75
______________________________________________________________ _____________ 2009/TEL40/SPSG/002 Agenda Item: 6b APEC Counter-Terrorism Action Plan: Promoting Cyber Security Purpose: Information Submitted by: Australia

A - Asia-Pacific Economic Cooperationmddb.apec.org/documents/2009/TEL/TEL40-SPSG/09_tel40... · Web viewThe Criminal Investigation and Detection Group (CIDG) of the Philippine National

  • Upload
    hathuy

  • View
    215

  • Download
    2

Embed Size (px)

Citation preview

___________________________________________________________________________2009/TEL40/SPSG/002

Agenda Item: 6b

APEC Counter-Terrorism Action Plan: Promoting Cyber Security

Purpose: InformationSubmitted by: Australia

Security and Prosperity Steering Group Meeting

Cancun, Mexico26-29 September 2009

APEC COUNTER-TERRORISM ACTION PLAN – PROMOTING CYBERSECUIRTY

ECONOMY: AUSTRALIALAST UPDATED: 31 July 2009

C. PROMOTING CYBER SECURITY

Contact Point: Mr Duncan Anderson, Director, E-Security, Australian Attorney General’s Department Telephone Number: 6141 2978 Fax Number: 6141 2978 Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS

MEASURES UNDERTAKEN OR

TO BE COMPLETED IN

2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

Following a review of e-security policies, programs and capabilities conducted in 2008, the Australian Government is undertaking the following measures:

- Creation of a new national computer emergency response team (national CERT) within the Australian Government, to strengthen engagement with the private sector to provide Australian businesses and other

In 2010 the Australian Government will undertake a review of cyber-security policies, programs and capabilities to address changes in the online environment.

Australia will also participate in the Cyberstorm III series of global cyber exercises in 2010.

OBJECTIVE EXPECTED OUTPUTS

MEASURES UNDERTAKEN OR

TO BE COMPLETED IN

2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Internet users with access to information on cyber threats, vulnerabilities and how to better protect their systems.

- Establishing a Cyber Security Operations Centre that will provide better situational awareness and the ability to facilitate responses to cyber security incidents of national importance.

- Reviewing Australian Government Internet gateways with the aim of reducing them to the minimum number required for operational efficiency and reliability.

- Creating trusted information exchanges between the

OBJECTIVE EXPECTED OUTPUTS

MEASURES UNDERTAKEN OR

TO BE COMPLETED IN

2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Government and private sector. These exchanges will cover the banking and finance sector, the telecommunications industry, and water and power utilities; and

- Working with Internet service providers to develop a code of practice for e-security to help create a "security culture" amongst Australian Internet users.

- Australian will also release a new e-security policy framework later in 2009.

BD- Bangkok, Leaders, 2003SD – Santiago, Leaders, 2004BSD- Busan, Leaders, 2005HD-Hanoi, Leaders, 2006SYD- Sydney, Leaders, 2007LD –Lima, Leaders, 2008BLSHS – Bangkok – Leaders’ Statement on Health Security - 2003AESI - APEC Energy Security Initiative, APEC Energy Ministers, 23 July 2002, Mexico City

All other references are to the APEC Leaders’ Statement on Fighting Terrorism and Promoting Growth, Los Cabos, Mexico, 26 October 2002

ECONOMY: Brunei Darussalam

C. PROMOTING CYBER SECURITY

Contact Point: Name: ____________Director_________________ Title: CID Department, Royal Brunei Police Force

Telephone Number: 673-2459506 Fax Number: 673-2459583 Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2005

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET AGREED

TARGETS

Endeavor to enact a comprehensive set of laws relating to cybersecurity and cybercrime that are consistent with the provisions of international legal instruments, including United Nations General Assembly Resolution 55/63 (2000) and Convention on Cybercrime (2001).

A comprehensive set of substantive, procedural, and mutual assistance laws to fight cyber crime.

Already enacted the Computer Misuse Order 2000

Identify national cybercrime units and international high-technology assistance points of contact and create such capabilities to the extent they do not already exist.

1. Identify international high-technology points of contact.

2. Join the international 24/7 cybercrime information exchange arrangement.

The investigation body is the Commercial Crime Unit of the Royal Brunei Police Force.

1. Expanding CCID2. Recruitment of

Accounting, Computer and Audit expertise

Time Frame- 2 years

Training in cybercrime investigation and computer forensic.

Establish institutions that exchange threat and vulnerability assessment (such as Computer Emergency Response Teams)

1. Institutions and assessment capability established

2. Information exchange arrangements established.

Develop closer cooperation between law enforcement officials and businesses in the field of information security and fighting computer crime.

Closer cooperation established between law enforcement officials and businesses in the field of information security and fighting computer crime.

Has close cooperation in this area; eg. ASEAN Police Force.

ECONOMY: CANADALAST UPDATED: May 2008

C. PROMOTING CYBER SECURITY

Contact Point: Andrew McAllister Title: Senior Strategist, Public Safety and Emergency Preparedness Canada, Cyber-Security Task Force Telephone Number: 613-991-7002 Fax number: Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO BE COMPLETED IN 2008

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

- Canada is in the process of reviewing lawful access to communications laws and consulting with industry, law enforcement and national security, and civil liberties stakeholders on a number of proposals that will ensure law enforcement and national security agencies are able to lawfully intercept communications during the exercise of their respective mandates. Additionally, proposals include amendments to the Criminal Code and other federal statues to deal with substantive and procedural issues to allow for ratification of the Council of Europe Convention on Cybercrime which will facilitate the fight against cyber-crime on the national and international scene.

- Canada built a coordinated plan with all levels of government and the private sector in Canada to network the individual capacities in 2003/2004

- The Canadian Cyber Incident

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO BE COMPLETED IN 2008

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO MEET AGREED TARGETS

Response Centre within Public Safety Canada (PSC) is the focal point for monitoring and analysis and coordinated response to cyber emergencies on behalf of the Government of Canada.

- Public Safety Canada established the Cyber Triage Unit to facilitate operational coordination to a cyber emergency involving both law enforcement and national security agencies.

BD- Bangkok, Leaders, 2003SD – Santiago, Leaders, 2004BSD- Busan, Leaders, 2005HD-Hanoi, Leaders, 2006SYD- Sydney, Leaders, 2007BLSHS – Bangkok – Leaders’ Statement on Health Security - 2003AESI - APEC Energy Security Initiative, APEC Energy Ministers, 23 July 2002, Mexico CityAll other references are to the APEC Leaders’ Statement on Fighting Terrorism and Promoting Growth, Los Cabos, Mexico, 26 October 2002

ECONOMY: CHILELAST UPDATED: MARCH 27TH 2009C. PROMOTING CYBER SECURITY

Contact Point: Name: Segundo Mansilla Andrade Title: Policía e Ingeniero Informático de la Brigada Investigadora del Ciber Crimen Metropolitana, de la Policía de Investigaciones de Chile

Telephone Number: 56.2.6960532 Fax Number: 56.2.5445622 Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Improving levels of knowledge that deal with cyber security.

Facilitation of policies related to prepare staff members with high responsibilities, either in the maintenance, development, or closure of critical systems, and the same privileges to those who should develop the prevention and investigation work of possible violations of cyber security safety.

Achieve a bigger commitment by all the actors with an impact on platforms and / or informatic critical infrastructure of special national or transnational concerned.

Having staff that minimizes risks and if it occurs in the absence of any unexpected incident, that our contingency plans will enable us to restore the continuity of services as soon as possible, and allow the investigation to cease future threats.

Trainings, forums and seminars, closed for a technical leadership and to represent main sectors to maintain critical state information, which may be of interest to terrorists. Meetings with the goal of mutual feedback, result of sharing experiences and data dissemination on cases handled by the Metropolitan Cyber Crime Investigation Unit, which occurred in Chile and the world.

Identification of relevant training information, specified people, and institutions that can take charge of such programs

Cycles of exhibitions, forums and workshops managed by members of the Cyber Crime Investigation Unit.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Establishing a multidisciplinary and transverse working group to the institutions that provide advance cyber security alert risks that may affect an important institution of the state.

Identification of critical points from the viewpoint of the significant information in the network about hackers.

Permanent polls in search of latent threats that may affect our critical systems.

Formation of a reunion that can cope with any threat that undermines the national cyber security.

Taking concrete steps to safeguard critical information.

To determine the tools to reverse adverse situations, from the standpoint of security.

Working meetings between stakeholders to participate and contribute to the safeguarding the state of Chile’s interests, from the standpoint of the informatics security of data and final information.

Implementation of policies, controls, technology, etc.. to reduced risks to acceptable levels.

To determine the right staff and a work plan to support this informatics security plan.

ECONOMY: CHINALAST UPDATED:

C. PROMOTING CYBER SECURITY

Contact Point: Name: Xing Jisheng Title: Third Secretary

Telephone Number: 86-10-65963106 Fax Number: 86-10-65963160 Email Address: [email protected]/[email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2007

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET AGREED

TARGETS

Identify international high-technology assistance points of contact and create such capabilities to the extent they do not already exist

Identify international high-technology points of contact

Continue to implement and enhance critical information infrastructure protection and cyber security as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment

1.Develop cohesive domestic strategies to ensure a trusted, secure and sustainable online environment

2. Address the threat posed by the misuse, malicious use and criminal use of the online environment by ensuring that legal and policy frameworks address substantive, procedural and mutual legal assistance arrangements consistent with the provisions of international legal instruments, including United Nations General Assembly Resolution 55/63 (2000) and Convention on Cybercrime (2001); and, join the international 24/7 cybercrime information exchange arrangement

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2007

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET AGREED

TARGETS

3.Develop watch, warning and incident response and recovery capabilities by establishing national computer security incident response teams (CSIRTs) to help prevent cyber attacks and minimize damage and recovery time from incidents, and participate in domestic and cross-border information sharing cooperative arrangements to support these efforts 

4. Develop partnerships among government, industry, academics and others, including between law enforcement officials and businesses, that recognize the important roles each plays in ensuring a trusted, secure and sustainable online environment, including through the development, implementation and review of guidelines and best practices 

National Computer Network Emergency Technical Response Team /Cooperation Center of China (CNCERT/CC) is tasked with information infrastructure protection and cyber security maintenance. It has a set of incident handling mechanisms and keeps improving the network security watching system. It cooperates closely with domestic government institutions, ISPs, and other CERTs. It also cooperates comprehensively with international CERTs and serves as the Deputy Chair of APCERT.

National internet security emergency response system was set up, which consists of government institutions, CERTs, ISPs and network security research institutes and vendors.

National Computer Network Emergency Technical Response Team /Cooperation Center of China (CNCERT/CC) plans to build more technical systems (e.g. HoneyNet) to enhance capacity of attacks/threats detection, and to hold joint incident responding exercise with teams around Asian Pacific region.

CNCERT/CC plans to hold conferences, seminars and trainings on computer network security issues.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2007

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET AGREED

TARGETS

5. Reach out to users to raise their awareness of the issues of online security, and assist them to understand and fulfill their role and responsibility in contributing to a trusted, secure and sustainable online environment

6. Encourage research and development efforts to improve the security of the online environment, and promote the design, development and implementation of appropriate and usable security measures in existing and new technologies

7. Support cooperative efforts among economies to promote the development and implementation of a trusted, secure and sustainable online environment 

CNCERT/CC publishes security bulletins and technical reports through website, mail-list and public media.

CNCERT/CC is authorized by government agencies to organize research institutes to join projects on network security.

Organize training programs and workshops on internet emergency response for Asian-Pacific economies, in particular for ASEAN members.

CNCERT/CC plans to propose a projects of malicious server list sharing to APEC-Tel, which aims to help APEC economies protect their own users by alerting, blocking those servers.

ECONOMY: Hong Kong, ChinaLAST UPDATED: February 2009

C. PROMOTING CYBER SECURITY

Contact Point: Name: _ Ms Donna CHAN__ Title: _ Chief Systems Manager (IT Strategy)__

Telephone Number: _+852 - 3182 6789 _ Fax Number: _+852 - 2519 7320 _ Email Address: __ [email protected]___

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING

OPPORTUNITIES TO MEET AGREED

TARGETSCountering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

HKC attaches great importance to strengthening information security and providing a secure environment for the conduct of e-commerce in Hong Kong.

Comprehensive IT security policies and guidelines have been developed for use in the Government and published for public access. We also carry out regular reviews of the policies and guidelines to ensure that they keep up with technology advancement, international developments and industry best practices. A comprehensive review will be carried out in 2009.

To help nurture greater security awareness and a more responsible computer user culture among the younger generation,, the Office of the Government Chief Information Officer (OGCIO) with other relevant parties had started a campaign in 2008 to visit schools and to provide advice on ethical use of IT and the Internet to students and teachers.. The campaign will be continued in 2009.

In 2008, the OGCIO had also completed an institutional review of the provision of computer emergency response centre (CERC) services in HKC. Implementation will be carried out in 2009.

Additional manpower will be given to the Technology Crime Division to sharpen its edge in the prevention and detection of cyber attacks against major information systems in Hong Kong – March 2010

Through the Police College, and the Interpol Asia and South Pacific Working Party on I.T. Crime, the HKPF will continue to perfect its digital evident handling and technology crime investigation capabilities.

ECONOMY: INDONESIALAST UPDATED: NOVEMBER 2008

C. PROMOTING CYBER SECURITY

Contact Point: Name: _____________________Title: _____________________________

Telephone Number: ____________ Fax Number: ___________ Email Address: __________________________

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2008

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

Indonesian government has submitted the draft of Law on On-Line Transaction to the parliament. The draft will be enacted this year.

The parliament has drafted the Law on Freedom to Access Public Information, and needs approval from the executive. The law will serve as a more comprehensive basis on information privacy protection, and complement to the Law on On-Line Transaction.

Indonesia will establish ID-SIRTII (Indonesia Security Incident Response Team on Indonesia Infrastructure) in the near future as coordinating institution for cyber crime

Indonesia needs capacity building/training on e-commerce for officials and private sectors in the local government.

Seminar/workshop on privacy protection, by sharing best practices from other APEC economies on applying principles of privacy protection, according to ECD Principles 1980 and APEC Privacy Policy framework

ECONOMY: JAPANLAST UPDATED: FEBRRUARY 2009

C. PROMOTING CYBER SECURITY

Contact Point: Name: __ Kaoru INAMOTO___________________Title: _ APEC Division , Ministry of Foreign Affairs___

Telephone Number: +81-3-5501-8342 Fax Number: +81-3-5501-8340Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

(1) Ministry of InternalAffairs andCommunications(MIC) implementsR&D programs toestablish fundamentaltechnology of networksecurity.(2) MIC improvesinformation sharingconcerning securityincidents betweentelecommunicationscarriers in cooperationwith relatedorganizations, such asTelecom ISAC Japan.(3) MIC promotestelecommunicationscarriers to strengthentheir informationsecurity management.(4) MIC and METIpromotes measures tocounter botnet incooperation withprivate sector such as

(1) NISC, MIC and METIwill establish a newpolicy meetingconcerning informationsecurity issue betweenJapan and ASEANcountries, and host the1st meeting in Tokyo inFebruary, 2009.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

ISPs and securityvendors.(5) NPA is strengtheningpublic-privatecooperation againstCyber terrorism by providing securityadvice on informationsecurity to criticalinfrastructureindustries andpromoting jointexercises betweenlocal law enforcementsand criticalinfrastructures.

ECONOMY: Republic of KoreaLAST UPDATED: July 22, 2009

C. PROMOTING CYBER SECURITY

Contact Point: Name: Mr. Jeong Jae-Hoon Title: Deputy Director, Network Security Division, Korea Communication Commission

Telephone Number: +82-2-750-2775 Fax Number: +82-2-750-2769 Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

Convened the 5th CyberSecurity Day event toenhance cyber securityawareness of both the government and private sectors (April 2009)

Conducted Cyber-crisis Response Exercise to enhance emergency response capabilities to cyber threats (June 2009)

Conducted security examinations of critical information infrastructure (July 2009)

Convene the 2nd APEC Cyber Terrorism Seminar in Seoul as a CTTF-TEL WG joint project (November 2009)

Took measures to enhance public information and communications network

National Cyber-crisis Management Act being considered by the National Assembly

Improve the Security Monitoring and Control system of the national computer network

Take further measures to enhance public information and communications network

- conduct inspection of information protection status of VoIP facilities

- prepare security guidelines for responding to malicious mobile phone codes and for IPTV companies

- establish an internet information protection council and publish a

Joint international cyber security exercise between APEC economies

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

- continuously provided on-site or remote-controlled technical support for responding to cyber attacks in the ROK

- routinely held seminars and training on cyber security for web developers and agencies

- conducted training exercise between ROK mobile communications companies and Korea Internet and Security Agency (KISA) to prepare for mobile phone viruses (December 2008)

- began the process of preparing a government response for the protection of information security (July 2008)

report on responses to major issues such as DDoS

ECONOMY: MALAYSIALAST UPDATED: 31 JULY 2009

C. PROMOTING CYBER SECURITYContact Point 1: Name: Ms. Syarisa Yanti Abubakar Title: Director of Policy, IMPACTTelephone Number: (+603) 8313 2020 Fax Number: (+603) 8319 2020 Email Address: [email protected]

Contact Point 2: Name: Mr. Mohd Shamir Hashim Title: Head, Cyber Security Research and PolicyTelephone Number: (+603) 8946 0919 Fax Number: (+603) 8946 0888 Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

The key measureundertaken by IMPACTfor co-operation andinformation sharing amongcountries are:1. IMPACT has signed anagreement with theInternationalTelecommunicationsUnion (ITU) tooperationalise the ITUGlobal CybersecurityAgenda (GCA) in all191 of ITU’s membercountries. IMPACT’Sstate-of-the-art globalheadquarters inCyberjaya, KualaLumpur will be thephysical, operationalhome of ITU’s GlobalCybersecurity Agenda(GCA). Thecollaboration betweenITU and IMPACT is

5. Further identify areasof co-operation amongAPEC countries toshare information oncyber threats.6. Further enhance theGlobal ResponseCentre’s offering toinclude regional cyberthreat information witha greater emphasis onthe Critical NationalInfrastructure (CNI).7. Jointly conduct cyberdrills to simulate cyberattacks on CNI andtrack jointpreparedness forresponding to suchtreats.8. Identify and helpprotect the CNI fromcyber threats such asBotNets. IMPACT isin the process of

Network Investigation Track- IRC Bot Networks- Malware Investigations- Hands-On Audit NetworkSystems- Computer EmergencyResponse Team (CERT)and Incident ResponseManagement- Network Technology forInvestigators- Network Forensics andInvestigation- Windows NetworkInvestigations

Digital Forensics Track

- Digital Evidence andAnalysis - Level I- Digital Evidence andAnalysis - Level II- Enterprise System ForensicInvestigations

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

aimed at buildingsynergies to provide: Real-time analysis,aggregation anddissemination ofglobal cyber threatinformation Early warningsystem andemergency responseto global cyberthreats Training and skillsdevelopment on thetechnical, legal andpolicy aspects ofCybersecurity2. The agreement is inline with the decisionof the World Summiton the InformationSociety to buildsecurity andconfidence in the useof information andcommunicationtechnologies (ICT).The Summit alsocalled for thecoordination of multistakeholderimplementation ofinformation exchange,creation of knowledge,sharing of bestpractices, andassistance in developingpublic/privatepartnerships.

operationalising theITU’s BotNetMitigation Toolkit.9. Operationalise theChild OnlineProtection (COP)program from the ITU.Key measures wouldinclude informationsharing, forced takedown of offensive sitesin the membercountries andincreasing awarenesson the threat.

- Macintosh ForensicAnalysis- Mobile Phone ForensicAnalysis- Linux / Unix Forensics- Information Security Track

Information AssuranceConcepts and Essentials

- Advanced InformationSystems Security Course- Windows Security AuditCourse- Introduction to LinuxSecurity Training- Hands-On Secure and AuditWindows Active Directory- Hands-On Secure and AuditWindows 2003 Servers- Hands-On Secure andAudit Web Applications- Hands-On Secure andWireless (WiFi) Networks- Hands-On Secure and AuditUnix Servers- Attack and ContingencyResponse Planning for Top-Level Domain Operations- Essentials of Planning andConducting Cyber Table-topExercises- Industry Based EnterpriseRisk Management- Security Defence &Analysis- Frugal Network Defence forIT Operations Staff – Low- Macintosh Forensic

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

3. The Memorandum ofUnderstanding wassigned in Bangkokduring ITUTELECOM ASIA2008 by ITUSecretary-General DrHamadoun Touré andChairman of theIMPACT ManagementBoard, Datuk Mohd.Noor Amin.4. The ITU GlobalCybersecurity Agenda(GCA) is an ITUframework forinternationalcooperation forgovernments,international lawenforcementauthorities, the privatesector, internationalorganizations and civilsociety to makecyberspace moresecure in anincreasingly networkedinformation society.The international effortis focused onstrengthening fiveareas:- Legal framework- Technical measures- Organizationalstructures- Capacity building- International

Analysis- Mobile Phone ForensicAnalysis- Linux / Unix Forensics- Information Security Track

Information AssuranceConcepts and Essentials

- Advanced InformationSystems Security Course- Windows Security AuditCourse- Introduction to LinuxSecurity Training- Hands-On Secure and AuditWindows Active Directory- Hands-On Secure and AuditWindows 2003 Servers- Hands-On Secure andAudit Web Applications- Hands-On Secure andWireless (WiFi) Networks- Hands-On Secure and AuditUnix Servers- Attack and ContingencyResponse Planning for Top-Level Domain Operations- Essentials of Planning andConducting Cyber Table-topExercises- Industry Based EnterpriseRisk Management- Security Defence &Analysis- Frugal Network Defence forIT Operations Staff – LowCost, Low Effort Methodsof Defending Your

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

cooperation5. While the GCA will behoused at the IMPACTCentre, ITU will havea ‘virtual showcase’ inGeneva of the earlywarning system, crisismanagement and realtimeanalysis of globalcyber threats.IMPACT initiatives,such as the GlobalResponse Centre aswell as training andskills development,security assurance,research, andinternationalcooperation will beconducted under theauspices of the GCA.6. The key measuresundertaken byIMPACT are: Access to IMPACT’sGlobal ResponseCentre(GRC) for allcountries in the APECregion. IMPACT’sGRC collates and

Network.- Understanding the DomainName System (DNS) andHow It Affects You- Network RangeArchitecture – BuildingNetworks to SupportExercises and Tests- Building, Deploying andMaintaining a SuccessfulSecurity AwarenessProgram- Security Basics forManagement- Security Basics for IT StaffLegal Track- Combating Cybercrime:Laws and LegalConsiderations- Data Protection andPrivacy: Laws and LegalConsiderations- Legal Aspects of ForensicInvestigations and Searchand Seizure- Legislation DraftingWorkshop: Cybercrime,Child Pornography,Economic Espionage- Critical InfrastructureProtection and CyberConflict- Enterprise SecurityPrograms and Governanceof Privacy and Security- E-Payment Laws andSecurity Considerations

ECONOMY: MEXICOLAST UPDATED:

C. PROMOTING CYBER SECURITY

Contact Point: Name: _____________________Title: _____________________________

Telephone Number: ____________ Fax Number: ___________ Email Address: __________________________

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

In February 2009, the “Advanced Workshop on Response Team for Cyber-crime Incident Management”, was held in San José, Costa Rica; within the framework of the Inter-american Counter-Terrorism Committee (CICTE).

On 10-11 March, The General Attorney (PGR) through the Attaché for the European Union and Switzerland attended the “Octopus Interface Conference on Cooperation Against Cyber-crime” held in Strasbourg, France, during the Cybercrime Convention of the European Council, adopted on November 8 2001.

Mexico has notably advanced in adapting the National Law to the contents of the Convention. With this purpose, the Federal Government has reiterated in several times its

The Mexican Government is carrying out technical consultations, along with the respective legal analysis, in order to establish a Response Team for Cyber-crime Incident the near future.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

willingness to join such Convention. Nevertheless, it is still pending that the Legislative Branch approves a bill on cyber-crime which could allow the adoption of such instrument.

ECONOMY: New ZealandLAST UPDATED: May 2008C. PROMOTING CYBER SECURITY

Contact Point: Name: Centre for Critical Infrastructure Protection (CCIP)

Telephone Number: +64 4 498 7654 Fax Number: +64 4 498 7655 Email Address: [email protected]

Incidents reported to: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

The Centre for Critical Infrastructure Protection provides cyber threat and incident alerts and analyses threats to New Zealand’s critical information infrastructure community. CCIP does not provide full CERT functionality but is actively engaged in both domestic and cross-border information sharing.

CCIP provides links to security related material, via its website and other electronic means, as well as collaborating nationally with organizations such as the Internet Safety Group (Netsafe) and InternetNZ.

CCIP also maintains ongoing relationships with key domestic stakeholders including the retail banking community (via the Internet Fraud Forum) and the SCADA/Utilities and telecommunication sectors. CCIP works closely with its partners in

The Government Communication Security Bureau (GCSB), which hosts the CCIP, has prepared a business case for funding for the establishment of a National Cyber Defence Centre (NZDC) which will incorporate the CCIP, a national CERT and a government CERT.

CCIP and the State Services Commission are collaborating with the tertiary sector in the establishment of a ‘Centre of Excellence’ program leading to a bachelor’s degree in Information Assurance. At this stage, the programme is due to start in 2010/11.

Plans are in place for CCIP to participate in the international Cyber Storm 3 exercise scheduled for 2010.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

the public sector including the NZ Police, Dept of Internal Affairs, which hosts the Anti-Spam Compliance Unit which enforces the Unsolicited Electronic Messages Act 2007 and the NZ Customs Service.

CCIP, in conjunction with its parent organization the Government Communications Security Bureau (GCSB), participates in the APEC’s TEL-WG, as well as being an active member of the Asia Pacific CERT (APCERT) community.

NZ Police have establishied a National Cyber Crime Centre (NC3) and aligning the Electronic Crime Laboratories (ECL) under a single national structure. A nationally focused unit will improve Police coordination with the Government and key industry groups within New Zealand, as well as other international groups and jurisdictions at both the strategic and operational levels.

C. PROMOTING CYBER SECURITY

Contact Point: Name: Jim Andrews Title: Assistant Commissioner (Operations), Royal PNG Constabulary

Telephone Number: (675) 322-6391 Fax Number: (675) 321-3660 Email Address:

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2006

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET AGREED

TARGETS

Endeavour to enact a comprehensive set laws relating to cyber security and cyber crime that are consistent with the provisions of international legal instruments, including United Nations General Assembly Resolution 55/63 (2000) and Convention on Cybercrime (2001).

A comprehensive set of substantive, procedural, and mutual assistance laws to fight cyber crime.

PNG is yet to have in place or enact a comprehensive set of laws relating to cyber security and cyber crimes.

Relevant Government Agencies will be tasked to develop the relevant policy for the Government to consider.

Identify national cybercrime units and international high-technology assistance points of contact and create such capabilities to the extent they do not already exist.

1. Identify international high-technology points of contact.

2. Join the international 24/7 cybercrime information exchange arrangement.

1. Managing Director Papua New Guinea Radiocommunication & Telecommunications Authority, (PANGTEL) PO Box 844, Boroko. Ph: (675) 325 8633. Fax: (675) 300 3839Website: www.pangtel.gov.pg

Mr. Jim Andrews, Assistant Commissioner, Operations, Royal Papua New Guinea Constabulary, PO Box 85, Konedobu, National Capital District, PNG (RPNGC). Ph: (675) 322 6391 Fax: (675) 321 3600.

2. PNG is not a member of the arrangement but is considering

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2006

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET AGREED

TARGETS

membership in future.ECONOMY: PERULAST UPDATED: FEBRRUARY 2008

C. PROMOTING CYBER SECURITY

Contact Point: Name: _____________________Title: _____________________________Telephone Number: ____________ Fax Number: ___________ Email Address: __________________________

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

There is a PeruvianCommission onCybercrime.The Peruvian Commissionon Cybercrime is in chargeof proposing actions toimplement measures of theUN Assembly Resolution55/63 to prevent thecriminal use ofinformation technologiesThis commission iscurrently working on acomplementary lawproposal on the subject inPeru.Resolution GA/RES(XXXIV-0/04) on the“Implementation of anintegral Inter-Americanstrategy to fight againstcyber security threats: amultidisciplinary approachfor the creation of a

The Commission isworking to identifyinternational high-Peruvian technology pointsof contact.

Exchange of experiences

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

cybersecurity culture” hasbeen approved by the OASGeneral Assembly in June2004. The Inter-AmericanNetwork on Alert andSurveillance Systems wascreated by the aforesaidresolution to rapidlydivulge information oncybersecurity and respondto crisis, incidents andthreats to computerssecurity.The Inter-AmericanNetwork on Alert andSurveillance Systems isinoperative yet; however,the CybercrimeInvestigation Departmentof Fraud Division andothers related of theDIRINCRI (Directorate ofInvestigation againstCrime)- PNDP, with thesupport of the Ministry ofTransportation andCommunications and thenational providers ofInternet services, is likelyto become part of thenetwork.

ECONOMY: PHILIPPINESLAST UPDATED: AUGUST 2008

C. PROMOTING CYBER SECURITY

Contact Point: Name: Mr. Ray Anthony Roxas-Chua III Title: Chairman, Commission on Information and Communications Technology

Telephone Number: (632) 426-1528 Fax Number: (632) 426-1525 Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2008

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET

AGREED TARGETSIdentify international high-technology assistance points of contact and create such capabilities to the extent they do not already exist.

Identify international high-technology points of contact.

Proposal to establish high-technology crime divisions in various law enforcement agencies is being conceptualized. The National Bureau of

Investigation (NBI) has an established Anti-Fraud and Computer Crime Division, but this unit severely lacks cyber security forensic tools and equipments.

The Criminal Investigation and Detection Group (CIDG) of the Philippine National Police (PNP) has an established Government Computer

The appropriate legal issuances that will implement the proposal for cybercrime information exchange arrangement was drafted and currently undergoing deliberations at Philippine Congress.

Logistics and funding support necessary for the operation (e.g. equipment, staffing, training, communications, etc.) for the established high-technology crime division.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2008

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET

AGREED TARGETSSecurity Incident Response Team (GCSIRT), but like the NBI, this unit needs an infusion of cyber forensic resources.

The CICT deputized a National Coordinator for Cyber Security and is currently in the process of implementing the project to set up the Philippine Cyber Security Coordination Center that will also act as the 24/7 point of contact.

Creation of Sectoral CERTs that will form part of the Philippine Cyber Security Coordination Center reporting system. Logistical and funding

support for the continued operation of the Philippine Cyber Security Coordination Center.

Continue to implement and enhance critical information infrastructure protection and cyber security as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment

1.Develop cohesive domestic strategies to ensure a trusted, secure and sustainable online environment.

2. Address the threat posed by the misuse, malicious use and criminal use of the online environment by ensuring that legal and policy frameworks address substantive, procedural and mutual legal assistance arrangements consistent with the provisions of international legal instruments, including United Nations General Assembly Resolution 55/63 (2000) and Convention on Cybercrime (2001); and, join the international 24/7

The substitute bill, “Cybercrime Prevention Act of 2008” was submitted at the 14th Congress and being deliberated upon by the Committee on ICT of the House of Representatives.

It will be tabled for plenary debate prior to transmission to the Senate.

The refiled bill now closely hews to the Convention on Cybercrime of the Council of Europe.

Concerned agencies to request the President to indorse and/or certify the “Cybercrime Prevention Act of 2008” as a priority bill.

Lobby for the immediate approval of the bill by the Senate and the House of Representatives.

Conduct series of awareness campaigns.

Information and education campaign to heighten policy-makers and public awareness on the importance and need for a cybercrime prevention law for the country’s economy and security.

Undertaking of public consultations (thru: fora, workshops, etc.) on the proposed bill to discuss issues and generate views critical to the shaping of the bill.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2008

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET

AGREED TARGETScybercrime information exchange arrangement.

3.Develop watch, warning and incident response and recovery capabilities by establishing national computer security incident response teams (CSIRTs) to help prevent cyber attacks and minimize damage and recovery time from incidents, and participate in domestic and cross-border information sharing cooperative arrangements to support these efforts. 

4. Develop partnerships among government, industry, academics and others, including between law enforcement officials and businesses, that recognize the important roles each plays in ensuring a trusted, secure and sustainable online environment, including through the development, implementation and review of guidelines and best practices.

5. Reach out to users to raise their awareness of the issues of online security, and assist them to understand and fulfill their role and responsibility in contributing

Signed the Security Cooperation Program with Microsoft in 2007 to engage in cooperative security activities in the areas of computer incident response.

Implementation of training course on Information Technology Audit, Security and Governance with ISACA-Manila through the National Computer Institute.

Conduct public awareness forums and conferences jointly with the private sector, through the Information Systems Security Society of the Philippines (ISSSP).

Concurrent with the setting up of the Philippine Cyber Security Coordination Center is the establishment of a pilot Digital Signature Certification Authority. The appropriate legal

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2008

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING NEEDS TO MEET

AGREED TARGETSto a trusted, secure and sustainable online environment.

6. Encourage research and development efforts to improve the security of the online environment, and promote the design, development and implementation of appropriate and usable security measures in existing and new technologies.

7. Support cooperative efforts among economies to promote the development and implementation of a trusted, secure and sustainable online environment. 

issuances that will implement the proposal for a National Digital Signature Certification Authority (Root CA, Government CA and Accredited CA) shall be subsequently studied/drafted in consultation with the relevant public agencies and private organizations.

ECONOMY: SingaporeLAST UPDATED: 31 July 2009

C. PROMOTING CYBER SECURITY

Contact Point:

Name: Goh Yang Chuang Title: Manager

Telephone Number: (65) 6211 1851 Fax Number: (65) 6211 2220 Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS

MEASURES UNDERTAKEN OR TO BE COMPLETED IN 2009 FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING

OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

1. In April 2008, Singapore launched its 2nd Infocomm Security Masterplan - Infocomm Security Masterplan (MP2), a 5 year masterplan which is meant to enhance Singapore’s resiliency against cyber attacks such as to establish the nation as a strategic and secure hub.

In the area of critical information infrastructure protection the MP2 includes objectives:a. Hardening of national infocomm infrastructure and services; and b. Enhancing infocomm security competencies; andc. Increasing international collaboration

In addition to the activities which were cited in 2008 (e.g. Cyber Security Exercises - To better tackle cyber threats, MP2 will conduct cyber security exercises to test the nation's ability to respond and recover from cyber

The MP2 is a 5-year masterplans under which Singapore will continue to pursue their stated objectives.

In this regard, the Cyber Security Exercises and Sector-Specific Infocomm Security Programmes are ongoing programs

N.A.

OBJECTIVE EXPECTED OUTPUTS

MEASURES UNDERTAKEN OR TO BE COMPLETED IN 2009 FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING

OPPORTUNITIES TO

MEET AGREED TARGETS

attacks, and Sector-Specific Infocomm Security Programmes to develop customised solutions for critical infrastructure owners in both public and private sectors), Singapore in May 2009, announced the launch of the development of a comprehensive Infocomm Security Professionals Roadmap and a Body of Knowledge which will form the foundation of a professional certification programme (to be launched later in 2009). The Infocomm Security Professionals Roadmap will outline clear pathways of certification, qualifications and competencies needed for an infocomm security professional, including areas which relates to critical information infrastructure protection, while the Body of Knowledge will serve as a framework for educating and testing the competence of aspiring infocomm security professionals

which will remain relevant in 5 years of the MP2; the Infocomm Security Professionals Roadmap and a Body of Knowledge will be launched in the later half of 2009.

ECONOMY: CHINESE TAIPEILAST UPDATED: FEBRUARY 2009

C. PROMOTING CYBER SECURITY

Contact Point: Name: Mr. Venson Lu, Title: Associate Researcher, Science & Technology Advisory GroupTelephone Number: (886-2) 2737-7706, Fax Number: (886-2) 2737-7333, Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by implementing and enhancing critical information infrastructure protection and cyber security.

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

1. The “Mechanism Plan to Establish Information and Communications Infrastructure Security” has been initiated since 2001, and is now in its third phase. The major focus aims at:

(1) Promoting public-private partnerships.

(2) Strengthening the cooperation and communication among member economies.

2. Develop critical information infrastructure protection and strengthen strategy.

3. Provide online security awareness training & promotion program to establish a security culture.

1. Study the feasibility to institutionalize the information security governance mechanism.

2. Published the 2010 Information and Communication Security Strategy White Paper.

3. Promote collaboration among Information Sharing and Analyzing Centers (ISACs) to ensure major critical infrastructure security.

1. Design information security syllabus and curriculums; encourage colleges to recruit more students.

2. Include more information security in computer educational program of elementary and high schools.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

4. Chinese Taipei has set up a cyber crime technical task force platform to manage the Internet Content Provider and the Internet Platform Provider to prevent cyber crime.

ECONOMY: THAILANDLAST UPDATED: 27 JULY 2009

C. PROMOTING CYBER SECURITY

Contact Point: Name: Mr. Pansak Sirirachatapong Title: Director of National Electronics and Computer Technology CenterTelephone Number: (662) 564-6900 Fax Number: (662) 564-6901-3

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Countering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

The Ministry of Information and Communication Technology (MICT) is responsible for monitoring suspicious activities on cyber space and collecting electronic evidence as requested by other concerned agencies, particularly the Royal Thai Police. MICT has also taken part in the investigation of cyber crime over the internet, such as the hacking of various applications and web boards.

In January 2009, MICT set up the Internet Security

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO

BE COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO

MEET AGREED TARGETS

Operations Center, with its full operation in place since May 2009. Hotline number (1212) and e-mail [email protected] are in place to receive reports and complaints concerning cyber crimes and the misuse of cyber space that may pose a threat to national security.

ECONOMY: UNITED STATESLAST UPDATED: FEBRUARY 2009

C. PROMOTING CYBER SECURITY

Contact Point:

Name: Ms. Jordana Siegel Title: Deputy Director, Outreach and Awareness, National Cyber Security Division, U.S. Department of Homeland Security

Telephone Number: +1 (703) 235-5183 Fax Number: Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO BE

COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO MEET

AGREED TARGETSCountering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

Through APEC TEL, the United States:

1. Is planning two bilateral legislative drafting meetings in 2009 to promote laws addressing cyber security issues.

2. Will, with Australia, further the ongoing work on cyber security awareness raising, to result in a report and collaborative activity amongst interested economies.

3. Will continue to support remaining and new activities

Through APEC TEL, the cyber security awareness virtual working group may pursue cyber security awareness raising within APEC more broadly.

N/A

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO BE

COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO MEET

AGREED TARGETSrelated to cyber security.

ECONOMY: VIETNAMLAST UPDATED: JULY 2009

1. Summary of main achievements/progress in implementing Leaders’ and Ministers’ Statements since last update.

B. Promoting cyber security: VNCERT of the Ministry of Information and Communication, which was established in 2007, has actively participated in

activities and programs on promoting cyber security such as: Country Self-Assessment Exercises, Regional Cyber Security Forums. In 2008, Viet Nam developed a national long-term strategy to secure cyber-space and disseminate regulations about cyber security. Recently, Viet Nam has invented to establish a National Network Security Technical Center. Viet Nam has developed program to protect legitimate financial and commercial system from abuse (2009 – 2010).

3. Identified agenda on priorities/needs:

B. Promoting cyber security. In 2009, Viet Nam is planning to issue the additional provisions and corrected provisions related cyber crime of Criminal Law. Furthermore, Viet Nam has been implementing the 3-year Project of National Network Security Technical Center. Besides, VNCERT continue to deploy the cooperative framework with Viet Nam Information Security Association (VNISA) and other national CERTs in the Region and worldwide.

C. PROMOTING CYBER SECURITY

Contact Point: Name: Office of VNCERT, Ministry of Information and Communication

Telephone Number: (844) 36404423____ Fax Number: (844) 36404425____ Email Address: [email protected]

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO BE

COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO MEET

AGREED TARGETSCountering terrorism by, implementing and enhancing critical information infrastructure protection and cyber security

A trusted, secure and sustainable online environment as reflected in the APEC Strategy to Ensure a Trusted, Secure and Sustainable Online Environment.

- Developing the state master plan to secure cyber-space.

- Enhancing, disseminating, and spreading out regulations about cyber security.

- Issuing the additional provisions and corrected provisions related cyber crime of Criminal Law.

- Implementing Anti-spam Decree in all over Vietnam.

- Developing the technical standard on information security management.

- Develop the Project of National Network Security Technical Center - Continue building PKI and CA centers.

- Strengthening information channels to deliver and receive cyber security information nation-wide.

- Develop cooperation framework between VNCERT and all ISPs in Vietnam.

- Deploy further partnerships with Vietnam information security associations and big companies on cyber security.

- Organize the national

- Implement the state master plan and develop other long-term plan to secure cyber-space.

- Enhancing, disseminating, and spreading out regulations about cyber security.

- Joining the International 24/7 cyber incident information exchange arrangement.

- Invent and implement the Project of National Network Security Technical Center (will last in 3 years).

- Develop a system for watch, warning and incident response in Viet Nam

- Promote to set up the domestic CSIRT network and operations (until 2010).

- Encourage the national and international conferences on cyber security and related topics.

- Encourage the training centers to issue information security (IS) certificates.

- Continue working on developing the series of technical standards in cyber security.

- Human resources training courses in law building.

- Human resources training courses and support in the cyber-security technical standard building.

- Financial support and experiences sharing to speed up the Vietnam CERT capability improving project’s implementation.

- Human resources training courses and support in the deployment of CERT/CSIRT operations.

- Training experts with international certificates of IS to be teachers and trainer.

OBJECTIVE EXPECTED OUTPUTS MEASURES UNDERTAKEN OR TO BE

COMPLETED IN 2009

FURTHER MEASURES PLANNED

(indicate timeframe)

CAPACITY BUILDING OPPORTUNITIES TO MEET

AGREED TARGETSworkshops/ events on cyber security.

- Deploy official websites of VNCERT for cyber security and for anti-spam management.

- Implement the RD project on building the technical system for watch, warning and incident response.

- Taking part in some international collaboration research projects.

- Improve working relationships between VNCERT and other national CERTs.

- Participating actively in the collaboration activities among APCERT and ASEAN CERTs

- Deploy further cooperation & collaboration with the National CERTs around the world.

- To consider VNCERT to be a member of the FIRST

- Support from overseas government, industry and organizations.