CTO Cybersecurity Forum 2013 Ebot Ebot Enaw


Published on

Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.

Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.

Published in: Technology, Travel
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

CTO Cybersecurity Forum 2013 Ebot Ebot Enaw

  1. 1. B.P 6170 Yaoundé Tél : (+237) 22 20 22 11 Email : infos@antic.cm Internet : http://www.antic.cm CTO , 26/04/2013
  2. 2. PRESENTATION OUTLINE 1. Context 2. Internet Resource Management in Cameroon 2.1. Legal status 2.2. «.CM» Domain Name 2.3. IPAddress 3. Ensuring Cybersafety in Cameroon 3.1. Organisational measures 3.2 Technical measures 4. Conclusion 26/04/2013CTO 2013
  3. 3. 26/04/2013 In order to attend the 2035 vision, the State must activate all the development levers, including the Information and Communication Technologies (ICT) which has emerged in the recent years as an important factor in economic growth. Cameroon is currently experiencing rapid growth of e-services (e- Government and e-Commerce related services) development , Internet usage increase and high penetration of mobile services. To this effect, the Government must ensure a trustworthy environment in the ICT sector which is pestered with scourge of cybercrimes. 1. CONTEXT CTO 2013
  4. 4. 26/04/2013 Legal and Regulatory Framework To curb the scourge of cybercrimes, on December 21, 2010, the Head of State promulgated a set of laws governing this sector; the Prime Minister, Head of Government has also signed decrees to ensure the proper implementation of the laws. Laws N°2010/012 and N°2010/013 Decree organizing ANTIC and ART Enforcement Decree on Security Audits Decree on Electronic Certification Decree on Naming and Addressing Resources 1. CONTEXT CTO 2013
  5. 5. 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.1. Legal Status 26/04/2013CTO 2013 Following the enactment of the Law N°2010/013 relating to Electronic Communication in Cameroon by the President of the Republic and the Decree N° 2013/0402/PM signed by the Prime Minister and Head of Government, ANTIC has the mandate to manage the following Internet resouces : • «.CM » Domain Names • IP Addresses in Cameroon
  6. 6. 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.2. « .CM» Domain Names 26/04/2013CTO 2013 14 Registrars registering domain names under the Cameroon’s ccTLD (.cm ) Cameroon’s ccTLD is managed with a policy which is respected by all the stakeholders Currently there are 11677 domain names under the Cameroon’s ccTLD ANTIC is hosting and managing the zone’s master/primary server meanwhile slave/secondary DNS services are provided by CAMTEL (03), ITU (01), RIPE (01) VERIZONE (01)
  7. 7. 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.3. Public IP addresses 26/04/2013CTO 2013 Currently, AfriNIC allocates public IP addresses to ISPs in Cameroon With the regulation in place, ANTIC has planned to establish partnership with AfriNIC in order to manage public IP addresses in Cameroon IPv4 is still widely used by ISP, however some ISP are currently managing IPv6 addresses ANTIC and stakeholders are developing plans to switch from IPv4 to IPv6 The realization of a national IXP is going on The elaboration of charter to be respected by LIRs( Local Internet Registeries) is currently going on ANTIC has organised several meetings with LIRs in order to discuss on the new orientations of public IP address management inline with legal framework in place ANTIC has implemented a whois application
  8. 8. 3. CYBERSECURITY MEASURES IN CAMEROON 3.1. Organizational measures Elaboration of a National Information Security Policy Establishment of a formal framework for the fight against cybercrime involving all cybersecurity actors (SED, DGSN, DGRE, MINPOSTEL, ANTIC, ART) Reinforce the cybersecurity legal framework Sensitization and promotion of teaching cybersecurity related courses in universities Building partnerships with some organizations (Yahoo, Google, FIRST, INTERPOL) Elaboration of standards related to cybersecurity(charter, procedure, policy) Set up sustainable funding mechanisms for cybersecurity activities 26/04/2013CTO 2013
  9. 9. 3. CYBERSECURITY MEASURES IN CAMEROON 3.2. Technical measures Set up a national PKI (Public Key Infrastructure) Set up a CIRT Conduct security audit nationwide Set up an IXP (Internet Exchange Point) Set up a national datacenter Put in place technical infrastructure to protect and monitor our cyberspace 26/04/2013CTO 2013
  10. 10. 4. CONCLUSIONS & PERSPECTIVES 26/04/2013CTO 2013 Develop a strategic framework involving different government structures in order to elaborate a national IT security policy Introduce IT Security Officer positions with respective roles in public and private agencies Reinforce the cybersecurity legal framework Put in place technical infrastructure(equipment and software) to protect and monitor our cyberspace Promote the development of local expertise in the cybersecurity Establish sustainable funding mechanisms for carrying out cybersecurity activities
  11. 11. 26/04/2013CTO 2013 Thank you for your Kind attention!