Post Jobs


strategy and Conpes (National Planning Policy guidelines for cyber security and defense). CERTIFICATION. Colombia does not. Transcript of CONPES Conclusiones Se busca con esta politica establecer lineamientos que permitan al govierno colombiano proteger. Generar lineamientos de polĂ­tica en ciberseuridad y ciberdefensa orientados a desarrollar una estrategia nacional que contrarreste el.

Author: Kazigar Duzil
Country: Qatar
Language: English (Spanish)
Genre: Marketing
Published (Last): 28 April 2016
Pages: 300
PDF File Size: 11.41 Mb
ePub File Size: 6.99 Mb
ISBN: 936-6-75099-660-2
Downloads: 62614
Price: Free* [*Free Regsitration Required]
Uploader: Doule

Conpes 3701 de 2011

Ministry Of Defense Colombia Cyber incident: Request the Ministry of Defense, once ColCERT has been established, to issue cybersecurity guidelines that minimize the conpss of risk to which entities are exposed.

To that end, decision-makers and experts on the subject will have to attend international conferences, seminars, and specialized meetings to discuss cybersecurity issues.

Examples include attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss. The International Strategy for Cyberspace was adopted in May Law of Amends the Criminal Code and creates a new legally protected 37001 called information and data protection.

The convergence of terrorism and cyberspace. The training and education offered to public- and private-sector employees to respond as the first line of defense to cybercrime copes deficient. It will prevent and counter all cyber threats or attacks that affect the country’s assets and interests.

Conpes 3701 Document

The Convention, together with its additional protocol concerning the criminalization of acts of a racist and xenophobic nature committed conpss computer systems, is the only binding international instrument in this area. Should none exist, it is requested that one be created. A potential cause of an unwanted incident, which may result in harm to a system or organization. An official record of events over a particular period of time.


Conpes Document

Their purposes are usually nefarious. Consists of the application of barriers that guard access to data whereby only authorized persons are allowed access. In specific areas, such as ISP regulation, significant progress was made in terms of standards toward the end of Anyone who gains improper access to a computer system protected with a security measure or remains within same vonpes the will of someone entitled to exclude them shall be liable to conppes fine.

CCP is due to commence operations in Cybersecurity and cyberdefense initiatives and operations are not adequately coordinated Although a number of institutional efforts exist in both conps private and the public sectorthe study has found that no agencies have been established at the national level to coordinate and implement cybersecurity and cyberdefense operations.

An Intersectoral Committee charged with devising a strategic vision for information management and with introducing policy guidelines for technology infrastructure management hardware, software, and communicationspublic information, and cybersecurity and cyberdefense. Request the Ministry of Foreign Affairs, with regard to international cooperation in the areas of cybersecurity, cyberdefense, and information security, to support ColCERT in those instances for which it has been designated the international point of contact for cybersecurity and cyberdefense.

CONPES by luis miguel sanchez rodriguez on Prezi Next

To that end, the national government, in partnership at the international level with the Organization of American States OASthrough the Inter-American Committee against Terrorism CICTEorganized a workshop on cybersecurity awareness in Mayfollowed by a national roundtable in October Dorothy Denning, Georgetown University Cyber threat: Business Management Conpes Document advertisement.

Strengthen the cybersecurity and cyberdefense laws, bolster international cooperation, and move toward accession by Colombia of the various international instruments in this area The purpose of this objective is to develop the necessary legal tools to ensure effective and efficient prevention, investigation, and prosecution of cybercrime.


An illegal or abusive activity connected with computers or communications networks in which a computer is used as a tool to commit the offense or the target of the offense is a computer system or its data. It is important to point out that additional funds will be allocated for in order to assist the General Command of the Armed Forces in implementing the CCOC.

Ministry of Defense of Colombia Cybercrime: At the same time, efforts will be made to introduce the necessary regulations to implement the country’s laws.

National Framework In order to put Colombia’s legal framework in perspective it is important to mention the country’s lawmaking efforts in chronological order, as follows: The array of computers, computer systems, and telecommunications, data, and information networks, whose destruction or interference could weaken or impact on the security conps a country’s economy, public health, or both.

From onward, the funding will come from investment in three projects that have already been registered in the Investment Projects Bank.

The improvement in the provision of public services to citizens via cyberspace. For computer security professionals a log serves to keep a record of data or information as to the who, what, when, where, and why with regard to an event involving a particular device or an application. It is not certifiable. The continual evolution, spread, and sophistication of cyber attacks, as well as technological convergence,3 highlight the need to adopt measures and controls to protect the state from these new threats.

Implement the appropriate institutional framework: