SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
e-Government Centre Moldova




               Digital security for better governance
                         and public services
                     Digital information security trainings
                                     2013
                                    Chisinau


Presentation Title                                             12.03.2013
e-Government Centre Moldova




                       Policy and legal framework
                     development for Digital Security
                               Hannes Astok
                                Senior Expert
                           eGovernmance Academy


Presentation Title                                            12.03.2013
Why policy framework?
 Growing threats and security concerns
 Vulnerability of the critical information systems
 Need for coordinated activities
 Clear roles and responsibilities between the
  institutions
 Better protection of information systems and critical
  infrastructure
 Estonian Cyber Security Strategy 2008-2013
Goals of the strategy
Establishment of a multilevel system of security
 measures
Expanding Estonia’s expertise in and awareness of
 information security
Adopting an appropriate regulatory framework to
 support the secure and extensive use of information
 systems
Goals of the strategy: more specifically
1. Development and implementation of a system of
    security measures
   1. Protection of the Critical Information
       Infrastructure (CII)
   2. Development and Implementation of a System
       of Security Measures
   3. Strengthening of Organisational Co-operation
Goals of the strategy: more specifically
2. Increasing competence in information security
   1. Organisation of Training in Cyber Security
   2. Enhancing Research and Development
3. Development of a legal framework for cyber
security
4. Development of international co-operation
5. Raising awareness of cyber security
Relations to the other national
development plans
Information Security Interoperability Framework
 (2007)
Information Society Strategy 2013
Knowledge-Based Estonia: R&D Development
 Strategy 2007-2013
Criminal policy development strategy
Education and health development plans
Legal framework -International law
Council of Europe
Convention on Cybercrime 2004
EU legal framework
Attacks against information systems: Council
 Framework Decision 222/2005/JHA
Protection of personal data (95/46/EC and
 2002/58/EC);
Electronic communications (2002/58/EC);
Retention of data (2006/24/EC);
Re-use of public sector information (2003/98/EC;
 under revision) ;
Information society services (2000/31/EC).
National legal framework
Penal Code: responsibility and penalties about
 various types of crime and attacks
Electronic Communications Act: requirements for
 publicly available electronic communications
 networks and communications services
National legal framework 2
Personal Data Protection Act: clear legal basis for
 processing any kind of personal data
Public Information Act: regulates the basis and
 procedures for the accessing of public information
National legal framework 3
Information Society Services Act: limits the liability
 of Internet service providers for the content of their
 service, spam related issues and general
 requirements for the provision of information society
 services.
International Cooperation
United Nations: issues of cyber security are
 addressed by a high-level expert group of the
 Internet Governance Forum (IGF) and the
 International Telecommunication Union (ITU).
International Cooperation: EU
European Commission
The European Network and Information
 Security Agency (ENISA) provides support to
 EU member states, institutions and
 entrepreneurs in the prevention and
 management of breaches in information security.
International Cooperation: EU 2
European Programme for Critical
 Infrastructure Protection – EU reseach
 network realted to cyber security
Q&A
                                        Thank You!

                                          Hannes Astok
                     www.ega.ee | hannes@astok.ee| +372 5091366 | hannesastok
                      E-Governance Academy | Tõnismägi 2, 10112 Tallinn, Estonia




Presentation Title                                                                 12.03.2013

Más contenido relacionado

La actualidad más candente

CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...Ethical Sector
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyApplications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyDavid Bess
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV IJECEIAES
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...Miguel A. Amutio
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

La actualidad más candente (13)

CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyApplications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Destacado (9)

PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
 
Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013
 
Hannes astok data protection agency
Hannes astok data protection agencyHannes astok data protection agency
Hannes astok data protection agency
 
Mpay&Mcloud
Mpay&McloudMpay&Mcloud
Mpay&Mcloud
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariuc
 
The new era of smart
The new era of smart The new era of smart
The new era of smart
 
Digital Transformation by Richard Baird
Digital Transformation by Richard BairdDigital Transformation by Richard Baird
Digital Transformation by Richard Baird
 
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 
Digital Economy Outlook 2015
Digital Economy Outlook 2015Digital Economy Outlook 2015
Digital Economy Outlook 2015
 

Similar a Digital Security Policy Framework Moldova

Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Brian Honan
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)Ismael Peña-López
 
E-goverment Estonia framework Arvo Ott
E-goverment Estonia framework  Arvo OttE-goverment Estonia framework  Arvo Ott
E-goverment Estonia framework Arvo OttVincent Everts
 
Internet Governance Capacity Building Programme
Internet Governance Capacity Building ProgrammeInternet Governance Capacity Building Programme
Internet Governance Capacity Building ProgrammeMohamed Zahran
 
ICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-AwarenessICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-AwarenessIsmael Peña-López
 
Inclusive E-Goverment by Prof. Dr. Marjan Gusev
Inclusive E-Goverment by Prof. Dr. Marjan GusevInclusive E-Goverment by Prof. Dr. Marjan Gusev
Inclusive E-Goverment by Prof. Dr. Marjan GusevMetamorphosis
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...nooriasukmaningtyas
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Digital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in EstoniaDigital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in EstoniaMart Laanpere
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation baipgroup
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalEdi Suryadi
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityDavid Sweigert
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paperpteromys_volans
 

Similar a Digital Security Policy Framework Moldova (20)

Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)
 
E-goverment Estonia framework Arvo Ott
E-goverment Estonia framework  Arvo OttE-goverment Estonia framework  Arvo Ott
E-goverment Estonia framework Arvo Ott
 
Internet Governance Capacity Building Programme
Internet Governance Capacity Building ProgrammeInternet Governance Capacity Building Programme
Internet Governance Capacity Building Programme
 
ICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-AwarenessICTs for development: from e-Readiness to e-Awareness
ICTs for development: from e-Readiness to e-Awareness
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
Qstn 27
Qstn 27Qstn 27
Qstn 27
 
Inclusive E-Goverment by Prof. Dr. Marjan Gusev
Inclusive E-Goverment by Prof. Dr. Marjan GusevInclusive E-Goverment by Prof. Dr. Marjan Gusev
Inclusive E-Goverment by Prof. Dr. Marjan Gusev
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Digital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in EstoniaDigital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in Estonia
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
PDFMailer
PDFMailerPDFMailer
PDFMailer
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 

Más de E-Government Center Moldova

Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterE-Government Center Moldova
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...E-Government Center Moldova
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranE-Government Center Moldova
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielE-Government Center Moldova
 
Government cloud services international experience laurence millar
Government cloud services international experience laurence millarGovernment cloud services international experience laurence millar
Government cloud services international experience laurence millarE-Government Center Moldova
 
Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1E-Government Center Moldova
 
Shuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharingShuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharingE-Government Center Moldova
 

Más de E-Government Center Moldova (20)

Assessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto VeldreAssessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto Veldre
 
MCloud operational framework
MCloud operational frameworkMCloud operational framework
MCloud operational framework
 
Arhitectura de securitate_MCloud
Arhitectura de securitate_MCloudArhitectura de securitate_MCloud
Arhitectura de securitate_MCloud
 
Ibm smart cloud solutions m-cloud
Ibm smart cloud solutions   m-cloudIbm smart cloud solutions   m-cloud
Ibm smart cloud solutions m-cloud
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...
 
Star storage m cloud week
Star storage m cloud weekStar storage m cloud week
Star storage m cloud week
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur riel
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 
3 platforma tehnologica_m-cloud
3 platforma tehnologica_m-cloud3 platforma tehnologica_m-cloud
3 platforma tehnologica_m-cloud
 
2 m cloud-iurie turcanu
2 m cloud-iurie turcanu2 m cloud-iurie turcanu
2 m cloud-iurie turcanu
 
Government cloud services international experience laurence millar
Government cloud services international experience laurence millarGovernment cloud services international experience laurence millar
Government cloud services international experience laurence millar
 
1 artur riel_sesiunea_1
1 artur riel_sesiunea_11 artur riel_sesiunea_1
1 artur riel_sesiunea_1
 
eGovernment in Israel
eGovernment in IsraeleGovernment in Israel
eGovernment in Israel
 
Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1
 
Shuky peleg e_gov_cyber_using_cloud_services
Shuky peleg e_gov_cyber_using_cloud_servicesShuky peleg e_gov_cyber_using_cloud_services
Shuky peleg e_gov_cyber_using_cloud_services
 
Shuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharingShuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharing
 
Hannes astok digital_security_2012
Hannes astok digital_security_2012Hannes astok digital_security_2012
Hannes astok digital_security_2012
 

Digital Security Policy Framework Moldova

  • 1. e-Government Centre Moldova Digital security for better governance and public services Digital information security trainings 2013 Chisinau Presentation Title 12.03.2013
  • 2. e-Government Centre Moldova Policy and legal framework development for Digital Security Hannes Astok Senior Expert eGovernmance Academy Presentation Title 12.03.2013
  • 3. Why policy framework?  Growing threats and security concerns  Vulnerability of the critical information systems  Need for coordinated activities  Clear roles and responsibilities between the institutions  Better protection of information systems and critical infrastructure  Estonian Cyber Security Strategy 2008-2013
  • 4. Goals of the strategy Establishment of a multilevel system of security measures Expanding Estonia’s expertise in and awareness of information security Adopting an appropriate regulatory framework to support the secure and extensive use of information systems
  • 5. Goals of the strategy: more specifically 1. Development and implementation of a system of security measures 1. Protection of the Critical Information Infrastructure (CII) 2. Development and Implementation of a System of Security Measures 3. Strengthening of Organisational Co-operation
  • 6. Goals of the strategy: more specifically 2. Increasing competence in information security 1. Organisation of Training in Cyber Security 2. Enhancing Research and Development 3. Development of a legal framework for cyber security 4. Development of international co-operation 5. Raising awareness of cyber security
  • 7. Relations to the other national development plans Information Security Interoperability Framework (2007) Information Society Strategy 2013 Knowledge-Based Estonia: R&D Development Strategy 2007-2013 Criminal policy development strategy Education and health development plans
  • 8. Legal framework -International law Council of Europe Convention on Cybercrime 2004
  • 9. EU legal framework Attacks against information systems: Council Framework Decision 222/2005/JHA Protection of personal data (95/46/EC and 2002/58/EC); Electronic communications (2002/58/EC); Retention of data (2006/24/EC); Re-use of public sector information (2003/98/EC; under revision) ; Information society services (2000/31/EC).
  • 10. National legal framework Penal Code: responsibility and penalties about various types of crime and attacks Electronic Communications Act: requirements for publicly available electronic communications networks and communications services
  • 11. National legal framework 2 Personal Data Protection Act: clear legal basis for processing any kind of personal data Public Information Act: regulates the basis and procedures for the accessing of public information
  • 12. National legal framework 3 Information Society Services Act: limits the liability of Internet service providers for the content of their service, spam related issues and general requirements for the provision of information society services.
  • 13. International Cooperation United Nations: issues of cyber security are addressed by a high-level expert group of the Internet Governance Forum (IGF) and the International Telecommunication Union (ITU).
  • 14. International Cooperation: EU European Commission The European Network and Information Security Agency (ENISA) provides support to EU member states, institutions and entrepreneurs in the prevention and management of breaches in information security.
  • 15. International Cooperation: EU 2 European Programme for Critical Infrastructure Protection – EU reseach network realted to cyber security
  • 16. Q&A Thank You! Hannes Astok www.ega.ee | hannes@astok.ee| +372 5091366 | hannesastok E-Governance Academy | Tõnismägi 2, 10112 Tallinn, Estonia Presentation Title 12.03.2013