Kim Andreasson Managing Director DAKA advisory AB

Post on 05-Jan-2016

57 views 0 download

Tags:

description

From e-government to cyber security: opportunities and challenges. Singapore Business Group Ho Chi Minh City, Vietnam March 14, 2014. Kim Andreasson Managing Director DAKA advisory AB. Presentation overview. An introduction to cyber security. Cyber dependency and cyber threats. - PowerPoint PPT Presentation

Transcript of Kim Andreasson Managing Director DAKA advisory AB

Kim AndreassonManaging DirectorDAKA advisory AB

Singapore Business GroupHo Chi Minh City, Vietnam

March 14, 2014

From e-government to cyber security: opportunities and challenges

An introduction to cyber security

Cyber dependency and cyber threats

Cyber security close to home (in Vietnam, your company, and you)

The UN framework and business opportunities

Conclusion

Presentation overview

Understanding cyber security

A convergence of three trends:

1. Global benefits of ICTs

2. Supply-side, such as e-government

3. Demand-side, such as connectivity

1. Global benefits of ICTs

ICTs contribute strongly to economic growth and better social outcomes

Benchmarking the information society is important in order for policy-makers to understand the factors behind it and how to achieve improved outcomes

2. Supply-side, such as e-government Information and

service delivery

Transparency and accountability

Link to broader development objectives

Digital by default

3. Demand-side, such as connectivity

Source:World Bank | World Development Indicators database

E-government usage

In 1990, the American tax authority, the IRS, received 4m online tax filings (the first year such service was available)

In 2000, the number rose to 35m

In 2010, online tax filings surpassed 100m

In 2013, there were 114m online tax returns

Measuring e-government

Benchmarking global e-government development since 2003 to “inform and improve the understanding of policy makers’ choices to shape their e-government programs” (UN 2004)

The survey measures “the willingness and capacity of countries to use online and mobile technology in the execution of government functions” (UN 2010)

Current UN methodology

The UN E-Government Development Index is composed of three indices:

Human capital index

Telecommunications infrastructure index

Online service index

For more information:

www.unpan.org/egovkb/

The online service index

Supply-side measurement approach, which means that websites are visited by researchers to evaluate what is available on them (i.e. the supply of information and services)

Every UN member state is assessed (now 193)

A defined set of websites are evaluated, primarily the national portal of each country or its equivalent

Almost all questions in the survey are binary, i.e. does the feature exist or not

Implementation

Every website assessed in its primary language

Researchers go through training sessions and are provided with specific instructions on how to score questions, as well as provided actual website examples

Researchers take a citizen approach, which means they try to find the information within a reasonable amount of time

Assessment takes place during a specific period of time (the “survey window”)

A quick case study on finding mobile services on www.gov.sg

Step 1: Go to citizen & residents section

Step 1: Go to citizen & residents section

How many national government websites around the world have a feature that offers to send alerts to mobile phones?

How many national government websites around the world have a feature that offers to send alerts to mobile phones?

Step 2: Go to mobile services sub-section

Step 2: Go to mobile services sub-section

How many national government websites around the world have a feature that offers to send alerts to mobile phones?

How many national government websites around the world have a feature that offers to send alerts to mobile phones?

Step 3: Confirm that Singapore offers it

Step 3: Confirm that Singapore offers it

How many national government websites around the world have a feature that offers to send alerts to mobile phones?

How many national government websites around the world have a feature that offers to send alerts to mobile phones?

Answer: In 2010, 25 out of 192 countries

Answer: In 2010, 25 out of 192 countries

E-government progress

http://www.archive.org

An introduction to cyber security

Cyber dependency and cyber threats

Cyber security close to home (in Vietnam, your company, and you)

The UN framework and business opportunities

Conclusion

Presentation overview

Enter cyber security

Understanding cyber threatsPolitically motivated threats:

cyber warfare, cyber terrorism, espionage and hacktivism

Non-politically motivated threats: typically financially motivated, such as cyber crime, intellectual property theft, and fraud, but also hacking for fun or retribution, for example, from a disgruntled employee

Singapore vs Anonymous

Hacked version of a blog hosted by The Straits Times on October 31, 2013

South Korea vs ?Attacks in 2009, 2011, and 2013

On March 20, 2013, South Korean television stations and financial institutions suffered from frozen computer terminals

ATMs and mobile payments were also affected

More than 48,000 computers and servers in South Korea were shut down

Critical infrastructures

Financial services, telecommunications, energy, etc.

Politically-motivated attacks with offline consequences

The 2010 Stuxnet attack

Cyber dependency matrix

Source:World Bank | World Development Indicators database

An introduction to cyber security

Cyber dependency and cyber threats

Cyber security close to home (in Vietnam, your company, and you)

The UN framework and business opportunities

Conclusion

Presentation overview

MobilityAn opportunity to improve efficiency – for criminals too

Number of mobile malware in 2013 more than doubled from 2012

Source:World Bank | World Development Indicators database

Vietnam

Vietnam is among the top five countries with the highest number of unique attacked mobile users

In addition, 78 out of 100 government websites with the domain “gov.vn” has “seriously” poor security systems

Attacks can compromise trust

Viet Nam News, March 6, 2014

Are you at risk?

An increase in usage means an increase in dependency

Annual cost of cyber crime around the world has been estimated by Norton, a security company, to be about USD 110bn

About 75% of organizations suffer from a cyber attack every year

A simple solution to mitigate risk:

According to Verizon, 96% of cyber breaches are avoidable through simple controls

Awareness, awareness, awareness

An introduction to cyber security

Cyber dependency and cyber threats

Cyber security close to home (in Vietnam, your company, and you)

The UN framework and business opportunities

Conclusion

Presentation overview

ITU Global Cybersecurity Index

International Multistakeholder Partnership Against Cyber Threats

ITU Global Cybersecurity Agenda (GCA)

Business opportunities across five areas:

1. Legal measures

2. Technical and procedural measures

3. Organizational structures

4. Capacity building

5. International cooperation

Recent developments

Edward Snowden

New threats: from hackers to nation-states

New challenges: localization strategies and security as a competitive advantage

Lack of international collaboration means domestic opportunities

Governments cannot go it alone; a role for the private sector and NGOs

An introduction to cyber security

Cyber dependency and cyber threats

Cyber security close to home (in Vietnam, your company, and you)

The UN framework and business opportunities

Conclusion

Presentation overview

Solution to cyber security is not about technology but people

Compared with just a decade ago, governments have made significant progress in expanding ICT access and the demand from users has risen accordingly

But just as crime has always been part of history, cyber security is likely to continue well into the future, especially since the two are increasingly intertwined

There is a need for more information at all levels in order to better understand cyber security

Every case is different, yet fundamentally the same

Thank you

www.DAKAADVISORY.com