Menu

CONPES 3701 PDF

Leave a comment

strategy and Conpes (National Planning Policy guidelines for cyber security and defense). CERTIFICATION. Colombia does not. Transcript of CONPES Conclusiones Se busca con esta politica establecer lineamientos que permitan al govierno colombiano proteger. Generar lineamientos de polĂ­tica en ciberseuridad y ciberdefensa orientados a desarrollar una estrategia nacional que contrarreste el.

Author: Goltimuro Kagajind
Country: Bermuda
Language: English (Spanish)
Genre: Automotive
Published (Last): 13 January 2007
Pages: 378
PDF File Size: 8.62 Mb
ePub File Size: 19.67 Mb
ISBN: 863-2-81783-645-2
Downloads: 93655
Price: Free* [*Free Regsitration Required]
Uploader: Akinozahn

At the same time, the evolution of these technologies has brought an increase in the use of technological resources for criminal purposes all over the world.

International framework The principal international instruments on cybersecurity and cyberdefense are: The Council considers that cybercrime requires a common criminal policy aimed at the protection of society against cybercrime15in particular by adopting conpess legislation and strengthening international cooperation.

The CCP will investigate cybercrime and provide support in prosecuting cases classified as computer crimes. This law also creates the National Spectrum Agency as well as issuing other provisions. Internet subscribers, – Source: In general terms, its functions will be as follows: The task of CAI Virtual will be to receive information and reports of cybercrimes, and to classify the criminal conduct found.

The convergence of terrorism and cyberspace. Strengthen the cybersecurity and cyberdefense laws, bolster international cooperation, and move toward accession by Colombia of the various international instruments in this area The purpose of this objective is to develop the necessary legal tools to ensure effective and efficient prevention, investigation, and 37701 of cybercrime.

It is also vital to inform the compes and raise awareness about all aspects of information security; strengthen levels of international cooperation and copes in areas of cybersecurity and cyberdefense; support investigations of computer attacks, and protect the public from the consequences of those attacks. As an upshot of the above activities, government agencies requested the Ministry of Defense to lead the way in implementing cybersecurity policies and establish mechanisms to respond to any cybercrimes and incidents that might affect the nation.

However, this law needs to be made much more specific in terms of scope and operability, so that cybersecurity and cyberdefense can be adequately addressed. The possibility that 301 concrete threat could exploit a vulnerability in order to cause a loss or harm to an information asset. From January to Decemberthe police dealt with cyber offenses recognized by Law of In order to enable the strategy’s implementation, this document offers specific recommendations for entities directly and indirectly involved in this issue.

  HCF4011 DATASHEET PDF

CONPES by alejandra ramirez on Prezi

Therefore, although this document aims to provide a policy framework for the issues of cybersecurity and cyberdefense in particular, the entities involved will be responsible for developing that framework and creating mechanisms by which to ensure information security nationwide. Joining the Cybersecurity Revolution: Approve the policy guidelines presented in this report for the development and implementation of the cybersecurity and cyberdefense strategy.

SCOPE In this document the Communications Regulation Commission offers the national government recommendations for the establishment of a National Cybersecurity Strategy; puts suggests suitable public-private collaboration and cooperation mechanisms; identifies ways to deter cybercrime; recommends the implementation and development of cybersecurity legal frameworks consistent with international standards; offers recommendations for the development of response systems for network security incidents, including surveillance, analysis, and incident response; and proposes guidelines for introducing a national cybersecurity culture in order to improve protection of critical information infrastructure in Colombia.

An illegal or abusive activity connected with computers or communications networks in which a computer is used as a tool to commit the offense or the target of the offense is a computer system or its data.

Business Management Conpes Document advertisement.

Conpes 3701 de 2011

Internet service providers Currently in Colombia these entities also provide telephony and television services, thus becoming providers of integrated telecommunications services. It will receive and heed the national cybersecurity guidelines and work in coordination with ColCERT. Request the Ministry of Information and Communication Technologies, the Ministry of Defense, and the Department of Security Administration or the entity serving as such, to design and implement training programs conles judicial police on information security and on computer crime investigation and prosecution.

Law of Amends the Criminal Code and creates a new legally protected interest called information and data protection. In Colombia these entities also provide telephony and television services, which makes them providers of integrated telecommunications services.

An Intersectoral Committee charged with devising a strategic vision for information management and with introducing policy guidelines for technology infrastructure management hardware, software, and communicationspublic information, and cybersecurity and cyberdefense. Latin American countries worst affected by a zombie network conpea March Source: Carnegie-Mellon University Computer risk: Any real or suspected adverse event in relation to the security of computer systems or computer networks: Ministry of Defense of Colombia – 34 – Cyberdefense: The attack was launched in protest against a proposed law regulating responsibility for online infringements of copyright and related rights.

  BATTLEGROUP KURSK PDF

Circular of Financial Superintendency of Colombia Sets the minimum security and quality requirements on information management through goods and services distribution media and channels for clients and users.

A potential cause of an unwanted incident, which may result in harm to a system or organization.

This document sets out a plan of action for putting into effect the policy on cybersecurity and cyberdefense, which will be entrusted to the entities involved. Request the Ministry of the Interior and Justice to prepare, in coordination with the Ministry of Defense and the Ministry of Information and Communication Technologies, a document that reviews the standards in place and proposes the necessary modifications as regards information security and data protection, in order to cohpes cybercrime, as well as identifying difficulties in terms of interpretation and coonpes.

CONPES by luis miguel sanchez rodriguez on Prezi Next

The staff from other public-sector entities will be assigned to the group under a temporary commission. Suggest to the Office of the Attorney General of the Nation that, in coordination with the Superior Council of the Judicature, it design and implement training programs on computer crime investigation and prosecution for judicial police, judges, and prosecutors.

It was found, however, with conps to ISP network security, for example, that logs are not stored for a sufficient conpex of time, so that, at a given point, they can be used as evidence or contribute to cybercrime investigations.