CALENDAR Cybersecurity: Guidelines For Diplomats
istitutodiplomatico.wordpress.com
www.diplomacy.edu/2014/cybersecurity/
Istituto Diplomatico is the structure of the Italian Ministry of Foreign Affairs (MFA) responsible for training. Its main task is to update and improve the professional quality of the MFA staff (both diplomats and non-diplomats) through courses and seminars. The Faculty consists mainly of internal staff and experts from the Ministry. The two main courses offered for diplomats are aimed at junior and middle-rank officers. The main activities for non-diplomat staff relate to pre-post courses and specialized professional training. The Institute is developing a series of self-paced online learning modules focused on the MFA’s activities and functions. Its most recent project is a blog (ISDI learning corner, available at http://istitutodiplomatico.wordpress.com/) for sharing useful information concerning diplomatic soft skills. DiploFoundation emerged from a project to introduce ICT tools to the practice of diplomacy, initiated in 1992 at the Mediterranean Academy of Diplomatic studies in Malta. In November 2001, Diplo was established as an independent non-profit foundation by the governments of Malta and Switzerland. Diplo has received wide recognition for its work, including consultative status with the United Nations. Today, Diplo works to increase the capacity of small and developing states to engage effectively in international policy, negotiations, and diplomacy. We do this by providing capacity development programmes in areas such as Internet governance and climate change diplomacy; using and developing tools for e-participation in global governance, including remote participation in international meetings and social media for global negotiations; and providing specialised and effective academic programmes – accredited with the University of Malta - for professional diplomats seeking cost-effective and high-quality training in both traditional and contemporary diplomacy topics.
Good practices for Cybersecurity The information technology revolution has gradually accelerated the development of powerful and affordable devices and tools that are now used by almost one-third of the world population. Throughout history, innovative technologies have been found to have multiple uses – as tools for the wise and productive, and as a means to commit attacks and crimes by those with malicious intent. This is made easier by the fact that legislation, developing at a much slower rate, cannot keep up with technical innovation. Diplomats use computers in their offices and at home, and smartphones and tablets that support voice and data, and can run hundreds of applications. Unless due care is taken to protect such devices, the owners are a target of attacks and crime. None of the suggestions in this calendar are obligatory – just proven good practice. There is no question that the sensitive data stored in these devices would embarrass the individual and their organisation if leaked or otherwise disclosed. Think about it… The pages in this calendar are based on the book ‘Good Digital Hygiene – staying secure in cyberspace’ written by Ed Gelbstein and published in November 2013 as a free .pdf download from http://bookboon.com/en/good-digital-hygiene-ebook. Stefano Baldi and Eduardo Gelbstein
eW i Fi
Offi ce sy ste m s
ail
E-m
Ho m
ce
Offi
op 1
h Online s
Online bank
er Twitt Pe rso et Intern
Sky p
e
na
lE -m
ail
Must be hard to guess. Change them regularly
JANUARY 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
6
7
1
2
3
4
5
8
9
10
11
12 istitutodiplomatico.wordpress.com
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Cyberspace is inherently insecure
DECEMBER 2013
25 2 9 16 23 30
26 3 10 17 24 31
27 4 11 18 25 1
28 5 12 19 26 2
29 6 13 20 27 3
30 7 14 21 28 4
1 8 15 22 29 5
29 5 12 19 26 5
30 6 13 20 27 6
31 7 14 21 28 7
1 8 15 22 1 8
2 9 16 23 2 9
FEBRUARY
27 3 10 17 24 3
28 4 11 18 25 4
No matter how careful you are your fingerprints are all over Cyberspace
FEBRUARY 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
3
4
5
6
7
1
2
8
9 istitutodiplomatico.wordpress.com
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Cyberspace is inherently insecure
JANUARY
30 6 13 20 27 3
31 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
5 12 19 26 2 9
25 4 11 18 25 1
26 5 12 19 26 2
27 6 13 20 27 3
28 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
MARCH
24 3 10 17 24 31
Avoid an infection or suffer its consequences
MARCH 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
3
4
5
6
7
1
2
8
9 istitutodiplomatico.wordpress.com
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Cyberspace is inherently insecure
FEBRUARY
27 3 10 17 24 3
28 4 11 18 25 4
29 5 12 19 26 5
30 6 13 20 27 6
31 7 14 21 28 7
1 8 15 22 1 8
2 9 16 23 2 9
1 8 15 22 29 6
2 9 16 23 30 7
3 10 17 24 1 8
4 11 18 25 2 9
5 12 19 26 3 10
6 13 20 27 4 11
APRIL
31 7 14 21 28 5
“Please confirm your identity by following this link�
APRIL 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
7
1
2
3
4
5
6
8
9
10
11
12
13 istitutodiplomatico.wordpress.com
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Cyberspace is inherently insecure
MARCH
24 3 10 17 24 31
25 4 11 18 25 1
26 5 12 19 26 2
27 6 13 20 27 3
28 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
29 6 13 20 27 3
30 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
MAY
28 5 12 19 26 2
The man who has one watch knows the time. The man who has two watches can never be sure
MAY 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
5
6
7
1
2
3
4
8
9
10
11 istitutodiplomatico.wordpress.com
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Cyberspace is inherently insecure
APRIL
31 7 14 21 28 5
1 8 15 22 29 6
2 9 16 23 30 7
3 10 17 24 1 8
4 11 18 25 2 9
5 12 19 26 3 10
6 13 20 27 4 11
27 3 10 17 24 1
28 4 11 18 25 2
29 5 12 19 26 3
30 6 13 20 27 4
31 7 14 21 28 5
1 8 15 22 29 6
JUNE
26 2 9 16 23 30
What would happen if you lost all your data?
JUNE 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
1 2
3
4
5
6
7
8 istitutodiplomatico.wordpress.com
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Cyberspace is inherently insecure
MAY
28 5 12 19 26 2
29 6 13 20 27 3
30 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
5 12 19 26 2 9
6 13 20 27 3 10
JULY
30 7 14 21 28 4
Be careful with what goes into your devices
JULY 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
7
1
2
3
4
5
6
8
9
10
11
12
13 istitutodiplomatico.wordpress.com
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Cyberspace is inherently insecure
JUNE
26 2 9 16 23 30
27 3 10 17 24 1
28 4 11 18 25 2
29 5 12 19 26 3
30 6 13 20 27 4
31 7 14 21 28 5
1 8 15 22 29 6
29 5 12 19 26 2
30 6 13 20 27 3
31 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
AUGUST
28 4 11 18 25 1
Potential weapon of mass disruption
AUGUST 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
4
5
6
7
1
2
3
8
9
10 istitutodiplomatico.wordpress.com
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Cyberspace is inherently insecure
JULY
30 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
5 12 19 26 2 9
6 13 20 27 3 10
3 10 17 24 1 8
4 11 18 25 2 9
5 12 19 26 3 10
6 13 20 27 4 11
7 14 21 28 5 12
SEPTEMBER
1 8 15 22 29 6
2 9 16 23 30 7
Some things are not shared including your devices and passwords
SEPTEMBER 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
1
2
3
4
5
6
7
8
9
10
11
12
13
14 istitutodiplomatico.wordpress.com
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
AUGUST
28 4 11 18 25 1
29 5 12 19 26 2
30 6 13 20 27 3
31 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
5 12 19 26 2 9
OCTOBER
29 6 13 20 27 3
Cyberspace is inherently insecure
30 7 14 21 28 4
When loss of confidentiality is not an option
OCTOBER 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
6
7
1
2
3
4
5
8
9
10
11
12 istitutodiplomatico.wordpress.com
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Cyberspace is inherently insecure
SEPTEMBER
1 8 15 22 29 6
2 9 16 23 30 7
3 10 17 24 1 8
4 11 18 25 2 9
5 12 19 26 3 10
6 13 20 27 4 11
7 14 21 28 5 12
29 5 12 19 26 3
30 6 13 20 27 4
31 7 14 21 28 5
1 8 15 22 29 6
2 9 16 23 30 7
NOVEMBER
27 3 10 17 24 1
28 4 11 18 25 2
Your traces in cyberspace will remain for a long time
NOVEMBER 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
3
4
5
6
7
1
2
8
9 istitutodiplomatico.wordpress.com
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Cyberspace is inherently insecure
OCTOBER
29 6 13 20 27 3
30 7 14 21 28 4
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
5 12 19 26 2 9
3 10 17 24 31 7
4 11 18 25 1 8
5 12 19 26 2 9
6 13 20 27 3 10
7 14 21 28 4 11
DECEMBER
1 8 15 22 29 5
2 9 16 23 30 6
Be careful who and what you allow inside
DECEMBER 2014 monday
tuesday
wednesday
thursday
friday
saturday
sunday www.diplomacy.edu
1
2
3
4
5
6
7
8
9
10
11
12
13
14 istitutodiplomatico.wordpress.com
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Cyberspace is inherently insecure
NOVEMBER
27 3 10 17 24 1
28 4 11 18 25 2
29 5 12 19 26 3
30 6 13 20 27 4
31 7 14 21 28 5
1 8 15 22 29 6
2 9 16 23 30 7
1 8 15 22 29 5
2 9 16 23 30 6
3 10 17 24 31 7
4 11 18 25 1 8
JANUARY 2015
29 5 12 19 26 2
30 6 13 20 27 3
31 7 14 21 28 4
Photo credits: Passwords: Ed Gelbstein; Tracking: iStock photo; Antivirus: iStock photo; Phishing: Kleuske Flickr Creative Commons License; Synchronization: Ed Gelbstein; Backup: Miodrag Badnjar; Downloads: iStock photo; Flash Memory: Lâm HUA Flickr Creative Commons License; Sharing: Wagner Cesar Munhoz Flickr Creative Commons License; Encryption: Postcard template free download from ; http://www.designedlykristi.com/freebies/postcards1.html, text By Eduardo Gelbstein; Social Media: Wikimedia Commons Trust no one: iStock photo Concept:
Stefano Baldi, Ed Gelbstein
Graphic layout and typesetting: Rudolf Tušek DiploFoundation, 2013 (Creative Commons License) For more information about the calendar: www.diplomacy.edu/2014/cybersecurity