As viruses, worms, Trojan horses, spoofing attacks, identity theft, spam, and cyber attacks are on the rise, cybersecurity threats are growing rapidly. Most nations including developing countries in the APEC region are at risk on cyberspace, and the cyber security vulnerabilities in government and critical infrastructure may be a risk to national security, public safety, and economic prosperity.
A deep understanding of cybersecurity is needed in order to build a foundation of knowledge that can aid securing the next generation networks. In the modern business environment, the concept of the perimeter is disappearing. The boundaries between inside and outside networks are becoming thinner. Cybersecurity measures must exist in these layers. A layered approach to security enables organizations to create multiple levels of defense against threats.
The cyber security has been recognized as an important tool that can support providing secure ICT services. It is, thus, critical to designing proper arrangements in steering and coordinating the whole process of policy planning, implementation, monitoring and evaluation among various levels of government authorities and agencies. Experiences learned from many countries illustrate that a considerable degree of failures in coordinating cybersecurity effectively.
|1||Cybersecurity Overview and National Strategies
||Critical Information Infra Protection and Electronic Authentication
||National Incident Management and Information Security Solution
||Personal Information Protection, Legistration, ISMS and Culture of Cybersecurity
The module aims to:
- Provide necessary knowledge for policy makers to establish cybersecurity policy;
- Discuss issues on implementing cybersecurity initiatives; and
- Demonstrate how governments can deal with cyber treats.
After working on this module, readers should be able to:
- Have overview of cybersecurity and national cybersecurity strategies;
- Understand cybersecurity law and legistration; and
- Discuss key issues in cybersecurity and treats.