{"id":255,"date":"2021-06-02T18:19:00","date_gmt":"2021-06-02T18:19:00","guid":{"rendered":"http:\/\/43.205.9.160\/?p=255"},"modified":"2023-11-10T06:53:12","modified_gmt":"2023-11-10T06:53:12","slug":"how-the-national-cybersecurity-plan-2022-is-making-philippines-cyber-secure","status":"publish","type":"post","link":"http:\/\/43.205.9.160\/vi\/archives\/255","title":{"rendered":"How the National Cybersecurity Plan 2022 is making Philippines Cyber Secure"},"content":{"rendered":"
<\/div>\n
\"\"<\/figure>\n\n\n\n

As per the latest data from January 2021, in a population of 110.3 million close to 74 million are active internet users in the Philippines, where the number increased by 4.2 million between 2020 and 2021.<\/p>\n\n\n\n

Another noteworthy fact is that at the same time in January 2021, there were 152.4 million mobile connections that was equivalent to 138.2% of the total population.<\/p>\n\n\n\n

In the last couple of years, Philippines has witnessed a mammoth internet savvy population that is also hugely active on social media to say the least. But with such dynamics, there is always a vulnerability to cyber crimes that becomes inevitable.<\/p>\n\n\n\n

So much so that in 2016, the country suffered its most damaging data leak comprising 70 million votes data registered with the Commission on Elections.<\/p>\n\n\n\n

Taking into consideration the nature of the cyber attacks and the growing digitization in the country, the Department of Information and Communications Technology (DICT) in Philippines launched the National Cybersecurity Plan 2022 (NCSP) with an aim to make Philippines cyber secure.<\/p>\n\n\n\n

Below mentioned are the key focus areas of the National Cybersecurity Plan 2022 that explains how it is making Philippines cyber secure:<\/p>\n\n\n\n

1. Securing Philippines\u2019 critical infostructure (CII)-<\/strong> One of the primary goals of NCSP is to ensure continuity in CII operations, the failure or limited activity of which due to natural or man-made disasters can cause a havoc in sectors like emergency services, healthcare, telecommunications, banking, logistics and many more, thereby adversely impacting most of the citizens.<\/p>\n\n\n\n

In the course of enabling cyber security capability and ensuring the protection of CII, compliance and assessment are made pivotal where they cover Protection Assessment, Security Assessment and Compliance to Cyber Risks concerning CII. Government agencies are subjected to obligatory National Drill Exercises to adhere to a regular protocol of reporting threats, security breaches and establishing constant monitoring.<\/p>\n\n\n\n

2. Protection of government networks-<\/strong> NCSP strives to protect the government networks through a National Computer Emergency Response Program which is also part of the National Drill Exercises. The program is designed to function as per an emergency protocol which is there to assist the government agencies in the event of cyber-crimes or attacks. The emergency protocol is supposed to become an integral part of operations for all government entities.<\/p>\n\n\n\n

NCSP insists on deploying Chief Information Security Officer (CISO) positions in government agencies, where the crucial responsibilities of a CISO include- using information security policies; allocating resources; and taking budget decisions. <\/p>\n\n\n\n

The NCSP has also bifurcated the hierarchy of the Computer Emergency Response Program into National CERT, Government CERT, Sectoral CERT, and Military CERT, where each one has a specific area to focus on. For instance, the Military CERT comes under The Department of National Defense (DND).<\/p>\n\n\n\n

One of the main objectives of this strategy is to establish a threat intelligence and analysis operations centre in order to aid- Research and Development; Testing Laboratories; and Threat Scenario Simulators.<\/p>\n\n\n\n

3. Safe keeping of the supply chains-<\/strong> To ensure the safety of the supply chains, NCSP has guided the government in setting common criteria to maintain compliance of the suppliers, where evaluation happens as per an established norm to ensure that the ICT equipment are compliant with the government\u2019s standards.<\/p>\n\n\n\n

4. Protection of individuals-<\/strong> NCSP has insisted that the government should take a holistic approach for the protection of the individuals. Topics related to cyber security are incorporated as a part of higher education. Also, advanced programs like webinars and specialized courses to obtain skills and knowledge in a short time are promoted.<\/p>\n\n\n\n

Encouragement is given to apprenticeships and cooperative education programs to ready an instant workforce that can simultaneously earn a salary and learn the necessary skills.<\/p>\n\n\n\n

NCSP also emphasizes on outreach programmes, that are conducted via different mediums and strategic relationships are developed with youth communities as well as the relevant local and international private organisations.<\/p>\n\n\n\n

With the above-mentioned focus areas, it is quite evident that National Cybersecurity Plan 2022 is not only shielding Philippines from cyber attacks but has also provided the future road map for the growth and improvement of digital forensics, network analytics and defence conceptualization.<\/p>","protected":false},"excerpt":{"rendered":"

As per the latest data from January 2021, in a population of 110.3 million close to 74 million are active internet users in the Philippines, where the number increased by 4.2 million between 2020 and 2021. Another noteworthy fact is that at the same time in January 2021, there were 152.4 million mobile connections that […]<\/p>","protected":false},"author":3,"featured_media":333,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","content-type":"","rank_math_lock_modified_date":false,"footnotes":""},"categories":[48,52],"tags":[],"class_list":["post-255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurity"],"acf":[],"_links":{"self":[{"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/posts\/255"}],"collection":[{"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/comments?post=255"}],"version-history":[{"count":2,"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/posts\/255\/revisions"}],"predecessor-version":[{"id":334,"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/posts\/255\/revisions\/334"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/media\/333"}],"wp:attachment":[{"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/media?parent=255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/categories?post=255"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/43.205.9.160\/vi\/wp-json\/wp\/v2\/tags?post=255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}