ICT Workshop - SECURITY
Download
Report
Transcript ICT Workshop - SECURITY
CARICOM
Seminar on the Implementation of the System of
National Accounts 2008 (SNA 2008)
14-16 June 2010,
Jolly Beach, Resort,
Antigua and Barbuda
CARICOM
CARICOM Workshop on the Development
of Caribbean Specific Information and
Communication Technologies (CSICT)
Statistics and Indicators
Theme: SECURITY
6 - 9 December 2011,
ANTIGUA AND BARBUDA
CARICOM
CONTENT OF PRESENTATION
Introduction
Definition of Key Terms
Sub-Themes/ Issues Identified
Indicators per sub-theme
Justification
CARICOM
INTRODUCTION
ICT can support enhanced security via
various types of systems with an ICT
platform such as Building Monitoring
Systems, Automatic Gates and other
software which can aid in financial
security, and data and network security.
CARICOM
DEFINITION OF KEY TERMS
• Security refers to the degree of protection
against danger, damage, loss and crime. Can
refer to physical, financial, computer, data,
application, information and network security.
DEFINITION OF KEY TERMS
• An electronic transaction is the sale or purchase
of goods or services, whether between
businesses, households, individuals,
governments, and other public or private
organisations, conducted over computermediated networks. (OECD)
DEFINITION OF KEY TERMS
• A database is an application that manages data
and allows fast storage and retrieval of that data.
• A Local Area Network (LAN) is a group of
computers and associated devices that share a
common communications lines or a wireless link.
• Identity Theft is a crime in which a person’s
confidential or personal information is stolen for
the purpose of criminal use.
DEFINITION OF KEY TERMS
• Intellectual property (IP) refers to creations of
the mind: inventions, literary and artistic works,
and symbols, names, images, and designs used in
commerce. (WIPO)
CARICOM
SUB-THEMES IDENTIFIED
The sub-themes/ Issues Identified are:
• Provisions for the security of electronic
transactions, databases, LANs and the
prevention of identity theft.
• Security and Protection of Intellectual
Property
CARICOM
SUB-THEMES IDENTIFIED
• Availability of Backup systems for easy
recovery in an instance of lost data, for
example after a disaster.
• ICT Tools generally used by law enforcement
agencies, both private and government, for
security of land space, protection of
territorial waters and so forth.
CARICOM
PROVISIONS FOR THE SECURITY OF ELECTRONIC
TRANSACTIONS, DATABASES, LANs AND THE
PREVENTION OF IDENTITY THEFT
Indicators:
• Proportion of total budget allocated to the security of
electronic transactions.
• Type of security mechanism most commonly employed in
securing databases in Government agencies.
• Type of security mechanism most commonly employed in
securing databases in private business.
Justification:
• Provides information on the importance placed on
security based on resources allocated, as well as,
differences in types of mechanisms employed in
Government vs. Private sector agencies.
CARICOM
PROVISIONS FOR THE SECURITY OF ELECTRONIC
TRANSACTIONS, DATABASES, LANs AND THE
PREVENTION OF IDENTITY THEFT
Indicators:
• Proportion of security budget allocated to staff
training.
• Proportion of this type of activity (securing electronic
transactions, databases and LANs) being outsourced.
Justification:
• Monies allocated to staff training can be an indication
of emphasis placed on ensuring systems are operating
efficiently.
• Outsourcing of this activity can be an indication of the
lack of local/in-house expertise or a lack of proper IT
infrastructure.
CARICOM
SECURITY AND PROTECTION OF INTELLECTUAL
PROPERTY
This theme looks at existence and
enforcement of laws dealing with
intellectual property rights.
CARICOM
SECURITY AND PROTECTION OF INTELLECTUAL
PROPERTY
Indicators:
• Existing laws for copyright protection.
• No of cases brought before the courts regarding
copyright infringement.
• Percentage of such cases resulting in fines or
convictions.
Justification:
• Can be an indication of the seriousness with which
perpetrators are placed before the courts and the
degree to which laws are enforced in this area.
CARICOM
AVAILABILITY OF BACKUP SYSTEMS, FOR EASY
RECOVERY IN AN INSTANCE OF LOST DATA
AFTER A DISASTER
If regular backup of data is critical to a
business or the operations of an agency,
then questions such as budget allocation,
type of equipment and media most
commonly used are pertinent.
CARICOM
AVAILABILITY OF BACKUP SYSTEMS, FOR EASY
RECOVERY IN AN INSTANCE OF LOST DATA
AFTER A DISASTER
Indicators:
• How often is data backup performed.
• Proportion of security budget allocated to the backup
of data and data recovery.
• Proportion of businesses that have the necessary
equipment for backup and recovery of data.
Justification:
• Can be indicative of the importance placed on the
backup of data and resources allocated to this area.
CARICOM
AVAILABILITY OF BACKUP SYSTEMS, FOR EASY
RECOVERY IN AN INSTANCE OF LOST DATA
AFTER A DISASTER
Indicators:
• Proportion of backup done offsite or outsourced.
• Type of equipment most commonly used to perform
this function.
• Type of medium most commonly used to store data.
Justification:
• Can be indicative of equipment cost, reliability and
durability of equipment aligned with specific needs of
a business.
CARICOM
ICT TOOLS USED FOR SECURITY OF LAND SPACE,
PROTECTION OF TERRITORIAL WATERS AND
GENERALLY USED BY LAW ENFORCEMENT AGENCIES,
BOTH PRIVATE AND STATE RUN
Indicators:
• Proportion of national security budget spent on ICT
equipment and capabilities.
• Proportion of security businesses utilizing ICTs by type of
system.
• Type of ICT security system(s) most commonly used.
Justification:
• Can be indicative of the priority of a government regarding cyber
security for the protection of its citizens.
• The type of system most commonly used can be useful in
determining the preferred equipment, which can be influenced
by cost, terrain or the specific needs of a country.
CARICOM
THANK YOU