Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presentation overview

Similar presentations


Presentation on theme: "Presentation overview"— Presentation transcript:

0 From e-government to cyber security: opportunities and challenges
Kim Andreasson Managing Director DAKA advisory AB Singapore Business Group Ho Chi Minh City, Vietnam March 14, 2014

1 Presentation overview
An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

2 Understanding cyber security
A convergence of three trends: Global benefits of ICTs Supply-side, such as e-government Demand-side, such as connectivity

3 1. Global benefits of ICTs
ICTs contribute strongly to economic growth and better social outcomes Benchmarking the information society is important in order for policy-makers to understand the factors behind it and how to achieve improved outcomes

4 2. Supply-side, such as e-government
Information and service delivery Transparency and accountability Link to broader development objectives Digital by default

5 3. Demand-side, such as connectivity
Source: World Bank | World Development Indicators database

6 E-government usage In 1990, the American tax authority, the IRS, received 4m online tax filings (the first year such service was available) In 2000, the number rose to 35m In 2010, online tax filings surpassed 100m In 2013, there were 114m online tax returns

7 Measuring e-government
Benchmarking global e-government development since 2003 to “inform and improve the understanding of policy makers’ choices to shape their e-government programs” (UN 2004) The survey measures “the willingness and capacity of countries to use online and mobile technology in the execution of government functions” (UN 2010)

8 Current UN methodology
The UN E-Government Development Index is composed of three indices: Human capital index Telecommunications infrastructure index Online service index For more information:

9 The online service index
Supply-side measurement approach, which means that websites are visited by researchers to evaluate what is available on them (i.e. the supply of information and services) Every UN member state is assessed (now 193) A defined set of websites are evaluated, primarily the national portal of each country or its equivalent Almost all questions in the survey are binary, i.e. does the feature exist or not

10 Implementation Every website assessed in its primary language
Researchers go through training sessions and are provided with specific instructions on how to score questions, as well as provided actual website examples Researchers take a citizen approach, which means they try to find the information within a reasonable amount of time Assessment takes place during a specific period of time (the “survey window”)

11 A quick case study on finding mobile services on www.gov.sg
How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 1: Go to citizen & residents section

12 How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 2: Go to mobile services sub-section

13 How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 3: Confirm that Singapore offers it Answer: In 2010, 25 out of 192 countries

14 E-government progress

15 Presentation overview
An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

16 Enter cyber security

17 Understanding cyber threats
Politically motivated threats: cyber warfare, cyber terrorism, espionage and hacktivism Non-politically motivated threats: typically financially motivated, such as cyber crime, intellectual property theft, and fraud, but also hacking for fun or retribution, for example, from a disgruntled employee

18 Singapore vs Anonymous
Hacked version of a blog hosted by The Straits Times on October 31, 2013

19 South Korea vs ? Attacks in 2009, 2011, and 2013
On March 20, 2013, South Korean television stations and financial institutions suffered from frozen computer terminals ATMs and mobile payments were also affected More than 48,000 computers and servers in South Korea were shut down

20 Critical infrastructures
Financial services, telecommunications, energy, etc. Politically-motivated attacks with offline consequences The 2010 Stuxnet attack

21 Cyber dependency matrix
Source: World Bank | World Development Indicators database

22 Presentation overview
An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

23 Mobility An opportunity to improve efficiency – for criminals too
Number of mobile malware in 2013 more than doubled from 2012 Source: World Bank | World Development Indicators database

24 Vietnam Vietnam is among the top five countries with the highest number of unique attacked mobile users In addition, 78 out of 100 government websites with the domain “gov.vn” has “seriously” poor security systems Attacks can compromise trust Viet Nam News, March 6, 2014

25 Are you at risk? An increase in usage means an increase in dependency
Annual cost of cyber crime around the world has been estimated by Norton, a security company, to be about USD 110bn About 75% of organizations suffer from a cyber attack every year A simple solution to mitigate risk: According to Verizon, 96% of cyber breaches are avoidable through simple controls Awareness, awareness, awareness

26 Presentation overview
An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

27 ITU Global Cybersecurity Index

28 International Multistakeholder Partnership Against Cyber Threats

29 ITU Global Cybersecurity Agenda (GCA)
Business opportunities across five areas: 1. Legal measures 2. Technical and procedural measures 3. Organizational structures 4. Capacity building 5. International cooperation

30 Recent developments Edward Snowden
New threats: from hackers to nation-states New challenges: localization strategies and security as a competitive advantage Lack of international collaboration means domestic opportunities Governments cannot go it alone; a role for the private sector and NGOs

31 Presentation overview
An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

32 Solution to cyber security is not about technology but people
Compared with just a decade ago, governments have made significant progress in expanding ICT access and the demand from users has risen accordingly But just as crime has always been part of history, cyber security is likely to continue well into the future, especially since the two are increasingly intertwined There is a need for more information at all levels in order to better understand cyber security Every case is different, yet fundamentally the same

33 Thank you


Download ppt "Presentation overview"

Similar presentations


Ads by Google