350 likes | 518 Views
From e-government to cyber security: opportunities and challenges. Singapore Business Group Ho Chi Minh City, Vietnam March 14, 2014. Kim Andreasson Managing Director DAKA advisory AB. Presentation overview. An introduction to cyber security. Cyber dependency and cyber threats.
E N D
From e-government to cyber security: opportunities and challenges Singapore Business Group Ho Chi Minh City, Vietnam March 14, 2014 Kim Andreasson Managing Director DAKA advisory AB
Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion
Understanding cyber security A convergence of three trends: • Global benefits of ICTs • Supply-side, such as e-government • Demand-side, such as connectivity
1. Global benefits of ICTs • ICTs contribute strongly to economic growth and better social outcomes • Benchmarking the information society is important in order for policy-makers to understand the factors behind it and how to achieve improved outcomes
2. Supply-side, such as e-government • Information and service delivery • Transparency and accountability • Link to broader development objectives • Digital by default
3. Demand-side, such as connectivity Source: World Bank | World Development Indicators database
E-government usage • In 1990, the American tax authority, the IRS, received 4m online tax filings (the first year such service was available) • In 2000, the number rose to 35m • In 2010, online tax filings surpassed 100m • In 2013, there were 114m online tax returns
Measuring e-government • Benchmarking global e-government development since 2003 to “inform and improve the understanding of policy makers’ choices to shape their e-government programs” (UN 2004) • The survey measures “the willingness and capacity of countries to use online and mobile technology in the execution of government functions” (UN 2010)
Current UN methodology • The UN E-Government Development Index is composed of three indices: • Human capital index • Telecommunications infrastructure index • Online service index For more information: www.unpan.org/egovkb/
The online service index • Supply-side measurement approach, which means that websites are visited by researchers to evaluate what is available on them (i.e. the supply of information and services) • Every UN member state is assessed (now 193) • A defined set of websites are evaluated, primarily the national portal of each country or its equivalent • Almost all questions in the survey are binary, i.e. does the feature exist or not
Implementation • Every website assessed in its primary language • Researchers go through training sessions and are provided with specific instructions on how to score questions, as well as provided actual website examples • Researchers take a citizen approach, which means they try to find the information within a reasonable amount of time • Assessment takes place during a specific period of time (the “survey window”)
A quick case study on finding mobile services on www.gov.sg How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 1: Go to citizen & residents section
How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 2: Go to mobile services sub-section
How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 3: Confirm that Singapore offers it Answer: In 2010, 25 out of 192 countries
E-government progress http://www.archive.org
Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion
Understanding cyber threats • Politically motivated threats:cyber warfare, cyber terrorism, espionage and hacktivism • Non-politically motivated threats:typically financially motivated, such as cyber crime, intellectual property theft, and fraud, but also hacking for fun or retribution, for example, from a disgruntled employee
Singapore vs Anonymous Hacked version of a blog hosted by The Straits Times on October 31, 2013
South Korea vs ? • Attacks in 2009, 2011, and 2013 • On March 20, 2013, South Korean television stations and financial institutions suffered from frozen computer terminals • ATMs and mobile payments were also affected • More than 48,000 computers and servers in South Korea were shut down
Critical infrastructures • Financial services, telecommunications, energy, etc. • Politically-motivated attacks with offline consequences • The 2010 Stuxnet attack
Cyber dependency matrix Source: World Bank | World Development Indicators database
Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion
Mobility • An opportunity to improve efficiency – for criminals too • Number of mobile malware in 2013 more than doubled from 2012 Source: World Bank | World Development Indicators database
Vietnam • Vietnam is among the top five countries with the highest number of unique attacked mobile users • In addition, 78 out of 100 government websites with the domain “gov.vn” has “seriously” poor security systems • Attacks can compromise trust Viet Nam News, March 6, 2014
Are you at risk? • An increase in usage means an increase in dependency • Annual cost of cyber crime around the world has been estimated by Norton, a security company, to be about USD 110bn • About 75% of organizations suffer from a cyber attack every year • A simple solution to mitigate risk: • According to Verizon, 96% of cyber breaches are avoidable through simple controls • Awareness, awareness, awareness
Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion
International Multistakeholder Partnership Against Cyber Threats
ITU Global Cybersecurity Agenda (GCA) Business opportunities across five areas: 1. Legal measures 2. Technical and procedural measures 3. Organizational structures 4. Capacity building 5. International cooperation
Recent developments • Edward Snowden • New threats: from hackers to nation-states • New challenges: localization strategies and security as a competitive advantage • Lack of international collaboration means domestic opportunities • Governments cannot go it alone; a role for the private sector and NGOs
Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion
Solution to cyber security is not about technology but people • Compared with just a decade ago, governments have made significant progress in expanding ICT access and the demand from users has risen accordingly • But just as crime has always been part of history, cyber security is likely to continue well into the future, especially since the two are increasingly intertwined • Thereis a need for more information at all levels in order to better understand cyber security • Every case is different, yet fundamentally the same
Thank you www.DAKAADVISORY.com