Status : Verified
Personal Name | Tuquero, John Paul T. |
---|---|
Resource Title | Building a standard credible cybersecurity of DND and its civilian bureaus |
Date Issued | 19 June 2023 |
Abstract | This paper will assess the DND Proper office and its civilian bureaus on its capabilities, risks, and current cybersecurity level, using Cybersecurity assessment. This will be a wake-up call in the defense sector as we will see what we lack and what needs to be implemented. Before securing the whole nation against threats to national peace and security (DBM NEP, 2016), the DND needs to be a cyber-secured department as a whole. The internal defense must be prioritized first as there are a lot of sensitive documents that are stored digitally inside the organization’s network, storage, and infrastructure. Imagine if the enemy had stolen a credential of a DND email, where official transactions are stored and taking place, or a hacker accessed or stolen a secret document detailing plans and tactics, and sold it to the black market or adversaries. It will be detrimental to the credibility of the Department, endanger security, and possibly tarnish public trust in the DND and government. To know if the defense sector is ready to defend against cyber attacks, and to implement necessary adjustments or projects, it is good to determine the current cybersecurity level of the DND Proper office and its civilian bureaus. A Cyber Risk Assessment (CRA) tool will be used to determine the cybersecurity capabilities, security controls implemented, policies and systems in place, and the security risks of each office. The result of the CRA will give us an understanding of the current level of cybersecurity of DND and its civilian bureaus and will give us information on their current setup, priorities, and issues. The strengths and weaknesses of each office will be revealed, and we will see what we lack, and how to remediate or make solutions out of the problems that will be exposed or arise in the paper. The output of the paper will yield the recommended policies, circulars, projects, and programs in the future that will be used as the standard and serve as a guide for the DND |
Degree Course | Master of Technology Management |
Language | English |
Keyword | Credible cyber defense; Cybersecurity assessment |
Material Type | Thesis/Dissertation |
Preliminary Pages
Category : C - Confidential information of a third-party is embedded.
Access Permission : Limited Access