Upload
ict-authority
View
212
Download
0
Embed Size (px)
Citation preview
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
1/16
COMESA Cyber Secur i ty and PK I Meet ingCOMESA Cyber Secur i ty and PK I Meet ing( P r e( P r e -- e v e n t A w a r e n e s s W o r k s h o p )e v e n t A w a r e n e s s W o r k s h o p )
2020 thth November 2013November 2013
By:By:
Michael K. KatunduMichael K. Katundu
Director, Information TechnologyDirector, Information TechnologyCommunications Commission of Kenya (CCK)Communications Commission of Kenya (CCK)
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
2/16
Content1. Introduction
2. Implementation of Kenyas National CybersecurityManagement framework
3. Collaboration in Cyber Crime Management.
5. How to Report Cybercrime attacks in Kenya
6. Kenyas Public Key Infrastructure (PKI)
7. COMESA Cyber Security and PKI Meeting
2
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
3/16
Introduction
What is Cyber Security?
Cyber security is the defense againstCybercrime or cyber-attacks.
It is the defense against attacks on
Information and CommunicationsTechnology (ICT) infrastructure.
What is Cyber Crime?
Cyber crime refers to attacks on theInformation and CommunicationsTechnology (ICT) infrastructure.
Cyber-attacks are mainly directed tocomputer networks, computer data,
It is a means of safeguarding
computer networks and theinformation they contain frompenetration and malicious damage or
disruption.
Facebook, emails, Bank accounts and
websites, among others.
Cyber-attacks can lead to maliciousdamage or disruption of services,
including loss of money. Cyber-attackscan be committed through the Internetusing Computers, Tablets , Mobile
phones, among others. Many types ofcybercrimes are simply extensions ofexisting physical criminal activities.
3
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
4/16
Introduction (Contd)
National CIRTsA National CIRT is a technicalcyber security management
entity that acts as a Trusted Pointof Contact for a given country
where Citizens, regional andinternational communities report
cybercrime incidents for assistance.
Sector CIRTsThis refers to a technical cybersecurity management framework
that serves a particular industry.
Examples include a lawenforcement CIRT, a financial
sector CIRT, aTelecommunications Operators
To effectively discharge its
mandate, best practice requiresthat a National CIRT establishes
relevant partnerships at theNational, Regional and
International level.
In Kenya the National CIRT is theKE-CIRT/CC
sector CIRT, an Academia sectorCIRT, among others
Stakeholders interest groups are
encouraged to form their respective sector CIRTs to
coordinate cyber securitymanagement within their sectors,
in collaboration with the NationalKE-CIRT/CC.
4
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
5/16
Introduction (Contd)
Cybersecurity management framework in Kenya includes:
The Kenya Information and Communications Technology SectorPolicy of 2006;
The Kenya Information and Communications Act CAP411A of1998; and
The Kenya Information and Communications (Electronic
5
2010, among other legal instruments;
The national Kenya Computer Incident Response TeamCoordination Centre (KE-CIRT/CC)
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
6/16
Implementation of Kenyas National Cyber Security
Management Framework
The Kenya Information and Communications Act CAP411A of 1998mandates the CCK to implement Kenyas national cyber securitymanagement framework
In October 2012, the CCK established the Kenya Computer Incident
Response Team/Coordination Centre (KE-CIRT/CC), Kenyas nationaltrusted point of contact for cyber security matters.
The functions of the KE-CIRT/CC include;
Offering advisories on cyber security matters to its constituents and coordinatingcyber incident response in collaboration with relevant actors locally, regionallyand internationally.
Gathering and disseminating technical information on computer securityincidents;
Carrying out research and analysis on computer security;
Facilitating the development of a national Public Key Infrastructure (PKI); and,
Capacity building in information security and creating and maintaining
awareness on cyber security-related activities.
6
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
7/16
Implementation of Kenyas National Cybersecurity
Management Framework
To enhance collaboration with local cyber security stakeholders, inApril 2012 the CCK put in place the National Cybersecurity SteeringCommittee (NCSC) to facilitate the establishment of the national KE-
CIRT/CC, as well as oversee the operations of the national KE-CIRT/CC.
The NCSC is chaired by CCK and draws members from:
The Ministry of Information, Communication and Technology (MICT);
e ecommun ca ons erv ce rov ers o enya ,
Internet Service Providers (ISPs) and Undersea Fibre Optic Cable Providers;
Law Enforcement;
Academia;
The Financial sector;
Critical Utilities Infrastructure entities (Kenya Airways, Kenya Civil Aviation,Nairobi Water and Sewerage Company, Kenya Pipeline Corporation, KenyaPower Limited and Kengen Limited); and Government Agencies.
7
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
8/16
Collaboration in Cyber Crime Management
To effectively discharge its mandate, best practice requiresthat a national CIRTestablishes relevant partnerships at the National, Regional and International level.
KE-CIRT/CC has established the following partnerships:
National level: National cyber security Steering Committee (NCSC) whosemembers are drawn from the Ministry of ICT, TESPOK/ISPs/Mobile Operators,
academia, the financial sector and the law enforcement;
Regional level: EACO cyber security Taskforce (E.A Point of Contact) andother E.A National CIRTs; and
International level:ITU, IMPACT, FIRST (ongoing), etc.
8
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
9/16
Overview of Cyber Incidents in Kenya
9
Source: KE-CIRT/CC 2013
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
10/16
How to Report Cybercrime attacks in Kenya
Cybercrime incidents can be reported to the KE-CIRT/CCthrough:
Web portal:http://cirt.cck.go.ke/contact
Email:[email protected]
Tel: +254-703-0422000/446 or +254-20-4242000/446
Fax:+254-20-4451866
A letter addressed to:
Director GeneralCommunications Commission of Kenya (CCK)Waiyaki Way
P.O. Box 14448, 00800 WestlandsNAIROBI, KENYA
10
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
11/16
Kenyas National
Public Key Infrastructure
11
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
12/16
A Public Key Infrastructure (PKI) refers to a system for thecreation, storage, and distribution of digital certificates whichare used to verify that a particular public key belongs to acertain entity.
A Public Key Infrastructure (PKI) creates digital certificateswhich map public keys to entities, securely stores these
Kenyas National Public Key Infrastructure (PKI)
12
cer ca es n a cen ra repos ory, an revo es em nee e .The PKI framework uses public key cryptography, acryptographic technique that enables users to securelycommunicate on an insecure public network, and reliably
verify the identity of a user via digital signatures.
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
13/16
Generally a PKI Consists of:
Registration Authorities (RAs)
RAs are the first point of contact for prospective users of PKI services.
The role of RAs is to verify the identity of a user. This function is usually performed by aCertification Authority (CA).
Certificate Authorities (CAs)
Kenyas National Public Key Infrastructure (PKI)
13
CAs issue and verify digital certificates that authenticate the identity of organizationsand individuals over a public system like the Internet.
The digital certificates are also used to sign electronic messages and documents, whichensure that the electronic messages and documents are not tampered with during thetransmission process.
A Root Certification Authority (RCA)
RCAs accredit CAs who issue digital certificates to users.
Accreditation ensures that digital certificates issued by the CA are recognized &trusted globally.
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
14/16
In Kenyas framework, the RA and CA functions will be performedby CCK licensed Electronic Certification Service Providers.
The RCA is a regulatory instrument and thus this function will beperformed by the CCK
Already, the technical implementation of Kenyas PKI (RA, CA and
Kenyas National Public Key Infrastructure (PKI)
14
s n p ace.
The CCK is currently in the process of developing a licensingframework for the Electronic Certificate Services Providers (E-CSPs).The framework is currently available for public/stakeholderconsultations until 25th November 2013.
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
15/16
COMESA Cyber Security and PKI Meeting
Objectives Sharing experiences among the COMESA
member states on the implementation of
national cyber security frameworks, national
Public Key Infrastructure (PKI) and consideration
of the COMESA cyber security and PKI road map.
Dates 26th to 28th November 2013
15
Venue Safari Park hotel, Nairobi
Target Group Academia, financial institutions, cyber security
committees/taskforces, investigators, judges, law
enforcement, lawyers, national and sector CIRTs,
prosecutors, policy makers, information security
professionals, among other cyber crimemanagement stakeholders.
8/13/2019 IT Presentation During COMESA Pre-Event.ppt [Compatibility Mode]
16/16
T H A N K Y O UT H A N K Y O U
ka tundu@cck .go .keka tundu@cck .go .ke