210 likes | 608 Views
Census and Statistics Department (C&SD). Collecting data on IT security in the business sector: The experience of Hong Kong, China 2004 Asia Pacific Technical Meeting on Information and Communication Technology (ICT) Statistics 30 November – 2 December 2004 Wellington, New Zealand. Background.
E N D
Census and Statistics Department (C&SD) Collecting data on IT security in the business sector:The experience of Hong Kong, China2004 Asia Pacific Technical Meeting onInformation and Communication Technology (ICT) Statistics30 November – 2 December 2004Wellington, New Zealand
Background • Hong Kong’s Performance in ICT • Ranked first in the ITU Mobile/Internet Index 2002 • Ranked seventh (second in Asia Pacific) in the ITU Digital Access Index 2003 • Ranked first in Asia in 2003 in terms of e-readiness by the Economic Intelligence Unit
Background • The Digital 21 IT Strategy • First promulgated in 1998 • Updated regularly • Enabling environment for e-business to prosper • Sustainable programme of measures to realize the full potential of IT to accelerate Hong Kong’s transition to a knowledge-based economy
IT Security Infrastructure • IT security awareness programme • Seminars, forum and exhibitions • Hong Kong Computer Emergency Response Team Coordination Centre • INFOSEC (www.infosec.gov.hk) • Smart cards with digital certificate • Questions on IT security in the Annual Survey on IT Usage and Penetration in the Business Sector since 2002
Questions on IT Security • Prevalence and extent of computer attacks • Nature of computer attacks • Actions taken after computer attacks • Security technology adopted • Obstacles in addressing security problems • Security measures in external and internal communications via electronic means
Questions on IT Security to be continued …
Survey Findings on IT Security Percentage of establishments having suffered from computer attacksin the 12 months before the survey, 2003
Survey Findings on IT Security Distribution of types of computer attacks, 2003
Survey Findings on IT Security Distribution of actions taken upon computer attacks, 2003
Survey Findings on IT Security Distribution of major types of security technology adopted, 2003
Survey Findings on IT Security Distribution of major methods of authenticationand/or secure access for the clients, 2003
Survey Findings on IT Security Distribution of major methods of authenticationfor employees, 2003
Issues and Challenges • Prevalence of computer attacks vs. serious and damages of such attacks (opinion questions?) • Counting rules on number of attacks • Emerging new IT security technologies • Respondents’ limited information on IT security
Census and Statistics Department (C&SD) Thank You Q&A