+ All Categories
Home > Documents > PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K....

PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K....

Date post: 17-Jan-2018
Category:
Upload: juliana-rogers
View: 220 times
Download: 0 times
Share this document with a friend
Description:
ALIGN INFORMATION TECHNOLOGY (IT) SYSTEMS TO THE AUTHORITY’S STRATEGY
32
PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)
Transcript
Page 1: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

PRESENTATION DURING NEW STAFF INDUCTION

ON THE

INFORMATION TECHNOLOGY (IT) DEPARTMENT

BY: MICHAEL K. KATUNDU,

Director, Information Technology (IT)

Page 2: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Mandate of the IT Department

1. Align Information Technology (IT) systems to the Authority’s Strategy

2. Facilitate the development of the Electronic Commerce (E-Commerce) framework in Kenya

3. Conduct technical Research and Development (R&D) on new and emerging technologies and trends

Page 3: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

ALIGN INFORMATION TECHNOLOGY (IT) SYSTEMS TO THE AUTHORITY’S STRATEGY

Page 4: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Align the Information Technology (IT) systems to the Authority’s Strategy

Automation of the Authority’s systems and processesManagement of the Authority’s IT systemsAwareness creation and capacity building on IT issues (Internal and Regulatory)Advise on IT issues (Internal and Regulatory)

Page 5: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

FACILITATE THE DEVELOPMENT OF THE ELECTRONIC COMMERCE (E-COMMERCE) FRAMEWORK IN

KENYA

Page 6: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Over v iew of Kenya’s National Cybersecur i ty Framework

VISION 2030

ICT Sector Policy

Kenya Information & Communications Act of 1998

National Cybersecurity Strategy

National Computer Incident Response Team/Co-ordination Centre (National KE-CIRT/CC)

National Public Key Infrastructure (NPKI)

Page 7: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Facilitate the development of the Electronic Commerce (E-Commerce) framework in Kenya

2.1. Coordination of the implementation of the national Cybersecurity framework

2.2. Coordination of the implementation of a framework for the administration and management of the dot KE country code Top Level Domain (ccTLD)

Page 9: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Coordination of the implementation of the national Cybersecurity framework (Cont’d)

ii. Types of Cybersecurity incidentsHate messages propagated through the Internet/Computer;Distributed Denial of Service (DDOS);Phishing;Website Defacement;Espionage

Page 10: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The National Computer Incident Response Team - Coordination

Centre

(National KE-CIRT/CC)

“ E n h a n c i n g I n t e r n e t S e c u r i t y i n K e n y a ”

Page 11: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Implementation of the national Cybersecurity framework (Cont’d)

The National Computer Incident Response Team-Coordination Centre (National KE-CIRT/CC)

The Authority implemented the National KE-CIRT/CC in Oct. 2012 with the technical support of the ITU The Authority is currently liaising with the ITU to upgrade the services of the National KE-CIRT/CCThe functions of the National KE-CIRT/CC are to:

a) Coordinate technical response to cybersecurity incidents in Kenya in collaboration with the national, regional and international cybersecurity actors;

Page 12: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Implementation of the national Cybersecurity framework (Cont’d)

The National Computer Incident Response Team-Coordination Centre (National KE-CIRT/CC)

The Authority implemented the National KE-CIRT/CC in Oct. 2012 with the technical support of the ITU The Authority is currently liaising with the ITU to upgrade the services of the National KE-CIRT/CCThe functions of the National KE-CIRT/CC are to:

a) coordinate technical response to cybersecurity incidents in Kenya in collaboration with the national, regional and international cybersecurity actors;

Page 13: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The functions of the National KE-IRT/CC (Cont’d):

b) To create awareness and build capacity on Cybersecurity in Kenya

Page 15: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The National KE-CIRT/CC operates as follows:

i. Users report cybersecurity incidents to the National KE-CIRT/CC (via the website, email, telephone, a letter or by visiting)

ii. The National KE-CIRT/CC conducts technical analysisiii. Respond to the cybersecurity incidentsiv. Escalation of the cybersecurity incidents of criminal

nature to the law enforcement (for investigation and possible prosecution)

v. Providing Network Early Warning information (advisories) to stakeholders

Page 16: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

National KE-CIRT/CC

Implement National

Cybersecurity Policies, Laws &

Regulations

Cybersecurity Awareness &

Capacity Building at the National Level

Technical Co-ordination &

Response to Cybersecurity

Incidents

Early Warning & Technical Advisories

Collect, collate and disseminate

national statistics on cybersecurity

incidents

Development & Implementation of a National Public Key

Infrastructure (NPKI)

Research & Development

(R&D) on Cybersecurity

Establish Collaboration

(National, Regional & International) on

Cybersecurity

Summary of the Functions of the National KE-CIRT/CC

Page 17: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

National KE-CIRT/CC

National Police

Service (NPS)

NationalIntelligence Service (NIS)

Kenya Defence

Forces (KDF)Directorate of

Public Prosecutions

(DPP)

Mobile Telecom Operators &

ISPs

Financial Institutions

Academia

National, Regional &

International CIRTs

National KE-CIRT/CC Collaboration (Stakeholders)

Page 18: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The National Publ ic Key Infrastructure(NPKI)

“ E n h a n c i n g I n t e r n e t S e c u r i t y i n K e n y a ”

Page 19: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The National PKI

Anonymity on the Internet drives the tendency towards abuse.

“On the Internet, nobody knows who really is on the other end”

Page 20: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The ICT Sector Policy of 2006 and the Kenya Information and Communications Act of 1998 mandate the Communications Authority of Kenya (CA) to license entities to provide Electronic Certification Service Provider (E-CSP) services.

E-CSP entities issue digital certificates (virtual identities) to Internet users to enable them carry out safe and secure electronic transactions.

The National PKI

Page 21: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The Ministry of ICT in collaboration with the Communications Authority of Kenya (CA) and the ICT

Authority (ICTA) have implemented the National Public Key Infrastructure (NPKI).

The National PKI

Page 22: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

The NPKI comprises of two parts:

The Root Certification Authority (RCA) A function of the Communications Authority of Kenya (CA) and is

used as a regulatory tool in the licensing of Electronic Certification Service Providers (E-CSPs). The RCA accredits (endorses) the E-CSPs so that the digital certificates they issue are recognized by the law

at the national level

The Government-owned E-CSP ICT Authority (ICTA) will be licensed to operate the government-

owned E-CSP to issue digital certificates (virtual identities) to Internet users using government services. This will be the first E-

CSP licensee for the Communications Authority of Kenya (CA).

The National PKI

Page 23: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

REAL WORLD CYBERSPACE

National Identity (ID) Card bearing an individual’s photo and finger print is used for identification.

An Digital Certificate (virtual identity) bearing an individual’s public key is used for identification.

A re-usable hand signature or signature-seal is used for authentication.

A digital signature (virtual signature), using an asymmetric encryption method, is used for authentication. The signature is unique for each e-transaction. For example, if a document is changed, the digital signature also changes.

The National PKI

Page 24: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Root Certification Authority (RCA)

Technical Standards Development

Awareness Creation & Capacity Building

Licensing & Accreditation of E-

CSPsGovernme

nt-owned E-CSP

Issue

Digital Certificates

Private-

owned E-CSPsIssu

e Digital Certificates

International Co-operation

The National Public Key Infrastructure (NPKI)

Key: E-CSP: Electronic Certification Service Provider licensed by the Communications Authority of Kenya (CA) to issue Digital Certificates (Internet IDs).

Page 25: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

25

User Environment For Electronic

SignaturesLegal and

Policy Issue

Technical Specifications

Accredit Certificate

Authorities International Cooperation

Root Certification

Authority(RCA)

Issue and manage E-CSP certificate; Audit E-CSPDevelop and

standardize

Research and development

Public awareness and Capacity Building

Support for mutual recognition

The National PKI

Page 26: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

26

Auditing Unit

Registration Authorities

Directory Services

Subscribers

Government-owned E-CSP

Generate & issue certificates

Storage and management of Certificate revocation lists

Act as agents of Certificate Authorities

Logs, History and Integrity Checks

The National PKI

Page 27: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Benefits of a NPKI

• Ability to digitally sign electronic data and information to ensure integrity of the data and non-repudiation

• Ability to encrypt electronic data and information to ensure confidentiality.

Page 28: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Implementation of a framework for the management of the dot KE country code Top Level Domain (ccTLD)

i. What is a Domain Name System (DNS)?A system that maps IP addresses to EASY-TO-REMEMBER Domain Names (CA.GO.KE). Include ccTLDs (country identity) and gTLDs (generic).

ii. What is a ccTLD?country code Top-Level Domain, and acts as an Internet Identity for a country or territory. Examples are: dot KE (Kenya), dot TZ (Tanzania), dot UK (United Kingdom), dot US (USA).

iii. Licensing framework for dot KE ccTLDKenya Network Information Centre (KENIC) started in 2002 under facilitation by CAThe Law (KICA) requires that dot KE Registry and Registrars are licensedThe Licensing framework is awaiting final approval by the Board

Page 29: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

CONDUCT TECHNICAL RESEARCH AND DEVELOPMENT (R&D) ON NEW AND EMERGING TECHNOLOGIES AND TRENDS

Page 31: PRESENTATION DURING NEW STAFF INDUCTION ON THE INFORMATION TECHNOLOGY (IT) DEPARTMENT BY: MICHAEL K. KATUNDU, Director, Information Technology (IT)

Structure of the IT Department

DirectorInformation Technology

(IT)

Assistant DirectorInformation Systems

(IS)

ManagerSystems Development &

Administration(SDA)

Assistant DirectorE-Commerce (EC)


Recommended