CONPES 3701 PDF

strategy and Conpes (National Planning Policy guidelines for cyber security and defense). CERTIFICATION. Colombia does not. Transcript of CONPES Conclusiones Se busca con esta politica establecer lineamientos que permitan al govierno colombiano proteger. Generar lineamientos de política en ciberseuridad y ciberdefensa orientados a desarrollar una estrategia nacional que contrarreste el.

Author: Nalrajas Kigor
Country: Central African Republic
Language: English (Spanish)
Genre: Marketing
Published (Last): 13 November 2016
Pages: 399
PDF File Size: 18.59 Mb
ePub File Size: 18.7 Mb
ISBN: 728-2-24112-303-3
Downloads: 95292
Price: Free* [*Free Regsitration Required]
Uploader: Mijora

National Strategy To Secure Cyberspace http: Similarly, the Ministry of Defense will endeavor to phase in theoretical and practical courses on information security, cybersecurity, and cyberdefense at officer and NCO conps schools.

CCP is due to commence operations in Computer Security Incident Response Team. The improvement in the provision of public services to citizens via cyberspace. Accordingly, over the last two years, the Ministry of Defense has worked to position the issue of cybersecurity and cyberdefense on the national agenda.

Ministry of Defense of Colombia Cybercrime: This law also creates the National Spectrum Agency as well as issuing other provisions. However, this law needs to be made much more specific in terms of scope and operability, so 370 cybersecurity and cyberdefense can be adequately addressed. An unwanted or unexpected event that occurs in cyberspace, which, in different circumstances, can harm individuals and affect or cause losses to processes and businesses – 20 – ColCERT Relational Scheme Graph 6: Request the Communications Regulation Commission to carry out a review of regulations on technical aspects to be met by telecommunications services and network providers in order to conform to the principles of data conpea, data integrity, and availability, as well as authentication and user network access mechanisms, and non-repudiation of communications; and request the Commission, if necessary, based cojpes the review, to implement the appropriate adjustments cinpes the regulatory framework in force.

The continual evolution, spread, and sophistication of cyber attacks, as well as technological convergence,3 highlight the need to adopt measures and controls to protect the cojpes from these new threats.

Circular of Financial Superintendency of Colombia Sets the minimum security and quality requirements on information management through goods and services distribution media and channels for clients and users. Request the Ministry of Information and Communication Technologies to issue a document containing information security guidelines based on international standards, which public-sector entities would be required to implement.

CONPES by alejandra ramirez on Prezi

The Strategy envisages three lines of action: At first, training will be provided to staff directly involved in tackling and managing cyber incidents. Overarching Objective To strengthen the capabilities the state to confront threats that undermine its security and defense in cyberspace cybersecurity and cyberdefensecreating the necessary environment and conditions to provide protection therein. The obligation was introduced for ISPs to Core Problem The agencies involved in the preparation of this document have concluded that the current capacity of the State to deal with cyber threats has major weaknesses.

  BILL KARWIN SQL ANTIPATTERNS PDF

There are three 3 main problem areas: Law of Introduces measures to encourage efficiency and transparency in Law 80 ofand issues other general provisions on procurement using public funds. It is not certifiable. Suggest to the Office of the Attorney General of the Nation that, in coordination with the Superior Council of the Judicature, it design and implement training programs on computer crime investigation and prosecution for judicial police, judges, and prosecutors.

It may also receive requests for talks, training courses, or visits to raise awareness about security issues as it will be in charge of cybercrime prevention and awareness building, which will always be carried out in coordination with ColCERT. It also defines three specific objectives: At present, Colombia is one of a number of countries that do not have a national cybersecurity and cyberdefense strategy that includes an organizational system and a legal and institutional framework strong enough to confront the latest cybersecurity challenges.

In general terms, its functions will be as follows: Financial and non-financial operations, by medium, Source: The national connection point for ISP networks in Colombia, which ensures that Internet traffic to and from our country only uses local or national channels. The array of computers, computer systems, and telecommunications, data, and information networks, whose destruction or interference could weaken or impact on the security of a country’s economy, public health, or both.

Conpes 3701 de 2011

It is also vital to inform the public and raise awareness about all aspects of information security; strengthen levels of international cooperation and partnership in areas of cybersecurity and cyberdefense; support investigations of computer attacks, and protect the public from the consequences of those attacks.

Furthermore, there are a limited number of training programs available for agencies that serve cnpes judicial police in this area.

To implement appropriate bodies to prevent, provide assistance, control, produce recommendations, and issue rules on cyber incidents or emergencies, in order to confront threats and risks to national cybersecurity and cyberdefense.

In order to achieve all of the foregoing, ColCERT and the CCP coonpes have to combine their initiatives with cobpes of the private sector and civil society. The Police Cyber Center CCP will be in charge of cybersecurity in Colombian territory, offering information, assistance, and protection against cybercrime. One notable incident occurred in the first half of when the “hacktivist” group that calls itself Anonymous attacked the portals of the office of the president, the Senate, the online government portal, and the Ministries 37701 the Interior and Justice, Culture, and Defense, leaving their websites off-line for several hours.

  HAMLET EL PRINCIPE DE DINAMARCA PDF

Any real or suspected adverse event in relation to the security of computer systems or computer networks: Data reported by network providers and services to SIUST The Internet has become an increasingly popular medium among users of banking services.

Conpes de – Ministerio de Tecnologías de la Información y las Comunicaciones

Coordinated conpds of formerly discrete networks towards uniformity in support of services and applications. Cybersecurity and cyberdefense initiatives and operations are not adequately coordinated Although a number of institutional efforts exist in both the private and the public sectorthe study has found that no agencies have been established at the national level to coordinate and implement cybersecurity and cyberdefense operations.

For computer security professionals, a log serves to keep a record of data or information as to the who, what, when, where, and why with regard to an event that involves a particular device or application. An official record of events over a particular period of time. The institutions responsible for cybersecurity and cyberdefense should seek and evaluate their participation in different international cooperation networks and mechanisms Council of Europe, OAS, and FIRSTwith a view to preparing the country to tackle the increasing cybersecurity challenges that exist on the international plane, as well as to respond more efficiently to cybersecurity incidents and offenses.

Convergence can refer to previously separate technologies such as voice and telephony featuresdata and productivity applicationsand video that now share resources and interact with each other synergistically Jenkins, Henry Convergence Culture, New York University Press, New York. Any crime committed using a computer or a computer service Ministry of Defense of Colombia. Request the Ministry of Foreign Affairs to examine the feasibility and advisability of Colombia’s accession to the principal international instruments on information security and data protection, with direct assistance from the Ministry of Defense and the Ministry of Information and Communication Technologies.

The task of CAI Virtual will be to receive information and reports of cybercrimes, and to classify the criminal conduct found. ColCERT will have the following specific objectives: H, H, R Keywords: Joining the Cybersecurity Revolution: