DOI QR코드

DOI QR Code

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia

캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석

  • Heng, Mara (Ministry of Information, Communications and Technology) ;
  • Hwang, Gee-Hyun (Office of International Affairs/Graduate School of Information Science, Soongsil University)
  • ;
  • 황기현 (숭실대학교 국제처/정보과학대학원)
  • Received : 2019.09.09
  • Accepted : 2019.10.20
  • Published : 2019.10.28

Abstract

This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

본 논문은 캄보디아 정부의 사이버보안 전략의 우선순위를 결정하는 것을 목적으로 한다. 이를 위해 ITU 국가 이익 모델에서 사이버보안의 4개 정책요인을 채택하고, 그 다음에는 사이버보안 분야를 리드하는 8 개 선진국의 우수사례를 벤치마킹하여 도출한 7개 실행전략 대안으로 AHP 연구모델을 수립하였다. AHP 연구모델을 바탕으로 설문지를 작성하고 19명의 전문가들이 캄보디아의 사이버보안 전략의 우선순위를 평가하였다. 데이터 분석 결과 캄보디아 정부의 사이버보안 핵심 정책요인은 국토방어, 경제복지, 가치증진 및 유리한 세계질서 순으로 평가되었으며, 이들을 구현하는 주요 대안은 사이버보안 법제화, 역량개발, 중요 정보 인프라에 대한 사이버 공격 방지 순으로 판명되었다. 본 연구는 캄보디아 정부의 사이버보안 역량을 강화할 수 있는 전략적 우선순위와 실행계획을 수립하는데 기여할 수 있다.

Keywords

References

  1. S. T. K. Myo & G. H. Hwang. (2017). Effect of Mobile Devices on the Use Intention and Use of Mobile Banking Service in Myanmar. Journal of Digital Convergence, 15(6), 71-82. https://doi.org/10.14400/JDC.2017.15.6.71
  2. M. Heng. (2018). A study on developing the Roadmap for Strengthening Cybersecurity Focused on Cambodia. Master Thesis, Soongsil University, Seoul.
  3. M. Dara & D. de. Carteret. (2016). Slew of websites hacked. The Phnompenh Post, January 12.
  4. I. Pena-Lopez. (2015). Global Cybersecurity Index & Cyberwellness Profiles Report. WSIS Forum 2015 Geneva, 1-37.
  5. UMUC.(n.d.). Cyber Security Primer. DOI : http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm#
  6. L. M. Aliyeva & G. H. Hwang. (2019). The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System. Journal of Digital Convergence, 17(5), 23-31. https://doi.org/10.14400/jdc.2019.17.5.023
  7. S. H. Kim & J. S. Han. (2014). Smart Cold-Chain Monitoring Automation System Architecture based on Internet of Things. Journal of digital convergence, 12(12), 351-356. https://doi.org/10.14400/JDC.2014.12.12.351
  8. J. H. Cho &, H. J. Lee (2018). A Study on the Real-time Cyber Attack Intrusion Detection Method. Journal of the Korea Convergence Society, 9(7), 55-62. https://doi.org/10.15207/JKCS.2018.9.7.055
  9. S. H. Hong & J. A. Yu (2018). Ransomware attack analysis and countermeasures of defensive aspects. Journal of Convergence for Information Technology, 8(1), 139-145. https://doi.org/10.14801/JAITC.2018.8.2.139
  10. F. Wamala. (2011). The ITU National Cybersecurity Strategy Guide. ITU.
  11. S. H. Lee & D. W. Lee. (2014). A Study on Internet of Things in IT Convergence Period. Journal of digital convergence. 12(7), 267-272. https://doi.org/10.14400/JDC.2014.12.7.267
  12. Canada & Public Safety Canada. (2010). Canada's cyber security strategy: for a stronger and moreprosperous Canada. Ottawa, Ont.: Government of Canada.
  13. H. J. Mun, Y. C. Hwang, & H. Y Kim. (2015). Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey. Journal of IT Convergence Society for SMB, 5(2), 1-6.
  14. OECD (2012). Non-governmental Perspectives on a New Generation of National Cybersecurity Strategies. OECD Digital Econmy Papers, 212.
  15. S. Berman (2018). How to Structure Your Organization's Cybersecurity Management: Insights from Nutter's Seth Berman. Nutter,October 3,
  16. ISACA. (2015). State of Cybersecurity : Implications for 2015. CyberSecurity Nexus, 22.
  17. L. S Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26. https://doi.org/10.15207/JKCS.2015.6.6.017
  18. L. S. Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26. https://doi.org/10.15207/JKCS.2015.6.6.017
  19. Z. Yunos, R. S. A. Hamid & M. Ahmad. (2016). Development of a cyber security awareness strategy using focus group discussion. SAI Computing Conference (SAI), 1063-1067.
  20. R. Filipek. (2007). Information security becomes a business priority. Internal Auditor, 64(1), 18.
  21. C. H. Yoon & G. D. Choi. (2014). The Effects of National Culture on Ethical Decision-Making in the Internet Context : An Exploratory Analysis. Journal of digital convergence, 12(12), 23-36. https://doi.org/10.14400/JDC.2014.12.12.23
  22. K. B. Kim & J. Y. Yun (2015). Comparison and Analysis on Mobile Payment in terms of Security : Survey. Journal of IT Convergence Society for SMB, 5(3), 15-20.
  23. L. Saaty. (1990). The Analytic Hierarchy Process. Publications, Pittsburgh, PA.
  24. H. T. Choi. (2018). Analysis of policy priorities for strengthening the capacity of local public officials. Journal of the Korea Convergence Society, 9(11), 345-351. https://doi.org/10.15207/JKCS.2018.9.11.345
  25. B. C. Kim. (2015). A Internet of Things(IoT) based exploration robot design for remote control and monitoring. Journal of digital convergence, 13(1), 185-190. https://doi.org/10.14400/JDC.2015.13.1.185