Page 82 - SAMENA Trends - May-June 2023
P. 82
ARTICLE SAMENA TRENDS
Therefore, a framework is essential for more than 200 cyber security legislations another device. However, because internet
accommodating the dynamic nature of were proposed, passed, or took effect of things (IoT) connections vary in size and
cybersecurity – newly emerging threats, globally. These legislations were primarily power consumption, as well as in the type
policy evolution, technology developments focused in Europe regions and the Asia- and quantity of data they can send and
plus changing economic and social factors. Pacific region. Most developing countries receive. With the diverse range of devices
A framework must factor in policies, have incorporated CI protection legislation and requirements required by IoT, a single
practices and procedures and support all into general cybersecurity legislation. SIM from a single telecommunications
organizations with protecting their assets However, a challenge remains in that operator is unable to cope. 5G eliminates
Multi-Stakeholder Part- legislation should be reasonably designed the need for a SIM card by assigning unique
in alignment with the ability to implement.
identities to each individual device, so the
nerships (MSP) bring This includes making legislation affordable responsibility for authentication is shifted
together different soci- so that a country can enforce, comply with from the operator to individual service
etal players (public sector, and maintain the legislation. providers.
private sector, civil society, What kind of framework is needed to build R-Responsibilities: 5G cybersecurity
academia) working trust? is a shared responsibility that involves
stakeholders
MNOs,
including
In the development of legislation or
key
together as equals, sharing framework the resources of a country interconnection providers, vendors,
risks, and combining must be considered including financial, application developers, service
human, technical, infrastructural, and or
providers and governments, each with
unique resources and institutional resources as well as political, a clearly defined set of responsibilities
competencies to address and social circumstances in order to ensure which (when fully met) can enable the
challenges or exploit that there isn’t a ‘policy implementation gap’ deployment and operation of 5G systems
in a secure manner. This means that
meaning that there is a difference between
opportunities in ways the expected outcome during the policy only with appropriate different roles’ can
that one cannot achieve design stage and the actual result after responsibilities be taken in a way that the
ecosystem can enter a ‘virtuous circle’ and
implementation. This tends to be a caused
alone to facilitate the by two factors including an unrealistic develop rapidly as seen in the development
development of sustain- assessment of the implementation ability of the GMSA’s 5G cybersecurity knowledge
able frameworks. Based of a country, and fundamentally, a lack of base ‘shared responsibility model’ (GSMA -
5G Cybersecurity Knowledge Base).
multi-stakeholder collaboration.
on fruitful outcomes from
WSIS Panel in SAMENA Multi-Stakeholder Partnerships (MSP) U-Unified Multi-stakeholders’ Collabora-
tion: Collaboration between all stakehold-
bring together different societal players
Leaders’ Summit and (public sector, private sector, civil society, ers is essential. Users, regulators, industry
best industrial knowledge academia) working together as equals, experts, governments need to leverage the
collective knowledge of industry. Without
sharing risks, and combining unique
above, we developed the resources and competencies to address this shared knowledge of the stakeholders
TRUST framework, to help challenges or exploit opportunities in such as the ITU, local governments, aca-
build the cybersecurity ways that one cannot achieve alone to demics, ETSI, ENISA other ICT corporations
and players. innovation will be stifled within
facilitate the development of sustainable
ecosystem holistically frameworks. Based on fruitful outcomes the industry and risks will not be highlight-
from WSIS Panel in SAMENA Leaders’ ed at an early stage. As Mr. Adel Mohamed
via a process that includes identifying, Summit and best industrial knowledge Darwish, Director, Regional Offices of the
assessing and managing potential above, we developed the TRUST framework, International Telecommunications Union
disruptions. to help build the cybersecurity ecosystem (ITU) for Arab States said “We are now
Creating trust is actually a process and holistically: faced with a global space, not only a local
must be done in a structured manner market. The input of private sectors and
which brings together all representative T-Technical Base: Cybersecurity is industry organizations is helpful, cyber-
stakeholder voices who are committed to rooted in technology. Cybersecurity security and digital transformation needs
unified standards and also willing to take risk can be appropriately governed by multi-stakeholder cooperation.”
part of the responsibility for establishing a technical measures and mitigated by
cybersecurity ecosystem. technical innovation. For example, with S-Standardized Baseline and International
4G authentication, telecommunications Common Standard to follow: As the
For example, regarding critical operators authenticate users using a global market grows, a standardized
infrastructure (CI), between 2020 to 2022, SIM card placed inside a smartphone or baseline for both ICT development and
82 MAY-JUNE 2023