[kictanet] Fw: Police Website Hacking

Matunda Nyanchama mnyanchama at aganoconsulting.com
Wed Jan 19 23:12:02 EAT 2011


Friends,

On the recent hacking of the Kenya Police website, here is what I posted on the 
Security  List <security at lists.my.co.ke>,although for some reason it hasn't 
shown up on the list.




----- Forwarded Message ----
From: Matunda Nyanchama <mnyanchama at aganoconsulting.com>
To: Security  List <security at lists.my.co.ke>
Sent: Wed, January 19, 2011 7:21:18 AM
Subject: Police Website Hacking


Friends,

I think this is a great opportunity for information protection professionals to 
step up and help government better protect its information assets. Remember: 
this government is much our own as it is of those that make decisions. Out here 
Canada, some people are pointing at me saying: what security professional can't 
step up to reduce the embarrassment and (possible) espionage when their 
government sites are hacked!

But conversation must a 2-way process and needs to happen us professionals and 
those in government.

We could help in this respect:

	* Do a current state assessment, including understanding what damage has been 
caused so far and what be happening "under the  hood". The hack is what became 
public. We don't know what else may be happening. I can bet that government 
servers are possibly on some international botnet rings where hackers (including 
spies - here is an example) may be collecting GoK information. The proposed 
assessment would look at everything from people to processes to technology and 
how these have been structured to protect government information assets.
	* Future state design: this is where the government security management would 
wish to be in the future
	* Gap analysis: what those gaps are and what are the priorities between current 
state and future state of security in government. My guess is that there are 
major gaps in skills (technical and management); technology may be there but is 
poorly deployed and managed (caring and feeding, e.g. monitoring, patching,  
etc.); processes may be poorly designed and implemented: ....
	* Roadmap to secure state: based on priorities we would design for them a 
master security plan to follow, including strategy, a proper security 
organization staffed with people with right skills and requisite mandate; 
technology infrastructure deployment and processes for managing things: people, 
processes and technology + associated accountabilities.

 I hope they take this offer, if they haven't started working on it already.

Over to you!

----------------------------------------------------------------------------------------------

Matunda Nyanchama, mnyanchama at aganoconsulting.com
Agano Consulting Inc.;  www.aganoconsulting.com
----------------------------------------------------------------------------------------------

“If you have an apple and I have an apple and we exchange these apples then you 
and I will still each have one apple. But if you have an idea and I have an idea 
and we exchange these ideas, then each of us will have two ideas.”- George 
Bernard Shaw 

-----------------------------------------------------------------------------------------------

This e-mail, including attachments, may be privileged and may contain 
confidential or proprietary information intended only for the addressee(s). Any 
other distribution, copying, use, or disclosure is unauthorized and strictly 
prohibited. If you have received this message in error, please notify the sender 
immediately by reply e-mail and permanently delete the message, including any 
attachments, without making a copy. Thank you.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20110119/3e56c6a0/attachment.htm>


More information about the KICTANet mailing list