1 / 35

Oman’s Child Online Protection (COP) Program

Oman’s Child Online Protection (COP) Program. Haitham Hilal AL Hajri. Digital Forensics Specialist. Information Security Training & Awareness. Oman National CERT. 24 th Jun 2012. Agenda. Oman Nation CERT The Need for COP Objectives Targeted Segment Framework

ojal
Télécharger la présentation

Oman’s Child Online Protection (COP) Program

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Oman’s Child Online Protection (COP) Program Haitham Hilal AL Hajri Digital Forensics Specialist Information Security Training & Awareness Oman National CERT 24th Jun 2012

  2. Agenda • Oman Nation CERT • The Need for COP • Objectives • Targeted Segment • Framework • COP Programs and Achievements • Launching the 2nd COP National Campaign

  3. Oman National Computer Emergency Readiness Team (OCERT) • It is one of the e-Oman national initiatives aiming at addressing cyber security risks, building local cyber security capabilities within the sultanate of Oman, building cyber security awareness amongst public and private sector organizations, critical national infrastructure and key industries as well as within the general public and ICT users. • OCERT Services: • Proactive Service • Reactive Service • Training & Awareness

  4. OCERT Services Reactive Services • Responding to reported security incidents • Sharing and disseminating security related information e.g. an intruder attack, security vulnerability, intrusion alert, computer virus,..etc. • Analyzing of reported security incidents and events Proactive Services • Announcement of intrusion alerts, vulnerability warnings, and security advisories of • Monitoring and observation new of technical developments, intruder activities and related trends to help identify future threats • providing constituents with a comprehensive and easy-to-find collection of useful information that aids in improving security • performing Risk assessment and penetration testing Training & Awareness • Increasing the general security awareness of the constituents • Building local capabilities in cyber security • Improving the security practices at public and private sector organizations • Building awareness of identifying ,dealing , reporting and responding to security incidents • Coordination of security training programs with local educational sectors and institutes • Promoting the research and development in information security

  5. The Need • 60% of children and young Adults Use Social Media Services . • 3 Out of 4 Children are willing to share personal information online. • 1 out of 5 Children could be targeted by a predator each year. Source: ITU COP Initiative

  6. COP Program’s Objectives • Educate children, Teens and Parents about Information Security Risks. • Provide them with the required knowledge and tools to be able to detect Security Risks. • Mitigate the occurrence of Information Security Incidents related to children. • Involve the whole family in the Awareness Process.

  7. The Objectives – Cont. • Promote knowledge sharing among children to build an efficient knowledge sharing culture. • Collect more accurate statistics about Information Security incidents among children. • Open a channel between OCERT and the website users to comment, suggest, contribute and report incidents.

  8. Targeted Segment

  9. Current Framework

  10. Illustration of Cyber-crime law Chapter one: Definitions & General Provisions • d- Electronic data & information: Whatsoever can be saved, processed, generated and communicated by means of information technology, whether it is in writing, photos, sounds, symbols or signals. • f- The Information Technology Device: Electronic device used to process the electronic data & information, save, transmit or receive it such as computers and communication equipment’s. • h- The electronic site: A site on the informational network where the electronic information is available through a specific address.

  11. Chapter Two Violation of safety, confidentiality of data & electronic information and the informational systems. Article (3) • Everyone who intentionally and illegally access an electronic site or informational system or information technology tools or part of it or exceeded his authorized access to it or continued his existence therein after being aware of his access, shall be punished with imprisonment for a period not less than one month and not exceeding six month and a fine not less than OMR one hundred and not more than OMR five hundred or by either penalty. • This law aid in prevention of access to illegal websites, that hosts kid’s pornography or materials that of harm to children within world wide web.

  12. Chapter Five Article (14) • The penalty with imprisonment for a period not less than one month and not exceeding one year and a fine not less than OMR one hundred and not exceeding OMR one thousand or by either penalty, shall be applied to any person who uses the informational network or the information technology facilities to produce or procure or distribute or make available or transmit or sale or purchase or import pornography materials, unless such actions were permitted for scientific or technical purposes. The punishment shall be for a period not less than one year and not exceeding three years and a fine not less than OMR one thousand and not exceeding OMR five thousands if the subject matter of the pornography program is a juvenile of less than eighteen years of age or he is meant by the criminal act and the same punishment shall be applied to any person who uses the informational network or the facilities of the information technology to possess juvenile pornography. • This law to aid limiting and prevention of pornography making transmission and distribution or trading .

  13. Article (15) The penalty with temporary imprisonment for a period not less than three years and not exceeding five years and a fine not less than OMR three thousands and not exceeding OMR five thousands, shall be applied to any person who uses the informational network or information technology facilities to incite or instigate a male or a female to commit a lechery or a prostitution crime or to help him to commit such a crime. The punishment of temporary imprisonment for a period not less than five years and not exceeding ten years and the fine of not less than OMR five thousands and not exceeding OMR ten thousands shall be applied if the victim is a juvenile not yet completed eighteen years of age • This law aids in prevention To incite or instigate a male or a female to commit a lechery or a prostitution and anyone who enforce or indorse it

  14. Article (16) • The penalty with imprisonment for a period not less than one year and not exceeding three years and a fine not less than OMR one thousand and not exceeding OMR five thousands or by either penalty, shall be applied to any person who uses the informational network or the information technology facilities such as mobiles incorporated with cameras in trespassing on of families and individuals by the private taking photographs or dissemination of their news or voice or video records even if it was true or aggressing the others with slander and defamation. This Law aid in to preventing misuse of devices that contain digital and electronic data such as photos and videos that may contain illegal materials, any misuse of these technological devices are punishable by law

  15. Article (18) The penalty with imprisonment for a period not less than one month and not exceeding three years and a fine not less than OMR one thousand and not exceeding OMR three thousands or by either penalty, shall be applied to any person who uses the informational network or the information technology facilities to threaten or extort a person to do or abstain from doing any act even if the doing or not doing of such an act is legal. The punishment shall be temporary imprisonment for a period not less than three years and not exceeding ten years and the fine of not less than OMR three thousands and not exceeding OMR ten thousands the threat is to commit an offence or by attributing indecent acts affecting honor and superiority. This law aids in to preventing bullying blackmailing or exhortations, that may result in indecency or effecting honor and superiority.

  16. Framework – Our Aim !

  17. COP Programs & Achievements Towards a Safe Cyber Environment Campaign: • Started in May 2009 • COP Activities: • School Visits • Train the Trainer • Awareness sessions for kids • Internet Café visits • COP Portal

  18. School visits - 2009

  19. Awareness Pamphlets & Posters - 2009

  20. School visits - 2009 • Painting Competition

  21. Internet café visits - 2009

  22. Lunching the first COP website - 2009

  23. National Event Participation: - 2009 • WTISD 2009 • Comex 2009 • Salalah Festival 2009 • Awareness Sessions for kids • Workshop for parents on “Protecting Kids in the Cyber Space”

  24. National Event Participation - 2010 • COMEX 2010 • Kids Corner • Salalah Festival 2010

  25. Kids Awareness Booklets - 2010

  26. Lunching the New COP Website - 2011

  27. National Event Participation - 2011 • Participation in Muscat Festival • Kids Corner (Awareness, Painting, Games, Drawing Competition)

  28. Achievements - 2011 • Hosted ITU Regional Workshop on Policy Advocacy & Capacity Building in Child Online Protection for ARB Region (30th & 31st October 2011)

  29. 2nd National COP Campaign

  30. School visits • For Students • Awareness Sessions for different grade level. - (do u know s ) in morning • announcement session - Quizzes • For the Parents: • Awareness sessions during school • parents meeting • practical session on how to set up • parental control tools

  31. Mall visits • Awareness • - Parental control demonstration • Kids attraction(face paint – Games • ..etc) • Threats movie presentation e.g. • social engineering – bad websites , • kidnapping – brain wash – cyber • stocking …etc

  32. Internet Café visits – COP site is the home page in all PC’s. – Printed materials for the customers. – COP desktop wallpaper + screen saver. –COP Gadget in all PC’s. – Awareness videos

  33. Gaming centers visits • awareness sessions • awareness materials distribution • incentives e.g. free coins to • play games when attending • the awareness session.

  34. Thanks Haitham Hilal AL Hajri Haitham.AL Hajri@ita.gov.om http://www.cert.gov.om

More Related