REPUBLIC OF NAMIBIA - IEEE Internet Initiative

1y ago
6 Views
3 Downloads
2.24 MB
21 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Nora Drum
Transcription

REPUBLIC OF NAMIBIAMINISTRY OF INFORMATION AND COMMUNICATION TECHNOLOGY

Internet Governance and Cybersecurity in NamibiaMs Elizabeth Ujarura KamutuezuDeputy Director : Ministry of ICTRepublic of Namibia,IEEE ETAP Forum30 May 2017

Background§ Namibia became Independent on the 21st March 1990from South African colonial regime.§ The country total space is 824,000sq km and Windhoekis the capital city.§ The total population is 2.1 million while femalepopulation is 50.7% and majority of the populationresides in rural areas.§ Namibia is sharing borders with South Africa, Angola,Zambia, Botswana and Zimbabwe.§ Namibia has eleven tribes and English is the officiallanguage while Afrikaans is also spoken by majority.

IntroductionIt is evident that Internet is most connected and least protectedand the expansion of cyberspace becomes salience feature of ourdaily life. Namibia enjoys over 100% mobile phone penetration;about 72.12% access to internet and 53% population has access tobroadband. Cybersecurity plays a pivotal role in the continuingdevelopment of information technology and Internet services. Inorder to safeguard Namibia’s security and economic wellbeing, itis vital that the Country enhance cyber security and to protectinformation infrastructure and equally important is ensuring thatthe Internet is safe and that the growing numbers of Internetusers are protected. This call for government intervention todevelop appropriate legal responses as a result the Namibiangovernment has drafted Electronic Transaction and CybercrimeBill to address problems pertaining to safety and security of digitalcommunications of any mode.

Namibia ICT Legal frameworkNamibia has a sound ICT legal framework that facilitateinvestment in the ICT sector. After independence since1990, Namibia developed a series of laws and policies thataimed at promoting ICT in Namibia and these are:1. Namibian Communications Act, 20092. Overarching ICT Policy, 20093. Telecommunications Policy,4. Broadcasting Act 19905. Postal Policy and New Licensing Framework6. Universal Access Policy7. Digital Terrestrial Television Policy Guidelines

st Africa Cable System (WACS) connectivity in 2011 and in 2012 Telecom Namibia (100%state owned company) inaugurated the West Africa Cable System (WACS) submarine cablethat links 14 countries (International);143 Post Offices countrywide;Telecom Namibia has laid about 7755 Km fiber optic cable across the country;The Ministry of ICT has established 26 Multi-Sectoral Community Centres (MSCC) acrossthe country;There are 342 FM radio transmitters, 57 TV transmitters and 36 studios;Telecom Namibia has established 193 base stations / PoPs for Broadband coverageMTC has established 661 active base stations / PoPs for Voice and Data connections, of which221 are providing broadband ( 1mbps) data services;Direct Marine Cable Connectivity: SAT-3; WACS; SEACOM; 4 International PoPs;National Backbone Network: 100% Digital; 9,025 km fibre; 295 PoPs; 228 DigitalDestinations; 178 Towers;The are four Telecoms Operators: GSM-Based; 2 x Mobile, 2 x FixedThere are six Internet Service Providers ;The National IXP was commissioned in 2014;Broadband Access: 3G and 4G/ LTE networks ;Access and Penetration: 7% fixed line; 120% mobile and 13% Internet;On the 17 June , 2015 The Namibia Broadcasting Corporation NBC (parastatal) has migratedfrom Analogue Television Broadcasting to Digital Terrestrial Television (DTT) broadcastingDTT Migration: 70% DTT population coverage

IGF Objectivesq Serves as a forum for multistakeholders policy dialogue todiscuss public policy issues related to key elements of Internetgovernanceq Discuss public policy issues related to key elements of Internetgovernance in order to foster the sustainability, robustness,security, stability and development of the Internetq Support international and regional coordination andcollaborationq Discuss, inter alia, issues relating to critical Internet resources;q Help to find solutions to the issues arising from the use andmisuse of the Internet, of particular concern to everydayusers.

IGF BenefitsqFree flow of ideas, knowledge and information over theinternet-It allows participants to discuss freely, tovoice their opinions, to think aloud, to think out of the box.qResolve issues related to security of user or networkqEstablish standards of exchange of information to avoidpiracyqDeveloping methods to keep personal and confidentialdata secrecyqExplore methods and policies for better internetperformance and governance

GOsSeverOperatorsAnyone who has a stake in the future of the Internet

Working CommitteeqMulti-Stakeholder Coordinating TeamqDisseminate all relevant information pertaining toNamIGF to all relevant stakeholders through theNamIGF website and emailing listq Collaborate with partners to mobilise resources tosupport the Nam IGF programmeqOrganise NamIGF every year

Defining Cyber CrimeCyber Crime - any criminal actdealing with computers andnetworks, where the computer isa tool, target, or both

Types of Offencesq Offences against confidentiality, integrity and availability of computer Dataand Systems Illegal access (hacking) – unlawful access to a computer system. Illegal data acquisition (data espionage) – internet used to obtain tradesecrets/personal information such as bank account or credit card numbers.Illegal Interception: offenders can intercept communications between usersto record information exchanged. Data interference: users depend on the availability of data and interferencecan result in financial losses. q Content related offences This category covers content that is considered illegal such as childpornography and xenophobic material, libel and false information, spam,copyright and related offences, trademark related offences etc.

Types of OffencesqComputer related offences Computer-related Fraud: it enables the offender to use automation and software toolsto mask criminals identities. Computer related forgery: refers to the manipulation of digital documents e.g. Alteringtext documents. Phishing: acts that are carried out to make victims disclose personal information. identity theft: criminal act of fraudulently obtaining and using another persons identity. misuse of devices: specially designed software tools used to attack other computers.qCombination offencesThis category covers various terms used to describe complex scams thatcombine a number of different offences. For example: phishing and cyberlaundering.

Drivers of CybercrimeqWeak technologyqVulnerable/unauthorised softwareqLimited accountabilityqInconsistent and incomplete legislation/regulationsqDifficulty tracking and prosecuting criminalsqLimited jurisdictionqUninformed, misguided and malicious users - weakpasswords, divulging passwords, opening unknownemails

Who are Cyber Criminals?qHackersqMalicious insidersqIndustrial espionageqBored, disgruntled, or overburdened employeesqNaïve/uninformed computer usersqOrganized crimeqTerroristsqPaedophiles and molestersqPetty criminalsqForeign governments

AchievementsqqqqEstablished NIGF Working CommitteeNIGF will be hosted in October 2017In process of Establishing CIRTElectronic Transaction and cybercrime Billunder public consultation

Challengesq The IGF is not a decision-making bodyq Cybercrime is borderlessq The common challenges are Lack of a legaland regulatory framework to ensure cybersecurityq There is lack of information, statistics andrecords of cybercrime committed inNamibia due to absence of laws, lack ofcapacity and general awareness ofcybercrime.

Challengesq Lack of public private institutionalcollaborationq Low technical capacity and human capacityIT skills. Systems poorly designed andpoorly managedq Social networking is on the rise andincreasingly cybercrimes are perpetratedthrough the social networks (Facebook,twitter etc.)

What can be doneqqqqPublic Advocacy / AwarenessConducive legal environmentInstitutional Capacity BuildingHarmonisation of laws (National andInternational

ConclusionqThe government needs to work closely with thecorporate entities; private sector to ensure the effectiveimplementation cyber security strategy laws once isenacted.qThe private sector is a key stakeholder to combatcybercrime, since they supply most of the relevanttechnology, operates most of the systems and networks.The private operators are also victims of cybercrime andsome attacks can lead to massive financial loss that willnegatively affect the economy.qBalancing Security vs Privacy

Thank You

Republic of Namibia, IEEE ETAP Forum 30 May 2017 Internet Governance and Cybersecurity in Namibia . Zambia, Botswana and Zimbabwe. . Cyber Crime -any criminal act dealing with computers and networks, where the computer is a tool, target, or both.

Related Documents:

IEEE 3 Park Avenue New York, NY 10016-5997 USA 28 December 2012 IEEE Power and Energy Society IEEE Std 81 -2012 (Revision of IEEE Std 81-1983) Authorized licensed use limited to: Australian National University. Downloaded on July 27,2018 at 14:57:43 UTC from IEEE Xplore. Restrictions apply.File Size: 2MBPage Count: 86Explore furtherIEEE 81-2012 - IEEE Guide for Measuring Earth Resistivity .standards.ieee.org81-2012 - IEEE Guide for Measuring Earth Resistivity .ieeexplore.ieee.orgAn Overview Of The IEEE Standard 81 Fall-Of-Potential .www.agiusa.com(PDF) IEEE Std 80-2000 IEEE Guide for Safety in AC .www.academia.eduTesting and Evaluation of Grounding . - IEEE Web Hostingwww.ewh.ieee.orgRecommended to you b

Namibia has two public tertiary institutions of general education, the University of Namibia (UNAM) established in 1992, and the Namibia University of Science and Technology (NUST), which was transformed from the Polytechnic of Namibia at the beginning of this year, 2016.

granite peaks. Namibia's capital Windhoek is located in central Namibia and is the social, economic, political and cultural centre of the country. Of its 2.5 million population Namibia counts some 107,000 of migrants for 2019 and 195,000 emigrants. Recent History & Leadership: During the late 19th Century Namibia was controlled by

GOVERNMENT GAZETTE OF THE REPUBLIC OF NAMIBIA Advertisements PROCEDURE FOR ADVERTISING IN THE GOVERNMENT GAZETTE OF THE REPUBLIC OF NAMIBIA 1. The Government Gazette (Estates) containing adver-tisements, is published on every Friday. If a Friday falls on a Public Holiday, this Government Gazette is published on the preceding Thursday. 2.Advertisements for publication in the Government Gazette .

committed to these principles, have resolved to constitute the Republic of Namibia as a sovereign, secular, democratic and unitary State securing to all our citizens justice, liberty, equality and fraternity, Now therefore, we the people of Namibia accept and adopt this Constitution as the fundamental law of our Sovereign and Independent Republic.

Standards IEEE 802.1D-2004 for Spanning Tree Protocol IEEE 802.1p for Class of Service IEEE 802.1Q for VLAN Tagging IEEE 802.1s for Multiple Spanning Tree Protocol IEEE 802.1w for Rapid Spanning Tree Protocol IEEE 802.1X for authentication IEEE 802.3 for 10BaseT IEEE 802.3ab for 1000BaseT(X) IEEE 802.3ad for Port Trunk with LACP IEEE 802.3u for .

SCHOOL- BASED FACTORS AFFECTING GRADE 12 LEARNERS’ ACADEMIC PERFORMANCE IN NAMIBIA SENIOR SECONDARY CERTIFICATE ORDINARY LEVEL BIOLOGY IN THE KHOMAS EDUCATIONAL REGION, NAMIBIA N. K. Muyoyeta1, J. Abah2 and D. Denuga2 Department of Mathematics, Science and Sports, Faculty of Education, University of Namibia Private Bag, 13301, Windhoek, Namibia

Artificial intelligence (AI) is transforming every segment of American life, with applications ranging from medical diagnostics and precision agriculture, to advanced manufacturing and autonomous transportation, to national security anddefense. The pace of AI development is rapid, and new technologies — like machine learning, autonomous systems, and natural language processing — continue .