SlideShare una empresa de Scribd logo
1 de 13
A secure and protected
     environment
Moldova in international rankings




                                                        ICT Development Index - IDI
Legend:
IDI - ICT Development Index (position 62 of 155)
NRI - Network Readiness Index (position 78 of 142)
E-GRI - e-Government Readiness Index (position 69 of 193)
KEI - Knowledge Economy Index (position 77 of 145)
Moldova: IDI disaggregated by sub-indices



                                                             Abonamente la telefonia fixa
                                                                    120
                       Rata popula ei cu studii superioare                                  Abonamente la telefonia mobila
                                                                    100
                                                                     80
                                                                     60                               La mea benzii Internet la canalele
                 Rata popula ei cu studii medii
                                                                                                              interna onale
                                                                     40
                                                                     20
                                                                       0
                         Rata de alfabe zare                                                            Gospodarii cu computere




        Abonamente la Internet in banda larga mobil                                              Gospodarii cu acces la Internet


                           Abonamente la Internet in banda larga
                                                                                  Nivelul de penetrare a Internetului
                                      puncte fixe




                                                                        2010         2012




  Highlighted problems that diminish the value of the Index:
  Broadband underdeveloped (low development speed)
  Relatively low penetration of fixed telephony (unbalanced rates?)
  Low rate of population with higher education
IDI and GNI per capita: Moldova-constrained economy




Moldova after the IDI is positioned at a higher level than countries with the same
level of gross national income per capita, which shows:
a) existence of some risks in the flexibility of ICT absorption capacity
b) great potential of ICT development
VISION

Moldova is a country with an advanced information society
in which:
- use of ICT facilities (ICT),
- expanded access to modern infrastructure for electronic
communications,
-   rich digital content and advanced information services;
- Protected environment
lead to economic competitiveness, welfare and good
government of the country.
General Objective

General objective:
Creating favorable conditions for the development and widespread
use of the ICT potential by public institutions, businesses and citizens
to achieve their economic, social and cultural goals for all benefit.
Basic pillars:
i) expanding access and connectivity by promoting competition in
network and broadband access services,
ii) building capacity for use of the benefits offered by ICT,
iii) stimulating the development of digital content and e-services,
iv) secure and protected environment .
Constraints

• Un-optimized infrastructure and uneven access
• Low "digital literacy" and insufficient use
• Underdeveloped local digital content and low availability of
  electronic services
• There is no public authority directly responsible and empowered
  with the powers, functions and duties, and a program on the
  country cyber security
A secure and protected environment



 The cybersecurity means normality resulting from the
 application of a set of proactive and reactive measures
 that ensure confidentiality, integrity, availability,
 authenticity and nonrepudiation of electronic
 information, public or private resources and services in
 cyberspace.
A secure and protected environment - threats

 Cyber ​threats materialize throw exploiting vulnerabilities of human
 factor, technical and procedural - most often in:
  • cyber ​attacks against the infrastructure to support public functions
    or services of the information society the disruption / damage could
    be a threat to national security;
  • unauthorized access cyber infrastructure;
  • modifying, deleting or damaging of data or restricting unauthorized
    illegal access to data;
  • cyber espionage;
  • causing a loss of property, harassment and blackmail individuals for
    the legal entities (public and private).
A secure and protected environment - Objectives and
  programs
                        Specific objectives :
                        Improve the national critical infrastructure cyber
                        security level (public authorities / institutions,
                        electronic communications networks, aqueducts,
General objective       power grid, transportation networks, and so on).
                        •Increasing competence in cyber security
Creating conditions
                        •Increasing awareness of the risks in digital space
for increasing
                        and needs of measures to ensure cyber security;
security and trust in
                        •Promotion and development of international
the digital space       cooperation in cyber security field.

                        Program:
                        ”The program of providing a cyber security”
A secure and protected environment

 Increasing competence in cyber security:

  • Adequate training of persons working in cyber security and
    promoting widespread professional certifications in the field;
  • Inclusion of cyber security related training program and professional
    development of managers in public and private sector;
  • Information and training for employees of public institutions in cyber
    security issues and reduce cyber risks;
  • Developing User's Guide for minimum insurance requirements of
    cyber security.
Areas of intervention


 Legal and regulatory framework;

 Instituţional framework;

 Norms and Standards;

 Organisational framework;

 Tehnologic framework.

Más contenido relacionado

La actualidad más candente

The Smart City as a Local Innovation Platform
The Smart City as a Local Innovation PlatformThe Smart City as a Local Innovation Platform
The Smart City as a Local Innovation PlatformComarch
 
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...IRJET Journal
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Presentation of ethical and social issues of ict
Presentation of ethical and social issues of ictPresentation of ethical and social issues of ict
Presentation of ethical and social issues of ictSmritiGurung4
 
Big data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart CityBig data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart Cityrashed sharif
 
Digital Lifestyle & M2M
Digital Lifestyle & M2MDigital Lifestyle & M2M
Digital Lifestyle & M2MComarch
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleTechXpla
 
Whitepaper - Module 5 Final
Whitepaper - Module 5 FinalWhitepaper - Module 5 Final
Whitepaper - Module 5 Finalasmullen
 
Module 6 current trends and emerging technologies
Module 6  current trends and emerging technologiesModule 6  current trends and emerging technologies
Module 6 current trends and emerging technologiesEclaro College
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Chuck Brooks
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...IPPAI
 
The Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersThe Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersCM Research
 

La actualidad más candente (20)

Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
The Smart City as a Local Innovation Platform
The Smart City as a Local Innovation PlatformThe Smart City as a Local Innovation Platform
The Smart City as a Local Innovation Platform
 
Cyber City Concept
Cyber City ConceptCyber City Concept
Cyber City Concept
 
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Presentation of ethical and social issues of ict
Presentation of ethical and social issues of ictPresentation of ethical and social issues of ict
Presentation of ethical and social issues of ict
 
Big data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart CityBig data/Data Mining/IoT/Smart City
Big data/Data Mining/IoT/Smart City
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Digital Lifestyle & M2M
Digital Lifestyle & M2MDigital Lifestyle & M2M
Digital Lifestyle & M2M
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin Pukale
 
Whitepaper - Module 5 Final
Whitepaper - Module 5 FinalWhitepaper - Module 5 Final
Whitepaper - Module 5 Final
 
Module 6 current trends and emerging technologies
Module 6  current trends and emerging technologiesModule 6  current trends and emerging technologies
Module 6 current trends and emerging technologies
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...
 
The Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersThe Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key Players
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 

Destacado

The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsE-Government Center Moldova
 
Государство и экономика: кто кого? 9.06.2
Государство и экономика: кто кого? 9.06.2Государство и экономика: кто кого? 9.06.2
Государство и экономика: кто кого? 9.06.2ВЦИОМ
 
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...E-Government Center Moldova
 
Pork: Marketing Alternatives
Pork: Marketing AlternativesPork: Marketing Alternatives
Pork: Marketing AlternativesElisaMendelsohn
 
Lewis 2004 uterine immune_defenses
Lewis 2004 uterine immune_defensesLewis 2004 uterine immune_defenses
Lewis 2004 uterine immune_defensesMSD Salud Animal
 
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)E-Government Center Moldova
 
Sustainable Garden Project: The Need to Assist Frail Elderly People
Sustainable Garden Project: The Need to Assist Frail Elderly PeopleSustainable Garden Project: The Need to Assist Frail Elderly People
Sustainable Garden Project: The Need to Assist Frail Elderly PeopleElisaMendelsohn
 
Digital Economy Outlook 2015
Digital Economy Outlook 2015Digital Economy Outlook 2015
Digital Economy Outlook 2015innovationoecd
 

Destacado (13)

The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 
Hannes astok data protection agency
Hannes astok data protection agencyHannes astok data protection agency
Hannes astok data protection agency
 
Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013
 
Mpay&Mcloud
Mpay&McloudMpay&Mcloud
Mpay&Mcloud
 
The new era of smart
The new era of smart The new era of smart
The new era of smart
 
Государство и экономика: кто кого? 9.06.2
Государство и экономика: кто кого? 9.06.2Государство и экономика: кто кого? 9.06.2
Государство и экономика: кто кого? 9.06.2
 
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...
 
Pork: Marketing Alternatives
Pork: Marketing AlternativesPork: Marketing Alternatives
Pork: Marketing Alternatives
 
Lewis 2004 uterine immune_defenses
Lewis 2004 uterine immune_defensesLewis 2004 uterine immune_defenses
Lewis 2004 uterine immune_defenses
 
Hannes astok policy development
Hannes astok policy developmentHannes astok policy development
Hannes astok policy development
 
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
PROGRAMUL STRATEGIC DE MODERNIZARE TEHNOLOGICĂ A GUVERNĂRII (E-TRANSFORMARE)
 
Sustainable Garden Project: The Need to Assist Frail Elderly People
Sustainable Garden Project: The Need to Assist Frail Elderly PeopleSustainable Garden Project: The Need to Assist Frail Elderly People
Sustainable Garden Project: The Need to Assist Frail Elderly People
 
Digital Economy Outlook 2015
Digital Economy Outlook 2015Digital Economy Outlook 2015
Digital Economy Outlook 2015
 

Similar a Prezentare compartiment securitatea 05 03 2013 p sincariuc

ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022Adrian Hall
 
66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english version
66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english version66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english version
66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english versionMariano Candial
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsITU
 
Day 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter AfricaDay 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter AfricaMyles Freedman
 
Technology for our 21st century learners
Technology for our 21st century learnersTechnology for our 21st century learners
Technology for our 21st century learnersebarrera628
 
Dubai 2
Dubai 2Dubai 2
Dubai 2mmavis
 
Digital agenda for cyprus
Digital agenda for cyprusDigital agenda for cyprus
Digital agenda for cyprusAnima Slides
 
Bridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWiBridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWiDr. Mazlan Abbas
 
Security Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity PlanSecurity Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity PlanChanaka Lasantha
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
ICT applicatons in rural development
ICT applicatons in rural developmentICT applicatons in rural development
ICT applicatons in rural developmentVenu Goud
 
Economic and social impact of broadband access
Economic and social impact of broadband accessEconomic and social impact of broadband access
Economic and social impact of broadband accessPrayukth K V
 

Similar a Prezentare compartiment securitatea 05 03 2013 p sincariuc (20)

ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022
 
BROADBAND
BROADBANDBROADBAND
BROADBAND
 
66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english version
66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english version66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english version
66.77 tp 9_internet de banda ancha_1er_cuat_2013_grupo_4. ppt - english version
 
Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Day 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter AfricaDay 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
Day 3 C2C -Link Centre: Ultra Broadband for Smarter Africa
 
Internet ...
Internet ...Internet ...
Internet ...
 
B plan ssm_2012
B plan ssm_2012B plan ssm_2012
B plan ssm_2012
 
Technology for our 21st century learners
Technology for our 21st century learnersTechnology for our 21st century learners
Technology for our 21st century learners
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
 
Digital agenda for cyprus
Digital agenda for cyprusDigital agenda for cyprus
Digital agenda for cyprus
 
Bridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWiBridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWi
 
Security Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity PlanSecurity Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity Plan
 
Product Market Study - ICT Market in Vietnam (2012)
Product Market Study - ICT Market in Vietnam (2012)Product Market Study - ICT Market in Vietnam (2012)
Product Market Study - ICT Market in Vietnam (2012)
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
ICT applicatons in rural development
ICT applicatons in rural developmentICT applicatons in rural development
ICT applicatons in rural development
 
DIGITAL INDIA
DIGITAL INDIADIGITAL INDIA
DIGITAL INDIA
 
Economic and social impact of broadband access
Economic and social impact of broadband accessEconomic and social impact of broadband access
Economic and social impact of broadband access
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Cc
CcCc
Cc
 

Más de E-Government Center Moldova

Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterE-Government Center Moldova
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...E-Government Center Moldova
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranE-Government Center Moldova
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielE-Government Center Moldova
 
Government cloud services international experience laurence millar
Government cloud services international experience laurence millarGovernment cloud services international experience laurence millar
Government cloud services international experience laurence millarE-Government Center Moldova
 
Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1E-Government Center Moldova
 
Shuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharingShuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharingE-Government Center Moldova
 

Más de E-Government Center Moldova (20)

Digital security hannes astok
Digital security hannes astokDigital security hannes astok
Digital security hannes astok
 
Assessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto VeldreAssessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto Veldre
 
MCloud operational framework
MCloud operational frameworkMCloud operational framework
MCloud operational framework
 
Arhitectura de securitate_MCloud
Arhitectura de securitate_MCloudArhitectura de securitate_MCloud
Arhitectura de securitate_MCloud
 
Ibm smart cloud solutions m-cloud
Ibm smart cloud solutions   m-cloudIbm smart cloud solutions   m-cloud
Ibm smart cloud solutions m-cloud
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...
 
Star storage m cloud week
Star storage m cloud weekStar storage m cloud week
Star storage m cloud week
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur riel
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 
3 platforma tehnologica_m-cloud
3 platforma tehnologica_m-cloud3 platforma tehnologica_m-cloud
3 platforma tehnologica_m-cloud
 
2 m cloud-iurie turcanu
2 m cloud-iurie turcanu2 m cloud-iurie turcanu
2 m cloud-iurie turcanu
 
Government cloud services international experience laurence millar
Government cloud services international experience laurence millarGovernment cloud services international experience laurence millar
Government cloud services international experience laurence millar
 
1 artur riel_sesiunea_1
1 artur riel_sesiunea_11 artur riel_sesiunea_1
1 artur riel_sesiunea_1
 
eGovernment in Israel
eGovernment in IsraeleGovernment in Israel
eGovernment in Israel
 
Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1Valeriu plamandeala platforma_tehnologica_comuna1
Valeriu plamandeala platforma_tehnologica_comuna1
 
Shuky peleg e_gov_cyber_using_cloud_services
Shuky peleg e_gov_cyber_using_cloud_servicesShuky peleg e_gov_cyber_using_cloud_services
Shuky peleg e_gov_cyber_using_cloud_services
 
Shuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharingShuky peleg e_gov_cyber_presentation_information_sharing
Shuky peleg e_gov_cyber_presentation_information_sharing
 

Prezentare compartiment securitatea 05 03 2013 p sincariuc

  • 1. A secure and protected environment
  • 2. Moldova in international rankings ICT Development Index - IDI Legend: IDI - ICT Development Index (position 62 of 155) NRI - Network Readiness Index (position 78 of 142) E-GRI - e-Government Readiness Index (position 69 of 193) KEI - Knowledge Economy Index (position 77 of 145)
  • 3. Moldova: IDI disaggregated by sub-indices Abonamente la telefonia fixa 120 Rata popula ei cu studii superioare Abonamente la telefonia mobila 100 80 60 La mea benzii Internet la canalele Rata popula ei cu studii medii interna onale 40 20 0 Rata de alfabe zare Gospodarii cu computere Abonamente la Internet in banda larga mobil Gospodarii cu acces la Internet Abonamente la Internet in banda larga Nivelul de penetrare a Internetului puncte fixe 2010 2012 Highlighted problems that diminish the value of the Index: Broadband underdeveloped (low development speed) Relatively low penetration of fixed telephony (unbalanced rates?) Low rate of population with higher education
  • 4. IDI and GNI per capita: Moldova-constrained economy Moldova after the IDI is positioned at a higher level than countries with the same level of gross national income per capita, which shows: a) existence of some risks in the flexibility of ICT absorption capacity b) great potential of ICT development
  • 5.
  • 6. VISION Moldova is a country with an advanced information society in which: - use of ICT facilities (ICT), - expanded access to modern infrastructure for electronic communications, - rich digital content and advanced information services; - Protected environment lead to economic competitiveness, welfare and good government of the country.
  • 7. General Objective General objective: Creating favorable conditions for the development and widespread use of the ICT potential by public institutions, businesses and citizens to achieve their economic, social and cultural goals for all benefit. Basic pillars: i) expanding access and connectivity by promoting competition in network and broadband access services, ii) building capacity for use of the benefits offered by ICT, iii) stimulating the development of digital content and e-services, iv) secure and protected environment .
  • 8. Constraints • Un-optimized infrastructure and uneven access • Low "digital literacy" and insufficient use • Underdeveloped local digital content and low availability of electronic services • There is no public authority directly responsible and empowered with the powers, functions and duties, and a program on the country cyber security
  • 9. A secure and protected environment The cybersecurity means normality resulting from the application of a set of proactive and reactive measures that ensure confidentiality, integrity, availability, authenticity and nonrepudiation of electronic information, public or private resources and services in cyberspace.
  • 10. A secure and protected environment - threats Cyber ​threats materialize throw exploiting vulnerabilities of human factor, technical and procedural - most often in: • cyber ​attacks against the infrastructure to support public functions or services of the information society the disruption / damage could be a threat to national security; • unauthorized access cyber infrastructure; • modifying, deleting or damaging of data or restricting unauthorized illegal access to data; • cyber espionage; • causing a loss of property, harassment and blackmail individuals for the legal entities (public and private).
  • 11. A secure and protected environment - Objectives and programs Specific objectives : Improve the national critical infrastructure cyber security level (public authorities / institutions, electronic communications networks, aqueducts, General objective power grid, transportation networks, and so on). •Increasing competence in cyber security Creating conditions •Increasing awareness of the risks in digital space for increasing and needs of measures to ensure cyber security; security and trust in •Promotion and development of international the digital space cooperation in cyber security field. Program: ”The program of providing a cyber security”
  • 12. A secure and protected environment Increasing competence in cyber security: • Adequate training of persons working in cyber security and promoting widespread professional certifications in the field; • Inclusion of cyber security related training program and professional development of managers in public and private sector; • Information and training for employees of public institutions in cyber security issues and reduce cyber risks; • Developing User's Guide for minimum insurance requirements of cyber security.
  • 13. Areas of intervention Legal and regulatory framework; Instituţional framework; Norms and Standards; Organisational framework; Tehnologic framework.