12 Identifying threats . Issuers, merchants, and acquirers of credit, debit, and prepaid cards experienced gross fraud losses of $11.27 billion in 2012, up 14.6% over the prior year. Card issuers lost 63% and merchants and acquirers lost the other 37%. Business Wire, August 19, 2013, citing The Nilson Report. 13 Identifying threats . Global Payments, Inc.