This document proposes guidelines for developing a national cybersecurity strategy. It discusses the importance of cybersecurity given increasing internet usage and mobile broadband adoption. Nations need strategic cybersecurity frameworks to protect digital economies, national security, and citizens from growing cyber threats. The paper reviews existing strategies and highlights challenges. It conducted expert interviews across technical, economic, legal and policy areas to inform proposed guidelines. The goal is to educate on cybersecurity and provide a collaborative framework to mitigate risks in the digital era.
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy āā
Ā
The UK is one of the worldās leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest Ā£1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability ā from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. Itās why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
This is my attempt to summarize the policy with salient points. For detailed verbose policy please visit http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy āā
Ā
The UK is one of the worldās leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest Ā£1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability ā from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. Itās why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
This is my attempt to summarize the policy with salient points. For detailed verbose policy please visit http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
Ā
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Ā
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), governmentās highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHijcisjournal
Ā
Technology is an endless evolving expression in modern era, which increased security concerns and pushed
us to create cyber environment. A National Cyber Security Strategy (NCSS) of a country reflects the state of
that countryās cyber strength which represents the aim and vision of the cyber security of a country.
Formerly, researchers have worked on NCSS by comparing NCSS between different nations for
international collaboration and harmonization and some researchers worked on policy framework for their
respective governments. However very insignificant attempts had been made to assess the strategic strength
of NCSS of Bangladesh by performing cross comparisons on NCSS of different Nations. Therefore, the
motive of this research is to evaluate the robustness of the existing cyber security strategy of Bangladesh in
comparison with some of the most technologically advanced countries in Asian continent and others like
USA, Japan, Singapore, Malaysia and India in order to keep the NCSS of Bangladesh up-to-date.
Overview of national cybercrime strategiesBenjamin Ang
Ā
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Projectās (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Ā
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
National Strategy to Secure 5G of the United States of AmericaNeil McDonnell
Ā
Neil McDonnell and the GovCon Chamber of Commerce bring this strategic plan to the public as part of our mashup effort to inform small business federal contractors.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
Ā
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
Ā
Managing High-Volume Cyber Attacks through Effective Strategies in Indonesia. Presentation at Cybersecurity for Government Asia Forum, Kuala Lumpur, January 2013
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Ā
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
Ā
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Ā
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), governmentās highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHijcisjournal
Ā
Technology is an endless evolving expression in modern era, which increased security concerns and pushed
us to create cyber environment. A National Cyber Security Strategy (NCSS) of a country reflects the state of
that countryās cyber strength which represents the aim and vision of the cyber security of a country.
Formerly, researchers have worked on NCSS by comparing NCSS between different nations for
international collaboration and harmonization and some researchers worked on policy framework for their
respective governments. However very insignificant attempts had been made to assess the strategic strength
of NCSS of Bangladesh by performing cross comparisons on NCSS of different Nations. Therefore, the
motive of this research is to evaluate the robustness of the existing cyber security strategy of Bangladesh in
comparison with some of the most technologically advanced countries in Asian continent and others like
USA, Japan, Singapore, Malaysia and India in order to keep the NCSS of Bangladesh up-to-date.
Overview of national cybercrime strategiesBenjamin Ang
Ā
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Projectās (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Ā
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
National Strategy to Secure 5G of the United States of AmericaNeil McDonnell
Ā
Neil McDonnell and the GovCon Chamber of Commerce bring this strategic plan to the public as part of our mashup effort to inform small business federal contractors.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
Ā
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
Ā
Managing High-Volume Cyber Attacks through Effective Strategies in Indonesia. Presentation at Cybersecurity for Government Asia Forum, Kuala Lumpur, January 2013
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Ā
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
Ā
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INFORMATION SYSTEMS 1
Security and safety of the power grid and its related computer information systems
Name of the student:
Name of the institution:
There have been increased use and application of information and communication technologies in most of critical infrastructures and departments of the government. They have proved to be fundamentally significant in helping the various departments to carry out their daily activities with a lot of ease and proficiency. However, these systems have also opened quite a considerable unforeseen opportunity both positive and negative. The infrastructures have become highly efficient and flexible and this has been very beneficial to the people. On the other hand, there have been persistent problems with cybercrimes and hackers who have outsmarted the government and the set securities protocols every now and then. This has made the state lose billions of dollars in a theft of its secrets and high-level information. In this case, it is right to analyze all the general impacts that can be put in place to prevent cybercrimes as well as threats. It is hence important to validate all the necessary measures that need to be put in place in every organization. The paper will hence give recommendations that can help the named organization solve the issues mentioned.
To address this issue, proper precautions needs to be put in place. The government has to demonstrate preparedness in combating this crime both in terms of systems put in place and also the legal jurisprudence (Higgins, 2016). The US power grid system is an interconnected system that is made up of power generation, transmissions software, and its distribution with a capacity to bring down the whole economy if not well protected. The nation's department of defense (DoD) is one of the most critical and sensitive institutions that can paralyze the state if tampered with by unscrupulous individuals. The situation is even worse if there is an advanced persistent threat (APT) against computers and software that operates the western interconnection power grid. This needs an urgent measure to remove the threat immediately and avoid its reoccurrence. We recommend the following security and safety of the power grid and its related computer information systems are taken by the concerned departments:
a. Creation of a special branch that is specifically dedicated to cyber security
It is high time for the government to come up with a special branch of the military personnel that will be dedicated to fighting cybercrimes (Higgins, 2016). Its main function will be to detect cybercrime activities, to develop mechanisms to prevent cybercrimes, apprehend, arrest and align cyber criminals in a court of law.
b. Creation of special court to determine cybercrime cases
Security and safety of the power grid and its related computer information systems and those crimes associated w.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
Ā
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
Ā
The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
Ā
The process of globalization, the emergence of new powers, and the increasing relevance of non-state actors are creating a multipolar and interconnected world. In the international arena, political and ideological diversity among the most relevant parties, diffusion of power, and the impact of changing global economics have added complexity to the geopolitical landscape. Businesses now operate in a much more difficult, heterogeneous environment.
This publication has been prepared by Zurich Insurance Group Ltd and ESADE.
Section 1: Emerging technologies will fundamentally change the nature of cyber risk.
Section 2: An inadequate global cyber governance framework.
Section 3: Toward a new governance framework: challenges and opportunities.
Project 2020
Scenarios for the Future of Cybercrime -
White Paper for Decision Makers
2
Contents
1. About Project 2020 3
2. Implications for Cybersecurity Stakeholders 3
3. Cybercriminal Threats 6
4. The View from 2012 8
5. Scenario Narratives for 2020 10
a. Citizen - Kinuko 10
b. Business - Xinesys Enterprises and Lakoocha 14
c. Government - South Sylvania 19
6. Beyond 2020 24
Appendix ā Scenario Method 25
3
1. About Project 2020
Project 2020 is an initiative of the International Cyber Security
Protection Alliance (ICSPA). Its aim is to anticipate the future of
cybercrime, enabling governments, businesses and citizens to
prepare themselves for the challenges and opportunities of the
coming decade. It comprises a range of activities, including
common threat reporting, scenario exercises, policy guidance and
capacity building.
The scenarios in this document are not predictions of a single
future. Rather, they are descriptions of a possible future, which
focuses on the impact of cybercrime from the perspectives of an
ordinary Internet user, a manufacturer, a communications service
provider and a government. The events and developments
described are designed to be plausible in some parts of the world,
as opposed to inevitable in all. They take their inspiration from
analysis of the current threat landscape, the expert opinion of
ICSPA members and extensive horizon scanning, particularly of
emerging technologies.
The European Cybercrime Centre (EC3) at Europol and the ICSPA
would like to express their heartfelt thanks to the Global Review
Panel of experts from governments, international organisations,
industry and academia who took the time to validate the scenarios.
This document is undoubtedly the better for it.
2. Implications for Cybersecurity Stakeholders
The scenarios presented in Section 5 raise a number of questions to
be answered by todayās stakeholders and decision makers. These
include:
ā¢ Who owns the data in networked systems, and for how
long?
ā¢ Who will distinguish between data misuse and legitimate
use, and will we achieve consistency? What data will the
authorities be able to access and use for the purposes of
preventing and disrupting criminal activity?
ā¢ Who covers (and recovers) the losses, both financial and in
terms of data recovery?
ā¢ Who secures the joins between services, applications and
networks? And how can objects that use different technologies
operate safely in the same environment?
4
ā¢ Do we want local or global governance and security
solutions?
ā¢ Will we be able to transit to new governance and business
models without causing global shocks, schisms and
significant financial damage?
If these questions remain unanswered, or the responses are
uncoordinated, we risk imposing significant barriers to the
technological advantages prom.
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxssuser454af01
Ā
F e B r U A r y 2 0 1 0 | v O l . 5 3 | n O . 2 | c o m m u n i c At i o n s o f t h e A c m 29
V
viewpoints
o
F
F
i
c
i
a
L
W
h
i
t
E
h
o
U
S
E
P
h
o
t
o
b
y
L
a
W
r
E
N
c
E
J
a
c
k
S
o
N
Communicationsā Inside Risks col-
umns over the past two decades have
frequently been concerned with trust-
worthiness of computer-communica-
tion systems and the applications built
upon them. This column considers what
is needed to attain new progress toward
avoiding the risks that have prevailed
in the past as a U.S. national cybersecu-
rity R&D agenda is being developed. Al-
though the author writes from the per-
spective of someone deeply involved in
research and development of trustwor-
thy systems in the U.S. Department of
Homeland Security, what is described
here is applicable much more univer-
sally. The risks of not doing what is de-
scribed here are very significant.
āPeter G. Neumann
C
Y B E r S pA C E I S T H E complex,
dynamic, globally intercon-
nected digital and infor-
mation infrastructure that
underpins every facet of so-
ciety and provides critical support for
our personal communication, econo-
my, civil infrastructure, public safety,
and national security. Just as our de-
pendence on cyberspace is deep, so
too must be our trust in cyberspace,
and we must provide technical and
policy solutions that enable four
critical aspects of trustworthy cyber-
space: security, reliability, privacy,
and usability.
The U.S. and the world at large are
currently at a significant decision
point. We must continue to defend
our existing systems and networks. At
the same time, we must attempt to be
ahead of our adversaries, and ensure
future generations of technology will
position us to better protect critical
infrastructures and respond to at-
tacks from adversaries. Government-
funded research and development
must play an increasing role toward
achieving this goal of national and
economic security.
Background
On January 8, 2008, National Security
Presidential Directive 54/Homeland Se-
curity Presidential Directive 23 formal-
ized the Comprehensive National Cyber-
security Initiative (CNCI) and a series of
continuous efforts designed to establish
a frontline defense (reducing current
vulnerabilities and preventing intru-
sions), which will protect against the
full spectrum of threats by using intel-
ligence and strengthening supply chain
security, and shaping the future environ-
ment by enhancing our research, devel-
Inside risks
The need for a national
Cybersecurity research and
Development Agenda
Government-funded initiatives, in cooperation with private-sector partners in
key technology areas, are fundamental to cybersecurity technical transformation.
DOI:10.1145/1646353.1646365 Douglas Maughan
President Barack obama greets White house cyber security chief howard A. schmidt, who
was appointed in December 2009.
ARt in
DeVeLoPment
30 c o m m u n i ...
F e B r U A r y 2 0 1 0 | v O l . 5 3 | n O . 2 | c o m m u n i c At i o n s o f t h e A c m 29
V
viewpoints
o
F
F
i
c
i
a
L
W
h
i
t
E
h
o
U
S
E
P
h
o
t
o
b
y
L
a
W
r
E
N
c
E
J
a
c
k
S
o
N
Communicationsā Inside Risks col-
umns over the past two decades have
frequently been concerned with trust-
worthiness of computer-communica-
tion systems and the applications built
upon them. This column considers what
is needed to attain new progress toward
avoiding the risks that have prevailed
in the past as a U.S. national cybersecu-
rity R&D agenda is being developed. Al-
though the author writes from the per-
spective of someone deeply involved in
research and development of trustwor-
thy systems in the U.S. Department of
Homeland Security, what is described
here is applicable much more univer-
sally. The risks of not doing what is de-
scribed here are very significant.
āPeter G. Neumann
C
Y B E r S pA C E I S T H E complex,
dynamic, globally intercon-
nected digital and infor-
mation infrastructure that
underpins every facet of so-
ciety and provides critical support for
our personal communication, econo-
my, civil infrastructure, public safety,
and national security. Just as our de-
pendence on cyberspace is deep, so
too must be our trust in cyberspace,
and we must provide technical and
policy solutions that enable four
critical aspects of trustworthy cyber-
space: security, reliability, privacy,
and usability.
The U.S. and the world at large are
currently at a significant decision
point. We must continue to defend
our existing systems and networks. At
the same time, we must attempt to be
ahead of our adversaries, and ensure
future generations of technology will
position us to better protect critical
infrastructures and respond to at-
tacks from adversaries. Government-
funded research and development
must play an increasing role toward
achieving this goal of national and
economic security.
Background
On January 8, 2008, National Security
Presidential Directive 54/Homeland Se-
curity Presidential Directive 23 formal-
ized the Comprehensive National Cyber-
security Initiative (CNCI) and a series of
continuous efforts designed to establish
a frontline defense (reducing current
vulnerabilities and preventing intru-
sions), which will protect against the
full spectrum of threats by using intel-
ligence and strengthening supply chain
security, and shaping the future environ-
ment by enhancing our research, devel-
Inside risks
The need for a national
Cybersecurity research and
Development Agenda
Government-funded initiatives, in cooperation with private-sector partners in
key technology areas, are fundamental to cybersecurity technical transformation.
DOI:10.1145/1646353.1646365 Douglas Maughan
President Barack obama greets White house cyber security chief howard A. schmidt, who
was appointed in December 2009.
ARt in
DeVeLoPment
30 c o m m u n i.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Ā
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Ā
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Ā
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotā¢UiPathCommunity
Ā
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalitĆ di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
š Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
šØāš«šØāš» Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Ā
Are you looking to streamline your workflows and boost your projectsā efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, youāre in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part āEssentials of Automationā series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Hereās what youāll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
Weāll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Donāt miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Ā
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Ā
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Ā
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
Ā
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more āmechanicalā approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Ā
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Monitoring Java Application Security with JDK Tools and JFR Events
Ā
Guideline Thailand Cybersecure Strate Digital Economy
1. AbstractāThe fight against cyber crime or cyberwarfare is
not of a telecommunications regulator alone, but rather of the
government and industry. Given the dynamic and growing
sophistication of such cyber crimes and cyber threats, it is
impossible to combat such risks with a static information
security. As mobile technology and network continues to evolve,
so should cybersecurity measures. The role of a
telecommunications regulator by the standard of International
Telecommunication Union, recommends that regulator must
established an early warning system and emergency response to
global cyber threats, training and skills development must be
provided on various aspects of cybersecurity, a framework
must be development for identification, warning and response
to such cybercrimes and cyber threats. Cybersecurity is
increasingly regarded as a strategic national issue affecting all
levels of society. It requires a high-level strategic approach to
cybersecurity that establishes national objectives and priorities.
It provides a strategic framework for a nationās approach to
cybersecurity. This paper proposes a guideline to develop the
National Cybersecurity Strategy. The research method is
qualitative in-depth interview with many experts in various
fields in order to develop a Cybersecurity Framework for
Governments. The contributions in this paper could assist
government in development of strategy and framework of
cybersecurity to protect and foster the digital economy.
Index Termsā Cybersecurity, National, Strategy, Guideline,
Digital economy.
I. INTRODUCTION
By 2015, at least 3 billion people, the equivalent of 40%
worldās total population, had access to the internet, where
45% of internet users are from Asia, compared to over 20%
in North and Latin America and 18% from Europe [1]. The
soaring internet usage contribution from Asia is entirely
because it holds 60% of the worldās population [2], making it
the next emerging frontier that has potential for tremendous
growth from mobile broadband and internet of things.
By the year 2017, it is estimated that mobile broadband
penetration will reach 70 percent of the worldās total
population. By the year 2020, the number of networked
devices (the āinternet of thingsā) will outnumber people by
six to one, transforming current conceptions of the internet
[3].
As mobile data usage and traffic has been increasing
rapidly and substantially, far faster than prevention
technology referred to as cybersecurity measures and
policies, countries worldwide are at a high risk of facing
information security challenges more than ever before. The
emergence such tremendous cybersecurity threats is due to
migration from 2nd
Generation and 3rd
Generation mobile
networks to 4G and then to 5G which is an all IP network,
making it prone to cybersecurity threats.
Especially with the emergence of low-cost smartphones
and widespread availability of mobile broadband (all IP
network), we can expect 99% of users connected to mobile
broadband via smartphones by 2020 [4]. In other words,
Cybersecurity is no longer a pure computer security issue.
Instead, every user connected to internet, via through
computers, tablets, smartphones, and Internet of things
devices (household appliances) is now prone to risk from
cybersecurity. Therefore, it is pertinent that we see
cybersecurity as a national policy mater, because the illicit
use of cyberspace can have a national wide impact and
hamper economic, public health, safety and national security
of a country.
Seeing the national wide impact it can have on a countryās
national security activities, it has should become a priority
for governments worldwide to ensure cybersecurity
measures and policies are in place, to protect lives and
property of their citizens, provide support to businesses and
industry sector in ensuring protection against such
cybercrimes, and most importantly, national leaders
understand the risks and have set measures for protection and
mitigation of cybersecurity threats. Nevertheless, a recent
2013 UN study revealed that a significant number of
countries are without a national cybercrime strategy [5].
This study contributes by stressing the importance of
implementation of proactive strategies, policies and
procedures guided by cybersecurity strategy. Most
importantly, this research proposes a cybersecurity
framework at a national level, as a guideline for governments
to devise a cybersecurity strategy and develop policies by
taking into consideration all stakeholders perspective,
ensuring these policies are a result of a cooperation from
local, national and global level [5]. Overall, the aim of this
research is to educate the importance of cybersecurity
measures and provide a framework for governments and
policy makers to mitigate disruption that can be caused by
cybersecurity. Bringing together public and private sector
stakeholders to build and ensure a resilient cybersecurity
posture will also foster economic development.
II. CYBERSECURITY STRATEGY AND POLICY
With the increase in proliferation of mobile broadband
connected devices, and technological shift from 2G to 4G,
The society has become increasingly dependent on IT. With
a shift to 4G it will become dependent on all IP network, this
has its benefits in increasing productivity and advancement
in all industry sectors, yet it also makes the networks more
vulnerable to cyber threats.
With advancement in technology, industries, companies
and governments have increasingly grown dependent on
their IT and putting critical assets on those systems as well.
Accordingly, this calls for a need for protection of those
critical assets and has become a topic of national interest.
A Guideline to Develop National Cybersecurity
Framework and Strategy
Settapong Malisuwan
2. Cyber-threats causing a stop in IT services in companies,
industries and government institutions can have a major
negative impact, putting a hold to services as well as
resulting in national security being threatened. Therefore in
addition to increasing digital economy readiness for business
sectors and government institutions, cybersecurity strategies
is also significant, as it has become the most important
challenge during the digital economy era.
The extent of cyber risk varies by industry sector, type of
business and the level of important of the information asset at
risk on the IT network. A more strategic understanding of the
value of information asset to the organizationās ability to
thrive is required, rather than just a focus on the performance
of the network or platform. Rapid consolidation and
collaboration among organizations means that organizations
now operate across multiple sectors and locations. An
organizationās security framework may be sufficient for its
original sector or geography, but expansion calls for security
measures to be reviewed in step [6].
The first scare on cybersecurity came since more than two
decades ago, thus cybersecurity strategies have surfaced, one
of the first countries to recognize the urgency in enacting
cybersecurity measures is United States. In 2003 they
published the National Strategy to Secure Cyberspace [7]. It
was a part of the overall National Strategy for Homeland
Security, which was developed in response to the terrorist
attacks on September 11th
2001.
In February 2014, the NIST, in United States publically
released its framework for Improving Critical Infrastructure
Cybersecurity (Framework). The framework provides a
methodology to develop cybersecurity measure and strategy
within an organization but it does not provide actionable
security measures. National Institute of Standards and
Technology is a non regulatory federal agency and provides a
voluntary framework. Hence, this framework is not
compulsory and is not currently a part of the current
cybersecurity formal regulation followed by the US.
Nevertheless, it is possible that this framework will become
the cybersecurity standard supported by federal
cybersecurity regulations. There is a growing agreement that
this framework is becoming the standard for cybersecurity in
US.
On the other hand, there is also no agreement on a
common definition of cybersecurity. The lack of common
understanding on cybersecurity as a protection against
cyber-threats is an obstacle to development of compatible
solution at an international level. There also appear to be
different views as to what falls within the scope of ānationalā
vs. āprivateā cybersecurity.
The national cybersecurity strategies influenced by two
significant aspects, 1) whether governments perceive
Internet as ātrusted spaceā or ādistrusted spaceā. 2)
Cybersecurity needs a clear scope. Are all notions connected
to internet and at risk an aspect of cybersecurity? Data,
identity, and/or āessential servicesā (e.g. electricity
distribution).
III. METHODOLOGY
The aim of this paper is to propose a guideline to develop
National Cybersecurity Strategy. For this research we have
conducted in-depth interviews with subject matter experts in
areas such as ICT technologies, Academic leaders in
Business and Economic aspects, Law, Social Science and
current Cybersecurity policy makers in Thailand. There are
fifteen experts in various areas as shown in Table I. The
conceptual framework of the research is illustrated in Fig. 1.
Table I: Interviewing experts and area of expertise
Area of expertise Numbers
ICT technologies 3
Business and Economic 3
Law 3
Social science 3
Cybersecurity policy 3
Fig. 1. The conceptual framework of the research
IV. RESULTS AND DISCUSSIONS
Building an effective cybersecurity strategy can pose
many challenges. A document that ticks all the right boxes
for what should be included can be easily made. To develop a
strategy it is necessary to achieve cooperation and
engagement from a wide range of stakeholders on a common
course of action. Certainly, this process will be a difficult
task. The development team should be realized that the
process of developing the strategy is generally as important
as the final outcome.
A.Framework
The analysis results from this paper recommended that
Cyber Program Management (CPM) framework proposed by
reference [8] should be selected as a reference to build the
proposed Cybersecurity framework. The basis of this
framework takes into consideration the role of information
security, IT in businesses and government processes, the
level of importance of valuable and information and risk
posed if it was leaked, and the overall risk on management
structure if under cybersecurity threat. Therefore, this
clarifies organizationās strategic priorities and organization
objectives for both business and government sector.
The research also recommended that the NIST
Cybersecurity Framework [9] in conjunction with the CPM
from reference [5] is highly recommended as references to
build the prototype framework together with other
information risk management tools. Finally, this paper
proposed the integrated framework from both recommended
frameworks as illustrated in Fig.2.
It will enable organizations of all sizes to effectively
demonstrate to stakeholders in building a robust
cyber-resilience approach. Hence, the study in this paper can
conclude major issues to construct the national
cybersecurity. The framework consists of the following
aspects:
1. For an integrated cybersecurity strategy that takes into
consideration roles of all stakeholders, the framework
Survey scientific
papers and
business reports
Interview
experts
Analyzing results
A guideline to develop
the Cybersecurity
Framework and Strategy
3. must be created through collaboration between industry
and government. It must consist of actionable and
specific standards, guidelines and practices to promote
national security. The framework must adopt a
structured approach to understand threats and have
specific guidelines for mitigating risks from cyber
threats. This will help everyone prioritize and implement
important cybersecurity controls faster and with more
consistency.
2. The five phases of Cybersecurity Framework are
Identify, Protect, Detect, Respond and Recover. This
lessens the cybersecurity risks as it organizes
information, enables risk management decisions and
enable management and mitigation of threats by
learning and improving from previous experience.
3. The Cybersecurity Framework will provide a common
language in order to ensure coherence in understanding,
managing and expressing expressing cybersecurity risk
both internally and externally to an organization. The
Framework can be used to help identify and prioritize
actions for reducing cybersecurity risk, and it is a tool
for aligning policy, business, and technological
approaches to managing that risk.
4. This framework will be a guideline to enable businesses
and governments to understand cybersecurity practices
and investments that are in line with specific
requirements of each organization. The framework is not
suitable but all security activities but is a good starting
point for every organization. It is constructed in order to
give businesses and governments a direction. In other
words, the Framework does not provide a āone size fits
allā list of security activities that should be implemented
or, for that matter, even a specific list of essential
security controls that should be a baseline starting point
for every organization.
5. The Framework provides a methodology to think
through and develop a cybersecurity program within an
organization ā it is not the solution itself. Simplistically,
the Framework is almost like a GAP analysis
6. The development of this framework integrates principles
from many other existing cybersecurity and risk
management standards which include the NIST SP 800
series, COBIT, ISO/IEC, and the Critical Security
Controls (CSC). However, as cybersecurity threat
changes in nature or if the intensity increases or
decreases, it is advised for this paper to continue to be
developed and improved as industry provides feedback
on implementation. As the Framework is put into
practice, lessons learned will be integrated into future
versions. This will ensure it is meeting the needs of
critical infrastructure owners and operators in a dynamic
and challenging environment of new threats, risks, and
solutions.
7. During the design process of the Cybersecurity
Framework, the designers should consider the questions
below.
How can the Preliminary Framework:
1) adequately define and address outcomes that
strengthen cybersecurity and support business
objectives?
2) enable cost-effective implementation?
3) appropriately integrate cybersecurity risk into
business risk?
Service
Tactical Level
Vision & Strategy (National level)
Strategic Level
Enterprise Cybersecurity Framwork
Organization & Authority
Policy Incident Management Risk Management
Audit & Compliance Architecture Education & Awareness
Operation Management
Networksecurity
Threatandvulnerability
management
Softwaresecurity
Hostsecurity
Dataprotection
Identityandaccess
management
Assetmanagement
Monitoring&
Measurement
AccountManagement&
Outsourcing
Businesscontinuity
management
Incidentresponseand
process
Confidentiality Integrity Availability
National and Organization Assets
Technology ptotection Functional operation Resiliency
National
Cybersecurity
Framework
GovernmentAgenciesandBusinessEnterprise
Risk Statement
Specific to each risk
category and relates to
security objectives and
threats
Objective
Specific to each security
element
Threats
Specific to each security
element
Strategic Plan and
Projects
Based on risk and
targeted security
objectives
Fig.2 Integrated Cybersecurity Framework
4. 4) provide the tools for senior executives and boards
of directors to understand risks and mitigations at
the appropriate level of detail?
5) enable senior executive awareness of potential
consequences of successful cyber attacks?
6) provide sufficient guidance and resources to aid
businesses of all sizes while maintaining
flexibility?
B.Strategy
The objective of the national cybersecurity strategy is to
achieve a continuous improvement approach which will
make it possible to more efficiently and effectively
implement cybersecurity measures. The strategy process
manifests itself at several levels and it includes different
phases. The goal is to create a continuous strategy process
with parts that regularly repeat and generate continuous
improvement. In this research, the continuous improvement
process of cybersecurity is integrate into the modified
Ends-Ways-Means cybersecurity strategy model to complete
the our proposed model as shown in Fig. 3 [5].
The results of the research also provides key cyber risk
management concepts as follows: [10]
1) Include cyber risks into existing risk management and
governance programs.
2) Put forward cyber risk management discussions to the
top level managers and CEO.
3) Focus on industry standards and best practice
4) Evaluate and then quickly react and be proactive in
managing organizationās specific cyber risks.
5) Trial and test cyberthreat response plans and
procedures.
6) Coordinate cyber incident response planning across
the enterprise.
7) Maintain situational awareness of cyber threats.
8) Proactive and efficiency in dealing and reacting to
cybercrime, adequate crossāborder provisions are
needed, and international cooperation and mutual
assistance within law enforcement needs to be
enhanced [11].
9) Businesses must have proactive measures to manage
cyber threats and fast and effective response
strategies. They should plan for, protect against, detect
and respond to cybersecurity incidents as shown in
Fig.4. Table II shows the detail of proactive measure
of cybersecurity. Cyberattacks cannot be foreseen but
increase in efficiency to limit damage is significant
[6].
Ends
National cybersecurity
objectives
Timescales & Performance Measures
Actions on cybersecurity priorities
National cybersecurity priorities
Clear, succinct and achievable
cybersecurity ends/objectives
National cybersecurity strategic
context: Cyber threats and risks
A clear statement of purpose, scope
and assumptions of the strategy
National
Cybersecurity
Strategy
Strategic Context
National Interests
Threats and Risks
International Treaties and
Conventions
Factors influencing
national cybersecurity
activities
National Interest
Defense of Homeland
Economic Well-being
Favorable World Order
Promotion of Values
Identify Cyber threats
and rate their impact
Means
Legal Resources
Technical & Procedural
Organizational
Resources devoted to
action on cybersecurity
priorities
Capacity Building
International Cooperation
Command and Control
Interagency Cooperation
Ways
Approaches to executing
cybersecurity strategy
National Response Plan
Analysis
Planning
Decision Production
The continuous improvement process of cybersecurity
Political mandate
Political approval
Implementation
Fig.3 National Cybersecurity Strategy Model (Modified from [8])
5. Fig.4 Proactive measures of Cybersecurity [6]
Table II: Proactive measure of Cybersecurity
Measure Action
Plan ļ· Assess environment
ļ· Identify and remediate gaps
ļ· Develop incident response plan
Protect ļ· Harden environment
ļ· Improve authentication
ļ· Manage privileged accounts
ļ· Limit unnecessary communication
ļ· Potentially reduce user privileges
Detect ļ· Network security monitoring program in place - not
just IDS
ļ· Key network egress points monitored
ļ· Logs archived and analyzed
ļ· Key host information collected
Respond ļ· Computer Incident Response Team (CIRT) staffed
and trained
ļ· CIRT chartered with authority to drive response
ļ· Response and remediation cycle times are measured
10) Organizations must develop strategy to detect ad
mitigate potential cyber attacks. Research should be
conducted to understand the nature of cyberthreats
that need protection against.
11) Must efficiently manage cybercrime, coordinate with
neighboring and cybersecurity crossborder
institutions. Must also ensure mutual understand of
cybersecurity and strategies and laws are consistent
with of region and other neighboring countries.[10].
C.Recommendations
The results of the research gave recommendations as
follows:
1. To strengthening security systems, the government
should open a dedicated cybercrime center. Meanwhile,
the government has to continue to seek new
opportunities for international co-operation.
2. Information security agencies have to work with
policymakers to take a broad view and to treat attacks on
computers and infrastructure the same way. The
government should not separate the protection of
infrastructure from the applications which run on top of
it.
3. The government should collaborate with telecom sector,
banking, transport, and public sectors to adopt risk
management measures and to report significant
incidents to competent authorities.
4. Cybercrime conducted in one application, could provide
access to other applications the user uses. Therefore it is
borderless in naure and makes cybercrime investigations
more complicated for law enforcement authorities. To
effectively tackle cybercrime, adequate crossāborder
provisions are needed, and international cooperation and
mutual assistance within the region law enforcement
needs to be enhanced.
5. The government must understand that the Cybersecurity
framework is a living document that helps an
organization define their current and desired
cybersecurity state, identify areas of need, and how well
they are progressing in that direction, as well as advice
on how to communicate to internal and external
stakeholders about risks that threaten services.
6. Cybersecurity is a global issue, it is no longer just a
single business or single country issue. Therefore, it
requires cooperation from governments and industry
alike to recognize cybersecurity as a shared global
problem. Hence, the government must encourage all
stakeholders consider doing the following.
a) Revise security policy documents to adopt and
reflect the language and vocabulary of the
framework.
b) Establish regular procedures for identifying new
threats, testing security procedures, and updating
procedures to address those threats, thereby
establishing an adaptive cybersecurity program.
c) Ensure that senior management is active in
establishing a cybersecurity strategy for the
company and reviewing the implementation of
that strategy.
CONCLUSION
Cybersecurity has become a vital national security issue
that requires tremendous attention and planning to mitigate
risk it has on nations and even regions. The aim of this paper
is to provide a guideline to draw up a Cybersecurity
Framework for governments to follow. However,
cybersecurity is not a single country of specific company
issue. All stakeholders including governments and industries
need to recognize the urgency of protection against
cyberthreats. Hence, an analysis of trends in cyberthreats,
best practices in protection and the level of international
coorperation required must be done to address not just
present but future challenges.
The major objective of this research aims to propose a
guideline to construct the National Cybersecurity
Framework. This guideline aims to provide useful and
practical recommendations to relevant public and private
stakeholders on the development, implementation and
maintenance of a cybersecurity strategy. More specifically
the guide aims to: define the areas of interest of a
cybersecurity strategy; identify useful recommendations for
public and private stakeholders; help countries to develop,
manage, evaluate and upgrade their national cybersecurity
strategy; contribute to the Commissionās efforts towards an
integrated international cybersecurity strategy. The guide
describes: a simplified model for developing, evaluating and
maintaining a national cybersecurity strategy.
Cybersecurity planning and implementation efforts must
extend far beyond security and IT personal to include all
stakeholders such as business owners and governments but
must include the cooperation at a regional and international
level.
6. REFERENCES
[1] InternetWorldStats. (2015). Internet Users in the World Distribution -
2014 Q4. Available: http://www.internetworldstats.com/stats.htm
[2] WorldPopulationStatistics. (2014). Asia Population 2014. Available:
http://www.worldpopulationstatistics.com/asia-population-2013/
[3] UN, "Comprehensive Study on Cybercrime," UNODC, Vienna2013.
[4] Cisco, "The Internet of Everything and the Connected Athlete: This
Changesā¦ Everything," 2013.
[5] F. Wamala, "ITU National Cybersecurity Strategy Guide," ed, 2011.
[6] Ernst&Young, "Get ahead of cybercrime," 2014.
[7] TheWhiteHouseWashington, "THE NATIONAL STRATEGY TO
SECURE CYBERSPACE 2003," ed, 2003.
[8] ITU, "Guidelines for the preparation of national wireless broadband
masterplans for the Asia Pacific region," 2012.
[9] NIST, "Framework for Improving Critical Infrastructure
Cybersecurity," 2014.
[10] HomelandSecurity, "Cybersecurity Questions for CEOs," 2014.
[11] EuRActiv. (2012). Cybersecurity: Protecting the digital economy.
Available:
http://www.euractiv.com/infosociety/cybersecurity-protecting-oil-inte
rnet-linksdossier-508217#group_positions
Settapong Malisuwan was born on 24th
March 1966
in Bangkok, Thailand. He was awarded full
scholarship from Thai government for PhD in
electrical engineering (telecommunications),
specializing in mobile communication systems from
Florida Atlantic University (State University System
of Florida), Boca Raton in 2000. He received his MSc
in electrical engineering in mobile communications
system from George Washington University in 1996
and was awarded First Class Honors, Gold Medal Award and Outstanding
Cadet Award by the university. He also achieved MSc in electrical
engineering in telecommunication engineering from Georgia Institute of
Technology in 1992. Furthermore, he achieved military education from
Special Warfare Center, Thailand, specializing in Ranger and Airborne
Courses in 1989 and 1988 respectively. He is currently the Vice Chairman
and Board Commissioner of National Broadcasting and
Telecommunications Regulator in Bangkok, Thailand. He was awarded The
āScience Towards the Excellence in 2013ā by The Senate Standing
Committee on Science, Technology, Communications and
Telecommunications. His research interests are in electromagnetics,
efficient spectrum management and Telecommunications policy and
management.