1 / 34

Navigating Cybersecurity Challenges and Opportunities in the Digital Age

Explore the evolving landscape of cybersecurity, from e-government advancements to emerging cyber threats. Learn about the UN framework and business prospects in this dynamic field, with a focus on Singapore and Vietnam. Discover the convergence of global ICT trends, e-government benefits, and connectivity demands. Delve into case studies, such as the Singapore vs. Anonymous cybersecurity incident, and gain insights on cyber dependency matrix and critical infrastructure protection. Stay informed about the rising mobile malware threats and the importance of understanding cyber risks for individuals and businesses.

mroy
Download Presentation

Navigating Cybersecurity Challenges and Opportunities in the Digital Age

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. From e-government to cyber security: opportunities and challenges Singapore Business Group Ho Chi Minh City, Vietnam March 14, 2014 Kim Andreasson Managing Director DAKA advisory AB

  2. Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

  3. Understanding cyber security A convergence of three trends: • Global benefits of ICTs • Supply-side, such as e-government • Demand-side, such as connectivity

  4. 1. Global benefits of ICTs • ICTs contribute strongly to economic growth and better social outcomes • Benchmarking the information society is important in order for policy-makers to understand the factors behind it and how to achieve improved outcomes

  5. 2. Supply-side, such as e-government • Information and service delivery • Transparency and accountability • Link to broader development objectives • Digital by default

  6. 3. Demand-side, such as connectivity Source: World Bank | World Development Indicators database

  7. E-government usage • In 1990, the American tax authority, the IRS, received 4m online tax filings (the first year such service was available) • In 2000, the number rose to 35m • In 2010, online tax filings surpassed 100m • In 2013, there were 114m online tax returns

  8. Measuring e-government • Benchmarking global e-government development since 2003 to “inform and improve the understanding of policy makers’ choices to shape their e-government programs” (UN 2004) • The survey measures “the willingness and capacity of countries to use online and mobile technology in the execution of government functions” (UN 2010)

  9. Current UN methodology • The UN E-Government Development Index is composed of three indices: • Human capital index • Telecommunications infrastructure index • Online service index For more information: www.unpan.org/egovkb/

  10. The online service index • Supply-side measurement approach, which means that websites are visited by researchers to evaluate what is available on them (i.e. the supply of information and services) • Every UN member state is assessed (now 193) • A defined set of websites are evaluated, primarily the national portal of each country or its equivalent • Almost all questions in the survey are binary, i.e. does the feature exist or not

  11. Implementation • Every website assessed in its primary language • Researchers go through training sessions and are provided with specific instructions on how to score questions, as well as provided actual website examples • Researchers take a citizen approach, which means they try to find the information within a reasonable amount of time • Assessment takes place during a specific period of time (the “survey window”)

  12. A quick case study on finding mobile services on www.gov.sg How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 1: Go to citizen & residents section

  13. How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 2: Go to mobile services sub-section

  14. How many national government websites around the world have a feature that offers to send alerts to mobile phones? Step 3: Confirm that Singapore offers it Answer: In 2010, 25 out of 192 countries

  15. E-government progress http://www.archive.org

  16. Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

  17. Enter cyber security

  18. Understanding cyber threats • Politically motivated threats:cyber warfare, cyber terrorism, espionage and hacktivism • Non-politically motivated threats:typically financially motivated, such as cyber crime, intellectual property theft, and fraud, but also hacking for fun or retribution, for example, from a disgruntled employee

  19. Singapore vs Anonymous Hacked version of a blog hosted by The Straits Times on October 31, 2013

  20. South Korea vs ? • Attacks in 2009, 2011, and 2013 • On March 20, 2013, South Korean television stations and financial institutions suffered from frozen computer terminals • ATMs and mobile payments were also affected • More than 48,000 computers and servers in South Korea were shut down

  21. Critical infrastructures • Financial services, telecommunications, energy, etc. • Politically-motivated attacks with offline consequences • The 2010 Stuxnet attack

  22. Cyber dependency matrix Source: World Bank | World Development Indicators database

  23. Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

  24. Mobility • An opportunity to improve efficiency – for criminals too • Number of mobile malware in 2013 more than doubled from 2012 Source: World Bank | World Development Indicators database

  25. Vietnam • Vietnam is among the top five countries with the highest number of unique attacked mobile users • In addition, 78 out of 100 government websites with the domain “gov.vn” has “seriously” poor security systems • Attacks can compromise trust Viet Nam News, March 6, 2014

  26. Are you at risk? • An increase in usage means an increase in dependency • Annual cost of cyber crime around the world has been estimated by Norton, a security company, to be about USD 110bn • About 75% of organizations suffer from a cyber attack every year • A simple solution to mitigate risk: • According to Verizon, 96% of cyber breaches are avoidable through simple controls • Awareness, awareness, awareness

  27. Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

  28. ITU Global Cybersecurity Index

  29. International Multistakeholder Partnership Against Cyber Threats

  30. ITU Global Cybersecurity Agenda (GCA) Business opportunities across five areas: 1. Legal measures 2. Technical and procedural measures 3. Organizational structures 4. Capacity building 5. International cooperation

  31. Recent developments • Edward Snowden • New threats: from hackers to nation-states • New challenges: localization strategies and security as a competitive advantage • Lack of international collaboration means domestic opportunities • Governments cannot go it alone; a role for the private sector and NGOs

  32. Presentation overview An introduction to cyber security Cyber dependency and cyber threats Cyber security close to home (in Vietnam, your company, and you) The UN framework and business opportunities Conclusion

  33. Solution to cyber security is not about technology but people • Compared with just a decade ago, governments have made significant progress in expanding ICT access and the demand from users has risen accordingly • But just as crime has always been part of history, cyber security is likely to continue well into the future, especially since the two are increasingly intertwined • Thereis a need for more information at all levels in order to better understand cyber security • Every case is different, yet fundamentally the same

  34. Thank you www.DAKAADVISORY.com

More Related