You are on page 1of 24

THE UNITED REPUBLIC OF TANZANIA

MINISTRY OF INFORMATION, COMMUNICATION AND


INFORMATION TECHNOLOGY

TAIC, 2023
CYBER SECURITY AWARENESS MONTH
&
“Building a secure and safe environment for Tanzania towards a sustainable
Digital Economy transformation”
By
PRESENTED DURING THE 07TH Eng. Stephen M. Wangwe
TANZANIA ANNUAL ICT
CONFERENCE 2023 ORGANISED
Ag. Director for Communication Safety and IT Security
BY ICT COMMISSION ON 16th
t0 20th OCTOBER 2023 IN DAR
ES SALAAM. For details
https://www.ictc.go.tz/ © MICIT – Cybersecurity Awareness https://www.mawasiliano.go.tz
/
CONTENTS
ICT SECTOR OVERVIEW

MICIT OVERVIEW

COMMUNICATION SAFETY AND IT SECURITY UNIT

SAFE AND SECURE DIGITAL ECONOMY

CYBERCRIMES

CYBERSECURITY

CYBERSECURITY TIPS

GENERAL TIPS (STAYING SAFE)

GOVERNMENT INITIATIVES

CONCLUSION

© MICIT – Cybersecurity Awareness https://www.mawasiliano.go.tz


/
HIGH LEVEL ICT SECTOR OVERVIEW:
Status
National ICT Policy 2016 2023
POLICY National Information Policy 2016
National Postal Policy 2003 2023

1. NCSS (2018 – 2023) + NCSCS


STRATEGY 2. National Broadband Strategy
3. National Cybersecurity Comm. Strategy
1. EPOCA, 2010
2. Cybercrimes Act, 2015
LAWS 3. E-Transactions Act, 2015
4. Personal Data Protection Act, 2022
5.**ICT Act
6. Various regulations

REGULATORY TCRA & PDPC


1. Infrastructure Dev. (NICTBB & NAPA)
2. Localization of ICT Equipment
3. Rural Connectivity-UCSAF
PROGRAMMES/PROMO
4. e-GOVERNMENT
TION OF ICT
5. Digital Tanzania Project
6. D4T (EU)
INVESTIGATIONS 1. Cybercrime Unit (TPF)
2. Fin. Intelligence Unit
https://www.mawasiliano.go.tz
© MICIT – Cybersecurity Awareness 3. NPS /
MINISTRY OF INFORMATION, COMMUNICATION AND
INFORMATION TECHNOLOGY (MICIT) OVERVIEW

• Created by the President Her Excellency Dr. Samia


Suluhu Hassan on 22nd November, 2021
• Mandated to:-
• Formulate policies on Information, Communication and
ICT, Posts and Telecommunications;
• Coordination and Regulation of Mass Media;
• Research, Development and Innovation in ICT;
• ICT Professionals Development;
• Establishment and Management of Postal Codes;
• National ICT Broadband Backbone; &
• Safety and Security of ICT.

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
INSTITUTIONS UNDER MICIT:
Tanzania Communication Regulatory Authority
Tanzania Telecommunications Corporation (TTCL)
Tanzania Broadcasting Corporation (TBC)
ICT Commission (ICTC)
Personal Data Protection Commission (PDPC)
Tanzania Standard Newspapers (TSN)
TCRA Consumer Consultative Council (TCRA-CCC)
Universal Communication Services Access Fund
Tanzania Posts Corporation

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
COMMUNICATION SAFETY AND IT SECURITY (CSIS)
OVERVIEW

• Coordinate development of policies, legislations, strategy, guidelines


and regulations pertaining to ICT Security and Safety;
• Establish appropriate mechanism to facilitate implementation of ICT
security management in the country;
• Monitor and evaluate implementation of ICT security and safety policies
countrywide;
• To coordinate development of strategies and progamme to promote
safety and end of life equipment
• To establish appropriate environment to facilitate implementation of
preventive measures on cybercrimes in the country
• Coordinate development of strategies and programme to promote
safety of end of life equipment, Business Continuity and Disaster
Recovery;
• Promote Green ICT initiatives; and
• Perform audit of ICT systems to ensure compliancy with security and
safety requirements.

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
DIGITAL ECONOMY
❑ Also WEB Economy or INTERNET Economy
❑ Digital economy is the worldwide network of economic activities, commercial
transactions and professional interactions that are enabled by information and
communications technologies (ICT) which are not limited by geographic
boundaries
❑ Examples: e-commerce, e-marketplaces, online educational courses,
streaming platforms, social media, video conferencing, work-from-home
options, e-health, e-government
❑ A digital economy is built on digital platforms that facilitate business processes
and enable better economic value.
❑ A key component of the digital economy is hyper connectivity, which is the
increasing interconnection of people, organizations, and machines that is a
result of the Internet, mobile technology, and the internet of things (IoT). This
increase of interconnections has motivated illicit acts (cybercrimes) in the
digital environment due to the value it has created.

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
DIGITAL TRANSFORMATION
❑Simply put, digital transformation is enabling
businesses to use the latest technology to
help them not only achieve their goals, but
faster, more efficiently, and more profitable.
❑Transformation involves integration of digital
technologies into all areas of an
organization/company, resulting in
fundamental changes to how the business
operates and delivers value to customers.

Point to Note
Every piece of new technology added to an IT infrastructure,
whether it's software, hardware, remote devices, network or
cloud components can cause potential problems resulting in
down-time and risks to revenue.

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
DIGITAL ECONOMY (BENEFITS TO TANZANIA)
❑ Promotes Use of the Internet
➢ Most of daily work today can be done on the internet(e-gov).

❑ The expansion of business opportunities


➢ Possible to break into new national and global markets

❑ The creation of new employment opportunities


➢ Job opportunities in new markets.

❑ The enhancement of public services


➢ improve many public services such as health care, municipal activities and
policing

❑ The rapid rise of E-Commerce


➢ The digital economy has pushed the e-commerce sector into overdrive Not just
direct selling but buying, distribution, marketing, creating, selling have all
become easier due to the digital economy

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
DIGITAL ECONOMY WITH THE RISE IN
CYBER-CRIMES
❑While digital technologies have enabled a new
economy to thrive, so as the growth in online
attacks by cyber criminals
❑The primary target for cyber-criminals is
consumer data, which can be sold or traded to
other criminals.
❑Criminals can also steal sensitive information
including credit card account numbers and Other
banking information, Mobile Money Information,
National Identity Numbers (NIN) and other vital
information that can be a huge risk to customers
if disclosed
Government through CSIS- Plays a great role in ensuring sustainability of
Tanzania’s digital economy by ensuring safe Cyber Space by doing
number of activities which include formulating Cybersecurity Policies,
Laws, Strategies, Frameworks etc. as well as bringing awareness to the
general public about safe cyber space requirements for the sustainable
digital economy.
© MICIT – Cybersecurity Awareness
https://www.mawasiliano.go.tz
/
❑ On July 31, A major Cyberattack in Kenya impacted online government
platforms, which included passport applications and renewal, e-visa
application system, License registration systems also Mobile money services
were impacted as well.
❑ On August 1, a number of banks across Italy were taken offline due to
targeted distributed denial of service (DDoS)
❑ On August 3, A major US hospital network, Prospect Medical Holdings, has
been the victim of a ransomware-based attack, the attack affect 16 hospitals.
❑ On August 8, UK election watchdog, The Electoral Commission (TEC),
revealed that it had been the victim of a complex cyber attack which exposed
the data of more than 40 million voters.
❑ Police Service of Northern Ireland Suffered Critical incident on August 8 after
the PII of all of its employees was published online

All these attacks reminds us all that it is not a matter of IF but WHEN the
attack will happen, therefore preparedness is key.

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
❑ Cybersecurity is the application of technologies, processes and controls to protect
systems, networks, programs, devices and data from cyber attacks.
❑ It is a critical business issue for every organisation.
❑ Mainly addresses following key components:-

Confidentiality
• Information assets are protected from unauthorized viewing and other access

Integrity
• Means data is protected from unauthorized changes to ensure that it is reliable and correct

Availability
• Means that authorized users have access to the systems and the resources they need.

Authenticity
• To establish the validity of a transmission, message or originator or a means of verifying and individuals
authorization to receive specific information. This includes user names, passwords, emails, biometrics, and others.

Non-Repudiation
• This attribute assures the sender of data is provided with proof of delivery and the recipient is provided with proof
of the sender’s identity so neither party can deny sending, receiving or accessing the data.
© MICIT – Cybersecurity Awareness
https://www.mawasiliano.go.tz
/
ELEMENTS OF CYBERSECURITY

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
SAFE AND SECURE DIGITAL ECONOMY ENVIRONMENT

Digital security involves protecting your online presence (data,


identity, assets).
For Tanzanian Organizations, firms and companies to remain
competitive, and mitigate risks, the automation of security,
scanning and assessment needs to match the rate of
innovation and speed to market.
Hence cyber-security has to be a top priority for Companies
and organizations. In the same way that cyber-criminals are
able to be exactly where the consumers are, also cyber-
criminals are becoming increasingly adept at infiltrating them.

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
ETHICS IN CYBERSECURITY PROFESSION

Cyber ethics is the philosophic study


of ethics pertaining to computers,
encompassing user behaviour and what
computers are programmed to do, and
how this affects individuals and society.
Privacy, accuracy, property and accessibility, these are the four
major issues of information ethics for the information age.

Your computer or system should not be used to harm others.


Your cyber knowledge should not be used to steal other people's
resources. One should not use or copy software for which you
have not paid. You should not break into someone else's
accounts.
© MICIT – Cybersecurity Awareness
https://www.mawasiliano.go.tz
/
Legislations related to Cyber ethics

• Cybercrimes Act, 2015


• EPOCA, 2011
• Computer Emergency Response
Team (CERT) Regulations, 2023

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
THINK OF MFA TO ENHANCE PROTECTION

• One of the most important steps you can take


to protect yourself online is to use a unique,
strong password for every one of your
accounts and apps. If Possible, it is strongly
advised to make use of MFA.
5 Factors of Authentication:
1. What you Know? (Knowledge)
2. What you Have? (Possession)
3. Who you are? (Inherent features)
4. Where you are? (Location)
5. How you do things? (Action behaviour)

10/26/2023 © MICIT – Cybersecurity Awareness 17


https://www.mawasiliano.go.tz
/
GENERAL SAFETY TIPS

© MICIT – Cybersecurity Awareness https://www.mawasiliano.go.tz


/
Tips for Self safety:

1. All MNO calls are made through 100

2. Get two steps ahead: Turn on two-step authentication on


accounts where available.

3. Unique account, unique password: Having separate


passwords for every account; At a minimum, separate your
work and personal accounts. Make your password stronger!

4. Think before you act: Be worry of communications that


implores you to act immediately, offers something that
sounds too good to be true or asks for personal information.
Don’t share your personal details over internet of mobile
phone.
© MICIT – Cybersecurity Awareness
https://www.mawasiliano.go.tz
/
General Tips (2)
5. When in doubt, throw it out: Links in email,
tweets, posts and online advertising are often how
cybercriminals try to steal your personal
information. Even if you know the source, if
something looks suspicious, delete it!
6. Mind what you Post in the Internet as Digital
footsteps are always Permanent
7. Be mindful of the Apps you install or links you
are requested to click
8. Backup your files/phone numbers/messages etc
9. Update your Apps/Browsers/OS
10. Protect your stuff
© MICIT – Cybersecurity Awareness https://www.mawasiliano.go.tz
/
General Tips (3)
11. Don’t entertain public Wi-Fi especially those
without password
12. Use of 15040 to report Fraudulent Calls and SMS
13. Don’t enjoy easy money/ quick gain
14. If you believe your financial accounts may be
compromised, CONTACT YOUR FINANCIAL
INSTITUTION for immediate intervention.
15. CONSIDER REPORTING the attack to the
police.

IT EASY TO STAY SAFE ONLINE….!

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
GOVERNMENT INITIATIVES
• National Cyber Security Strategy (2018 – 2023) under
review;
• TzCERT; Cybercrime Unit; FIU; DCEA; TPDF; e-GA; NPS;
PCCB; TISS/GSO;
• Ranked 2nd in Africa in Cyber Security Maturity –
GCI2020 Report;
• National Cyber Security Communication Strategy
(2021/2022 – 2025/2026);
• Installation of National PKI (NPKI);
• Establishment of Personal Data Protection Commission;
• Development of Tanzania Digital Economy Strategic
Framework (2023 – 2033);
• SADC; EAC; AU; EU; Commonwealth; UN; Bi-lateral;
• Ratification process of Malabo Convention;
• Child Online Protection Policy/Guidelines underway;
© MICIT – Cybersecurity Awareness https://www.mawasiliano.go.tz
/
Conclusion

• Cyber Laws of Tanzania are fairly sufficient for


handling challenges in the cyber space but legal
frameworks cannot work alone
• Fighting against cyber crimes/attacks calls for a
coordinated efforts (Both Public & Private sectors)
• As internet technology advances so does the threat
landscape
• Share the knowledge, Stay safe, Stay happy and enjoy
life…….

© MICIT – Cybersecurity Awareness


https://www.mawasiliano.go.tz
/
AKSANTENI
© MICIT – Cybersecurity Awareness https://www.mawasiliano.go.tz
/

You might also like