Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.

Slides:



Advertisements
Similar presentations
Existing tools for cooperation – WG 2 1 Regional Policy Dialogue Capacity building seminars WORKING GROUP MEETINGS HIGH LEVEL SEMINAR SERIES 4 working.
Advertisements

Philippine Cybercrime Efforts
Creating the Map To Set the Direction. Educational Positioning System (EPS – a play on GPS)
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Near East Plant Protection Network for Regional Cooperation & Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview on.
The Role of Environmental Monitoring in the Green Economy Strategy K Nathan Hill March 2010.
Course: e-Governance Project Lifecycle Day 1
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
National Infrastructure Protection Plan
TAMING THE WILD FRONTIER: IMPROVING SYSTEMS AND PROCESSESS IN CREATING DIGITAL RECORDS IN GOVERNMENT BY AZIMAH MOHD ALI THE NATIONAL ARCHIVES OF MALAYSIA.
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
(Geneva, Switzerland, September 2014)
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Session 121 National Incident Management Systems Session 12 Slide Deck.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Scottish Information Landscape An overview from SLIC Elaine Fulton Director Scottish Library and Information Council
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
How To Apply Quality Management
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 3 Internal Controls.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
L Integrating Web applications l Moving legacy transactions to a Web environment l Setting goals and targets to measure progress l Focus on content and.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Click to edit Master subtitle style Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development 11 BROADBAND POLICY. NOVEMBER.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
© Malaysian Communications and Multimedia Commission 1 Malaysia’s Approach to Network Security Bistamam Siru Abdul Rahman, General Manager,
Social and Professional Issues in IT Roshan Chitrakar.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
1. Public confidence is key to success of E- Government implementation o Information and individual privacy o National security o Global competitiveness.
Session 81 National Incident Management Systems Session 8 Slide Deck.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Framework for the Creation of Digital Knowledge Resources to meet the Challenges for Digital Future: A Librarian’s Perspective Dr. Harish Chandra Librarian.
E-Government In Malaysia
THE ROLE OF THE ACADEMY OF SCIENCES MALAYSIA IN THE PROMOTION OF SCIENCE & TECHNOLGY Omar Abdul Rahman Senior Fellow, Founding & Immediate Past President,
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
Beverly Harris Collaboration in Statistics: The Case of St. Kitts and Nevis NSDS Workshop Anguilla November 9 th
1 Policy Frameworks for the Knowledge-based Economy ICTs, Innovation and Human Resources Brasilia September 2002 Session 2.2. ICTs and e-business.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Global Geospatial Information Management (GGIM) A UN-DESA Initiative in collaboration with Cartographic Section, DFS Stefan Schweinfest UNSD.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
ICT POLICIES INITIATIVES AND STRATEGIES
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Digital Innovations Glasgow University Archives and Records Management 17 December 2013.
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Presenter: Mohammed Jalaluddin
ISO Smart and Sustainable Cities developments
8 Building Blocks of National Cyber Strategies
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
ISO Smart and Sustainable Cities developments
Presentation transcript:

Week 3 E-GOVERNMENT

Security PRIVACY

Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution of security and privacy to inviduals

Definition Assure their citizens that the information are secured and protected from unauthorized use Increase the level of personal information available online

Conceptual Security Model

Integrate the various aspects of security services, mechanisms, objects and management functions Components Security management Security services Security mechanism Security object

Security Component Security management Security services Security mechanism Security object

Government initiatives High spending in security products and services Well understood of ICT security technology High skilled and experience security expects Develop supporting infrastructure A set of human element development Support mechanism to personnel

ICT Security Division Establish within MAMPU in Jan 2000 Keeper for public sector ICT security Plans, coordinates, streamlines and consolidates A referral point for ICT security-related matters with government organization Responsible for ICT security training and acculturation programmed

ICT Security Division Categories(framework): Proactive measures providing ICT security documents

Malaysian Communications and Multimedia Commission(MCMC) Oversees the new regulatory framework  Development and enforcement of access codes and standards. Ensures information security and the integrity and reliability of the network

Malaysian Communications and Multimedia Commission(MCMC) The MCMC has enforcement powers for offence relating to network security in the CMA.  IMPACT (an International Multilateral Partnership Against Cyber-Terrorism, set up by the Malaysian government)

Police Cyber Crime Unit The Royal Malaysia Police has established.

ICT Security Division Categories (framework): Recovery measures Continuous measures

Police Cyber Crime Unit

Ministry of Science, Technology and Innovation (MOSTI) Formulation and implementation of : national policy on ICT national information security policy Encouraging research, development and commercialization Development and promotion of ICT industries. CyberSecurity Malaysia (formerly is NISER)

Malaysian Computer Emergency Response Team(MyCERT) Provide an expert point of reference on network and security matters Reporting security incidents and facilitating communication Disseminating security information Acting as a repository of security-related information, acquiring patches, tools and techniques Educating the public with regard to computer security in Malaysia

NETWORK SECURITY EG*Net is the government’s dedicated network Provide gateway to external network Security technologies

Control access to application and data Authentication of individual E-Government IT Policy and Standards

Control access to application and data Digital Identities and Signatures CA Future plans Combine smart card technology

Discussion questions 1. What are the essentials components of a security model? 2. Justify the role of each ICT security departments. 3. Why security is necessary for e-government? 4. Explain about the e-government information technology policy and standards. 5. How to control the access to application and data? 6. Justify the important key technologies of network security. 7. What is the government upcoming plan for security?