[kictanet] IG Discussion 2009, Day 6 of 10
mwende njiraini
mwende.njiraini at gmail.com
Wed May 6 02:17:46 EAT 2009
Thank you Evans for this contribution.
Organizations may wish to consider seeking Information Security Management
System (ISMS) ISO/IEC 27001 certification which includes the following
elements:
1. Security Objectives
2. Information Security Policy
3. Security Organization
4. Asset Classification and Control
5. Personnel Security
6. Physical and Environmental Security
7. Computer, S/W, Data, Operation, and Network Security
8. System Access Control
9. Systems Development and Maintenance
10. Business Continuity Planning
11. Compliance
Reference: http://www.iso.org/iso/catalogue_detail?csnumber=42103
Kind regards
Mwende
*Disclaimer: Views expressed here are the author’s own*
On Mon, May 4, 2009 at 6:53 PM, Evans Kahuthu <ifani.kinos at gmail.com> wrote:
> The purpose of Information Security/Cybersecurity is to protect an
> organizations's valuable resources, such as information, hardware and
> software. Through the selection and application of appropriate safeguards,
> Information Security helps the organization's mission by protectiing its
> physical and financial resources, reputation, legal position, employees, and
> other tangible and intangible assets.
> The issue of cybersecurity/Information security simply comes down to three
> things: 1) Confidentiality, 2) Integrity and Availability.
> Information Security management/cybersecurity entails the identification of
> an organisation's information assets and developemt, documentation, and
> implementation of policies, standards, procedures and guidelines, which
> ensure their Confidentiality, Integrity and Availability.
> Unfortunately, cybersecurity is sometimes viewed as hindering the mission
> of the organisation by impossing poorly selected bothersome rules and
> procedures on users, managers and systems. On the contrary, if well
> implemented, Cybersecurity rules and procedures can support the overall
> organisational mission.
> In the case of Kenya, the way to create a culture of cybersecurity is
> through management tools such as data classification, security awareness
> traininig, risk assesment and risk analysis in order to identify threats,
> classify assets, and rate their vulnerabilities so that effective security
> controls can be implemented.
>
> Regards,
> Evans
>
>
> On Sun, May 3, 2009 at 10:59 PM, mwende njiraini <
> mwende.njiraini at gmail.com> wrote:
>
>> Good morning,
>>
>>
>>
>> The focus of our discussion this week is on cybersecurity and trust. We
>> will seek to address privacy and data security issues.
>>
>>
>>
>> Like many other Kenyans, we frequently register to use various online
>> services provided by the government and businesses. The registration
>> process requires that we provide personal information including physical,
>> postal address, telephone numbers, credit card numbers, etc. The younger
>> generation and the young-at-heart are readily sharing “personally
>> identifiable information” including photos and events through social
>> networking sites including facebook, youtube, myspace, flickr, twitter,
>> etc.
>>
>>
>>
>> Personal information collected and made available in the public domain
>> such as the electoral register, telephone directory can be combined with
>> information for example from supermarkets loyalty cards to create valuable
>> market information to track individual preferences and purchase profiles.
>> This information may unfortunately be subject to abuse and theft.
>> Consequently, ‘trust’ in policies and the security measures that the
>> government and businesses establish to protect user information is therefore
>> an essential element for the success of e-transactions (both e-government
>> and e-commerce)
>>
>>
>>
>> - How can we create a cyber security culture in Kenya? What is the
>> role of the educators, peers and parents in digital literacy with respect to
>> privacy and security?
>> - Does the current legal environment provide for the protection of
>> privacy on the internet? How can we establish a balance between security
>> and right to privacy?
>>
>> Looking forward to hearing from you.
>>
>>
>>
>> Kind regards
>>
>> Mwende
>>
>>
>>
>> References
>>
>> 1. Protecting your Privacy on the Internet:
>> http://privacy.gov.au/internet/internet_privacy/index.html#2
>>
>> 2. Privacy Policies: http://www.facebook.com/policy.php?ref=pf,
>> http://twitter.com/privacy
>>
>> 3. Article 12 of the Universal Declaration of Human Rights :
>> http://www.un.org/en/documents/udhr/index.shtml#a12
>>
>> 4. Office of the Privacy Commissioner of Canada: Protecting Your
>> Privacy on the Internet: http://www.priv.gc.ca/fs-fi/02_05_d_13_e.cfm
>>
>> 5. Privacy illustrations:
>> http://www.priv.gc.ca/information/illustrations/index_e.cfm
>>
>> 6. http://www.diplomacy.edu/ISL/IG/
>>
>>
>>
>> *Disclaimer: Views expressed here are the author’s own*
>>
>> _______________________________________________
>> kictanet mailing list
>> kictanet at lists.kictanet.or.ke
>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>
>> This message was sent to: ifani.kinos at gmail.com
>> Unsubscribe or change your options at
>> http://lists.kictanet.or.ke/mailman/options/kictanet/ifani.kinos%40gmail.com
>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20090506/f28abe11/attachment.htm>
More information about the KICTANet
mailing list