This website uses cookies to ensure you have the best experience. Learn more

Cybersecurity Essay

4792 words - 20 pages

HE, President Mwai Kibaki, presides over the official
ground breaking of Konza Technology City.
January 2013

2 0 1 7

1

2

Hon. Samuel L.Poghisio,
EGH, MP
Minister for Information
and Communications

Minister’s Statement
Access to information is crucial to economic growth. Information and communications technology offer a powerful tool that, if deployed
equitably, can ensure citizens are empowered and Government can deliver services more effectively. Information is vital for the efficient
delivery of public and private sector product and services that are responsive to the needs of citizens and businesses as well as capacity
creation.
For a variety of reasons ...view middle of the document...

The Government while guiding budgets will ensure that projects deliver the value they promise towards attainment of the objectives of this
Master Plan. Achievements will underlie the Government’s commitment in enhancing transparency, ensuring greater accountability to the
public as well as opening up new opportunities for local entrepreneurs.

3

4

By 2017, Kenya becomes
Africa’s most globally respected
knowledge economy
- Master Plan Vision

5

Dr. Bitange Ndemo,
CBS
PS, Ministry of Information
and Communications

6

Our Journey
The Kenya ICT Master Plan 2017 is focused on driving real economic growth. The Ministry of Information and Communications will take a threepronged approach in the execution of this plan, which recognizes Government projects that deliver citizen’s needs, the need to strengthen
industry through ICT and encouragement of the creation of ICT businesses.
Kenya’s ICT Master Plan aspires to position Kenya as a regional leader in ICT while delivering the latest and most robust infrastructure.
Open standards, transparency and accountability are all key to the success of this Master Plan. Further, the Ministry is diligently working on
standardizing business processes and the development of sub-plans to allow for the delivery of innovative public services within Government.
We are strengthening governance and increasing engagement with Government and with Private Sector to remove barriers that would impede
execution. This plan centers on the needs of the citizen to ensure all efforts are designed to address those needs and truly deliver a society
built on knowledge.
There are challenges anticipated in enabling the realization of ICT as an
integral component of Vision 2030. This plan has therefore, been designed with
interventions that are specific to both Social and Economic Pillars. The initiatives
in this plan have been mainstreamed with the objectives of Vision 2030 given
that the Government acknowledges that the future of our economy depends on
developing a skillful and knowledgeable human capital.
For Kenya to achieve full benefits of ICT the plan has set seven key intervention areas
,

Kenya as a
leading
African ICT
Hub

A society
built on
knowledge

Open and
efficient
Government
delivering value
through ICT

under the vision 2030 social pillar namely: Education and Training, Health Sector,
Water and Sanitation, Environment, Housing and Urbanization, Gender, Youth and
Vulnerable groups, Social Equity and Poverty Reduction. In addition, there would be
seven key areas of intervention under the vision 2030 economic pillar. These are:
Tourism, Agriculture, Wholesale and Retail Trade, Manufacturing, Business Process

Robust,
accessible &
affordable ICT
infrastructure

Outsourcing and Financial Services and Creative Industry.

7

Strategic Goals
Every Citizen Connected
Every citizen, resident, home and institution will be connected through countrywide
...

Other Essays Like Cybersecurity

Challenges Facing the Finance Industry Essay

2404 words - 10 pages Challenges Facing the Finance Industry This paper will explore three problems facing the finance industry. Those problems include cybersecurity, compliance with regulation, and risk management. Three solutions will also be addressed later in this paper. 1 When one thinks about the finance industry, banks, credit agencies, insurance companies, and equity firms may come to mind. Over the years financial institutions have

Ipremier Case Study

680 words - 3 pages . (2015). Business Driven Technology (6th ed.). New York, NY: McGraw-Hill Education. ISBN: 978-0-07-337690-5 Pagliery, J. (2014, July 2). Russia attacks U.S. oil and gas companies in massive hack.CNNMoney. Retrieved July 6, 2014, from http://money.cnn.com/2014/07/02/technology/security/russian-hackers/index.html Trenholm, R. (2014, June 24). New UK cybersecurity training scheme prepares for hackers - CNET. CNET. Retrieved July 6, 2014, from http://www.cnet.com/news/new-uk-cybersecurity-training-scheme-prepares-for-hackers/

Living in the Age of Cyber Attacks and Cyber Warfare

2381 words - 10 pages Living in the Age of Cyber Attacks and Cyber Warfare UMUC   If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment

Professional Forensics Basics

1056 words - 5 pages ://www.cnet.com/news/sony-hack-said-to-leak-47000-social-security-numbers-celebrity-data/ US-CERT Computer Forensics Retrieved January 19, 2015 from, https://www.us-cert.gov/sites/default/files/publications/forensics.pdf Computer Forensics and Cellular Forensics/ Cyber Crime investigation, Retrieved January 19, 2015 from, http://www.pinow.com/investigations/computer-forensics EnCase Cybersecurity Retrieved January 19, 2015 from, https

Security Assessment and Recommendations

925 words - 4 pages allow the company to proactively monitor its systems from any disgruntled employees that would want to take advantage of their authority. The risks involved when not applying these precautions could lead to extensive costs and bad publicity to the company’s image. Reference "Crisis Mapping and Cybersecurity – Part II: Risk Assessment | Diary of a Crisis Mapper." Diary of a Crisis Mapper. N.p., n.d. Web. 18 Mar. 2012. http

Renowned Speakers Challenge Business Leaders at the Ameriquest Symposium to Think Differently

726 words - 3 pages Renowned Speakers Challenge Business Leaders at the AmeriQuest Symposium to Think Differently 1888 PressRelease - Ben Stein and Steve Forbes headline a roster of experts on the economy, cybersecurity, innovation, and change, encouraging attendees to think outside the box. The 2015 AmeriQuest Symposium, held February 11-13 in Orlando, FL, gathered executives and business leaders from across the country for two days of networking, thought

A Key Concept in Information Systems

1049 words - 5 pages . ”The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) leads efforts to improve the Nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans (US-CERT).” Hospitals have

Exploration of Cyber Security as a Public Good

2319 words - 10 pages Exploration of Cyber Security as a Public Good 1) How can government justify telling private industry how to set up or improve their cyber security? “President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter” (U.S. White House Office, 2010). Today, more than ever, society

Metacognitive Writing Assignment

1195 words - 5 pages Cybersecurity: Not Even Good Enough for Government Work. Retrieved October 19, 2015, from https://reason.com/archives/2015/06/26/federal-cybersecurity-bad-enough-for-gov 2. Then write three paragraphs (500-700 words total) regarding your work on this project, using the questions below as a guide. Your goal is to demonstrate some ways your work on this project has prepared you for advanced or scholarly writing in your specific field or

Unit 2 Assignment 1

734 words - 3 pages in missed opportunity to re-create the contents of the laptop and external drive and to recognize the severity of the potential loss of data. The cybersecurity operations officials failed to ensure a timely investigation and notifications were made regarding the severity of the lost data (Opfer, 2006). Issue 5: VA Policies, procedures and practices were not easy to identify, were not current, nor were they complete. The VA policies and

On the Offensive

1043 words - 5 pages misunderstandings”. This conference was a success in some ways but according to James Lewis, a cybersecurity expert, “Western Countries were reluctant to push very hard because of fears of a breakdown in discussions with Russia and China. But, on September 12, China and Russia had constructed and outlined a cyber-code of conduct that would establish rights and responsibilities of states in protecting information networks and cyberspace networks. According to

Related Papers

Cybersecurity Standards: A Case Study On Malaysian Banking Sector

1977 words - 8 pages Cybersecurity Standards: A Case Study on Malaysian Banking Sector Anwer Yusoff Head, Industry & Business Department CyberSecurity Malaysia Sept 18th 2013 Copyright © 2013 CyberSecurity Malaysia Internet use in Malaysia 17 ,723,000 internet users Sources: Internet World Stats (30 June 2012) Copyright © 2013 CyberSecurity Malaysia 2 Internet use in Malaysia The highest usage was recorded among people aged 20

How To Protect Your Network From Cybersecurity

2362 words - 10 pages How to Protect Your Network From Cyber Attacks There are three measures network administrators can take to avoid the types of network attacks that plagued U.S. and South Korean websites including www.whitehouse.gov, NASDAQ, NYSE, Yahoo!'s financial page and the Washington Post. The three areas to focus on are network based mitigation, host based mitigation and proactive measures. Network based mitigation * Install IDS/IPS with the ability

Trends Of Cybercrimes Essay

1987 words - 8 pages The Future of Cybersecurity LaToya Crook BCC/403 October 26, 2015 Professor David Pettinari The Future of Cybersecurity The world in which we live is becoming more socially connected than ever before. It seems that technological advances have met, if not exceeded, anyone's expectations as new ways to communicate continue to develop. Due to the innovations of mobile connections, global technologies, and the ominous cloud, information

Cyber Security Essay

521 words - 3 pages cybersecurity overarching guidance for DoD has been published. DoDI 8500.01 dated March 14, 2014. Works Cited Booz, Allen, Hamilton “Achieving “Unity of Effort” in Cybersecurity” http://www.boozallen.com/insights/insight-detail/achieving-unity-of-effort-in-cybersecurity web 16 Jul 2014. Brocade Fastiron SX Series “Enterprise LAN Switching Data Sheet” Perlman, Radia "Tutorial on Network Layer 2 & 3” Presidential Policy Directive “Critical