Search This Blog

Populære indlæg

Thursday, September 4, 2014

IT Strategies and governments

this is (as it always is with IT and when i'm involved) a work in progress

when it's finished in a couple of years (i am just one human being) or rather if i ever finish it it should be some guidelines how to use it on a government/country wide scale…. phew!
  
but this is in fact the largest "fishing" expedition i have ever participated in. i hope that someone with a broader view will write some stuff on these pages so that we all can create something usefull.

i wan't to learn :-)

these are the areas that should be covered:

- security

- design (so that it looks like one system instead of 200 smaller ones mashed together on a webpage)

- how to save money

- who runs the system

- what technologies can be used now and which ones needs maturing

- how can different branches of the state use what techs (in schools have students play a versatile number of games - action, strategy, etc - in single player mode. example: when you play a rpg game with different class of characters you learn to solve the same problem with different tools and if you play games with multiple options of winning you learn to use the same tool to solve different problems).

- intelligence services and social media (to monitor the entire network [ie. twitter, facebook, etc] is no small feat if you want to get information. how to implement a pre-empitive scanning method)

- why open source or access to the source code

- why private sub-contractors and not some state company. well, we'll use both. the state maintains control where the private sub-coqntractors handles the work.

13 comments:

  1. here is what i would describe as a project-specification (krav specifikation in Danish). it propably has a whole lot left out but i haven't got information to make better calls so what i'll do is on a theoretical level

    ReplyDelete
  2. project description

    create a cyber-strategy for the Danish government or any government. it is more guidelines how to exploit technology to create a more integrated society. and to save money but that part comes later.

    the strategy is composed by the following sub-parts:

    how can it-technology solve the tasks of the state

    analyse how the state can make life easier for the single citizen, government officals, municipal workers and the corporate sector. which technologies can be beneficial for the state

    examples could be to create analysis methods to predict that something is going to happen.

    strategies to use on social media. how to make the single municipal appear as a part of a country.

    how to implement these country wide

    how to make sure that these advices is implemented country wide so that "we" look like a country and not 100 smaller countries

    this is also to save money for the state and municipal system

    "best practice" security advise

    these are more guidelines and they should be divided into subparts like:
    - private citizens (single computer or small lan (4-8))
    - corporate sector (smaller networks and very large ones spanning several countries)
    - government system (very large systems, integrated with each other)
    - military systems (i "don't" know too much but i know that there is no such thing as waterproof shutters)
    - research groups (single computers to large systems)

    contingency plan

    this is just an apt attempt to mitigate the impact of a security risk (look at heartbleed), system breakdown due to power shortage, data-breach etc

    digitalization

    this is the part where the decisions is being made and those decisions is then implemented in realspace.

    environment

    coprporate sector
    hospitals
    police
    defence
    communications
    banks

    ressources

    mixed environment ranging from mobile devices, laptops, workstations, servers and server-farms

    user groups

    ranging from people with very little knowledge of computers and software to professionals with knowledge and skills beyond the capabilities of any ordinairy user.

    ReplyDelete
  3. technolocal opputunities
    ========================

    social media
    ------------

    big data
    --------

    integrated systems
    ------------------

    information sharing
    -------------------

    your data, any time, anywhere

    cloud (example storage, email-server, application)
    --------------------------------------------------

    lamc (local area multi computer)
    --------------------------------

    ReplyDelete
  4. environment
    ===========

    mobile devices
    --------------

    laptops
    -------

    desktop/workstation
    -------------------

    a workstation is a powerfull desktop computer like the one a 3d animator uses

    servers
    -------

    users
    -----

    what type of users will be using these systems

    ReplyDelete
  5. tasks of the state
    ==================

    accounting (you got that already :-)

    epj

    criminal records

    grades

    ReplyDelete
  6. "best" security practices
    =========================

    state systems
    -------------

    hospitals
    police
    army
    communication with citizens

    private corporate sector
    ------------------------

    banks
    pharmaceutical (r&d need higher security because of IP theft)

    citizen
    -------

    some good advice anyone can use at home


    security tips
    -------------

    some advice on how to setup your router so that it is more secure

    gateway servers
    ---------------

    a server that sits between the router and the hw-fw. it uses proxys to anonymize traffic coming from the inside of the lan. it holds dns server to make dns poisoning a lot harder.

    also this server should handle incoming traffic from home users connecting through a vpn

    ReplyDelete
  7. contingency plan
    ================

    now we are talking about not only foreseeing the future but to handle it

    for instance, what do we do if a very high security risk appears (heartbleed anyone), power failure, etc

    how to restore data

    ReplyDelete
  8. digitalisation
    ==============

    this is the decisions made based on the report. you could see this as recommendations

    ReplyDelete
  9. implementation
    ==============

    how do we implement these systems

    ReplyDelete
  10. none of the documents above shows the full scale of what i'm proposing and offering :-)

    ReplyDelete
  11. but at the moment i am working on a bootable (cd/dvd readonly) gateway server that sits between the big scary internet and your internal lan. it's between the inet accesspoint and the rest of the lan.

    ReplyDelete