Presentation is loading. Please wait.

Presentation is loading. Please wait.

Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.

Similar presentations


Presentation on theme: "Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution."— Presentation transcript:

1 Week 3 E-GOVERNMENT

2 Security PRIVACY

3 Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution of security and privacy to inviduals

4 Definition Assure their citizens that the information are secured and protected from unauthorized use Increase the level of personal information available online

5 Conceptual Security Model

6 Integrate the various aspects of security services, mechanisms, objects and management functions Components Security management Security services Security mechanism Security object

7 Security Component Security management Security services Security mechanism Security object

8 Government initiatives High spending in security products and services Well understood of ICT security technology High skilled and experience security expects Develop supporting infrastructure A set of human element development Support mechanism to personnel

9 ICT Security Division Establish within MAMPU in Jan 2000 Keeper for public sector ICT security Plans, coordinates, streamlines and consolidates A referral point for ICT security-related matters with government organization Responsible for ICT security training and acculturation programmed

10 ICT Security Division Categories(framework): Proactive measures providing ICT security documents

11 Malaysian Communications and Multimedia Commission(MCMC) Oversees the new regulatory framework  Development and enforcement of access codes and standards. Ensures information security and the integrity and reliability of the network

12 Malaysian Communications and Multimedia Commission(MCMC) The MCMC has enforcement powers for offence relating to network security in the CMA.  IMPACT (an International Multilateral Partnership Against Cyber-Terrorism, set up by the Malaysian government)

13 Police Cyber Crime Unit The Royal Malaysia Police has established.

14 ICT Security Division Categories (framework): Recovery measures Continuous measures

15 Police Cyber Crime Unit

16 Ministry of Science, Technology and Innovation (MOSTI) Formulation and implementation of : national policy on ICT national information security policy Encouraging research, development and commercialization Development and promotion of ICT industries. CyberSecurity Malaysia (formerly is NISER) www.cybersecurity.my

17 Malaysian Computer Emergency Response Team(MyCERT) Provide an expert point of reference on network and security matters Reporting security incidents and facilitating communication Disseminating security information Acting as a repository of security-related information, acquiring patches, tools and techniques Educating the public with regard to computer security in Malaysia

18 NETWORK SECURITY EG*Net is the government’s dedicated network Provide gateway to external network Security technologies

19 Control access to application and data Authentication of individual E-Government IT Policy and Standards

20 Control access to application and data Digital Identities and Signatures CA Future plans Combine smart card technology

21 Discussion questions 1. What are the essentials components of a security model? 2. Justify the role of each ICT security departments. 3. Why security is necessary for e-government? 4. Explain about the e-government information technology policy and standards. 5. How to control the access to application and data? 6. Justify the important key technologies of network security. 7. What is the government upcoming plan for security?


Download ppt "Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution."

Similar presentations


Ads by Google