The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
UN Comprehensive Study on Cybercrime
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Protection of Classified Information & Cyber Security
Lecture 1: Overview modified from slides of Lawrie Brown.
INFORMATION SOCIETY DEVELOPMENT IN THE REPUBLIC OF BULGARIA “Information Society perspectives in South-Eastern Europe” Thessaloniki, 29 & 30 June 2001.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Securing Information Systems
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Ng Regenie Fräser Secretary General October 29, 2008 Connecting the Caribbean & Caribbean Internet Forum.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Cybersecurity Governance in Ethiopia
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
A National approach to Cyber security/CIIP: Raising awareness.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
Toward a Culture of Cybersecurity Research Aaron Burstein TRUST & ACCURATE Research Fellow Samuelson Clinic & BCLT, Boalt Hall UC Berkeley.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Note1 (Admi1) Overview of administering security.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
MIS323 – Business Telecommunications Chapter 10 Security.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Issues for Computer Users, Electronic Devices, Computer and Safety.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.
Consumer rights when subscribing to an internet service.
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
Cyber Security and Georgia. New Challenges
WTSA-12 Resolutions addressing security
Cybersecurity in the ECOWAS region
Support for Harmonization of the ICT Policies in Sub-Sahara Africa,
WTSA-12 Resolutions addressing security
DIGITAL CZECH REPUBLIC Impact of Digital Revolution
Cybersecurity in Belarus a general overview of support areas
SAM GDPR Assessment <Insert partner logo here>
Cybercrime in the election process:
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
Economic and social cohesion in the Western Balkans - cybersecurity
Cyber Security Ecosystem of Georgia. Experience and Challenges
Deborah Housen-Couriel, ADV.
REGIONAL CONFERENCE ON MIGRATION (RCM) Liaison Officer Network to Combat Migrant Smuggling and Trafficking SEMINAR ON CHALLENGES RELATING TO MIGRATION:
Presentation transcript:

The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications CYBERSECURITY OVERVIEW REPUBLIC OF BOTSWANA

BACKGROUND  Cyber Security – is a global challenge, policy makers worldwide are working hard to address security challenges of cyberspace. Cyberspace poses unique security challenges; global reach of ubiquitous networks, speed, jurisdictions & enforcement etc.  Cybercrime and cybersecurity are two issues that can hardly be separated. A multi-stakeholder approach is required to address the issues of cybersecurity and cybercrime. 2

BACKGROUND (Cont..) ITU defines Cybersecurity as a the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. [ITU-T Rec. X.1205] 3

TYPICAL CYBER ATTACKS – Passive and Active Attacks 4

TYPICAL CYBER ATTACKS  Denial-of-service (DoS) attack - carried out by overloading system capacity, and preventing legitimate users.  Defacement attack is carried out by replacing the victim’s web page with a wrong material e.g. pornographic, political  Malware attacks - is any program that can deliberately and unexpectedly interfere with the normal computer operation  Spam - bulk sending of unsolicited  Phishing - refers to an attack using mail programs to trick or coax web users into revealing sensitive information. 5

MULTI-STAKEHOLDER APPROACH 6 Source: ITU

CYBERSECURITY PILLARS  ITU identified five pillars required to address cybersecurity: 7

LEGAL AND POLICY FRAMEWORK  Cybersecurity issues are not restricted by geography or national boundaries. A criminal located in one country can commit a cybercrime that produces its effects in a different country  It is very important cybersecurity legislations and policies are international and regionally harmonised  SADC have developed model laws for Cybercrime and Cybersecurity legislations  Various International Institutions are working Cybercrime and Cybersecurity such as ITU, UN, CTO, Budapest Cybercrime Convention, IMPACT etc. 8

LAW ENFORCEMENT ISSUES 9

SUMMARY  There is a need to develop Comprehensive National Cybersecurity Strategy.  Create cybersecurity awareness and educate consumers.  Build capacity on cybersecurity and cybercrime issues.  Develop and review cybercrime legislation in order to ensure consumer protection. 10

11 THANK YOU PULA