SlideShare a Scribd company logo
1 of 2
| |
4/10/2024 1
The Security of Systems & the underlying Infrastructure provides
Confidence, & Assurance to both the Businesses , the customers, the
Citizenry and our International partners to trust the Systems and the
Platforms that are providing the Digital Markets and the Services
The ICT Authority outlines the following Key Initiatives to enable the
achievement of Secure, Resilient Digital Economy.
No
.
Infrastructure/Service
Area
Security Breach
Impact
Recommend Mitigation
1 Government Common
Core Network (GCCN)
Total compromise of all Nairobi
MCDA’s and Government Data &
Systems.
Provide GOK Gateway Sec
urity on GCCN & total traf
fic Visibility and Monitori
ng ( SOC) at 24/7.
2 National Optic Fibre
Backbone
Infrastructure
(NOFBI)
Total compromise of Regional Go
vernment Agencies and County G
overnments
Provide at Regional Level
System Security Visibility
for Upstream & Downstre
am Traffic Visibility and M
onitoring ( SOC) at 24/7.
3 National NPKI (Digital
Online Identity)
Security issues such as
confidentiality, integrity and non-
repudiation must be dealt with
effectively for on-line, E-
commerce and digital business to
be successful.
Immediate revamp and o
perationalization of the G
overnment National Publ
ic Key Infrastructure (NPK
I) to ensure Online Digital
Identity through Issuance
of Digital Signatures.

More Related Content

Similar to COVID_Cyber Slides. COVID_Cyber Slides.pptx

Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfSoftware Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfMatthew Allen
 
Economic and social impact of broadband access
Economic and social impact of broadband accessEconomic and social impact of broadband access
Economic and social impact of broadband accessPrayukth K V
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
M&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionM&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionVKVirata1
 
General requirements-for-e-commerce
General requirements-for-e-commerceGeneral requirements-for-e-commerce
General requirements-for-e-commercesumasicm
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital eraRicardo de Almeida
 
Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...
Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...
Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...IMARC Group
 
Competition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chainCompetition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chainChristoph Stork
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
 
Key IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdfKey IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdfDraup3
 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptxAbhi71358
 
Do's and Don'ts of Collaborative Regulation (G5) in Smart Cities
Do's and Don'ts of Collaborative Regulation (G5)  in Smart CitiesDo's and Don'ts of Collaborative Regulation (G5)  in Smart Cities
Do's and Don'ts of Collaborative Regulation (G5) in Smart CitiesFarhad Tavakkol Hamedani
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeCA
 
COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress GrahameLynch1
 
Docomo 5 g_white_paper
Docomo 5 g_white_paperDocomo 5 g_white_paper
Docomo 5 g_white_papermgkib
 
DOCOMO 5G White Paper
DOCOMO 5G White PaperDOCOMO 5G White Paper
DOCOMO 5G White PaperSitha Sok
 

Similar to COVID_Cyber Slides. COVID_Cyber Slides.pptx (20)

Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfSoftware Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
 
Growth on ICT Enterprise Horizon
Growth on ICT Enterprise HorizonGrowth on ICT Enterprise Horizon
Growth on ICT Enterprise Horizon
 
Economic and social impact of broadband access
Economic and social impact of broadband accessEconomic and social impact of broadband access
Economic and social impact of broadband access
 
single_window_nga_e.ppt
single_window_nga_e.pptsingle_window_nga_e.ppt
single_window_nga_e.ppt
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
M&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionM&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisition
 
General requirements-for-e-commerce
General requirements-for-e-commerceGeneral requirements-for-e-commerce
General requirements-for-e-commerce
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 
Communications Development in Saudi Arabia
Communications Development in Saudi ArabiaCommunications Development in Saudi Arabia
Communications Development in Saudi Arabia
 
Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...
Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...
Mobile Virtual Network Operator (MVNO) Market PPT: Growth, Outlook, Demand, K...
 
Competition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chainCompetition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chain
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Key IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdfKey IT and Digital Investment Areas Shaping the Industry.pdf
Key IT and Digital Investment Areas Shaping the Industry.pdf
 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptx
 
Do's and Don'ts of Collaborative Regulation (G5) in Smart Cities
Do's and Don'ts of Collaborative Regulation (G5)  in Smart CitiesDo's and Don'ts of Collaborative Regulation (G5)  in Smart Cities
Do's and Don'ts of Collaborative Regulation (G5) in Smart Cities
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crime
 
COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress
 
Docomo 5 g_white_paper
Docomo 5 g_white_paperDocomo 5 g_white_paper
Docomo 5 g_white_paper
 
DOCOMO 5G White Paper
DOCOMO 5G White PaperDOCOMO 5G White Paper
DOCOMO 5G White Paper
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

COVID_Cyber Slides. COVID_Cyber Slides.pptx

  • 1. | | 4/10/2024 1 The Security of Systems & the underlying Infrastructure provides Confidence, & Assurance to both the Businesses , the customers, the Citizenry and our International partners to trust the Systems and the Platforms that are providing the Digital Markets and the Services The ICT Authority outlines the following Key Initiatives to enable the achievement of Secure, Resilient Digital Economy.
  • 2. No . Infrastructure/Service Area Security Breach Impact Recommend Mitigation 1 Government Common Core Network (GCCN) Total compromise of all Nairobi MCDA’s and Government Data & Systems. Provide GOK Gateway Sec urity on GCCN & total traf fic Visibility and Monitori ng ( SOC) at 24/7. 2 National Optic Fibre Backbone Infrastructure (NOFBI) Total compromise of Regional Go vernment Agencies and County G overnments Provide at Regional Level System Security Visibility for Upstream & Downstre am Traffic Visibility and M onitoring ( SOC) at 24/7. 3 National NPKI (Digital Online Identity) Security issues such as confidentiality, integrity and non- repudiation must be dealt with effectively for on-line, E- commerce and digital business to be successful. Immediate revamp and o perationalization of the G overnment National Publ ic Key Infrastructure (NPK I) to ensure Online Digital Identity through Issuance of Digital Signatures.