SlideShare a Scribd company logo
THE UNITED REPUBLIC OF TANZANIA
President’s office, Public Service Management
e-Government Agency
Delivering Secure, Public-Oriented e-Government
Facilities in Africa
A Holistic Approach
Dr. Jabiri Kuwe Bakari
Bsc. Computer Sc., Msc. (Eng.) Data comm., PhD.
(CEO)
e-Government Agency (eGA)
e-Government Agency - Tanzania
1
Agenda
e-Government Agency - Tanzania
1. Introduction
2. e-Government Facilities in a Nutshell
3. Delivering Secure, Public-Oriented e-Government
Facilities
4. Issues and Challenges - African perspective
5. Suggestions to Address the Challenges
6. Conclusion
Introduction
e-Government
 The use of ICT , and particularly the internet, as a tool to achieve better government.
 The process involves people, hardware (computers, networks gadgets), software
(operating systems and application systems) and systems (combination of hardware,
software and people).
 The arrangement requires reliable and secure communication infrastructure to
facilitate exchange of information, skilled staff and presence of appropriate e-
legislations
e-Government Facilities
 These are general systems and components needed to create the necessary e-
government offerings, such as software, hardware, infrastructure and other e-
services platforms.
ICT/e-Government Security
 The protection of information systems against unauthorised access to or
modification of information, whether in storage, processing or transit, and against
the denial of or absence of service to authorised user or the provision of service to
unauthorised users, including those measures necessary to detect, document, and
counter such threats.
 It covers information, infrastructure, processes, systems, services and technology.
e-Government Agency - Tanzania
© e-Government Agency
Infor. System in Various
Public Institutions
1-Secured information systems within
The public institutions
2 Secured infrastructure between
the public institutions
Public services available
through
Various platform/service
providers
Public getting various services
through Various platform/
service providers / operators
Private Cloud
Use of Shared resources,
systems, Data centres,
secured infrastructure etc
e-Government in a Nutshell
e-Government Agency - Tanzania
5
Hardware
Operating
system
Applications
Store
Process
Collect
Communi
cate
Hardware
Operating
system
Applications
Store
Process
Collect
Communi
cate
Operational
Procedural Operational
Procedural
Mechanical/Electronic
Mechanical/Electronic
Administrational
Managerial Administrational
Managerial
Legal/Contractual
Legal/Contractual
Ethical/Culture
Ethical/Culture
Database
(Various business
records etc. )
Database
(Various business
records etc. )
e-Government Facilities in a Nutshell
Valuable asset of public
Institution-Information
Valuable asset of Public
institution -Information
Software (Operating
systems, Application
software) set of
instructions
ICT
eGov
Private Cloud
•It is about business processes, enabled by ICT, taking place within and between different public
institutions
•It is about collecting, processing, storing and exchanging information within and between different
public institutions
e-Government Agency - Tanzania
6
Hardware
Operating
system
Applications
Store
Process
Collect
Communi
cate
Hardware
Operating
system
Applications
Store
Process
Collect
Communi
cate
Operational
Procedural Operational
Procedural
Mechanical/Electronic
Mechanical/Electronic
Administrational
Managerial Administrational
Managerial
Legal/Contractual
Legal/Contractual
Ethical/Culture
Ethical/Culture
• Information security is about protection of ICT assets/resources in
terms of Confidentiality, Integrity and Availability – (information
and services)
Malicious software (Virus,
worm or denial-of-service
attack, Backdoors, salami
attacks, spyware, etc.) can
be introduced here !
Holistic Approach
required
Database
(Various business
records etc. )
Database
(Various business
records etc. )
Valuable asset of the Public
institutions -Information
Valuable asset of the public
institutions-Information
Delivering secure, public-oriented e-Government
facilities
Physical security of
the hardware
Authorised user
abusing his/her
privileges e.g.
Disgruntled staff
e-Government Agency - Tanzania
7
Issues and Challenges
1. Cultural and Ethical Challenges
 User behaviour - Culture of “sharing”
 Unethical behaviour,
2. Legal Challenges
 Lack of Legal framework necessary to avail e-
government services to citizenry
e-Government Agency - Tanzania
8
Issues and Challenges…
3.Administrative and Managerial Challenges
 Existence of perception gap between the decision
makers and technical staff on ICT security. Thus,
difficult in getting Strategic Management's Backing.
 Inadequacy of well structured ICT
departments/units, with appropriate skills and
strategically positioned within public institutions.
 Lack of competent and vetted human resource to
effectively deal with ICT security.
 Inadequate collaboration between the ICT
departments in public institutions and the e-
Government entity
 Acquisition of e-government solutions which are
not derived from institutions requirement (vendor
driven)
e-Government Agency - Tanzania
9
Issues and Challenges…
4) Operational Procedure Challenges
 Absence of ICT security policies,
standards and guidelines both at
national and organizational levels
5) Technical Issues
 Software, hardware and network
vulnerabilities coupled with Inadequate
management, control and maintenance
of ICT
 E-Government systems not integrated –
exchange of information between one
system and another system is facilitated
by user
e-Government Agency - Tanzania
Suggestions to address the Challenges
At a Strategic Level
• Knowing and acknowledging the problem/ issue
• Bridging the gap between decision makers and
technical staff
• ICT security concerns should be addressed in the initial
planning of e-government initiatives
• Formulating ICT Security strategies at national and
organizational levels
• ICT security challenges should not be dealt in isolation,
instead holistic approach is required.
• Putting in place coherent legal and regulatory
frameworks - Whole process of e-Government need to be
guided by sound legal and regulatory environment.
e-Government Agency - Tanzania
Suggestions to address the Challenges
At Tactical and Operational Level
• HR: Involving skilled and ethical personnel during
acquisition, installation and operationalization of e-
government
• Capacity building and awareness raising
• Implementing ICT Security strategies at national and
organizational levels
• Use Standards and Best Practices
e-Government Agency - Tanzania
12
A Holistic Approach for Managing ICT Security in Organisations
Strategic (Top)
Management’s
Backing
(GL-01)
Technical
Management's
Backing
(GL-02)
Quick
Scan
(GL-04)
Form
Project
Team & Plan
(GL-03)
General
Management’s
attention &
Backing
(GL-05)
Risk
Assessment/
Analysis
(GL-08)
Mitigation
Planning
(GL-09)
Develop
Counter
Measures
(GL-10)
Operationalisation
(ICT Security
Policy, Services &
Mechanisms)
(GL-11)
Maintenance
(Monitor the
Progress)
(GL-12)
Review/Audit
ICT Security
(GL-06)
Awareness
& Backing of
General staff
(GL-07)
INTERNALISED & CONTINUOUS PROCESS
INTRODUCTION OF ICT
SECURITY MANAGEMENT
PROCESS (INITIALISATION)
The Organisation
The Organisation’s goal & services
StandardsandBestPractises
TheOrganisation’sculture&behaviour
The Environment
Stakeholders
Publicinfrastructures
TheOrganisation’sstructure
Presented in a book: ISBN Nr 91-7155-383-8
e-Government Agency - Tanzania
Each process maps the Holistic View of the
security challenge
Mechanical/Electronic
Applications
Operating
system
Hardware
Store
Process
Collect
Commu
nicate
Social
Technical
Holistic view of ICT
Security Problem (SBC)
Ethical/Culture
Legal/Contractual
Administrational
Managerial
Operational
Procedural
People
Users
Valuable asset-
Information
Database
(Various business
records etc. )
Process
(GL - X)
e-Government Agency - Tanzania
A holistic approach for managing ICT
security is required for public-oriented e-
Government facilities to be secure!
General Management
Mechanical/Electronic
Applications
Operating
system
Hardware
Store
Process
Collect
Commu
nicate
Social
IT managers &
Security Personnel
Technical
Holistic view of ICT
Security Problem (SBC)
Ethical/Culture
Legal/Contractual
Administrational
Managerial
Operational
Procedural
People
Users
Perception Problem
Valuable asset-
Information
Database
(Financial, customer
records etc. )
General Management
This is a technical
problem
Lets have the best Firewall,
Antivirusetc.
This is a business
Problem
Depending on organisation structure -
The general management team may
comprise of CEO, Assistant to CEO,
All Directors, and all CXOs from major
units which are not Directorates
e-Government Agency - Tanzania
END
Thank You for Listening
15
e-Government Agency - Tanzania

More Related Content

What's hot

Robotic process automation in local government a system for efficiency, or ju...
Robotic process automation in local government a system for efficiency, or ju...Robotic process automation in local government a system for efficiency, or ju...
Robotic process automation in local government a system for efficiency, or ju...
PanagiotisKeramidis
 
Ethiopian Open Government Data Initiative
Ethiopian Open Government Data InitiativeEthiopian Open Government Data Initiative
Ethiopian Open Government Data Initiative
abiyotb
 
Responsible use of ai in governance(1)
Responsible use of ai in governance(1)Responsible use of ai in governance(1)
Responsible use of ai in governance(1)
PanagiotisKeramidis
 
Zlatan Sabic ICT for Governance
Zlatan Sabic ICT for GovernanceZlatan Sabic ICT for Governance
Zlatan Sabic ICT for Governance
yahoosch
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
IDC4EU
 
Electronic Open and Collaborative Governance - An Overview
Electronic Open and Collaborative Governance - An OverviewElectronic Open and Collaborative Governance - An Overview
Electronic Open and Collaborative Governance - An Overview
samossummit
 
191018 data interoperability
191018 data interoperability191018 data interoperability
191018 data interoperability
Kenji Hiramoto
 
Digital seoul e governance(통합본)
Digital seoul e governance(통합본)Digital seoul e governance(통합본)
Digital seoul e governance(통합본)
simrc
 
181130d gov
181130d gov181130d gov
181130d gov
Kenji Hiramoto
 
Government Efficiency in Macedonia and Albania
Government Efficiency in Macedonia and Albania Government Efficiency in Macedonia and Albania
Government Efficiency in Macedonia and Albania
USAID CEED II Project Moldova
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
E-Journal ICT4D
 
Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku
Slovak Governance Institute
 
World e-Parliament Conference 2016 - Closing Summary
World e-Parliament Conference 2016 - Closing SummaryWorld e-Parliament Conference 2016 - Closing Summary
World e-Parliament Conference 2016 - Closing Summary
Andy Williamson
 
E estonia brochure eng
E estonia brochure engE estonia brochure eng
E estonia brochure eng
Chris Skinner
 
eDemocracy Strengthening open governments
eDemocracy Strengthening open governmentseDemocracy Strengthening open governments
eDemocracy Strengthening open governments
Ministry of Administrative Reconstruction
 
e-services benchmarks
e-services benchmarkse-services benchmarks
e-services benchmarks
StevenSegaert
 
Amanat UU ITE (Cahyana Ahmadjayadi)
Amanat UU ITE (Cahyana Ahmadjayadi)Amanat UU ITE (Cahyana Ahmadjayadi)
Amanat UU ITE (Cahyana Ahmadjayadi)
Indriyatno Banyumurti
 
E Govt - Presentation
E Govt - PresentationE Govt - Presentation
E Govt - Presentation
noriccok
 
Development Application & e governance
Development Application & e governanceDevelopment Application & e governance
Development Application & e governance
Jo Balucanag - Bitonio
 
Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...
Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...
Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...
Support for Improvement in Governance and Management SIGMA
 

What's hot (20)

Robotic process automation in local government a system for efficiency, or ju...
Robotic process automation in local government a system for efficiency, or ju...Robotic process automation in local government a system for efficiency, or ju...
Robotic process automation in local government a system for efficiency, or ju...
 
Ethiopian Open Government Data Initiative
Ethiopian Open Government Data InitiativeEthiopian Open Government Data Initiative
Ethiopian Open Government Data Initiative
 
Responsible use of ai in governance(1)
Responsible use of ai in governance(1)Responsible use of ai in governance(1)
Responsible use of ai in governance(1)
 
Zlatan Sabic ICT for Governance
Zlatan Sabic ICT for GovernanceZlatan Sabic ICT for Governance
Zlatan Sabic ICT for Governance
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Electronic Open and Collaborative Governance - An Overview
Electronic Open and Collaborative Governance - An OverviewElectronic Open and Collaborative Governance - An Overview
Electronic Open and Collaborative Governance - An Overview
 
191018 data interoperability
191018 data interoperability191018 data interoperability
191018 data interoperability
 
Digital seoul e governance(통합본)
Digital seoul e governance(통합본)Digital seoul e governance(통합본)
Digital seoul e governance(통합본)
 
181130d gov
181130d gov181130d gov
181130d gov
 
Government Efficiency in Macedonia and Albania
Government Efficiency in Macedonia and Albania Government Efficiency in Macedonia and Albania
Government Efficiency in Macedonia and Albania
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku
 
World e-Parliament Conference 2016 - Closing Summary
World e-Parliament Conference 2016 - Closing SummaryWorld e-Parliament Conference 2016 - Closing Summary
World e-Parliament Conference 2016 - Closing Summary
 
E estonia brochure eng
E estonia brochure engE estonia brochure eng
E estonia brochure eng
 
eDemocracy Strengthening open governments
eDemocracy Strengthening open governmentseDemocracy Strengthening open governments
eDemocracy Strengthening open governments
 
e-services benchmarks
e-services benchmarkse-services benchmarks
e-services benchmarks
 
Amanat UU ITE (Cahyana Ahmadjayadi)
Amanat UU ITE (Cahyana Ahmadjayadi)Amanat UU ITE (Cahyana Ahmadjayadi)
Amanat UU ITE (Cahyana Ahmadjayadi)
 
E Govt - Presentation
E Govt - PresentationE Govt - Presentation
E Govt - Presentation
 
Development Application & e governance
Development Application & e governanceDevelopment Application & e governance
Development Application & e governance
 
Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...
Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...
Minister Tamara Srzentic, life events in public service delivery, SIGMA, 4 Ma...
 

Similar to Deliovering Secure e-Goverment Facilities in Africa

1_ICT.pptx
1_ICT.pptx1_ICT.pptx
1_ICT.pptx
poonam256394
 
1_ICT.pdf
1_ICT.pdf1_ICT.pdf
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
Wesen Tegegne
 
Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Cyber Security - Awareness Presentation - High Level
Cyber Security - Awareness Presentation - High LevelCyber Security - Awareness Presentation - High Level
Cyber Security - Awareness Presentation - High Level
bbothma718
 
100531 it management dpa upload
100531 it management dpa upload100531 it management dpa upload
100531 it management dpa upload
plpictimatec
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
ASNA p.a
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
Chinatu Uzuegbu
 
Sahoum resume
Sahoum resumeSahoum resume
Sahoum resume
Eng Sahoum Aljazzazi
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
subramanian K
 
eGovernance Explained - Mukund Nadgowda
eGovernance Explained - Mukund NadgowdaeGovernance Explained - Mukund Nadgowda
eGovernance Explained - Mukund Nadgowda
Mukund Nadgowda
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
faithxdunce63732
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security Policies
Laura Martin
 
Unit 3.pptx
Unit 3.pptxUnit 3.pptx
Unit 3.pptx
DevTimilsina1
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
guestea68b0
 
E-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica BoatengE-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica Boateng
Francisco J Grajales III
 
Effective handling of Complaints - Optimizing the use of ICT in Law Enforcement
Effective handling of Complaints - Optimizing the use of ICT in Law EnforcementEffective handling of Complaints - Optimizing the use of ICT in Law Enforcement
Effective handling of Complaints - Optimizing the use of ICT in Law Enforcement
ChukwuebukaUgwu4
 
Executive Summary - Human Resources and Information Communication Technology ...
Executive Summary - Human Resources and Information Communication Technology ...Executive Summary - Human Resources and Information Communication Technology ...
Executive Summary - Human Resources and Information Communication Technology ...
The University of Texas (UTRGV)
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
alfred4lewis58146
 
Empirical Study: Moroccan Information systems specificities for better IT Gov...
Empirical Study: Moroccan Information systems specificities for better IT Gov...Empirical Study: Moroccan Information systems specificities for better IT Gov...
Empirical Study: Moroccan Information systems specificities for better IT Gov...
INFOGAIN PUBLICATION
 

Similar to Deliovering Secure e-Goverment Facilities in Africa (20)

1_ICT.pptx
1_ICT.pptx1_ICT.pptx
1_ICT.pptx
 
1_ICT.pdf
1_ICT.pdf1_ICT.pdf
1_ICT.pdf
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)
 
Cyber Security - Awareness Presentation - High Level
Cyber Security - Awareness Presentation - High LevelCyber Security - Awareness Presentation - High Level
Cyber Security - Awareness Presentation - High Level
 
100531 it management dpa upload
100531 it management dpa upload100531 it management dpa upload
100531 it management dpa upload
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Sahoum resume
Sahoum resumeSahoum resume
Sahoum resume
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 
eGovernance Explained - Mukund Nadgowda
eGovernance Explained - Mukund NadgowdaeGovernance Explained - Mukund Nadgowda
eGovernance Explained - Mukund Nadgowda
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security Policies
 
Unit 3.pptx
Unit 3.pptxUnit 3.pptx
Unit 3.pptx
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
 
E-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica BoatengE-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica Boateng
 
Effective handling of Complaints - Optimizing the use of ICT in Law Enforcement
Effective handling of Complaints - Optimizing the use of ICT in Law EnforcementEffective handling of Complaints - Optimizing the use of ICT in Law Enforcement
Effective handling of Complaints - Optimizing the use of ICT in Law Enforcement
 
Executive Summary - Human Resources and Information Communication Technology ...
Executive Summary - Human Resources and Information Communication Technology ...Executive Summary - Human Resources and Information Communication Technology ...
Executive Summary - Human Resources and Information Communication Technology ...
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
 
Empirical Study: Moroccan Information systems specificities for better IT Gov...
Empirical Study: Moroccan Information systems specificities for better IT Gov...Empirical Study: Moroccan Information systems specificities for better IT Gov...
Empirical Study: Moroccan Information systems specificities for better IT Gov...
 

More from Commonwealth Telecommunications Organisation

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Telecommunications Organisation
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth Telecommunications Organisation
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Telecommunications Organisation
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
We learn it agenda
We learn it agendaWe learn it agenda
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
Commonwealth Telecommunications Organisation
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
Commonwealth Telecommunications Organisation
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
5 expedition posters
5 expedition posters5 expedition posters
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
Commonwealth Telecommunications Organisation
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Deliovering Secure e-Goverment Facilities in Africa

  • 1. THE UNITED REPUBLIC OF TANZANIA President’s office, Public Service Management e-Government Agency Delivering Secure, Public-Oriented e-Government Facilities in Africa A Holistic Approach Dr. Jabiri Kuwe Bakari Bsc. Computer Sc., Msc. (Eng.) Data comm., PhD. (CEO) e-Government Agency (eGA) e-Government Agency - Tanzania 1
  • 2. Agenda e-Government Agency - Tanzania 1. Introduction 2. e-Government Facilities in a Nutshell 3. Delivering Secure, Public-Oriented e-Government Facilities 4. Issues and Challenges - African perspective 5. Suggestions to Address the Challenges 6. Conclusion
  • 3. Introduction e-Government  The use of ICT , and particularly the internet, as a tool to achieve better government.  The process involves people, hardware (computers, networks gadgets), software (operating systems and application systems) and systems (combination of hardware, software and people).  The arrangement requires reliable and secure communication infrastructure to facilitate exchange of information, skilled staff and presence of appropriate e- legislations e-Government Facilities  These are general systems and components needed to create the necessary e- government offerings, such as software, hardware, infrastructure and other e- services platforms. ICT/e-Government Security  The protection of information systems against unauthorised access to or modification of information, whether in storage, processing or transit, and against the denial of or absence of service to authorised user or the provision of service to unauthorised users, including those measures necessary to detect, document, and counter such threats.  It covers information, infrastructure, processes, systems, services and technology. e-Government Agency - Tanzania
  • 4. © e-Government Agency Infor. System in Various Public Institutions 1-Secured information systems within The public institutions 2 Secured infrastructure between the public institutions Public services available through Various platform/service providers Public getting various services through Various platform/ service providers / operators Private Cloud Use of Shared resources, systems, Data centres, secured infrastructure etc e-Government in a Nutshell e-Government Agency - Tanzania
  • 5. 5 Hardware Operating system Applications Store Process Collect Communi cate Hardware Operating system Applications Store Process Collect Communi cate Operational Procedural Operational Procedural Mechanical/Electronic Mechanical/Electronic Administrational Managerial Administrational Managerial Legal/Contractual Legal/Contractual Ethical/Culture Ethical/Culture Database (Various business records etc. ) Database (Various business records etc. ) e-Government Facilities in a Nutshell Valuable asset of public Institution-Information Valuable asset of Public institution -Information Software (Operating systems, Application software) set of instructions ICT eGov Private Cloud •It is about business processes, enabled by ICT, taking place within and between different public institutions •It is about collecting, processing, storing and exchanging information within and between different public institutions e-Government Agency - Tanzania
  • 6. 6 Hardware Operating system Applications Store Process Collect Communi cate Hardware Operating system Applications Store Process Collect Communi cate Operational Procedural Operational Procedural Mechanical/Electronic Mechanical/Electronic Administrational Managerial Administrational Managerial Legal/Contractual Legal/Contractual Ethical/Culture Ethical/Culture • Information security is about protection of ICT assets/resources in terms of Confidentiality, Integrity and Availability – (information and services) Malicious software (Virus, worm or denial-of-service attack, Backdoors, salami attacks, spyware, etc.) can be introduced here ! Holistic Approach required Database (Various business records etc. ) Database (Various business records etc. ) Valuable asset of the Public institutions -Information Valuable asset of the public institutions-Information Delivering secure, public-oriented e-Government facilities Physical security of the hardware Authorised user abusing his/her privileges e.g. Disgruntled staff e-Government Agency - Tanzania
  • 7. 7 Issues and Challenges 1. Cultural and Ethical Challenges  User behaviour - Culture of “sharing”  Unethical behaviour, 2. Legal Challenges  Lack of Legal framework necessary to avail e- government services to citizenry e-Government Agency - Tanzania
  • 8. 8 Issues and Challenges… 3.Administrative and Managerial Challenges  Existence of perception gap between the decision makers and technical staff on ICT security. Thus, difficult in getting Strategic Management's Backing.  Inadequacy of well structured ICT departments/units, with appropriate skills and strategically positioned within public institutions.  Lack of competent and vetted human resource to effectively deal with ICT security.  Inadequate collaboration between the ICT departments in public institutions and the e- Government entity  Acquisition of e-government solutions which are not derived from institutions requirement (vendor driven) e-Government Agency - Tanzania
  • 9. 9 Issues and Challenges… 4) Operational Procedure Challenges  Absence of ICT security policies, standards and guidelines both at national and organizational levels 5) Technical Issues  Software, hardware and network vulnerabilities coupled with Inadequate management, control and maintenance of ICT  E-Government systems not integrated – exchange of information between one system and another system is facilitated by user e-Government Agency - Tanzania
  • 10. Suggestions to address the Challenges At a Strategic Level • Knowing and acknowledging the problem/ issue • Bridging the gap between decision makers and technical staff • ICT security concerns should be addressed in the initial planning of e-government initiatives • Formulating ICT Security strategies at national and organizational levels • ICT security challenges should not be dealt in isolation, instead holistic approach is required. • Putting in place coherent legal and regulatory frameworks - Whole process of e-Government need to be guided by sound legal and regulatory environment. e-Government Agency - Tanzania
  • 11. Suggestions to address the Challenges At Tactical and Operational Level • HR: Involving skilled and ethical personnel during acquisition, installation and operationalization of e- government • Capacity building and awareness raising • Implementing ICT Security strategies at national and organizational levels • Use Standards and Best Practices e-Government Agency - Tanzania
  • 12. 12 A Holistic Approach for Managing ICT Security in Organisations Strategic (Top) Management’s Backing (GL-01) Technical Management's Backing (GL-02) Quick Scan (GL-04) Form Project Team & Plan (GL-03) General Management’s attention & Backing (GL-05) Risk Assessment/ Analysis (GL-08) Mitigation Planning (GL-09) Develop Counter Measures (GL-10) Operationalisation (ICT Security Policy, Services & Mechanisms) (GL-11) Maintenance (Monitor the Progress) (GL-12) Review/Audit ICT Security (GL-06) Awareness & Backing of General staff (GL-07) INTERNALISED & CONTINUOUS PROCESS INTRODUCTION OF ICT SECURITY MANAGEMENT PROCESS (INITIALISATION) The Organisation The Organisation’s goal & services StandardsandBestPractises TheOrganisation’sculture&behaviour The Environment Stakeholders Publicinfrastructures TheOrganisation’sstructure Presented in a book: ISBN Nr 91-7155-383-8 e-Government Agency - Tanzania
  • 13. Each process maps the Holistic View of the security challenge Mechanical/Electronic Applications Operating system Hardware Store Process Collect Commu nicate Social Technical Holistic view of ICT Security Problem (SBC) Ethical/Culture Legal/Contractual Administrational Managerial Operational Procedural People Users Valuable asset- Information Database (Various business records etc. ) Process (GL - X) e-Government Agency - Tanzania
  • 14. A holistic approach for managing ICT security is required for public-oriented e- Government facilities to be secure! General Management Mechanical/Electronic Applications Operating system Hardware Store Process Collect Commu nicate Social IT managers & Security Personnel Technical Holistic view of ICT Security Problem (SBC) Ethical/Culture Legal/Contractual Administrational Managerial Operational Procedural People Users Perception Problem Valuable asset- Information Database (Financial, customer records etc. ) General Management This is a technical problem Lets have the best Firewall, Antivirusetc. This is a business Problem Depending on organisation structure - The general management team may comprise of CEO, Assistant to CEO, All Directors, and all CXOs from major units which are not Directorates e-Government Agency - Tanzania
  • 15. END Thank You for Listening 15 e-Government Agency - Tanzania