This cybersecurity guide for developing countries has been prepared for facilitating the exchange of information on best practices, related to cybersecurity issues and to meet the stated goal of the Global Cybersecuriry Agenda (GCA) to “enhance security and build confidence in the use of information and communication technologies (ICT)”.
The guide is intended to give developing countries a tool allowing them to better understand the economical, political, managerial, technical and legal cybersecurity related issues in the spirit of the Global Cybersecurity Agenda. The purpose of it is to help countries get prepared to face issues linked to ICT deployment, uses, vulnerabilities and misuses.
The content of the guide has been selected to meet the needs of developing and, in particular, leastdeveloped countries, in terms of the use of information and communication technologies for the provision of basic services in different sectors, while remaining committed to developing local potential and increasing awareness among all of the stakeholders.
The Cybersecurity Guide for Developing Countries is structured in five independent parts that can be read either in sequence or separately.
- Part I identifies the context, stakes and challenges of cybersecurity.
- Part II presents cyberthreats, cyberattacks and cybercrime issues
- Part III proposes legal, justice and police approaches related to cybersecurity and cybercrime issues. This part demonstrates the fundamental role of forensic computer techniques in cybercrime investigation and identifies some legal issues related to cybercrime and international cooperation that contribute to preventing, deterring and fighting cybercrime.
- Part IV introduces a technical approach to cybersecurity, presents the most relevant principles of computer security, and specifies the domains of application of cybersecurity.
- Part V focuses on managing risks and security in a context of business intelligence. It contributes to understanding how to build a cybersecurity strategy, define a cybersecurity policy, and implement security measures.