SlideShare uma empresa Scribd logo
1 de 11
B.P 6170 Yaoundé Tél : (+237) 22 20 22 11 Email : infos@antic.cm Internet : http://www.antic.cm
CTO , 26/04/2013
PRESENTATION OUTLINE
1. Context
2. Internet Resource Management in Cameroon
2.1. Legal status
2.2. «.CM» Domain Name
2.3. IPAddress
3. Ensuring Cybersafety in Cameroon
3.1. Organisational measures
3.2 Technical measures
4. Conclusion
26/04/2013CTO 2013
26/04/2013
In order to attend the 2035 vision, the State must activate all the
development levers, including the Information and Communication
Technologies (ICT) which has emerged in the recent years as an important
factor in economic growth.
Cameroon is currently experiencing rapid growth of e-services (e-
Government and e-Commerce related services) development , Internet
usage increase and high penetration of mobile services.
To this effect, the Government must ensure a trustworthy
environment in the ICT sector which is pestered with scourge of cybercrimes.
1. CONTEXT
CTO 2013
26/04/2013
Legal and Regulatory Framework
To curb the scourge of cybercrimes, on December 21, 2010, the Head of State
promulgated a set of laws governing this sector; the Prime Minister, Head of
Government has also signed decrees to ensure the proper implementation of the
laws.
Laws N°2010/012 and N°2010/013
Decree organizing ANTIC and ART
Enforcement Decree on Security Audits
Decree on Electronic Certification
Decree on Naming and Addressing Resources
1. CONTEXT
CTO 2013
2.INTERNET RESOURCES MANAGEMENT IN CAMEROON
2.1. Legal Status
26/04/2013CTO 2013
Following the enactment of the Law N°2010/013 relating to Electronic
Communication in Cameroon by the President of the Republic and the Decree
N° 2013/0402/PM signed by the Prime Minister and Head of Government,
ANTIC has the mandate to manage the following Internet resouces :
• «.CM » Domain Names
• IP Addresses in Cameroon
2.INTERNET RESOURCES MANAGEMENT IN CAMEROON
2.2. « .CM» Domain Names
26/04/2013CTO 2013
14 Registrars registering domain names under the Cameroon’s ccTLD (.cm )
Cameroon’s ccTLD is managed with a policy which is respected by all the
stakeholders
Currently there are 11677 domain names under the Cameroon’s ccTLD
ANTIC is hosting and managing the zone’s master/primary server meanwhile
slave/secondary DNS services are provided by CAMTEL (03), ITU (01), RIPE (01)
VERIZONE (01)
2.INTERNET RESOURCES MANAGEMENT IN CAMEROON
2.3. Public IP addresses
26/04/2013CTO 2013
Currently, AfriNIC allocates public IP addresses to ISPs in Cameroon
With the regulation in place, ANTIC has planned to establish partnership with AfriNIC in order to
manage public IP addresses in Cameroon
IPv4 is still widely used by ISP, however some ISP are currently managing IPv6 addresses
ANTIC and stakeholders are developing plans to switch from IPv4 to IPv6
The realization of a national IXP is going on
The elaboration of charter to be respected by LIRs( Local Internet Registeries) is currently going on
ANTIC has organised several meetings with LIRs in order to discuss on the new orientations of
public IP address management inline with legal framework in place
ANTIC has implemented a whois application
3. CYBERSECURITY MEASURES IN CAMEROON
3.1. Organizational measures
Elaboration of a National Information Security Policy
Establishment of a formal framework for the fight against cybercrime involving all cybersecurity actors
(SED, DGSN, DGRE, MINPOSTEL, ANTIC, ART)
Reinforce the cybersecurity legal framework
Sensitization and promotion of teaching cybersecurity related courses in universities
Building partnerships with some organizations (Yahoo, Google, FIRST, INTERPOL)
Elaboration of standards related to cybersecurity(charter, procedure, policy)
Set up sustainable funding mechanisms for cybersecurity activities
26/04/2013CTO 2013
3. CYBERSECURITY MEASURES IN CAMEROON
3.2. Technical measures
Set up a national PKI (Public Key Infrastructure)
Set up a CIRT
Conduct security audit nationwide
Set up an IXP (Internet Exchange Point)
Set up a national datacenter
Put in place technical infrastructure to protect and monitor our cyberspace
26/04/2013CTO 2013
4. CONCLUSIONS & PERSPECTIVES
26/04/2013CTO 2013
Develop a strategic framework involving different government structures in order to
elaborate a national IT security policy
Introduce IT Security Officer positions with respective roles in public and private agencies
Reinforce the cybersecurity legal framework
Put in place technical infrastructure(equipment and software) to protect and monitor our
cyberspace
Promote the development of local expertise in the cybersecurity
Establish sustainable funding mechanisms for carrying out cybersecurity activities
26/04/2013CTO 2013
Thank you for your Kind attention!

Mais conteúdo relacionado

Mais procurados

Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsFrancis Amaning
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureFrancis Amaning
 
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...Ambrose Ruyooka,PMP,CGEIT, CRISC
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Amirudin bin Abdul Wahab
Amirudin bin Abdul WahabAmirudin bin Abdul Wahab
Amirudin bin Abdul Wahabeletseditorial
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
 

Mais procurados (11)

Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Amirudin bin Abdul Wahab
Amirudin bin Abdul WahabAmirudin bin Abdul Wahab
Amirudin bin Abdul Wahab
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 

Destaque

Destaque (19)

CTO Cybersecurity Forum 2013 Patricia Dovi Sampson
CTO Cybersecurity Forum 2013 Patricia Dovi SampsonCTO Cybersecurity Forum 2013 Patricia Dovi Sampson
CTO Cybersecurity Forum 2013 Patricia Dovi Sampson
 
Malawi Case Study Microloan
Malawi Case Study MicroloanMalawi Case Study Microloan
Malawi Case Study Microloan
 
CTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre KaptueCTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre Kaptue
 
Kevin Poulter HR4 ICT12
Kevin Poulter HR4 ICT12Kevin Poulter HR4 ICT12
Kevin Poulter HR4 ICT12
 
Harriet Omoding HR4_ICT12
Harriet Omoding HR4_ICT12Harriet Omoding HR4_ICT12
Harriet Omoding HR4_ICT12
 
Financing Infrastructure
Financing InfrastructureFinancing Infrastructure
Financing Infrastructure
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
CTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla Licciardello
CTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla LicciardelloCTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla Licciardello
CTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla Licciardello
 
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana BelingueCTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
 
Activation of Universal Access in Kenya
Activation of Universal Access in KenyaActivation of Universal Access in Kenya
Activation of Universal Access in Kenya
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
John Tysoe, the Mobile World
John Tysoe, the Mobile WorldJohn Tysoe, the Mobile World
John Tysoe, the Mobile World
 
HR4 ICT Mcleman
HR4 ICT MclemanHR4 ICT Mcleman
HR4 ICT Mcleman
 
Ramsus Aaen Madesn HR4 ICT12
Ramsus Aaen Madesn HR4 ICT12Ramsus Aaen Madesn HR4 ICT12
Ramsus Aaen Madesn HR4 ICT12
 
The Mobile World
The Mobile WorldThe Mobile World
The Mobile World
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
Brian Goulden HR4 ICT12
Brian Goulden HR4 ICT12Brian Goulden HR4 ICT12
Brian Goulden HR4 ICT12
 

Semelhante a CTO Cybersecurity Forum 2013 Ebot Ebot Enaw

CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeCA
 
country report corée group koreaaaA.pptx
country report corée group koreaaaA.pptxcountry report corée group koreaaaA.pptx
country report corée group koreaaaA.pptxessiben
 
Digital strategy for cyprus
Digital strategy for cyprusDigital strategy for cyprus
Digital strategy for cyprusAnima Slides
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"ATMOSPHERE .
 
Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)Rasheed Adegoke
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
Ministry of Communication and Technology
Ministry of Communication and TechnologyMinistry of Communication and Technology
Ministry of Communication and TechnologyTransformNG
 

Semelhante a CTO Cybersecurity Forum 2013 Ebot Ebot Enaw (20)

CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crime
 
country report corée group koreaaaA.pptx
country report corée group koreaaaA.pptxcountry report corée group koreaaaA.pptx
country report corée group koreaaaA.pptx
 
Digital strategy for cyprus
Digital strategy for cyprusDigital strategy for cyprus
Digital strategy for cyprus
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"
 
Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Communications Development in Saudi Arabia
Communications Development in Saudi ArabiaCommunications Development in Saudi Arabia
Communications Development in Saudi Arabia
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Implementation in E-Government in Cameroon - Eric Sindeu
Implementation in E-Government in Cameroon - Eric SindeuImplementation in E-Government in Cameroon - Eric Sindeu
Implementation in E-Government in Cameroon - Eric Sindeu
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
Ministry of Communication and Technology
Ministry of Communication and TechnologyMinistry of Communication and Technology
Ministry of Communication and Technology
 

Mais de Commonwealth Telecommunications Organisation

Mais de Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Session 2.2 Simon Milner
Session 2.2 Simon MilnerSession 2.2 Simon Milner
Session 2.2 Simon Milner
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
Session 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie CreeseSession 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie Creese
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

CTO Cybersecurity Forum 2013 Ebot Ebot Enaw

  • 1. B.P 6170 Yaoundé Tél : (+237) 22 20 22 11 Email : infos@antic.cm Internet : http://www.antic.cm CTO , 26/04/2013
  • 2. PRESENTATION OUTLINE 1. Context 2. Internet Resource Management in Cameroon 2.1. Legal status 2.2. «.CM» Domain Name 2.3. IPAddress 3. Ensuring Cybersafety in Cameroon 3.1. Organisational measures 3.2 Technical measures 4. Conclusion 26/04/2013CTO 2013
  • 3. 26/04/2013 In order to attend the 2035 vision, the State must activate all the development levers, including the Information and Communication Technologies (ICT) which has emerged in the recent years as an important factor in economic growth. Cameroon is currently experiencing rapid growth of e-services (e- Government and e-Commerce related services) development , Internet usage increase and high penetration of mobile services. To this effect, the Government must ensure a trustworthy environment in the ICT sector which is pestered with scourge of cybercrimes. 1. CONTEXT CTO 2013
  • 4. 26/04/2013 Legal and Regulatory Framework To curb the scourge of cybercrimes, on December 21, 2010, the Head of State promulgated a set of laws governing this sector; the Prime Minister, Head of Government has also signed decrees to ensure the proper implementation of the laws. Laws N°2010/012 and N°2010/013 Decree organizing ANTIC and ART Enforcement Decree on Security Audits Decree on Electronic Certification Decree on Naming and Addressing Resources 1. CONTEXT CTO 2013
  • 5. 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.1. Legal Status 26/04/2013CTO 2013 Following the enactment of the Law N°2010/013 relating to Electronic Communication in Cameroon by the President of the Republic and the Decree N° 2013/0402/PM signed by the Prime Minister and Head of Government, ANTIC has the mandate to manage the following Internet resouces : • «.CM » Domain Names • IP Addresses in Cameroon
  • 6. 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.2. « .CM» Domain Names 26/04/2013CTO 2013 14 Registrars registering domain names under the Cameroon’s ccTLD (.cm ) Cameroon’s ccTLD is managed with a policy which is respected by all the stakeholders Currently there are 11677 domain names under the Cameroon’s ccTLD ANTIC is hosting and managing the zone’s master/primary server meanwhile slave/secondary DNS services are provided by CAMTEL (03), ITU (01), RIPE (01) VERIZONE (01)
  • 7. 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.3. Public IP addresses 26/04/2013CTO 2013 Currently, AfriNIC allocates public IP addresses to ISPs in Cameroon With the regulation in place, ANTIC has planned to establish partnership with AfriNIC in order to manage public IP addresses in Cameroon IPv4 is still widely used by ISP, however some ISP are currently managing IPv6 addresses ANTIC and stakeholders are developing plans to switch from IPv4 to IPv6 The realization of a national IXP is going on The elaboration of charter to be respected by LIRs( Local Internet Registeries) is currently going on ANTIC has organised several meetings with LIRs in order to discuss on the new orientations of public IP address management inline with legal framework in place ANTIC has implemented a whois application
  • 8. 3. CYBERSECURITY MEASURES IN CAMEROON 3.1. Organizational measures Elaboration of a National Information Security Policy Establishment of a formal framework for the fight against cybercrime involving all cybersecurity actors (SED, DGSN, DGRE, MINPOSTEL, ANTIC, ART) Reinforce the cybersecurity legal framework Sensitization and promotion of teaching cybersecurity related courses in universities Building partnerships with some organizations (Yahoo, Google, FIRST, INTERPOL) Elaboration of standards related to cybersecurity(charter, procedure, policy) Set up sustainable funding mechanisms for cybersecurity activities 26/04/2013CTO 2013
  • 9. 3. CYBERSECURITY MEASURES IN CAMEROON 3.2. Technical measures Set up a national PKI (Public Key Infrastructure) Set up a CIRT Conduct security audit nationwide Set up an IXP (Internet Exchange Point) Set up a national datacenter Put in place technical infrastructure to protect and monitor our cyberspace 26/04/2013CTO 2013
  • 10. 4. CONCLUSIONS & PERSPECTIVES 26/04/2013CTO 2013 Develop a strategic framework involving different government structures in order to elaborate a national IT security policy Introduce IT Security Officer positions with respective roles in public and private agencies Reinforce the cybersecurity legal framework Put in place technical infrastructure(equipment and software) to protect and monitor our cyberspace Promote the development of local expertise in the cybersecurity Establish sustainable funding mechanisms for carrying out cybersecurity activities
  • 11. 26/04/2013CTO 2013 Thank you for your Kind attention!