<div>Morning,</div>
<div> </div>
<div>Reference to email below - you may wish to make reference to the following additional resources</div>
<ul>
<li>One more CERT in Africa: Mauritius Gets Computer Emergency Response Team - <a onclick="return top.js.OpenExtLink(window,event,this)" href="http://www.pcworld.com/businesscenter/article/146123/mauritius_gets_computer_emergency_response_team.html" target="_blank">http://www.pcworld.com/businesscenter/article/146123/mauritius_gets_computer_emergency_response_team.html</a></li>
<li>CERT is located at Carnegie Mellon University, involved in Internet security vunerabilities, long term network changes research: <a onclick="return top.js.OpenExtLink(window,event,this)" href="http://www.cert.org/" target="_blank">http://www.cert.org/</a></li>
<li>Team Cymru is a specialized Internet security research firm : <a onclick="return top.js.OpenExtLink(window,event,this)" href="http://www.team-cymru.org/" target="_blank">http://www.team-cymru.org/</a></li>
<li>FIRST is the global Forum for Incident Response and Security Teams: <a onclick="return top.js.OpenExtLink(window,event,this)" href="http://www.first.org/" target="_blank">http://www.first.org/</a></li></ul>
<div>Kind regards</div>
<div>Mwende</div>
<div>Please note the change in the subject line today is IG Discussion 2009,<strong><u>Day 9 of 10 </u></strong></div>
<div>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><i><span lang="EN-US"><font size="3"><font face="Times New Roman">Disclaimer: Views expressed here (except those quoted or referenced) are the author’s own</font></font></span></i></p>
<br> </div>
<div><span class="gmail_quote">On 5/7/09, <b class="gmail_sendername">mwende njiraini</b> <<a onclick="return top.js.OpenExtLink(window,event,this)" href="mailto:mwende.njiraini@gmail.com" target="_blank">mwende.njiraini@gmail.com</a>> wrote:</span></div>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Good morning, </font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"> </font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Today we have the opportunity of discussing the last aspect of cybersecurity: Computer Security Incident Response</span><font size="2"><span lang="EN-US" style="FONT-SIZE: 14pt"> </span><span lang="EN-US" style="FONT-SIZE: 10pt">Teams (CSIRTs)/Computer Emergency Response Teams (CERT). CSIRTs/CERTs are responsible for preparing for, detecting, managing and responding to cybersecurity incidents as well as creating consumer awareness.</span><span></span></font></font></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"> </font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Global cybersecurity is said to be ‘as strong as the weakest link’.<span> </span>Developing countries particularly in Africa have not sufficiently addressed cybersecurity issues.<span> </span>While some countries have initiated efforts to develop cybersecurity capabilities through the establishment of National CSIRTs/CERTs, the CERT-TCC in Tunisia is the only active national CERT in Africa (</span><span lang="EN-US"><a onclick="return top.js.OpenExtLink(window,event,this)" href="http://www.ansi.tn/en/about_cert-tcc.htm" target="_blank"><span><font color="#0000ff">http://www.ansi.tn/en/about_cert-tcc.htm</font></span></a></span><span lang="EN-US">).</span><span></span></font></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"> </font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US">In establishing a National CERT/CSIRT… </span><span></span></font></p>
<ul style="MARGIN-TOP: 0cm" type="disc">
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">What structure could be adopted? </font></span>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">What services should be offered?<span> </span></font></span>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">What elements could be considered to establish trust in this institution thereby encouraging organizations with critical information infrastructure (CII) such as government agencies, banks, educational institutions, water and power companies, etc, to share of cybersecurity incidents?</font></span> </li>
</li></li></ul>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"> </font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Kind regards</span><span></span></font></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Mwende</font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><i><span lang="EN-US"><font size="3"><font face="Times New Roman">Disclaimer: Views expressed here (except those quoted or referenced) are the author’s own</font></font></span></i></p>
</blockquote><br>