The Integritas System to enforce Integrity in Academic Environments

Preview:

DESCRIPTION

The Integritas System to enforce Integrity in Academic Environments. A Model for Online Entertainment. Prof Basie von Solms Mr Jaco du Toit. Prof Basie Von Solms Academy for Computer Science and Software Engineering University of Johannesburg basievs@uj.ac.za. Agenda - PowerPoint PPT Presentation

Citation preview

The Integritas System to enforce Integrity in

Academic Environments

Prof Basie von Solms

Mr Jaco du Toit

Prof Basie Von SolmsAcademy for Computer Science and Software EngineeringUniversity of Johannesburgbasievs@uj.ac.za

A Model for Online Entertainment

Agenda

•Some statements•A Model (Strawman) for Online Entertainment

•Implementing the Model•Shoot the model down in flames!!!

Statement 1 :

Do not try to prohibit access to online sites

•It is impossible•It cannot work

Statement 2 :

Consolidate the different definitions into one

•Online gambling•Interactive gambling•Online betting•Interactive betting•Virtual gambling•etc etc

For this presentation, call this

‘Online Entertainment’

Statement 3 :

Legalize ‘Online Entertainment’

under strict conditions

Online Entertainment providers (local and international) can now apply for licensing in SA if they conform to the set conditions

Licensing for Online Entertainment

Internet

User

Licensed Providers

SA National OE Registration Authority (NOERA)

User

X

Online Entertainment Provider X

What are the Conditions ?

•Regulation•Compliance Enforcement• Based on available international

Best practices•(ReCe Model)

What are the Conditions ?

•Regulations• Information Security Governance

• Security, Privacy, Protection• Financial Governance• Digital Forensics Governance• Under-age control ??• Cooperation• ‘Push’ of exceptions• Money laundering• Pornography• etc

What are the Conditions ?

•Regulations• Information Security Governance

• Security, Privacy, Protection

Confidentiality Data integrity Identification and AuthenticationAccess controlLogging and auditingPrevent Identity theftMalicious software controlTransmission securityCredit card protectionProcess of Application and Registering…

What are the Conditions ?

•Regulations• Financial Governance

Winning paid into same account‘Push’ if exceptions occurRegular information on SA users/playersCredit card protection standards

FICA???RICA???

What are the Conditions ?

•Regulations• Digital Forensics Governance

Information available to investigate cyber crime incidents and user complaints

What are the Conditions ?

•Compliance Enforcement

• Ensure compliance to the Regulations by Compliance checking/Auditing

• Compliance Inspectors

Benefits

•Online Entertainment Providers• Legal

• Advertise in SA• Market their products

• etc

•National OE Regulating Authority (NOERA) (and SA)

• Income (Licensing fees)• Tax incomes

• Control• Protecting citizens

• National Critical Information Infrastructure Protection (NCIIP)

•Players• Peace of mind

• Lower risk of fraud, Identity theft, cyber crime• Recourse – National Customer Complaint Centre

• etc

Expertise, Knowledge and Education – from where?

•Cyber Inspectors• Outsourced• Locally trained

•ITU-UJ Centre of Competency in Cyber Security• Certificate in Cyber Security

• Formally approved• NQF Level 5• Full examination• UJ Certificate• Starting in 2012

Internet

User

Licensed Providers

SA National OE Registration Authority (NOERA)

Customer Complaint Centre

User

X

Online Entertainment Provider X

ITU-UJ CoECSX, Y and Z

ReCe Model

Regulations

ComplianceChecking

AdviceAwareness

Possible Implementation Plan

Step 1 : Advice from this CommitteeGO/NO GO

Step 2 : Evaluate the ReCe model by circulating it to other experts for commentschanges, suggestions, additions

GO/NO GOStep 3 : Create an expert team to create a provisional the sets of Regulations

and the Compliance enforcement processesStep 4 : Invite comments from acknowledged international OE providers

GO/NO GOStep 5 : Refine Model, finalize the sets of Regulations and the Compliance enforcement

processes and start legalization processStep 6 : Start training Cyber Inspectors/Auditors

Step 7 : Create processes, procedures and infrastructures* Application process, Customer Support Centre, Licensing fees etc

Step 8 : etc

National Critical Information Infrastructure (NCII)

•Strategic importance to SA• Economic future• Social future

• Cyber crime• Cyber terrorism• Cyber warfare

•National Critical Information Infrastructure Protection (NCIIP)

• All computers connected to the Internet is part of SA’s NCII• Must be protected in Cyber space• SA Postbank (R 42 m)!!!

•Responsibility of Parliament for Cyber Security oversight in SA• UN Conference in Geneve in May 2011

•This initiative of today is critical for SA and must be done by all Government Departments for all Internet based systems

Start shooting!!!

Thanks

Recommended