e-Trust and cyber security
-
Upload
internet-society-new-york-chapter-isoc-ny -
Category
Documents
-
view
339 -
download
0
description
Transcript of e-Trust and cyber security
![Page 1: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/1.jpg)
Spurring Internet-based Innovation and Economic Growthe-Trust and cyber
securityNasser Kettani | Chief Technology Officer | Microsoft QatarCritical Challenges for Economic Growth and Social
Development
![Page 2: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/2.jpg)
ICT positive and unprecedented impact
Economic sustainable growthBusiness, Education, Health, Banking, IT industry, etc.
Social developmentGovernment (e-procedures), Literacy, Fighting digital divide, Quality of living, Well-being
Country competitivenessKnowledge driven economy, digital literacy, country brand, offshoring/outsourcing/hosting industry
![Page 3: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/3.jpg)
ICT risks
Critical infrastructures reliance on ICTWater, electricity
Strategic industriesOil & Gas, transportation, bank and finance
![Page 4: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/4.jpg)
Cyber Security
Both a requirement and an enabler
To be safe
And to build TRUSTFrom citizens and residents, from investors, from the world
![Page 5: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/5.jpg)
Typical threats
Digital crimeHacktivismCyberwarfareFraudsPiracy/counterfeitsPrivacy issues
![Page 6: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/6.jpg)
InitiativesAwarenessDigital literacy for everyone, behaviors to improve security, use platforms with managed security (public cloud providers)
TrainingsLaw enforcement, administrators
Legal frameworkProtection of online transaction, validity of digital signatures, prosecution of criminals
PartnershipsWith other law enforcement forces, with private sector, with universities
![Page 7: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/7.jpg)
Cyber Security Agenda
Strategies / Policy
ICT Infrastructure
Social, Economic, Political and IT Alignment
National Projects and Solutions
Relationship
![Page 8: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/8.jpg)
Thank you
![Page 9: e-Trust and cyber security](https://reader034.fdocuments.net/reader034/viewer/2022042601/54563f5daf79597b578b4963/html5/thumbnails/9.jpg)
Images credits• http://
syntropolis.net/media/news_pictures/gas-champion-qatar-diversify-investments/lng.jpg
• http://www.lgfcunewsworks.org/images/photos/large/usingatm2-lg.jpg
• http://www.airplane-pictures.net/images/uploaded-images/2011-2/20/122936.jpg
• http://blog.ljmu.ac.uk/wp-content/uploads/2011/11/cyber-security.jpg