Title: Kim Andreasson
1From e-government to cyber security
opportunities and challenges
- Kim Andreasson
- Managing Director
- DAKA advisory AB
- Singapore Business Group
- Ho Chi Minh City, Vietnam
- March 14, 2014
2Presentation overview
An introduction to cyber security
Cyber dependency and cyber threats
Cyber security close to home (in Vietnam, your
company, and you)
The UN framework and business opportunities
Conclusion
3Understanding cyber security
- A convergence of three trends
- Global benefits of ICTs
- Supply-side, such as e-government
- Demand-side, such as connectivity
41. Global benefits of ICTs
- ICTs contribute strongly to economic growth and
better social outcomes - Benchmarking the information society is important
in order for policy-makers to understand the
factors behind it and how to achieve improved
outcomes
52. Supply-side, such as e-government
- Information and service delivery
- Transparency and accountability
- Link to broader development objectives
- Digital by default
63. Demand-side, such as connectivity
Source World Bank World Development Indicators
database
7E-government usage
- In 1990, the American tax authority, the IRS,
received 4m online tax filings (the first year
such service was available) - In 2000, the number rose to 35m
- In 2010, online tax filings surpassed 100m
- In 2013, there were 114m online tax returns
8Measuring e-government
- Benchmarking global e-government development
since 2003 to inform and improve the
understanding of policy makers choices to shape
their e-government programs (UN 2004) - The survey measures the willingness and capacity
of countries to use online and mobile technology
in the execution of government functions (UN
2010)
9Current UN methodology
- The UN E-Government Development Index is composed
of three indices - Human capital index
- Telecommunications infrastructure index
- Online service index
For more information www.unpan.org/egovkb/
10The online service index
- Supply-side measurement approach, which means
that websites are visited by researchers to
evaluate what is available on them (i.e. the
supply of information and services) - Every UN member state is assessed (now 193)
- A defined set of websites are evaluated,
primarily the national portal of each country or
its equivalent - Almost all questions in the survey are binary,
i.e. does the feature exist or not
11Implementation
- Every website assessed in its primary language
- Researchers go through training sessions and are
provided with specific instructions on how to
score questions, as well as provided actual
website examples - Researchers take a citizen approach, which means
they try to find the information within a
reasonable amount of time - Assessment takes place during a specific period
of time (the survey window)
12A quick case study on finding mobile services on
www.gov.sg
How many national government websites around the
world have a feature that offers to send alerts
to mobile phones?
Step 1 Go to citizen residents section
13How many national government websites around the
world have a feature that offers to send alerts
to mobile phones?
Step 2 Go to mobile services sub-section
14How many national government websites around the
world have a feature that offers to send alerts
to mobile phones?
Step 3 Confirm that Singapore offers it
Answer In 2010, 25 out of 192 countries
15E-government progress
http//www.archive.org
16Presentation overview
An introduction to cyber security
Cyber dependency and cyber threats
Cyber security close to home (in Vietnam, your
company, and you)
The UN framework and business opportunities
Conclusion
17Enter cyber security
18Understanding cyber threats
- Politically motivated threats cyber warfare,
cyber terrorism, espionage and hacktivism - Non-politically motivated threats typically
financially motivated, such as cyber crime,
intellectual property theft, and fraud, but also
hacking for fun or retribution, for example, from
a disgruntled employee
19Singapore vs Anonymous
Hacked version of a blog hosted by The Straits
Times on October 31, 2013
20South Korea vs ?
- Attacks in 2009, 2011, and 2013
- On March 20, 2013, South Korean television
stations and financial institutions suffered from
frozen computer terminals - ATMs and mobile payments were also affected
- More than 48,000 computers and servers in South
Korea were shut down
21Critical infrastructures
- Financial services, telecommunications, energy,
etc. - Politically-motivated attacks with offline
consequences - The 2010 Stuxnet attack
22Cyber dependency matrix
Source World Bank World Development Indicators
database
23Presentation overview
An introduction to cyber security
Cyber dependency and cyber threats
Cyber security close to home (in Vietnam, your
company, and you)
The UN framework and business opportunities
Conclusion
24Mobility
- An opportunity to improve efficiency for
criminals too - Number of mobile malware in 2013 more than
doubled from 2012
Source World Bank World Development Indicators
database
25Vietnam
- Vietnam is among the top five countries with the
highest number of unique attacked mobile users - In addition, 78 out of 100 government websites
with the domain gov.vn has seriously poor
security systems - Attacks can compromise trust
Viet Nam News, March 6, 2014
26Are you at risk?
- An increase in usage means an increase in
dependency - Annual cost of cyber crime around the world has
been estimated by Norton, a security company, to
be about USD 110bn - About 75 of organizations suffer from a cyber
attack every year
- A simple solution to mitigate risk
- According to Verizon, 96 of cyber breaches are
avoidable through simple controls - Awareness, awareness, awareness
27Presentation overview
An introduction to cyber security
Cyber dependency and cyber threats
Cyber security close to home (in Vietnam, your
company, and you)
The UN framework and business opportunities
Conclusion
28ITU Global Cybersecurity Index
29International Multistakeholder Partnership
Against Cyber Threats
30ITU Global Cybersecurity Agenda (GCA)
- Business opportunities across five areas
- 1. Legal measures
- 2. Technical and procedural measures
- 3. Organizational structures
- 4. Capacity building
- 5. International cooperation
31Recent developments
- Edward Snowden
- New threats from hackers to nation-states
- New challenges localization strategies and
security as a competitive advantage - Lack of international collaboration means
domestic opportunities - Governments cannot go it alone a role for the
private sector and NGOs
32Presentation overview
An introduction to cyber security
Cyber dependency and cyber threats
Cyber security close to home (in Vietnam, your
company, and you)
The UN framework and business opportunities
Conclusion
33Solution to cyber security is not about
technology but people
- Compared with just a decade ago, governments have
made significant progress in expanding ICT access
and the demand from users has risen accordingly - But just as crime has always been part of
history, cyber security is likely to continue
well into the future, especially since the two
are increasingly intertwined - There is a need for more information at all
levels in order to better understand cyber
security - Every case is different, yet fundamentally the
same
34Thank you
www.DAKAADVISORY.com