This document outlines Ghana's critical national internet infrastructure and proposes strengthening it. It discusses automating Ghana's .gh domain name registry and establishing a governing body. It also proposes deploying root servers through joint efforts of the registry and internet exchange point. The document outlines Ghana's national cybersecurity organization CERT-GH and an IPv4 to IPv6 transition task force. It describes Ghana's internet exchange point and need for a national internet backbone plan. The document proposes locating key infrastructure elements at Ghana's new national data center to foster synergies between national internet resources.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.
Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.
Meanwhile, due to the growing sophistication and complexity of ICT and the global ICT supply chains, federal agency information systems are increasingly at risk of compromise, and agencies need guidance to help manage ICT supply chain risks
Singapore's National Cyber Security StrategyBenjamin Ang
Singapore's National Cyber Security Strategy was launched by the Singapore government at the inaugural Singapore International Cyber Week 2016. This presentation gives an overview of the 4 pillars of the Strategy and some of its implementation steps so far, including the upcoming new Cybersecurity Act, and the SGD 10 million fund for capacity building in ASEAN. You can download the full Strategy at www.csa.gov.sg
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.
Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.
Meanwhile, due to the growing sophistication and complexity of ICT and the global ICT supply chains, federal agency information systems are increasingly at risk of compromise, and agencies need guidance to help manage ICT supply chain risks
Singapore's National Cyber Security StrategyBenjamin Ang
Singapore's National Cyber Security Strategy was launched by the Singapore government at the inaugural Singapore International Cyber Week 2016. This presentation gives an overview of the 4 pillars of the Strategy and some of its implementation steps so far, including the upcoming new Cybersecurity Act, and the SGD 10 million fund for capacity building in ASEAN. You can download the full Strategy at www.csa.gov.sg
Cybersecurity legislation in Singapore (2017)Benjamin Ang
Reviewing the Personal Data Protection Act (PDPA), Computer Misuse and Cybersecurity Act (CMCA), and the draft Cybersecurity Act Cybersecurity Bill of Singapore, correct up to November 2017
New developments in cyber law - Singapore and beyondBenjamin Ang
New developments in the Computer Misuse and Cybersecurity Act, Singapore; actions by the Personal Data Protection Commission under the Personal Data Protection Act (PDPA); thought on the upcoming Cybersecurity Act 2017
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
A primer on Singapore's Cybersecurity Strategy, and the laws of Singapore relating to Cybersecurity (Computer Misuse Act, Personal Data Protection Act, Cybersecurity Act 2018). Also contains a summary of the results of the Public Consultation on the Cybersecurity Bill
Overview of national cybercrime strategiesBenjamin Ang
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Project’s (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
16 recommendations for better cybersecurity, digested from the 454 page COI (Committee of Inquiry) report on Singapore's biggest data breach to date (1.5 million patients' records), presented at Cyber Resilience and Risk Forum 2019, Singapore. Useful info for board directors, managers, CSOs, CISOs, cybersecurity professionals
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificAPNIC
APNIC Foundation Program Director Sylvia Cadena participated at the Stockholm Internet Forum from 15 to 18 May 2017 and presented an overview of APNIC's support for CERT development in the region to help ensure the Internet remains secure and stable.
The presentation of a public hearing of the European Parliament in Brussels, Belgium in 2018. Expert witness Lars Hilse was heard on the risks of cyber terrorism against critical infrastructure and public places.
Presentations from the SPF Spectrum Resilience workshop on 03 May 2018
More information about the UK Spectrum Policy Forum is available here.
http://www.techuk.org/about/uk-spectrum-policy-forum
This is my attempt to summarize the policy with salient points. For detailed verbose policy please visit http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
This presentation presentated by Mohd Shamir B Hasyim, Vice President Government and Multilateral Engagement, Cyber Security Malaysia, 10th September 2013 on #IISF2013
An Integrated Approach For Cyber Security And Critical Information Infrastructure Protection
"Bite-sized" updates from TRPC on tech-related developments in APAC. In telecoms, South Korea appears to be the first country in APAC to allow 6GHz Wi-Fi. OTT services continue to be scrutinised, with Australia and Japan casting an eye on misinformation and slander efforts. In FSI, South Korea will be hoping to expand the use of big data, while Australia is relaxing rules on regulatory sandbox participation.
Abhaya Sumanasena - Real Wireless - Spectrum Options techUK
Presentations from the SPF Cluster 2 & 3: Release Mechanisms & Flexible Spectrum Access workshop on 21 May 2018
More information about the UK Spectrum Policy Forum is available here.
http://www.techuk.org/about/uk-spectrum-policy-forum
Tampering With the Open Internet: Experiences From AfricaAFRINIC
The talk explores the ways, explicit and covert, in which states and private operators hinder the free flow of internet traffic. The security and privacy implications of such tampering numerous, but could intermediaries in Africa play a more proactive role to minimise threats to an open internet? This talk also notes how practices such as surveillance and censorship affect civic engagement, and, as food for thought, poses the question of how the economic and social impacts of internet traffic tampering in Africa countries should be accurately measured.
Cybersecurity legislation in Singapore (2017)Benjamin Ang
Reviewing the Personal Data Protection Act (PDPA), Computer Misuse and Cybersecurity Act (CMCA), and the draft Cybersecurity Act Cybersecurity Bill of Singapore, correct up to November 2017
New developments in cyber law - Singapore and beyondBenjamin Ang
New developments in the Computer Misuse and Cybersecurity Act, Singapore; actions by the Personal Data Protection Commission under the Personal Data Protection Act (PDPA); thought on the upcoming Cybersecurity Act 2017
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
A primer on Singapore's Cybersecurity Strategy, and the laws of Singapore relating to Cybersecurity (Computer Misuse Act, Personal Data Protection Act, Cybersecurity Act 2018). Also contains a summary of the results of the Public Consultation on the Cybersecurity Bill
Overview of national cybercrime strategiesBenjamin Ang
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Project’s (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
16 recommendations for better cybersecurity, digested from the 454 page COI (Committee of Inquiry) report on Singapore's biggest data breach to date (1.5 million patients' records), presented at Cyber Resilience and Risk Forum 2019, Singapore. Useful info for board directors, managers, CSOs, CISOs, cybersecurity professionals
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificAPNIC
APNIC Foundation Program Director Sylvia Cadena participated at the Stockholm Internet Forum from 15 to 18 May 2017 and presented an overview of APNIC's support for CERT development in the region to help ensure the Internet remains secure and stable.
The presentation of a public hearing of the European Parliament in Brussels, Belgium in 2018. Expert witness Lars Hilse was heard on the risks of cyber terrorism against critical infrastructure and public places.
Presentations from the SPF Spectrum Resilience workshop on 03 May 2018
More information about the UK Spectrum Policy Forum is available here.
http://www.techuk.org/about/uk-spectrum-policy-forum
This is my attempt to summarize the policy with salient points. For detailed verbose policy please visit http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
This presentation presentated by Mohd Shamir B Hasyim, Vice President Government and Multilateral Engagement, Cyber Security Malaysia, 10th September 2013 on #IISF2013
An Integrated Approach For Cyber Security And Critical Information Infrastructure Protection
"Bite-sized" updates from TRPC on tech-related developments in APAC. In telecoms, South Korea appears to be the first country in APAC to allow 6GHz Wi-Fi. OTT services continue to be scrutinised, with Australia and Japan casting an eye on misinformation and slander efforts. In FSI, South Korea will be hoping to expand the use of big data, while Australia is relaxing rules on regulatory sandbox participation.
Abhaya Sumanasena - Real Wireless - Spectrum Options techUK
Presentations from the SPF Cluster 2 & 3: Release Mechanisms & Flexible Spectrum Access workshop on 21 May 2018
More information about the UK Spectrum Policy Forum is available here.
http://www.techuk.org/about/uk-spectrum-policy-forum
Tampering With the Open Internet: Experiences From AfricaAFRINIC
The talk explores the ways, explicit and covert, in which states and private operators hinder the free flow of internet traffic. The security and privacy implications of such tampering numerous, but could intermediaries in Africa play a more proactive role to minimise threats to an open internet? This talk also notes how practices such as surveillance and censorship affect civic engagement, and, as food for thought, poses the question of how the economic and social impacts of internet traffic tampering in Africa countries should be accurately measured.
Vaikka valikoimasi työntekijälähettiläs olisi todella ansioitunut sosiaalisen median käyttäjä, ei hänkään välttämättä kaikkea tiedä, esimerkiksi tekijänoikeuksista. Hän kaipaa tuohon asiaan siis apua ja sinun kannattaa sitä antaa, jotta työntekijälähettilyys kantaisi hedelmää.
Lue artikkeli: http://www.zento.fi/blog/tyontekijalahettilas-kaipaa-johtamista/
Työntekijälähettilyys-ohjelma vaatii toimiakseen muitakin toimijoita kuin työntekijälähettiläät. Jonkun esimerkiksi pitäisi hoitaa riittävän sisällön virta työntekijälähettiläiden verkostoille jaettavaksi.
Lue artikkeli: http://www.zento.fi/blog/tyontekijalahettilyys-ohjelman-avainroolit/
Jos mietit, mikä on työntekijälähettiläs ja miten se hyödyttää yritystä tai organisaatiota, niin lue tämä tiivistelmä!
Voit käydä lukemassa tämän sisällön laajempana Zenton blogissa: http://www.zento.fi/blog/mita-tarkoittaa-tyontekijalahettilas/
Yleiskatsaus yhteisömanagerin tehtäviin. Mitä tekee yhteisömanageri, entä sisältömanageri? Yhteisön määritelmä. Tarpeet. Motivaatio. Tavoitteellisuus. Mittarit. Yhteisöjen johtaminen. Millainen on hyvä yhteisömanageri. Yhteisömanageroinnin tulevaisuus.
How should employees be part of my marketing mix? Can I extend the reach of my brand’s messages through employees in social media? Can I drive increased engagement of employees at work? Does the shift of social media from organic messaging to paid advertising concern you? Will there be a time when my employees will carry my messages further than our brand's social pages? If so, this research report is for you.
Perusteet kuntoon - näin onnistut sosiaalisessa mediassaDarwin Oy
Darwin Sosiaalisen median tehoaamu 24.3.2010
Miten sosiaalinen media otetaan tehokäyttöön ja mitä se vaatii yritykseltä. Tavoitteiden asettaminen, resurssit ja toiminnan edellytykset. Riskien ja hyötyjen vertailu sekä luovan idean merkitys.
Presentation from Networkshop46.
GÉANT, by Mian Usman, GÉANT.
Campus network refresh, by David Stockdale, Imperial College London.
Multicast QUIC for video content delivery, by Richard Bradbury, BBC Research & Development.
The Importance of adopting, implementing and following up IPv6 migration at a country/national Level. IPv6 preparedness is increasingly urgent and growth of the Internet Assigned Numbers Authority pool for available IPv4 addresses is already exhausted.
The Presentation provide guidance of what the issues to consider when planning and monitoring an IPv6 migration managed by different stakeholders .
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
23rd PITA AGM and Conference: Key business drivers for IPv6APNIC
Senior Internet Resource Analyst Elly Tawhai gives a presentation on the key drivers for IPv6, covering how IPv6 enables the sustainable growth of the Internet, and the possibility for new services and business opportunities on large-scale IP installations.
Peering Asia 2021v: Little-known IXPs in Asia PacificAPNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng presents on less well known IXPs in the region and the important role they play in their economies.
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions, duta a terme a la comunitat usuària de LAC-IX (Latin America and Caribbean IXPS) el 30 d'abril de 2021 en format virtual.
In these slides, you will be able to learn about what we will need to do in order to enable 5G and how open source can help accelerate that transformation.
Similar to Strenthening Critical Internet Infrastructure (20)
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2. Critical National Internet Infrastructure
Domain
Name
Registry (.gh)
Root Server
Copy ( F-
Root Project)
Cyber
Security-
Infrastructure
Protection
IP Numbers
Resources
(IPv4 to IPv6)
Internet
Exchange
Point (G IXP)
National
Internet
Backbone
(Private,
Gov.)
International
Gateways
Operators
National
Datacentre
Infrastructure
3. Domain Name (.gh) Registry Project
Automation Project Completed
Equipment Installed and operational
Technical Management to be outsourced to a consultant
to operate
GDNR - Domain Name Organization
Established by ACT of Parliament (ACT 772 –ETA)
Multi-stakeholder Local Internet Community
Develop Policy for Registry
Oversee operation of registry
Registry Board to lead
4. .gh Registry Project
Registry Ready for DNSSEC implementation
3R Registry Model to be adopted
Call for EOI for Registrars (Open)
Registrar Accreditation Process
Registrar Association to be formed to Interface with
registry
5. Root Server Project
Domain Name Registry planning to Deploy copy of
root server
GIXP also planning to deploy copy of root server
Need to harmonize effort – Look at installing L- and
R- Servers
Ghana to benefit for speeding up of Internet by joint
effort
Joint committee proposed to work on this project
6. Cyber Security – CERT-GH
National Cyber Security Policy and Strategy already developed by Ministry
with Multi-stakeholder support
Security Incidence Handling and response
National CERT (CERT-GH) Deployed as coordination CERT
Ministry of Communications & ITU /IMPACT
Sectoral CERTs to be developed along side
ARN, GOV (NITA), NSA, FIN, ISP, BUS
Coordination Centre @ Ghana Multimedia Centre
Team to move to 3rd floor of new MOC building
Constituents of National CERT (mostly network operators) to manage
incidences when they receive incidence reports
Governance of CERT-GH – Independent entity with government funding ?
PPP Information Sharing platform developed and being operationalized
Governance- Info Sharing platform by PPP Steering Committee
7. IPv4 to IPv6 Transition
IP number resources administered by AfriNIC
Subscribe to be member
Depletion of IPv4 ( Critical Numbers Resources)
Need to adopt IPv6 number system
Migration Plan
Capacity Building
Equipment compliance enforcement
Need to have National Task Force
All Stakeholders
MOC & NITA to spear heard formation of Taskforce
8. Ghana Internet eXchange Point (GIXP)
Established in 2005
Managed by GIX Association
Has membership of 17 Operators
Exchange of Local traffic
Ghana traffic remains in Ghana
Members mostly commercial Operators
Governance?
Non-commercial (Edu) operators
Issues?
9. National Internet backbone
Principally driven by private operators
NCBC (Vodafone Wholesale)
Mobile Operators
Government providing infrastructure
NITA Eastern Corridor completed, Western Corridor planned
GIFEC Universal Service Obligations
Policy, laws on sharing infrastructure
Issues
High Cost of maintenance of Fiber
Incentives for deployments
Need for national plan to guide future expansion of
Infrastructure
10. International Gateway
Five Sub-marine Operators
0ver 12,3 Tbps capacity
Satellite Gateway operators?
Policy and Law on International gateway
Promoting International Gateways
Issues and challenges
11. National Data Centres InfrastructurePrimaryDC
spans across three floor
in new NITA-MOC
Building near AITI-KACE
Over 600 Racks space
and up
- 2 Pentabyte storage
capacity
Sits on 10GBps Fiber
around heart of Accra
SecondaryDC
Located in Kumasi
Connected to Primary via
high speed Fibre Optics
cables
To operate Active –Active
with Primary Data Center
DisasterRecovery
Located in Tamale
Connected to Primary &
Secondary via High
speed Fibre Optics
•Primarily to store all government data securely
•Lease of capacity to private sector for DC and DR services
12. Way Forward
Registry @ National Datacenter
GIXP @ National Datacenter
GarNET Exchange @ National Datacenter
CERT-GH Operating from National Dataenter
Synergies of Registry, GIXP, GarNET and National CERT
and other National Infrastructure offer good
preposition Joint Root Server Project and other Critical
National Internet Ifrastructure