Aller au contenu

Cyber security in different geopolitical contexts#

bg left:20%


Geopolitical and regional context of cyber threats#

bg left:20%

  • Political and economic tensions exacerbate the risk of cyberattacks
  • Nation states may be involved in cyber attacks
  • Cybercriminal groups located in certain regions
  • Non-state actors and terrorist groups exploiting cyberspace

Threats specific to regions where humanitarian organizations operate#

bg left:20%

Sub-Saharan Africa#

  • Cyber attacks targeting critical infrastructure
    • ex: medical facilities, water and electricity distribution networks
  • Ransomware attacks targeting humanitarian organizations

Threats specific to regions where humanitarian organizations operate#

bg left:20%

Middle East and North Africa#

  • Cyber espionage related to regional conflicts
    • ex: monitoring of communications of humanitarian organizations
  • Targeted attacks on human rights defenders and civil society organizations
  • Use of malware to disrupt humanitarian operations

Threats specific to regions where humanitarian organizations operate#

bg left:20%

Asia-Pacific#

  • Cyberattacks to compromise humanitarian organizations' information systems
  • Online extortion and blackmail attempts against aid workers

Threats specific to regions where humanitarian organizations operate#

bg left:20%

Latin America and the Caribbean#

  • Organized cybercrime targeting financial and personal data of humanitarian organizations
  • Attacks on organizations fighting corruption and organized crime
  • Cybersecurity threats related to political violence and social tensions

Threats specific to regions where humanitarian organizations operate#

bg left:20%

Europe and North America#

  • Phishing and social engineering attacks targeting employees and volunteers of humanitarian organizations
  • Cyberattacks targeting supply chains and local partners of humanitarian organizations
  • Attempts to infiltrate and compromise the IT systems of humanitarian organizations

Adapting strategies accordingly#

bg left:20%

  • Analysis of the risks linked to the geopolitical and regional context
  • Implementation of defense mechanisms adapted to specific threats
  • Cooperation with local authorities and regional partners (if possible)