Cybersecurity calendar 2014

Page 1

CALENDAR Cybersecurity: Guidelines For Diplomats

istitutodiplomatico.wordpress.com

www.diplomacy.edu/2014/cybersecurity/


Istituto Diplomatico is the structure of the Italian Ministry of Foreign Affairs (MFA) responsible for training. Its main task is to update and improve the professional quality of the MFA staff (both diplomats and non-diplomats) through courses and seminars. The Faculty consists mainly of internal staff and experts from the Ministry. The two main courses offered for diplomats are aimed at junior and middle-rank officers. The main activities for non-diplomat staff relate to pre-post courses and specialized professional training. The Institute is developing a series of self-paced online learning modules focused on the MFA’s activities and functions. Its most recent project is a blog (ISDI learning corner, available at http://istitutodiplomatico.wordpress.com/) for sharing useful information concerning diplomatic soft skills. DiploFoundation emerged from a project to introduce ICT tools to the practice of diplomacy, initiated in 1992 at the Mediterranean Academy of Diplomatic studies in Malta. In November 2001, Diplo was established as an independent non-profit foundation by the governments of Malta and Switzerland. Diplo has received wide recognition for its work, including consultative status with the United Nations. Today, Diplo works to increase the capacity of small and developing states to engage effectively in international policy, negotiations, and diplomacy. We do this by providing capacity development programmes in areas such as Internet governance and climate change diplomacy; using and developing tools for e-participation in global governance, including remote participation in international meetings and social media for global negotiations; and providing specialised and effective academic programmes – accredited with the University of Malta - for professional diplomats seeking cost-effective and high-quality training in both traditional and contemporary diplomacy topics.


Good practices for Cybersecurity The information technology revolution has gradually accelerated the development of powerful and affordable devices and tools that are now used by almost one-third of the world population. Throughout history, innovative technologies have been found to have multiple uses – as tools for the wise and productive, and as a means to commit attacks and crimes by those with malicious intent. This is made easier by the fact that legislation, developing at a much slower rate, cannot keep up with technical innovation. Diplomats use computers in their offices and at home, and smartphones and tablets that support voice and data, and can run hundreds of applications. Unless due care is taken to protect such devices, the owners are a target of attacks and crime. None of the suggestions in this calendar are obligatory – just proven good practice. There is no question that the sensitive data stored in these devices would embarrass the individual and their organisation if leaked or otherwise disclosed. Think about it… The pages in this calendar are based on the book ‘Good Digital Hygiene – staying secure in cyberspace’ written by Ed Gelbstein and published in November 2013 as a free .pdf download from http://bookboon.com/en/good-digital-hygiene-ebook. Stefano Baldi and Eduardo Gelbstein


eW i Fi

Offi ce sy ste m s

ail

E-m

Ho m

ce

Offi

op 1

h Online s

Online bank

er Twitt Pe rso et Intern

Sky p

e

na

lE -m

ail

Must be hard to guess. Change them regularly


JANUARY 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

6

7

1

2

3

4

5

8

9

10

11

12 istitutodiplomatico.wordpress.com

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

Cyberspace is inherently insecure

DECEMBER 2013

25 2 9 16 23 30

26 3 10 17 24 31

27 4 11 18 25 1

28 5 12 19 26 2

29 6 13 20 27 3

30 7 14 21 28 4

1 8 15 22 29 5

29 5 12 19 26 5

30 6 13 20 27 6

31 7 14 21 28 7

1 8 15 22 1 8

2 9 16 23 2 9

FEBRUARY

27 3 10 17 24 3

28 4 11 18 25 4


No matter how careful you are your fingerprints are all over Cyberspace


FEBRUARY 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

3

4

5

6

7

1

2

8

9 istitutodiplomatico.wordpress.com

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

Cyberspace is inherently insecure

JANUARY

30 6 13 20 27 3

31 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

5 12 19 26 2 9

25 4 11 18 25 1

26 5 12 19 26 2

27 6 13 20 27 3

28 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

MARCH

24 3 10 17 24 31


Avoid an infection or suffer its consequences


MARCH 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

3

4

5

6

7

1

2

8

9 istitutodiplomatico.wordpress.com

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

Cyberspace is inherently insecure

FEBRUARY

27 3 10 17 24 3

28 4 11 18 25 4

29 5 12 19 26 5

30 6 13 20 27 6

31 7 14 21 28 7

1 8 15 22 1 8

2 9 16 23 2 9

1 8 15 22 29 6

2 9 16 23 30 7

3 10 17 24 1 8

4 11 18 25 2 9

5 12 19 26 3 10

6 13 20 27 4 11

APRIL

31 7 14 21 28 5


“Please confirm your identity by following this link�


APRIL 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

7

1

2

3

4

5

6

8

9

10

11

12

13 istitutodiplomatico.wordpress.com

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

Cyberspace is inherently insecure

MARCH

24 3 10 17 24 31

25 4 11 18 25 1

26 5 12 19 26 2

27 6 13 20 27 3

28 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

29 6 13 20 27 3

30 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

MAY

28 5 12 19 26 2


The man who has one watch knows the time. The man who has two watches can never be sure


MAY 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

5

6

7

1

2

3

4

8

9

10

11 istitutodiplomatico.wordpress.com

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

Cyberspace is inherently insecure

APRIL

31 7 14 21 28 5

1 8 15 22 29 6

2 9 16 23 30 7

3 10 17 24 1 8

4 11 18 25 2 9

5 12 19 26 3 10

6 13 20 27 4 11

27 3 10 17 24 1

28 4 11 18 25 2

29 5 12 19 26 3

30 6 13 20 27 4

31 7 14 21 28 5

1 8 15 22 29 6

JUNE

26 2 9 16 23 30


What would happen if you lost all your data?


JUNE 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

1 2

3

4

5

6

7

8 istitutodiplomatico.wordpress.com

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

Cyberspace is inherently insecure

MAY

28 5 12 19 26 2

29 6 13 20 27 3

30 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

5 12 19 26 2 9

6 13 20 27 3 10

JULY

30 7 14 21 28 4


Be careful with what goes into your devices


JULY 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

7

1

2

3

4

5

6

8

9

10

11

12

13 istitutodiplomatico.wordpress.com

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

Cyberspace is inherently insecure

JUNE

26 2 9 16 23 30

27 3 10 17 24 1

28 4 11 18 25 2

29 5 12 19 26 3

30 6 13 20 27 4

31 7 14 21 28 5

1 8 15 22 29 6

29 5 12 19 26 2

30 6 13 20 27 3

31 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

AUGUST

28 4 11 18 25 1


Potential weapon of mass disruption


AUGUST 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

4

5

6

7

1

2

3

8

9

10 istitutodiplomatico.wordpress.com

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

Cyberspace is inherently insecure

JULY

30 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

5 12 19 26 2 9

6 13 20 27 3 10

3 10 17 24 1 8

4 11 18 25 2 9

5 12 19 26 3 10

6 13 20 27 4 11

7 14 21 28 5 12

SEPTEMBER

1 8 15 22 29 6

2 9 16 23 30 7


Some things are not shared including your devices and passwords


SEPTEMBER 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

1

2

3

4

5

6

7

8

9

10

11

12

13

14 istitutodiplomatico.wordpress.com

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

AUGUST

28 4 11 18 25 1

29 5 12 19 26 2

30 6 13 20 27 3

31 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

5 12 19 26 2 9

OCTOBER

29 6 13 20 27 3

Cyberspace is inherently insecure

30 7 14 21 28 4


When loss of confidentiality is not an option


OCTOBER 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

6

7

1

2

3

4

5

8

9

10

11

12 istitutodiplomatico.wordpress.com

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

Cyberspace is inherently insecure

SEPTEMBER

1 8 15 22 29 6

2 9 16 23 30 7

3 10 17 24 1 8

4 11 18 25 2 9

5 12 19 26 3 10

6 13 20 27 4 11

7 14 21 28 5 12

29 5 12 19 26 3

30 6 13 20 27 4

31 7 14 21 28 5

1 8 15 22 29 6

2 9 16 23 30 7

NOVEMBER

27 3 10 17 24 1

28 4 11 18 25 2


Your traces in cyberspace will remain for a long time


NOVEMBER 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

3

4

5

6

7

1

2

8

9 istitutodiplomatico.wordpress.com

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

Cyberspace is inherently insecure

OCTOBER

29 6 13 20 27 3

30 7 14 21 28 4

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

5 12 19 26 2 9

3 10 17 24 31 7

4 11 18 25 1 8

5 12 19 26 2 9

6 13 20 27 3 10

7 14 21 28 4 11

DECEMBER

1 8 15 22 29 5

2 9 16 23 30 6


Be careful who and what you allow inside


DECEMBER 2014 monday

tuesday

wednesday

thursday

friday

saturday

sunday www.diplomacy.edu

1

2

3

4

5

6

7

8

9

10

11

12

13

14 istitutodiplomatico.wordpress.com

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

Cyberspace is inherently insecure

NOVEMBER

27 3 10 17 24 1

28 4 11 18 25 2

29 5 12 19 26 3

30 6 13 20 27 4

31 7 14 21 28 5

1 8 15 22 29 6

2 9 16 23 30 7

1 8 15 22 29 5

2 9 16 23 30 6

3 10 17 24 31 7

4 11 18 25 1 8

JANUARY 2015

29 5 12 19 26 2

30 6 13 20 27 3

31 7 14 21 28 4


Photo credits: Passwords: Ed Gelbstein; Tracking: iStock photo; Antivirus: iStock photo; Phishing: Kleuske Flickr Creative Commons License; Synchronization: Ed Gelbstein; Backup: Miodrag Badnjar; Downloads: iStock photo; Flash Memory: Lâm HUA Flickr Creative Commons License; Sharing: Wagner Cesar Munhoz Flickr Creative Commons License; Encryption: Postcard template free download from ; http://www.designedlykristi.com/freebies/postcards1.html, text By Eduardo Gelbstein; Social Media: Wikimedia Commons Trust no one: iStock photo Concept:

Stefano Baldi, Ed Gelbstein

Graphic layout and typesetting: Rudolf Tušek DiploFoundation, 2013 (Creative Commons License) For more information about the calendar: www.diplomacy.edu/2014/cybersecurity


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.