Committed to connecting the world

CIS5: Building confidence and security in the use of ICTs

OVERVIEW

Objective: To build the capacity of Member States in the CIS region in building confidence and security in the use of ICTs, within the framework of the concept of information ecology for sustainable development and combating the potential negative consequences of the impact of the information environment.

Expected results

1)              Human capacity building in the countries of the region in building confidence and security in the use of ICTs, with adaptation for age, health condition and area of activity, including for effective use of e-government services

2)              Helping CIS countries participate collectively in global Internet governance policy

3)              Parameters of the information environment and criteria for assessing their impact on humans

4)              Recommendations on conducting information-ecology expert analyses of ICT projects and the information environment in which they are applied (region, country, town, etc.)

5)              Continuous professional development courses, training, seminars on monitoring the status of the information environment and its effect on humans, including building confidence and security in the use of ICTs.

Implementation of RI CIS5.pdf

IMPLEMENTATION

In 2015, within the framework of the implementation of regional initiative CIS5, an analysis was conducted, based on open sources, in following spheres:

  • Current situation in information and communication technologies;
  • Legal situation relating to  building confidence and security in the use of ICTs, including national and international initiatives;
  • Development of electronic public services;
  • Child online-protection;
  • Accessible environment. Ensuring access to telecommunications/ICT services for persons with disabilities;
  • Inter-operator cooperation with regard to building confidence and security in the use of ICTs;
  • The issues of confidence and security in e-commerce;
  • Activities of the Regional Commonwealth in the field of Communications (RCC) aimed at building confidence and security in the use of ICTs

Short recommendations were elaborated relating to each of the spheres and generalized indicators presented, which allow to evaluate the level of confidence and security in the use of ICTs. The report submitted to the ITU Area Office for CIS.

Also, professional standards were elaborated and approved by Labor Ministry of Russia for following posts: System Administrator of Information and Communication Systems; Specialist for Administration of Network Devices of Information and Communications Systems; System Programmer; Specialist for Design of Graphics and User Interface; Specialist for Technical Support of Information and Communication Systems; Information and Communication System Sales Manager. The above professional standards can be used as samples for elaboration of professional standards in the CIS countries and are available in the Internet at: http://www.acikt.ru/.

In the MTUCI, the Infocommunications and Information Technologies training and scientific centre for professional retraining was created, which is to further human capacity building in the CIS countries in the field of building confidence and security in the use of ICTs.

The Implementation of regional initiative CIS5 was discussed at Roundtable on Use of Information and Communication Technologies for Human Development: Child Online Protection; Assistance to Persons with Disabilities; Building Confidence and Security in the Use of ICTs, Bishkek, Kyrgyz Republic, 8 December 2015

In 2016, training materials for Laboratory complex Intrusion detection / prevention systems (IDS/IPS) "Forpost" were developed, including profession-oriented modules, training aids, and test materials for information security engineers.

Training Center "Infocommunications and IT" was created and trainig materials in wide area of information defense in telecommunications networks for professionals from CIS Region were developed.

Contribution to ITU-D STUDY GROUP 2 (Question 3/2: Securing information and communication networks: Best practices for developing a culture of cybersecurity) was elaborated.