{"id":35,"date":"2023-10-05T03:09:42","date_gmt":"2023-10-05T03:09:42","guid":{"rendered":"https:\/\/zealous-pare.13-237-91-173.plesk.page\/?page_id=35"},"modified":"2024-04-17T03:22:01","modified_gmt":"2024-04-17T03:22:01","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.digital.gov.pg\/index.php\/digital-services\/cyber-security\/","title":{"rendered":"CYBER SECURITY"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#092b57&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;CYBER SECURITY &#038; GOVERNANCE&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;|700|||||||&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_font_size=&#8221;46px&#8221; title_font_size_tablet=&#8221;36px&#8221; title_font_size_phone=&#8221;30px&#8221; title_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; header_text_color=&#8221;#FFFFFF&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>&#8220;Protecting against cyber-attacks, ensuring data confidentiality, managing access control and developing plans.&#8221;<\/p>\n<p>[\/et_pb_text][lwp_divi_breadcrumbs home_text=&#8221;HOME&#8221; font_icon=&#8221;&#x24;||divi||400&#8243; link_color=&#8221;#FFFFFF&#8221; separator_color=&#8221;#FFFFFF&#8221; current_text_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f1f5fa&#8221; custom_padding=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Cyber Security is critical to enable safe and secure delivery of digital services. Cybersecurity affects everyone and as a result it is a shared responsibility for all to exercise cybersecurity best practices. Cyber security is the responsibility of all; therefore, all public bodies must make the necessary efforts.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;CYBER SECURITY&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0f6;||divi||400&#8243; icon_color=&#8221;#092b57&#8243; image_icon_width=&#8221;60px&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#002352&#8243; background_color=&#8221;#FFFFFF&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;30px|20px|30px|20px|true|true&#8221; animation=&#8221;off&#8221; border_color_bottom=&#8221;#FF2E35&#8243; global_colors_info=&#8221;{}&#8221; border_color_all__hover_enabled=&#8221;on|hover&#8221; border_width_bottom__hover_enabled=&#8221;off|desktop&#8221; border_width_bottom__hover=&#8221;0px&#8221;]<\/p>\n<div class=\"elementor-element elementor-element-3f135f7b elementor-widget elementor-widget-image-box\" data-id=\"3f135f7b\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-image-box-wrapper\">\n<div class=\"elementor-image-box-content\">\n<p class=\"elementor-image-box-description\">The PNG National Cyber Security Center (NCSC) protects critical information infrastructure, monitors and responds to cyber threats, provides guidance on cybersecurity, and promotes awareness of risks and best practices. The NCSC is vital for safeguarding PNG&#8217;s digital assets and promoting a secure digital ecosystem.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][dsm_perspective_image _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dsm_perspective_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;CYBER CRIME&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf21b;||fa||900&#8243; icon_color=&#8221;#092b57&#8243; image_icon_width=&#8221;60px&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#002352&#8243; background_color=&#8221;#FFFFFF&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;30px|20px|30px|20px|true|true&#8221; animation=&#8221;off&#8221; border_color_bottom=&#8221;#FF2E35&#8243; global_colors_info=&#8221;{}&#8221; border_width_all__hover_enabled=&#8221;on|hover&#8221; border_width_all__hover=&#8221;0px&#8221; border_width_bottom__hover_enabled=&#8221;off|hover&#8221; border_width_bottom__hover=&#8221;0px&#8221;]<\/p>\n<p><span>The Cyber Crime Unit of the Royal Papua New Guinea Constabulary is now collocated with the DICT and we are working toward a partnership to improve the coordination or cyber-crime matters with the DICT, telco operators, and various enforcement agencies.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;CYBER SAFETY&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf502;||fa||900&#8243; icon_color=&#8221;#092b57&#8243; image_icon_width=&#8221;60px&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#092b57&#8243; background_color=&#8221;#FFFFFF&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;30px|20px|30px|20px|true|true&#8221; animation=&#8221;off&#8221; border_color_bottom=&#8221;#FF2E35&#8243; global_colors_info=&#8221;{}&#8221; border_color_all__hover_enabled=&#8221;on|hover&#8221; border_color_all__hover=&#8221;#FF2E35&#8243; border_width_bottom__hover_enabled=&#8221;off|hover&#8221; border_width_bottom__hover=&#8221;0px&#8221;]<\/p>\n<p><span>Cyber safety is important because cyber threats such as hacking, malware, and identity theft can cause financial and reputational damage to individuals and organizations. Cyber safety involves promoting a culture of security awareness and education, which can help prevent or reduce cyber-attacks. The DICT works closely with NICTA, the National Censorship Office, and bilateral partners to provide awareness.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;GOVERNEMNT &#038; SOCIAL MEDIA&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0b7;||divi||400&#8243; icon_color=&#8221;#092b57&#8243; image_icon_width=&#8221;60px&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#092b57&#8243; background_color=&#8221;#FFFFFF&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;30px|20px|30px|20px|true|true&#8221; animation=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; border_color_all__hover_enabled=&#8221;on|hover&#8221; border_color_all__hover=&#8221;#FF2E35&#8243; border_color_bottom__hover_enabled=&#8221;on|hover&#8221;]<\/p>\n<p><span>The Department maintains a register of government social media accounts, ensuring compliance with information dissemination standards. The Department monitors accounts to comply with policies, promotes best practices, provides guidance. Trainings are also provided to agencies, and works with stakeholders to promote responsible social media use by government.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;GOVERNANCE&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;|600|||||||&#8221; title_text_color=&#8221;#092b57&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">The Public Service ICT Steering Committee (PSICTSC) is established under the Digital Government Act 2022. The PSICTSC is a vital government body responsible for guiding and overseeing the implementation of digital transformation programs and initiatives across government agencies in Papua New Guinea. The Committee\u2019s functions include:<\/p>\n<p>[\/et_pb_text][dsm_icon_list icon_color=&#8221;#092b57&#8243; icon_font_size=&#8221;20px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][dsm_icon_list_child text=&#8221;Developing and endorsing the Digital Government Plan and other relevant digital government policies, standards, and guidelines for the public service&#8221; font_icon=&#8221;&#x3d;||divi||400&#8243; icon_font_size=&#8221;20px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Providing strategic direction and oversight to ensure the effective and efficient use of ICT resources and infrastructure. This includes maintaining and updating the PNG Government Technology Stack&#8221; font_icon=&#8221;&#x3d;||divi||400&#8243; icon_font_size=&#8221;20px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Developing and implementing programs and initiatives to promote the adoption and integration of ICT in the public service&#8221; font_icon=&#8221;&#x3d;||divi||400&#8243; icon_font_size=&#8221;20px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Facilitating collaboration and coordination among government agencies to ensure alignment and coherence of ICT programs and initiatives&#8221; font_icon=&#8221;&#x3d;||divi||400&#8243; icon_font_size=&#8221;20px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Monitoring and evaluating the progress and effectiveness of ICT programs and initiatives&#8221; font_icon=&#8221;&#x3d;||divi||400&#8243; icon_font_size=&#8221;20px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Providing advice and recommendations to the government on matters related to the use of ICT in the public service&#8221; font_icon=&#8221;&#x3d;||divi||400&#8243; icon_font_size=&#8221;20px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/dsm_icon_list_child][\/dsm_icon_list][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Public Service ICT Steering Committee plays a critical role in ensuring the effective and efficient use of ICT in the public service, promoting collaboration and coordination among government agencies, and supporting the achievement of the government\u2019s overall goals and objectives related to digital transformation.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;30px&#8221; box_shadow_color=&#8221;rgba(103,151,255,0.17)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;PREVIOUS&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzIn19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x3c;||divi||400&#8243; icon_color=&#8221;#092b57&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;30px&#8221; _builder_version=&#8221;4.23.4&#8243; _dynamic_attributes=&#8221;url&#8221; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#092b57&#8243; body_text_color=&#8221;#092b57&#8243; image_icon_custom_margin=&#8221;0px|0px|0px|0px|true|true&#8221; image_icon_custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>GOVERNMENT CLOUD<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;NEXT&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM3In19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x3d;||divi||400&#8243; icon_color=&#8221;#092b57&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;30px&#8221; module_class=&#8221; lwp-blurb-right&#8221; _builder_version=&#8221;4.23.4&#8243; _dynamic_attributes=&#8221;url&#8221; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#092b57&#8243; body_text_color=&#8221;#092b57&#8243; image_icon_custom_margin=&#8221;0px|0px|0px|0px|true|true&#8221; image_icon_custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; text_orientation=&#8221;right&#8221; background_layout=&#8221;dark&#8221; custom_margin_last_edited=&#8221;off|phone&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; body_font_size_tablet=&#8221;&#8221; body_font_size_phone=&#8221;&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>E-GOVERMENT PORTAL<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Protecting against cyber-attacks, ensuring data confidentiality, managing access control and developing plans.&#8221;<div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/www.digital.gov.pg\/\" class=\"home\"><span property=\"name\">HOME<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">&#x24;<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Cyber Security is critical to enable safe and secure delivery of digital services. Cybersecurity affects everyone and as a result it is a shared responsibility for all to exercise cybersecurity best practices. Cyber security is the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":95,"parent":29,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-35","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/pages\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":313,"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/pages\/35\/revisions"}],"predecessor-version":[{"id":7334,"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/pages\/35\/revisions\/7334"}],"up":[{"embeddable":true,"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/pages\/29"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/media\/95"}],"wp:attachment":[{"href":"https:\/\/www.digital.gov.pg\/index.php\/wp-json\/wp\/v2\/media?parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}