Page 292 - Atouts Economiques Cameroun-2019-GB
P. 292

 292
ADMINISTRATION
 P.O Box 6170 - YAOUNDÉ
Tel. (237) 222 086 498 Fax. (237) 222 203 929
E-mail: infos@antic.cm www.antic.cm
                  LES ATOUTS ECONOMIQUES DU CAMEROUN
NATIONAL AGENCY FOR INFORMATION AND COMMUNICATION TECHNOLOGIES
Created in 2002, NAICT is a public administrative body, and a legal financially independent entity; it is the realization of a promise by the Head of State in his speech on November 30, 2001 when he inaugurated the Multimedia Centres in the Lycée Général Leclerc and Bilingual High School Essos...
NAICT, TOWARDS
A BETTER SECURE NATIONAL CYBERSPACE
This perception of the Head of State aiming at improving in the field of ICTs in all of our Institutions, was reinforced by the establishment of a legal, infrastructural, technical and financial framework, likely to help create a serene and secure environment in the use of Information and Communication Technologies.
Law N0 2010/12 of December 21, 2010 on cybersecurity and cybercrime in Cameroon confers on NAICT, which is placed under techni- cal supervision by the Ministry in charge of the telecommunications, and financial supervision by the Ministry in charge of finance, the task of secu- ring electronic communications networks and information systems. This task is in addition to that of promoting and monitoring the action of public authorities as regards ICTs development.
We should point out that the rapid growth of the Internet has undeniably sped up and facilitated access and exchange of information. This flashing success in communication has unfortunately favou- red the emergence of new forms threats known as cybercrimes. These threats pose significant risks to public administrations, businesses and private individuals. In Cameroon, many legal or physical persons have been the victims of cybercriminal acts causing significant financial consequences.
Fighting cybercrime has therefore become a major challenge faced by the Government, which needed to deal with the problem firmly. First, they had to set up an appropriate legal framework with the promul- gation by the Head of State of Law N0 2010/012 on 21 December 2010 on Cybersecurity and Cybercrime in Cameroon. The law confers on NAICT the task of ensuring, on behalf of
the State, the regulation of activities linked to the security of information systems and electronic communication networks through the security watch, security audit and electronic certification.
To achieve this strong duty, NAICT has equipped itself with security technologies to ensure the secu- rity of the national cyberspace.
SECURITY WATCH IN EVOLUTION
Security watch is the supervision of an informa- tion system in order to prevent and cope with security incidents. It aims at obtaining real-time information on intrusion activities, attacks and weaknesses of a system.
Besides, security watch helps to prevent incidents by issuing alerts and recommendations on the security of electronic communications networks and by moni- toring, detecting and providing information on com- puter risks and actions committed by cybercriminals.
To do this, NAICT has set up a Computer Incident Response Team (CIRT), which is in parti- cular responsible for:
• Protection of sensitive infrastructures in the national cyberspace, and real-time response to incidents;
• Issuing newsletters and security alerts; • The development of security standards;
• Assistance to users, businesses and security services in handling cyber incidents;
• People-awareness and training of State’s staff in particular;
• Statistical monitoring and collaboration with other CIRTs and Bodies.
Many actions were carried out as part of these tasks. Thus, NAICT has carried out numerous vul- nerability scans of the websites and information systems in public administrations. To date, 26,996 vulnerabilities were detected on the websites of the public administrations.
Besides, NAICT monitors the public administra- tions’ sites in order to assess their availability and to detect attacks against them. Since 2013, twenty- nine (29) Web defacement attacks and seventy-








































































   290   291   292   293   294