CARICOM Seminar on the Implementation of the System of National Accounts 2008 (SNA 2008) 14-16 June 2010, Jolly Beach, Resort, Antigua and Barbuda CARICOM CARICOM Workshop on the Development of Caribbean Specific Information and Communication Technologies (CSICT) Statistics and Indicators Theme: SECURITY 6 - 9 December 2011, ANTIGUA AND BARBUDA CARICOM CONTENT OF PRESENTATION Introduction Definition of Key Terms Sub-Themes/ Issues Identified Indicators per sub-theme Justification CARICOM INTRODUCTION ICT can support enhanced security via various types of systems with an ICT platform such as Building Monitoring Systems, Automatic Gates and other software which can aid in financial security, and data and network security. CARICOM DEFINITION OF KEY TERMS • Security refers to the degree of protection against danger, damage, loss and crime. Can refer to physical, financial, computer, data, application, information and network security. DEFINITION OF KEY TERMS • An electronic transaction is the sale or purchase of goods or services, whether between businesses, households, individuals, governments, and other public or private organisations, conducted over computermediated networks. (OECD) DEFINITION OF KEY TERMS • A database is an application that manages data and allows fast storage and retrieval of that data. • A Local Area Network (LAN) is a group of computers and associated devices that share a common communications lines or a wireless link. • Identity Theft is a crime in which a person’s confidential or personal information is stolen for the purpose of criminal use. DEFINITION OF KEY TERMS • Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. (WIPO) CARICOM SUB-THEMES IDENTIFIED The sub-themes/ Issues Identified are: • Provisions for the security of electronic transactions, databases, LANs and the prevention of identity theft. • Security and Protection of Intellectual Property CARICOM SUB-THEMES IDENTIFIED • Availability of Backup systems for easy recovery in an instance of lost data, for example after a disaster. • ICT Tools generally used by law enforcement agencies, both private and government, for security of land space, protection of territorial waters and so forth. CARICOM PROVISIONS FOR THE SECURITY OF ELECTRONIC TRANSACTIONS, DATABASES, LANs AND THE PREVENTION OF IDENTITY THEFT Indicators: • Proportion of total budget allocated to the security of electronic transactions. • Type of security mechanism most commonly employed in securing databases in Government agencies. • Type of security mechanism most commonly employed in securing databases in private business. Justification: • Provides information on the importance placed on security based on resources allocated, as well as, differences in types of mechanisms employed in Government vs. Private sector agencies. CARICOM PROVISIONS FOR THE SECURITY OF ELECTRONIC TRANSACTIONS, DATABASES, LANs AND THE PREVENTION OF IDENTITY THEFT Indicators: • Proportion of security budget allocated to staff training. • Proportion of this type of activity (securing electronic transactions, databases and LANs) being outsourced. Justification: • Monies allocated to staff training can be an indication of emphasis placed on ensuring systems are operating efficiently. • Outsourcing of this activity can be an indication of the lack of local/in-house expertise or a lack of proper IT infrastructure. CARICOM SECURITY AND PROTECTION OF INTELLECTUAL PROPERTY This theme looks at existence and enforcement of laws dealing with intellectual property rights. CARICOM SECURITY AND PROTECTION OF INTELLECTUAL PROPERTY Indicators: • Existing laws for copyright protection. • No of cases brought before the courts regarding copyright infringement. • Percentage of such cases resulting in fines or convictions. Justification: • Can be an indication of the seriousness with which perpetrators are placed before the courts and the degree to which laws are enforced in this area. CARICOM AVAILABILITY OF BACKUP SYSTEMS, FOR EASY RECOVERY IN AN INSTANCE OF LOST DATA AFTER A DISASTER If regular backup of data is critical to a business or the operations of an agency, then questions such as budget allocation, type of equipment and media most commonly used are pertinent. CARICOM AVAILABILITY OF BACKUP SYSTEMS, FOR EASY RECOVERY IN AN INSTANCE OF LOST DATA AFTER A DISASTER Indicators: • How often is data backup performed. • Proportion of security budget allocated to the backup of data and data recovery. • Proportion of businesses that have the necessary equipment for backup and recovery of data. Justification: • Can be indicative of the importance placed on the backup of data and resources allocated to this area. CARICOM AVAILABILITY OF BACKUP SYSTEMS, FOR EASY RECOVERY IN AN INSTANCE OF LOST DATA AFTER A DISASTER Indicators: • Proportion of backup done offsite or outsourced. • Type of equipment most commonly used to perform this function. • Type of medium most commonly used to store data. Justification: • Can be indicative of equipment cost, reliability and durability of equipment aligned with specific needs of a business. CARICOM ICT TOOLS USED FOR SECURITY OF LAND SPACE, PROTECTION OF TERRITORIAL WATERS AND GENERALLY USED BY LAW ENFORCEMENT AGENCIES, BOTH PRIVATE AND STATE RUN Indicators: • Proportion of national security budget spent on ICT equipment and capabilities. • Proportion of security businesses utilizing ICTs by type of system. • Type of ICT security system(s) most commonly used. Justification: • Can be indicative of the priority of a government regarding cyber security for the protection of its citizens. • The type of system most commonly used can be useful in determining the preferred equipment, which can be influenced by cost, terrain or the specific needs of a country. CARICOM THANK YOU