Free Essay

Cybersecurity

In: Computers and Technology

Submitted By njorostunnaman
Words 4766
Pages 20
HE, President Mwai Kibaki, presides over the official ground breaking of Konza Technology City.
January 2013

2 0 1 7

1

2

Hon. Samuel L.Poghisio,
EGH, MP
Minister for Information and Communications

Minister’s Statement
Access to information is crucial to economic growth. Information and communications technology offer a powerful tool that, if deployed equitably, can ensure citizens are empowered and Government can deliver services more effectively. Information is vital for the efficient delivery of public and private sector product and services that are responsive to the needs of citizens and businesses as well as capacity creation. For a variety of reasons (economic and policy), developing countries like Kenya are less equipped to take advantage of the potential in ICT to stimulate growth, and are likely to fall behind advanced economies. The Kenya ICT Master Plan is therefore not designed in isolation, given that there is evidence from developed countries that investment in ICT facilitates economic growth by increasing productivity. As the Kenya
Government ensures an enabling ICT environment and regulatory framework, this plan aims at stimulating the setup of ICT-related businesses to enhance employment creation.
At the heart of this document is a strategic intent to develop a robust ICT sector that will enhance economic growth through creation of businesses and hence employment. In the execution of this plan, Kenya will become a leading ICT hub for the region, improve the lives of her citizens and see significant ICT-led economic growth in line with Vision 2030. This ICT Master Plan aims at building and promoting an environment where more service sector businesses are created and are able to thrive through leveraging on ICT.
ICT offers key benefits that make life simpler and more convenient for citizens and businesses and provides channels to collaborate and share information, which in turn enables innovation.
The Government while guiding budgets will ensure that projects deliver the value they promise towards attainment of the objectives of this
Master Plan. Achievements will underlie the Government’s commitment in enhancing transparency, ensuring greater accountability to the public as well as opening up new opportunities for local entrepreneurs.

3

4

By 2017, Kenya becomes
Africa’s most globally respected knowledge economy
- Master Plan Vision

5

Dr. Bitange Ndemo,
CBS
PS, Ministry of Information and Communications

6

Our Journey
The Kenya ICT Master Plan 2017 is focused on driving real economic growth. The Ministry of Information and Communications will take a threepronged approach in the execution of this plan, which recognizes Government projects that deliver citizen’s needs, the need to strengthen industry through ICT and encouragement of the creation of ICT businesses.
Kenya’s ICT Master Plan aspires to position Kenya as a regional leader in ICT while delivering the latest and most robust infrastructure.
Open standards, transparency and accountability are all key to the success of this Master Plan. Further, the Ministry is diligently working on standardizing business processes and the development of sub-plans to allow for the delivery of innovative public services within Government.
We are strengthening governance and increasing engagement with Government and with Private Sector to remove barriers that would impede execution. This plan centers on the needs of the citizen to ensure all efforts are designed to address those needs and truly deliver a society built on knowledge.
There are challenges anticipated in enabling the realization of ICT as an integral component of Vision 2030. This plan has therefore, been designed with interventions that are specific to both Social and Economic Pillars. The initiatives in this plan have been mainstreamed with the objectives of Vision 2030 given that the Government acknowledges that the future of our economy depends on developing a skillful and knowledgeable human capital.
For Kenya to achieve full benefits of ICT the plan has set seven key intervention areas
,

Kenya as a leading African ICT
Hub

A society built on knowledge Open and efficient Government delivering value through ICT

under the vision 2030 social pillar namely: Education and Training, Health Sector,
Water and Sanitation, Environment, Housing and Urbanization, Gender, Youth and
Vulnerable groups, Social Equity and Poverty Reduction. In addition, there would be seven key areas of intervention under the vision 2030 economic pillar. These are:
Tourism, Agriculture, Wholesale and Retail Trade, Manufacturing, Business Process

Robust, accessible & affordable ICT infrastructure Outsourcing and Financial Services and Creative Industry.

7

Strategic Goals
Every Citizen Connected
Every citizen, resident, home and institution will be connected through countrywide robust, accessible and affordable ICT infrastructure.

Kenya is Africa’s ICT Hub
Kenya will become the leading ICT Hub in Africa, attracting leading global players and generating globally respected local entrepreneurship and innovation.

Public Services for All
Public Services will be available to all citizens through ICT and ICT will enable a truly integrated, open and efficient Government delivering meaningful value to citizens.

A Society Built on Knowledge
Kenya will be a Knowledge Based Society. All Kenyans will be able to use ICT to improve their knowledge, businesses and livelihood. ICT will be the greatest enabler of Kenya’s economic growth.

8

Strategic Pillars
1. Enhanced Public Value

2. Development of ICT
Businesses

3. Strengthen ICT as a driver of industry

Enhancing the delivery and access of public services for all through strategic and innovative use of ICTs and achieve exemplary governance Develop Kenyan ICT Business that lead the world in understanding emerging market needs

Transformation of key Vision
2030 economic sectors to significantly enhance their productivity and global competitiveness and growth

One stop shop approach to the delivery of public services to persons and establishments; Access by 100% persons.
Access by 100% establishments.
Access to 80% of public sector services.
Improved governance through a whole-of-government approach constitution to IT alignment;
Best in class enterprise architecture that addresses the imperatives of the new constitution.
Best in class implementation.

Establish eco-system for market adoption of locally developed innovations;
100 successfully commercialized businesses. 20 new innovations that are globally propagated through government co-facilitated commercialization.

Establish eco-system for ICT adoption with special emphasis on SMEs;
Impact on GDP +25%.
60% automation of SMEs.
+50% productivity gain for Vision
2030 economic sectors.

An ICT Industry that is a substantial economic driver;
USD 2Bn sector.
500 new Tier 1 ICT companies.
50,000 jobs.

9

Foundational Pillars
Integrated Country Positioning:
Integrate Kenya’s ICT agenda into local and international communication including policy, political and diplomatic initiatives to promote Kenya’s innovation and Konza
Technology City.

Enhancing Citizen Capacity:
Deploy integrated, open and secure national networks across all technology domains with an emphasis on shared access, growing national capacity and inclusion of all

• Campaign for Local and International ICT Country positioning. • Konza City Marketing

• Campaign for Local and International ICT Country positioning. • Konza City Marketing

citizens

• Next generation super-broadband networks, enhanced NOFBI,

Integrated ICT Infrastructure & Info-structure:
Minimize duplication and create true integration in the investment in public services ICT to enable best practice application of shared services, national data infrastructure, open data, and policyframeworks

10

thematic super networks (Health,
Agriculture, Education, Trade)
• World class Government Shared Services backbone & Citizen end to end services, Citizen services centre
Core shared services applications Strategic Pillar 1: Enhanced Public Value
The Public Value pillar will focus on enhancement of the quality of life for all Kenyans through affordable, accessible and available ICT. The goal is to attain +90% inclusion of Kenyan society to public services, information and knowledge through ICT.

The plan will allow for ubiquitous solutions for centralized public service delivery. The pillar will address the following services;
Health, Education, Agriculture, Youth, Gender and Vulnerable Groups.

11

Connected Health

ICT adoption in the health sector will focus on enhancing health service provision for
Kenyans. This will ensure faster service delivery for all. 12

Expected outcomes:
• A working Health
Information
Management
System
• A Telemedicine strategy • Counterfeit drug control services
• Medical information and mobile health applications availability to citizens Connected Education

Education is the foundation of knowledge for all.
ICT within the education sector will ensure connectivity for all students by providing virtual classrooms to enable learning through online participation. Expected outcomes
• Connected academic centres
• Access to online resources for students and teachers • Increase online participation by adults • Improved quality of education • National Schools
Education Network
(SENet)

Connected Agriculture

Kenya is an agricultural country.
Adoption of ICT will facilitate access to information for improving production among farmers. Through this, Kenya will increase her exports to other countries while reducing imports and increasing food security. Expected outcomes
• Connected and ICT savvy farmers
• Affordable connectivity for farmers • Social networks and collaboration tools

Youth, Gender and
Vulnerability Groups

Kenya’s population majority consists of the youth and with the gender balance initiatives, Kenya, through ICT will ensure that IT literacy in the country is increased especially among the youth and vulnerable groups.

Expected outcomes
• Affordable connectivity in youth service organizations • IT savvy youth
• Increase employment levels among the youth through ICT opportunities • Increased availability of information to the youth 13

Strategic Pillar 2: Development of ICT Businesses
This pillar focuses on developing a globally competitive ICT industry as the foundation of a knowledge economy. Included here is the establishment of smart parks, smart infrastructure, smart platforms and centers of excellence that attract foreign direct investment, and create employment.

It further addresses Technology Innovation, Konza Technology City, BPO/ITES
Industry, Digital Economy Development, Centers of Excellence, Technology
Innovation. This shall entail creation of policies and infrastructure necessary to foster creativity and innovation at all levels.

14

Technology Innovation
Technology innovation aims to develop a creative and innovative ICT sector for the country. This shall entail creation of policies and infrastructure necessary to foster creativity and innovation at all levels.

Action

Description

Outcome(s)

Develop Industrialization

Champion the development of science and technology parks that will

Economic transformation

Science and Technology

provide the thrust for innovation, economic transformation, attract

Parks

foreign direct investment and position the country as science and

Foreign Direct Investment

technology giant.

Develop software and

Champion the development of software and hardware development

hardware development

standards to prepare local developers with necessary skills and increase

standards

their competitiveness at the global stage.

Innovation
Software development standards Hardware manufacturing standards Competitive skills

Promote Intellectual

To safeguard the innovation, together with responsible state agencies

Increased awareness on IPR

Property Rights (IPR) to

champion the enforcement of intellectual property rights in the country,

Protect Innovation

safeguard innovation

create awareness among stakeholders and protect the creative industry.

Recognize and Reward

Together with other industry stakeholders, champion the creation of

ICT innovators

mentors and role models by recognizing and rewarding ICT innovators

Mentors programme

through public acknowledgements and awards.

Establish Centers of

Champion the establishment of centers of excellence to exhibit the use

Excellence

Centers of Excellence

and adoption of ICT in different industries, sectors and fields. This is meant to showcase the possibilities of technology.

Table 1: Technology Innovation

15

Konza Technology City
The vision for Konza Technology City is to build a sustainable world-class technology hub with a vibrant mix of businesses, residents, and urban amenities that will be a major economic driver for the nation.

Action

Description

Outcome(s)

Identify priority

Develop a 4-stage process for:

Commitment from key investors

sectors, assesses

Prioritizing sectors

competitiveness and maps companies to value chain

Defining enablers for competitiveness
Identifying ICT opportunities across the value chain
Mapping companies against the set criteria

Developing incentives

Creating a portfolio of incentives to attract ideal investors

for investment

A great ecosystem of investors across key sectors who are able to contribute to the attainment of the Konza vision

Implementation of the

Empower enabling sectors, e.g. Financial, Health, Education, etc

Deliver Africa’s number 1

Konza Technology City

Deploy infrastructure

technology city

Project

Deploy reliable telecommunication services
Implement high-class shared amenities, e.g. roads, sanitation, etc

Table 2: KONZA Technology City

16

BPO/ITES and the ICT Industry
Having been identified as a flagship project in Vision 2030, Business Process Outsourcing and IT Enabled Services(BPO/ITES) presents a tremendous opportunity for the country if leveraged well. This project area will explore and execute key strategies to unlock this potential. Action

Description

Outcome(s)

Develop a market for BPO/ITES

Create BPO opportunities and proactively

Delivery of BPO services locally and

both locally and Internationally

market Kenya abroad as a BPO/ITES

internationally

destination
Develop and Implement National

Development of a Techno-city for promoting

Fully operational Techno-city offering

BPO/ITES strategy

BPO/ITES, IT Tourism and Employment

employment, entrepreneurship and ICT

creation

export opportunities

Develop National BPO/ITES

BPO/ITES standards are necessary to ensure

A formalized and regulated BPO/ITES

standards

credibility of the industry and fair trade

industry

Develop and implement a National

The ICT R&D strategy will include

An influx for local innovations into

ICT R&D strategy

development of well resourced incubation

the market through the existence of a

centers, and a comprehensive, consolidated

supported value chain

value chain between developers and the market Table 3: BPO/ITES and the ICT Industry

17

Digital Economy Development
The Digital Economy is a key input in propelling economic growth and has been proven to create employment and improve income levels. It is essential in ensuring the uptake of ICT infrastructure and promoting economic growth. The focus of this project area will

Action

Description

Outcome(s)

Increase enterprises – SMEs and

Support creation of online trading capabilities,

Seamless sales fulfillment, improved

SMMEs - online participation

including solutions in logistics and secure

service delivery and affordable

payment, access to IT cloud applications and

operational tools for SMMEs

web and mobile applications
Encourage and Promote

Promotion of Fiber Connectivity to the home

Increased online access for

Telecommuting

to enable home offices, entertainment and

telecommuters

education through home learning
Increased localized learning tools

Table 4: Digital Economy Development

18

Center of Excellence
This Masterplan will be supported by a local resource base developed through well-equipped research and development environments, which allows for testing and creation of new concepts.

Action

Description

Outcome(s)

Establish technology research and

Focus on research, development, and

Local R&D Centres with adoptable

integration centres (TRIC)

deployment of efficient and affordable

solutions

technologies
47 Technology Adoption and Integration
Centers
Establish Technology Project

Develop tools for SMEs to use to implement

Improved quality of products and

Implementation Methodology for

projects and make them readily available

services and efficient use of business

local SMEs

tools through project management training and resources for SMEs

Establish Permanent Demo Centers

Develop training centres for SMEs on

Digital Villages spread country-wide with

business skills through Digital Villages

SME business skills training centres

Table 5: Center of Excellence

19

Strategic Pillar 3: Strengthen ICT as a driver of industry
Transformation of key Vision 2030 economic sectors to significantly enhance their productivity, global competitiveness and growth.

20

Financial Services
Goal:
Programs in the Financial Services sector aim to transform Kenya into a trusted gateway and an innovative hub to East
Africa for financial services through ICT.

Highlighted Outcomes:
An all encompassing e-Transaction law
Champion the enactment of e-Transaction legislation that will bring in legal certainty for e-Commerce and e-Business and therefore ensure full participation. This will also ensure all required standards are considered in the regulatory process

Promote the development of affordable e-services
Promote adoption and localization of global e-services Increased awareness on availability, safety and access to e-services.

Promote awareness on cyber security
Both financial and non-financial institutions need high awareness of the need for secure online systems. This will ensure a secure online environment for conducting business and other economic activities.
Encourage the use of security standards while designing, building and deploying IT systems.

21

Tourism and Hospitality
Goal:
ICT will be used to improve the experience of visitors to Kenya before, during and after their visit, and enhance the growth and competitiveness of the Tourism and Hospitality sector. The main focus will be on supporting a Digital Concierge Program.

Highlighted outcomes:
Facilitate the development of a digital concierge programme
Accelerate the development of informational, transactional, location-based and mobile-commerce services by solution providers through common reusable content and functionalities

Facilitate networks for innovation of tourism innovation and destinations
Work with responsible ministries, agencies and other stakeholders to generate new innovative products and services through the use of ICT and broadband infrastructure to reach new markets and deliver exceptional tourist experience. Promote the development of an m-Tourism subsector that will utilize the momentum gained by the mobile industry. This may include the development of mobile applications, games and services for the sector.

Facilitate the use of ICT to promote and enhance the touristic offer
Assist the responsible Ministry and agencies to take full advantage of the available ICT and broadband infrastructure to promote, enhance and animate the Kenya touristic offer including the use of analytics and business intelligence solutions

22

Manufacturing
Goal:
ICT is a key enabler for the manufacturing sector. It is transforming the global manufacturing arena while at the same time opening up opportunities. Innovation and ICTs are transforming many sectors to anywhere, anytime platforms. In the manufacturing sector, the focus will be design anywhere, make anywhere, and sell anywhere.

Highlighted outcomes:
Facilitate the automation of the manufacturing value chain
Automation within the manufacturing industry and especially its value chain will lead to efficiency which brings a host of benefits including lower cost of production and hence competitiveness at the local, regional and international markets.

Promote manufacturing intelligence and digitally enabled manufacturing
Knowing what to produce and when is the next generation manufacturing trend that avoids waste and increases return on investment. This involves analyzing consumer trends and habits through analytics and business intelligence tools. Konza will promote the establishment additive manufaturing, leveraging the presence of world class technology institutions.

Promote green manufacturing
Sustainable manufacturing means a sustainable economy and a sustainable country. Together with responsibly ministries promote the use of green sustainable technologies and energy sources.

23

Transport and Logistics
Goals
Kenya is the transport and logistics hub of East Africa and as such programs in

Highlighted Outcomes

ICT to entrench Kenya’s position as a

Facilitate setting up of an online trade exchange portal high-value hub and a supply chain nerve

Together with responsible ministry and other stakeholders, facilitate the

center.

setting up of an online trade exchange portal will provide the much-needed

the Logistics sector will focus on using

centralized information on trade including products and encourage buying and selling of commodities and services online.

Facilitate the development of a national logistics and transport network
In collaboration with the responsible Ministry and other stakeholders develop a national online transport and logistics network that will provide a one-stop shop for standardized logics and supply chain services.

Facilitate the development of a Trade Information
Management System
Assist the responsible Ministry to develop a Trade Management Information
System that capture statistics on trade, products and services, regulatory, trade facilitation information and data for effective decision making.

24

Energy
Goals
The high-tech sector has developed at

Highlighted Outcomes

extraordinary speed over the last couple of decades, at a scale far beyond early predictions. This development has also come with a growing energy need. The initiatives here are meant to promote innovative use of energy, adoption of green and sustainable energy sources.

Promote the use of alternative energy
(Green ICT)
Together with the responsible Ministry encourage the use of alternative sustainable energy to power ICT use and deployment.
Promote the development of Energy Efficient ICT Solutions
Encourage ICT practitioners, device manufacturers, system designers and developers to develop energy efficient solutions in line with sustainable ICT.
Promote the use of artificial intelligence on energy consumption
Through the responsible Ministry and Agencies, encourage the use of artificial intelligence and smart grid to improve and increase reliability, efficiency and sustainability of electricity and other forms of distributed energy.

25

Creative Industry
Goal

Highlighted Outcomes

Digital content has been identified as a critical enabler for rapid up take of broadband technology. Availability of local and relevant digital content and services contributes to an increased use of broadband infrastructure.

Increase trade opportunities for Creative Industry
Support the creation of a Centre of Excellence to promote the arts and sciences. The Centre will collaborate with private and public sector to promote and enabling environment for the creative industry.

Raise the Profile of Creative Industry
Establish programs to highlight, recognize and celebrate exceptional talent in Kenya. By promoting local professionals, the program hope inspire and draw Kenyans to participate in the creative industry. This will help to increase the talent pool in the creative industry it.
Promote efficiency, quality and quantity of goods and services in the
Creative Industry
Support the Creative Industry with IT infrastructure like cloud computing, access to fiber optic networks and e-commerce tools.

26

Foundational Pillar
The foundational pillars will form the platforms upon which the strategic pillars will be executed. This will consist of integrated ICT infrastructure and info-structure, country positioning, enhanced citizen capacity.

27

Integrated ICT infrastructure and info-structure
Action

Description

Outcome(s)

Roll out a National Next

The rollout of a Next Generation Nationwide

Provision of countrywide last mile

Generation Broadband Network

Broadband and Wireless Networks

connectivity solutions

as the cornerstone for achieving the
Connected Kenya Masterplan as it connects
Government agencies, businesses, schools, hospitals and homes. By 2030, 100% of all sectors must have countrywide connectivity.
Centralized affordable cloud services

Establish a National cloud

Establishment of a national cloud

computing platform for use by

environment for local businesses to offer

both private and public sector

Software as a Service to citizens and

Citizens service centres across the

customers.

counties

Implement a National Open Data

Work with multiple government agencies,

World class Open Data Portal

and strategic data Programme

private sector and development partners to avail to the public important machine

Open Data based developer and

readable data

application eco-system

Develop strategic programme in the

Integrated national data management

management of national data
Table 5a: Center of Excellence

28

framework

Integrated ICT infrastructure and info-structure (Cont.)
Action

Description

Outcome(s)

Develop a National framework for

Incoporate a comprehensive and integrated

Government cybersecurity organisation

Information and Cyber Security

cybersecurity programme from vision to

incorporating multiple agencies

through a proactice approach to the country security needs

operational capability implementation
National cybersecuriy governance framework National cybersecurity policy and standards Raised cybersecurity awareness across
Kenya
Holistic comprehensive government cybersecurity architecture technology pipeline and implementation plan

Table 5b: Center of Excellence

29

Country Positioning
Action

Description

Outcome(s)

Develop an integrated multi-

Konza Technology City will be the basis for

Established PPPs for delivering the

sector positioning strategy

promoting Kenya as the Sillicon Savannah to

Master plan

deliver the Master plan objectives
Completion of Phase 1 of Konza as a smart city with a world class data centre and world renowned research based technology university and 10 local/
International anchor tenants

Drive local sector relevance for Konza

Establish incubation and local centre of excellence for local firms
Develop partnership between local and international firms for mutual growth

Table 6: Country Positioning

30

Enhanced Citizen Capacity
Action

Description

Outcome(s)

Develop a shared services strategy

This will enable public service providers to

Establish citizen portals

work closely together to share information as relevant to citizens and ensure seamless

Establish public services shared

access to records

platforms

Citizens will be able to access public services through electronic means cost effectively Table 7: Enhanced citizen capacity

31

Facilitation
Action

Description

Masterplan coordination and

The Programme Management Office will ensure targeted projects are executed efficiently.

tracking
Identifying and recruiting partners

The Connected Kenya Masterplan is heavily dependent on partnerships. This facilitation role will, therefore include engaging with relevant public sector partners and bring them on board on specific projects.

Project management and

The implementation of this master plan will be treated as a project with timelines and

monitoring

milestones. The Facilitation role will therefore include that of managing the scope, resources and time as defined in the master plan.

Research

This action will lay the groundwork that will fuel creativity and innovation by providing the necessary platform that supports local research and development, enterprise and talent development through incubation.

Benchmarking

The Connected Kenya Master plan’s performance will be benchmarked against global indices and from which lessons may be drawn to improve the delivery of the master plan.

Table 8: Facilitation

32

Financing
Achieving the Connected Kenya Master plan vision of establishing a

The ministry through the Kenya ICT Board will come up with

robust and countrywide high-speed ICT infrastructure, harnessing

incentives to draw in private sector financing the infrastructure

ICT for economic transformation, people engagement and

projects in the master plan. Development partners and other

empowerment and creation of a smart nation will require the

ministries will need to be engaged to bring in their budgetary

mobilization of significant financial resources and technical skills

allocations for some of the initiatives falling under their ministries

and capacity. In 2011, ICT spending was US$860 million. Government

or mandates.

of Kenya spent 0.3% on IT as a percentage of overall spending. This is 20 times less than government industry average of 6.5%. This will

Financing risks identified in the Master Plan execution include:

need to increase and be reallocated based on planned priorities.



Starving ICT projects of funds – currently, on average

Most Government ICT spending is on hardware at 65% compared to

Government ICT projects are not funded enough for the

global benchmark of 18%. IT spending on staff is significantly lower

duration of their useful life to keep them current and relevant

at 18% as opposed to 38% for global benchmark. A variety of internal

and so their intended objectives are not effectively met.

and external financing sources will need to be made available to

Projects identified will need to be well funded for initial

address the different financing and technical assistance needs, both

deployment, licensing, support and maintenance. A detailed

over the short- and the medium-term.

costing plan for each identified initiative will be developed as a follow-on to this plan which will center around the basic

And because there are limitations in public and official development

understanding that:

assistance financing, it is essential to mobilize additional resources

i.

Software deployment budgets should grow to

from other development partners, the private sector, and the

between 30 – 50% of software licensing budgets while

capital market. For example, capital market financing needs to be

maintenance and enhancement budgets will need to

developed to support the issuance of relevant instruments (such

increase to averages of 40% of license budgets annually

as infrastructure bonds), which are considered to have investment

from the current 5 – 10%

grade credit rating.

ii.

Infrastructure and hardware should be budgeted for in line with the identified needs in this plan

33

Project Team & Process
The development of the Master Plan has been a year-long process driven by the Government of Kenya through the
Ministry of Information and Communication with support from the National Communication Secretariat.
In developing this plan, our ambition was to produce a simple document which every citizen would understand while committing to clear deliverables over the next 5-years. The deliverables are key to achieving our outlined vision, which centers on growing the economy through infusion of ICTs and knowledge into all our Vision 2030 pillars. The projected economic growth is largely pegged to enhanced citizen value.
The Master Plan has been a collaborative effort among numerous partners who volunteered their support representing
KICTB, NCS, Telecommunication Operators, CCK, Multimedia University, USIU, BPO/ITES Workgroup at the Office of the Prime Minister, CIO East Africa, Creative Industry Task Force, Connected Health Task Force, HP, Cisco, Microsoft,
Accenture, Oracle, PWC and IBM Corporate Service Corps among others. We got input for many individuals who we cannot all list here but should know that we are sincerely grateful.

Paul Kukubo, MBS
CEO, Kenya ICT Board
Project Lead

Extensive benchmarking was done with other developed economies that have taken great strides to articulate, develop and implement their ICT Master Plans such as Singapore and Malaysia. Earlier drafts of the plan were validated globally in the USA, UK, Singapore, and South Africa among other countries and learnings incorporated. Beyond this a local citizen engagement exercise was carried out over a period of one month and feedback incorporated. All this was done to ensure that every possible input would be considered to enable delivery of a holistic plan.
This plan is a living document, which will be reviewed annually to assess progress and realignment to the priorities of the day.
Core Team: Kenya ICT Board, Wadzanai Madziva, Harry Hare, and Joseph McOluoch.

34

35

Notes

36

Similar Documents

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72

Premium Essay

Cybersecurity

...EXECUTIVE SUMMARY This paper details the importance of cyber security in the face of evolving cyber threats and the ever-increasing attacks on government and businesses alike. We live in a globally connected world and globally distributed cyber threats. Not restricted by geographical boundaries these threats target all technologies, service providers, and consumers. The threats are at an all-time high, in terms of sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are...

Words: 1611 - Pages: 7

Premium Essay

Cybersecurity

...Cyber Security by American Military University Professor Derrick Thomas June 22, 2014 Cyber security is a difficulty that everyone faces in today’s society. It is defined in a variety of ways by many. One definition is that cyber security focuses on protecting computer networks, systems, data, and programs from unwanted access. Cyber security is sometimes referred to as information security, information network security, cyberspace security, or even computer security. There are many viewpoints by highly educated people on cyber security but the purpose of this paper is to tell my viewpoint on the subject. Every aspect of a persons life has some sort of cyber dimension. People paying for bills online, cloud computing, and even online gaming. This year in 2014, everyone is bombarded with news headlines that say cyber threats are up. Many of these headlines always include some kind of phishing attack trying to steal someones identity, a hacker that breached the network of a company, a new technique that attacks mobile devices like smart phones, or a government trying to monitor and take secrets from another government!!br0ken!! The concern for cyber security is now a real-world concern globally. The concern over cyber security is what is driving the governments worldwide to make it priority one on their list's now. This is so, because technology is growing at a very fast and continuous pace. The technology field itself is very vast and has much variety. Cyber security...

Words: 4041 - Pages: 17

Free Essay

Cybersecurity and Cyberwar

...(Book Report) December 11, 2015 Cybersecurity and Cyberwar: What the world needs to know After everything that has been happening in the world, from the 9/11 takedown of the twin towers, to the shooting in Paris almost a month ago, the world has been drawn to attention to the extent of surveillance and cyber-espionage practiced by the US government, not only in relation to suspected terrorists but also in relation to the ordinary citizen. After reading Cybersecurity and Cyberwar, I feel like it comes at an interesting time in the history of security services world-wide, when the extent of inter-connectivity of every agency, corporation and individual makes cyber-surveillance easier to put into effect. The authors are experts in their field: Peter Singer is Senior Fellow and Director of the Center for 21st Century Security and Intelligence at the Brookings Institution, a former coordinator of Obama's defence policy task-force during the 2008 campaign and author of three other books on aspects of warfare. Allan Friedman is also a well-known expert in the field of information security and cyber-security, formerly Research Director for the Center for Technology Innovation at the Brookings Institution, and currently Visiting Scholar at George Washington University's Cyber Security Policy Research Institute. In other words, this is an authoritative text. In Cybersecurity and Cyberwar, Singer and Friedman attempt to fill this worrisome knowledge...

Words: 1488 - Pages: 6

Premium Essay

Cybersecurity

...Me and cyber security I strongly believe that cyber security will be my profession. The reasons to say cyber security will be my profession are: First, I have a good experience of reading. Second, I am incredibly interested in cyber security profession. However, my friends believe that cyber security is going to be difficult for me. Even though my associates frustrated me that cyber security is challenging, my reading practice and interest in cyber security empowered me to attend cyber security program. I have ability of reading various reading materials that encouraged me to go for cyber security program. When I was in Jimma University, I was both student and assistant lecturer. Due to that, I used to read a lot of materials to teach my students. For example books, journals, newspapers and video lectures. In addition to that, I was also reading different resources to score good grade on my own courses. Some of these materials are textbooks of physiology, anatomy and biochemistry, online materials and different researches. To sum up, I used to read day and night to cover both my students’ and my own courses. So, my reading skill will contributes a lot to successfully accomplish cyber security program. Also, I attracted by cyber security profession. The first reason that makes me interested in cyber security discipline is its high demand. Nowadays the uses of Internet and cyber crime are growing in parallel. As a result, our world is in high demand of qualified cyber...

Words: 520 - Pages: 3

Free Essay

Cybersecurity

...Question 1 0 / 10 points Active Directory was used to impose access controls based upon the user's job title. Question options: True False Question 2 10 / 10 points Active Directory can be used to account-based access controls. Question options: True False Question 3 10 / 10 points In Active Directory, groups can be used to implement Role Based Access Controls. Question options: True False Question 4 8.75 / 10 points Match the access controls in column #1 to the correct category in column #2 (logical or physical). __1__ Pass phrases __2__ Door Locks __2__ Biometrics __2__ Guards and Guard Dogs __1__ Passwords __1__ Access Control Lists for Folders and Files __2__ Bollards __2__ Fences 1. Logical Access Controls 2. Physical Access Controls Question 5 10 / 10 points Under Microsoft Windows, a file's properties will include read, write, execute, and encrypt permissions. Question options: True False Question 6 10 / 10 points ____________ is a security principle which requires that access to resources be restricted so that users can only access the files and folders required to do their job(s). Question options: High water mark Least Privilege Separation of Duties Due Diligence Question 7 10 / 10 points ___________ was used in the lab to change access controls on files using a set of access control requirements. Question options: Power...

Words: 311 - Pages: 2

Premium Essay

Cybersecurity

...There are nine parts to the system analysis and design life cycle. The first three stages are about gathering information. The first part of the cycle is initiation. This is when someone identifies a need or an opportunity. The second part of the cycle is the system concept development, which defines the scope or the boundary of the concepts. Next is the planning stage. During this stage the project management plan and other planning documentation is developed. This will be the basis for acquiring the resources needed to achieve a solution. The next three stages are about the actual design. The fourth stage is the requirements analysis. This is where the functional requirements document is created in which user needs are analyzed and user requirements are developed. The fifth stage, which is self-explanatory, is the design stage. This is where the systems design documents are created from the detailed requirements, focusing on how to deliver the required functionality. The sixth stage is the development stage. This is the part where the design is transformed into a complete information system. The final three stages are where everything comes together. During the integration and testing stage the developed system are tested to see if they perform as designed. Stage eight is implementation. This includes the implementation preparation and the implementation of the system into a production environment and the solution to any of the problems found in the integration and testing...

Words: 313 - Pages: 2

Premium Essay

It and Cybersecurity

...Tyler Pederson IS 3110 Unit 2 Assignment 1 12/15/2014 PCI DSS and the Seven Domains YieldMore YieldMore has a network needing to configure its current configuration and policy to meet PCI DSS standards which can be found at: https://www.pcisecuritystandards.org/security_standards/documents.php?agreements=pcidss&association=pcidss In order to be in compliance a basic compliance plan has been created to ensure YieldMore and customer data in the reconfiguration will be met. Software and hardware used will be checked to PCI DSS database to ensure compliance. The network plan will be required to meet these minimum requirements before compliance assessment test will be made. *Note: If third party is to host the payment process and procedure. They will be responsible to uphold the PCI DSS standards, they will be held liable if failure to maintain compliance. Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall -In reference to previous network plan U1A1 a firewall will be in place in the LAN/WAN Domain & System/Application Domain to protect internal network from potential external threats. Requirement 2: Do not use defaults, such as default password -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain) Protect Cardholder Data Requirement 3: Protect stored...

Words: 572 - Pages: 3

Premium Essay

Cybersecurity Career

...How to get a job in the Cybersecurity field James Ethan Linville Upper Valley Career Center – Computer Information Technology - 1 year certificate ITT Technical Institute – Networking Systems Administration How to get a job in the Cybersecurity field This paper will provide you with information on the attainment of a successful career path to the field of Cybersecurity and how to become an Information security analysts (Data security examiners, Data security experts, IT Security Investigators). It will tell you what an information security analysts does. This information will include education, certifications and licenses, related work experience, advancement, and important skill sets. It will also provide information on salary and salary versus other IT positions. What is an Information security analysts? Data security examiners plan and do efforts to establish safety to ensure an association's PC systems and frameworks. Their obligations are ceaselessly growing as the quantity of digital assaults increment. Data security experts should persistently adjust to stay a venture in front of cyber attackers. They must stay avant-garde on the most recent systems aggressors are utilizing to penetrate PC frameworks and on IT security. Examiners need to research new security innovation to choose what will most adequately ensure their association. This may include going to cybersecurity meetings to hear firsthand records of different experts who have encountered new sorts of assaults...

Words: 1183 - Pages: 5

Premium Essay

Essay Cybersecurity

...Cybersecurity Policy In order to create a strong cybersecurity policy in Adius, their security professionals must comprehend key elements including servers, network and network components, access control procedures, mobile computing and telecommuting, authentication procedures, and architecture frameworks. Every portion of computer hardware happens to have its individual exclusive security necessities within a cyber environment, thus, interlocking all the devices and increasing complexity. These devices entail smart managing and must be ruled by policy, standards, and procedure. A method of attaining great cybersecurity practice includes utilizing overall security architectures, such as ISO 17799 - considered the International Organization for Standardization (ISO) primary information security management standard. The ISO standard happens to be an assortment of good practice relating to Information Technology along with cybersecurity. This could be applied in all kinds of organizations. The twelve chief facets of the standard contain an extensive array of material extending from risk assessments and treatment systems policies, to additional zones like access control within cybersecurity, human resource, and environment security. It includes twelve main domains, all including some objective (Theoharidou, et al., 2005). Most of the standards, which Adius needs to develop, are performance standards. These should be measured and evaluated and must be able to lead to ISO certification...

Words: 1417 - Pages: 6

Premium Essay

Cybersecurity Administrator

...PROFILE My goals are to excel in getting my masters in Cybersecurity, and progress forward in my career growth in the field. Working through my career within a growing organization, whereas I will get an opportunity to utilize all my skills, education and knowledge to benefit the organization in projects. QUALIFICATIONS * Excellent communication and leadership skills * Strong team player * Over 10 years manufacturing and production process experience * Fast learner with a positive “Can Do” attitude * Dynamic troubleshooting problems on emergency notice * Proficient computer software and applications experience * Clearance - Secret * Willingness to learn and grow in multicultural environment * Ability to pay close attention to detail with a high degree of accuracy * Substantial related clerical/administrative skills and experience * Great personality and professional manner toward others * Flexibility to work effectively in a changing environment * Extensive customer service/data entry * Obtained forklift certifications in all areas COMPUTER LITERACY * Operating Systems: Windows 98/00/XP/07/8/8.1, UNIX, Linux, Oracle VB, VMware * Databases: MS SQL Server 05/08/12, MS-Access, SCRT Database Linux. * Languages: HTML, ASP, XML, DHTML, CSS, PL/SQL, JavaScript, C, C++. EDUCATION Strayer University of Huntsville 7/2013 – Present Bachelor’s Degree – Cyber security Management Expected Graduation –...

Words: 710 - Pages: 3

Free Essay

The Risks of Not Investing Into Cybersecurity

...The Risks of NOT Investing into CyberSecurity In 2002, preparations were being made for me to transition from the Navy to civilian life. I wanted to start a career in the IT field, and, unfortunately, the Navy wasn’t capable of providing me that opportunity. At the time though, careers in the IT field were still uncommon and considered overhead to corporations. After realizing this, I had decided to stay in the Navy since I hadn’t acquired the necessary education or experience to be competitive in the IT market yet. Over 10 years ago, IT and Cybersecurity were not considered to be as worthwhile a career field to pursue. Today, the financial industry is learning just how valuable cybersecurity is, and according to an article, Friedenberg remarks that, “Companies, on average, spend 1,600 work hours per incident at a cost of $40,000 to $92,000 per victim” (2006). In an effort to compromise the confidentiality, integrity, and availability of the financial institutions, cyber terrorists have taken an active role declaring war on one of our nation's critical key infrastructure. There are major risks in the financial industry that are causing the institutions to invest more into the protection of their assets which are in jeopardy of compromise every time a cyber attack occurs. Consumers want to know that their money is protected when they put in a financial institution. The personal information that consumers are required to present, for instance Name, Date of Birth, account...

Words: 1992 - Pages: 8

Premium Essay

Emerging Cybersecurity Strategies

...increase in funding and support for the study of emerging cybersecurity technologies. The considerations for this paper are to discuss the emerging technologies and strategies that can be integrated across the public and private sector to improve cybersecurity on a local, national, and international level. New technologies need to dynamically assess networks real-time such as with the use of Remote Agents and Real-time forensic analysis. These technologies also need to make the attack space less predictable and constantly evolving such as through the use of moving target defense. Emerging Cybersecurity Technologies The E-government Act of 2000 was signed by President Bush to move toward a more 24-7 government. The dream was to eliminate the need to have to stand in line at the DMV for half a day just to pay annual vehicle registration fees (Barker, 2011). Security was certainly a concern, but it was not at the forefront of the move as government agencies would go through massive changes in equipment, manning, and practices in order to move information and programs online. Now, over a decade later we still see moves and changes taking place, such as the department of Veterans Affairs recently moving all of their applications, forms and records online. The expensive cost of getting the government caught up was expected with such an overhaul in the system; however, the U.S. should have spent more on cybersecurity and had to learn this lesson the hard way. The recent breaches...

Words: 2624 - Pages: 11

Premium Essay

Cybersecurity Policy Issues

...twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users. INTRODUCTION From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair...

Words: 1930 - Pages: 8

Premium Essay

Single Most Importan Cybersecurity Vulnerability

...Single Most Important Cybersecurity Vulnerability Facing IT Managers Disclaimer: please do not copy and paste the paper With the growing usage of the Internet, the expansion of global communication, the office in its traditional sense is fading away. In order for corporations, whether small or large to be profitable in this competitive market, the walls of their offices have had to expand beyond the four walls located at their physical business address. In order to conduct business effectively nowadays, it has become necessary to have internal private business and government networks connecting to other corporate and government networks; as such, the use of portable devices has significantly increased and private corporate information travels more and more. While this is extremely convenient, and allows conducting business at unconventional hours and locations, it is simultaneously risky and requires organizations to proactively secure their data from being compromised. Internet access is available from the privacy of our homes, but also in an increasing number of public places: libraries, fast food restaurants, cafés, and department stores. With the growing cyberworld has come a multiplication of cyber-attacks, where both amateurs and dedicated hackers constantly try penetrating corporate networks. It has become a very challenging objective for IT managers and IT professionals to keep information secured while travelling through the internet. Additionally, one of main...

Words: 3016 - Pages: 13