Posting mengikut label

Wednesday, July 12, 2017

Brunei needs to fill gaps in cybersecurity defences


Azlan Othman

BRUNEI has gaps in its cybersecurity defences and much work is needed to boost its capacity to deploy proper strategies, capabilities and programmes, according to a report by UN telecommunications agency International Telecommunication Union (ITU).

Though the country is making some progress, a lot remains to be accomplished with regard to legal, technical and organisational institutions, educational and research capabilities, and cooperation in information-sharing networks to develop a near-perfect approach to cybersecurity, the report hinted.

“Wealth breeds cybercrime, but it does not automatically generate cybersecurity, so governments need to make sure they are prepared,” it added.

Brunei Darussalam is ranked 53rd globally out of 193 nations in ITU’s latest Global Cybersecurity Index (GCI) that measures the commitment of nations to cybersecurity.

The Sultanate is in fifth place in Asean after Singapore, Malaysia, Thailand and the Philippines, and 12th in the Asia Pacific in the GCI 2017 released this week.




Brunei is ranked 53rd on the index with a score of 0.524, levelling with Bangladesh, and has been listed in the ‘maturing stage’ category (GCI score between the 50th and 89th percentile), which refers to 77 countries that have developed complex commitments to cybersecurity and engage in cybersecurity programmes and initiatives.

Singapore has topped the GCI 2017, followed by United States and Malaysia. Other countries in the Top 10 include Oman, Estonia, Mauritius, Australia, Georgia, France, and Canada.

The Sultanate scored high in cybercriminal legislation and training, government and national computer emergency response team (CERT), computer incidence response team (CIRT) and computer security incidence response team (CSIRT), child online protection, professional training and courses as well as education programmes, bilateral and multilateral agreements and international cooperation.

It has received an overall medium score in legal, technical and organisational measures, public awareness campaign, capacity building as well as public-private partnerships.

But the country fared lower in cybersecurity legislation, standards for organisation and profession, standardisation bodies, cybersecurity good practice and research and development (R&D) programme. The report suggested that more work needed to be done in these areas.

Twenty one countries are referred to ‘leading stage’ (GCI score in the 90th percentile) that demonstrates high commitment in all five pillars of the ITU Global Cybersecurity Agenda, namely legal, technical, organisational, capacity building and international cooperation.

‘Initiating stage’ refers to the 96 countries (GCI score less than the 50th percentile) that have started to make commitments in cybersecurity.

The GCI-2017, the second in an index series published by ITU, measured the commitment of ITU’s 193 member states to cybersecurity.

The report said about 38 per cent of countries has a published cybersecurity strategy and an additional 12 per cent of governments are in the process of developing one.

The agency said more effort is needed in this critical area, particularly since it conveys that governments consider digital risks high priority.

“Cybersecurity is an ecosystem where laws, organisations, skills, cooperation and technical implementation need to be in harmony to be most effective,” stated the report, adding that cybersecurity is “becoming more and more relevant in the minds of countries’ decision makers”.

The GCI 2017 measured countries’ commitment to cybersecurity and helps them identify areas for improvement. Through the information collected, GCI 2017 aims to illustrate the practices in use so that ITU member states can identify gaps and implement selected activities suitable to their national environment – with the added benefits of helping to harmonise practices and fostering a global culture of cybersecurity.

“At ITU, we are committed to making the Internet more secure, safer and trustworthy, for the benefit of all,” said Houlin Zhao, ITU Secretary-General.

“While the impact generated by cyber-attacks, such as those carried out as recently as June 27, 2017, may not be eliminated completely, prevention and mitigation measures to reduce the risks posed by cyber-related threats can and should always be put in place. The GCI reaffirms ITU’s commitment to build confidence and security in the use of ICTs.”

In addition to showing the overall cybersecurity commitment of ITU’s 193 member states, the index also shows the improvement and strengthening of all GCI indicators, which are defined by the five pillars of the ITU Global Cybersecurity Agenda.


Sumber - Borneo Bulletin

3 comments:

Marsya Rovena said...

Maintaining direct control

BONUS PELANGISLOT :
> Bonus New Member 10%
> Bonus Deposit Harian 10%
> Bonus Cashback up to 15% [SPORT]
> Bonus Cashback up to 15% [SABUNG AYAM]
> Bonus Cashback up to 15% [SLOTS & TANGKAS]
> Bonus Rollingan 0.3% [POKER, SLOT]
> Bonus Rollingan 0.3% [TANGKAS, AYAM]
> Bonus Rollingan 0.8% [CASINO]
> Bonus Referral Togel :
-- 4D & COLOK : 1%
-- 2D & 3D : 0.5%
> Bonus Referral up to 2% [SPORT & SABUNG AYAM]

KETERANGAN LEBIH LANJUT HUBUNGI :
IG : slot_pelangi
Versi Web :
> www.pelangislot77.org
> www.pelangislot77.info
WHATSAP : +6282323351494

Robert Earl said...

RECOVERY OF LOST FUNDS (BINARY OPTIONS, BITCOINS, LOAN SCAM).
THINGS YOU NEED TO KNOW ABOUT THE GLOBALKOS C.E.H RECOVERY COMPANY.
(leroysteckler@gmail.com)
⏱️2MIN.
Hiring a professional cyber security agent has been one of the world most technical valued navigating information. High prolific information and Privileges comes rare as it has been understood that what people do not see, they will never know.
Welcome to the Global KOS hacking agency where every request concerning lost funds are recovered within a short period of time.
The crucial benefit of contacting The Global-KOS recovery company is
• ZERO TRACES: After a successful penetration recovery is carried out by the Global-KOS, no active or passive attacks will be used to trace any of our actions to our clients or our organization. One common practice that attackers employ to evade detection is to break into poorly secured systems and use those hijacked systems as proxies through which they can launch and route attacks. Attackers effort on this platform are useless because we use a strong proxy firewall switching and a firm security system to prevent unauthorized bodies from tracking or modifying our network accessible resources. I.e the hacker and clients are 100% safe and anonymous.
Secondly,
ADVANTAGE TO CLIENTS:
• REPEAT CLIENTS and SERVICES: E.g, after helping a client recover all money lost to fraudulent practices, most of this clients comes back requesting we provide the same service in disguise as another person. We found a way to issue serial Numbers to each clients who seeks our help and services for identification purposes because we are not interested in your names nor location. But we urge that individuals shouldn't abuse this opportunities as we have provided value to you.
However, on this platform of recovery, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web protocol. The operation of these hackers is to potentially deploy a distinguished cyber security technique to retrieving back the victims stolen funds via the application of a diverse CM breacher which enables you to track the data location of a scammer and extract every data on the con database. This is achieved using the systematic courier tracking method.
Which of the uneasy situation do you find yourself in right now?
✅(BITCOIN INVESTMENTS, BINARY OPTIONS OR LOAN SCAM?
This shocking study points to one harsh reality we all face today. It saddens our mind when a client expresses annoyance or dissatisfaction of unethical behaviors of scammers. We have striven to make tenacious efforts to help those who are victims of this fleas get off their traumatic feeling of loss.
The company is large enough to provide comprehensive range of services such as.
• MOBILE PHONE PENETRATION.(Catching A Cheating Spouse)📲
• CREDIT SCORE UPGRADE,
• PENETRATION OF WEBSITES AND DATABASE.
• UNLOCKING FROZEN CRYPTO WALLET📲
• EMAIL PENETRATION
• PENETRATING A FRAUDULENT WEBSITE.📲
• UBER FREE PAYMENT LICENCE.📲

For prolific services and info,
Contact:
✉️Email: theglobalkos@gmail.com
leroysteckler@gmail.com
®Global KOS™
2020.

Peeter said...

Fullz with CC Info (USA, UK, CAN)
USA FULLZ (SSN DOB DL) & HIGH CREDIT SCORES FULLZ
Track 101 & 202 Dumps With Pin Codes
EIN Business Fullz
PayPal/Office365 Logins
USA/Canada Photo I.D's/Passports
Bank Logins

Here you can DM me Guy's
IcQ - 752822040
TG/icq - @killhacks
Wickr/Skype - peeterhacks

Contact with full potential
Many More stuff will be provided on demand
Will Serve you with Loyalty
Here we are for you 24by7

(Te.legram) (@leadsupplier)
(I/C/Q) (752.822.040)

::GADGETS LIST::

SMTP's/Web-Mailers/PHP-mailers/Alexus-Mailer
C-panel/RDP's
S-hells/Bru-tes/Dorks
Spa-mming To-ols with Guides/Tutorials (package available also)
PC/Mob/Web/Server Ha-cking Stuff on demand
Credit/Debit Cards Tuts for Transfers, Cashouts, CC To BTC
Car-ding (Amazon, PayPal, E-bay, BTC, etc) Updated Tuts
Flasher/Cracker for Bit.Co*n
2021 OR 2022 Fr**D B**le
I.p's & Pro.xies
Bulk (Netflix/Amazon/Spotify/Coinbase) Acount Logs
W.eb L-inks D*R* DE*p Updated
Web Complete Course for D**P & D**K with Video Tuts
Scri-pting for Sca-m Pages
Master Class Complete Kal-i Li-nux
Vi-ruses for Attac-king & Sp-ying
Senders (Email, SMS, Codes)