2. “Cyber Security embraces the protection of both private and public
sector interest in cyber space and their dependency on digital
networks and also the protection of exploitation of opportunities—
commercial or public policy—that cyberspace offers.”
3. BUSINESS DRIVERS & CHALLENGES
oIncreasing sophistication, frequency and scale of cybercrime
oMalicious and inadvertent leakage of sensitive data
o Loss of intellectual property
o Increasing regulatory environment
oInterconnections between corporate and process control networks
oVulnerabilities introduced by the rise of cloud computing, mobile
devices and Web 2.0 applications within the enterprise (see next
figure)
4. GHANA CRITICAL NATIONAL INFORMATION
INFRASTRUCTURE
1.National Defense
and Security
2. Banking and
Finance
3. Information and
Communications
4. Energy
5. Transportation
6. Water
7. Health Services
8. Government
9. Emergency
services
10. Food and
Agriculture
9/1/2016 4
5.
6. REGULATED ENVIRONMENTS – INFORMATION
INFRASTRUCTURE
Regulated Environments:
Internet Service Providers &
Mobile Network Operators -NCA
Financial Operators – Bank of Ghana
Power SCADA operators – Energy Commission
Who are being protecting?
Subscribers
Clients
What are the intervention for security?
Regulatory provisions for Cyber Security?
Data protection?
Data aging policy?
01/09/2016 ...CERT-GH, SHARING INFORMATION FOR ENHANCE CYBER SECURITY 6