10.07.2015 Views

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10Wassenaar Agreement “will not impedebona fide civil transactions”. In fact, thisclause, when combined with the impact thatcryptographic export controls are having onthe civil market, might allow such controls tobe legally challenged where the WassenaarArrangement is being used to justify them.Restriction on ImportsImport of cryptography can be defined as goodor services of cryptography brought into onecountry from another country. Cryptographyis subject to import restrictions. Severalgovernments place import restrictions onencryption technology. The availability ofthese encryption technologies depends onthe actual strength of the encryption thatyou are allowed to use for security. Thisvaries according to import restrictionsfor a specific geographical area. Not allcountries apply the restrictions on importingcryptography tools. It reflects on what is theoutcome that a particular government mayface if they simply allow import activities ofcryptography tools.Table 1 shows countries with restrictions onimporting cryptography tools (refer tablebelow), the colour green represents somecountries with no import restrictions at all.The ones in yellow shows that for countriesto import cryptography tools, a license isrequired to import them. Countries that aretotally banned from importing cryptographyare in red. The “Unknown” column statesthat these countries are encouraged toseek further advice from their governmentsbefore importing any cryptography tools.Meanwhile, those with mixed colours,represent mixed restrictive policies.Rationale to Import ControlThere are reasons why certain governmentsare really concerned about importingcryptography tools from foreign countries.They are afraid that the public might misusecryptography for negative purposes, forexample, planning a rebellion against thegovernment and the government will nothave a chance to monitor the communicationsas it is encrypted. Governments preferBahrainChinaEgyptIranIsraelKazakhstanLatviaLithuaniaArmenia Malta BelarusCzech Republic Moldova IraqHong Kong Morocco MongoliaGhana Hungary Pakistan Myanmar NepalSaudi Arabia India South Korea Russia Nicaragua<strong>Malaysia</strong> Poland Ukraine Brunei Turkmenistan RwandaSingapore South Africa Vietnam Tunisia Uzbekistan North Korea TatarstanGREEN GREEN YELLOW YELLOW YELLOW RED RED RED Unknown UnknownTable 1: Import Restriction Table(Source: Restriction on Cryptography Imports)e-Security | Cyber Security <strong>Malaysia</strong> | Vol: 28-(Q3/<strong>2011</strong>)© CyberSecurity <strong>Malaysia</strong> <strong>2011</strong> - All Rights Reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!