Digital data is exposed to various types of threats while traversing data networks across a wide range of platforms. Understanding the types of threats to which data is exposed is as important as understanding how to protect data from vulnerable systems. This course introduces important concepts in maintaining cyber hygiene and preserving data integrity in the cyberspace. This course teaches how to identify the many digital threats to which various classes of data are exposed.
Cette formation couvre les aspects techniques, économiques et réglementaires relatifs à l'émergence d'une véritable économie de la donnée dans les pays en développement, en insistant sur les manquements relatifs au développement d'une infrastructure large bande. Il vise en particulier à présenter les approches de solutions pour ce qui concerne les zones rurales ou isolées.
The subject matter if this web seminar refers to international data transfers whereby cloud computing solutions will be applied. In relation to the subject matter various types of data will be discussed, including personal, which will be analysed in the context of different regulations. The web seminar will include technical aspects of application of various types of the cloud computing and its impact on the application of the legal framework. The seminar will also address different roles of cloud actors and its obligations under relevant regulations.
The training aims to strengthen the capacity of countries to produce ICT indicators and statistics according to international standards and methodologies. It presents the main groups of telecommunication/ICT indicators collected and the different questionnaires as well as the definition and methodologies of the indicators following the ITU Handbook for the collection of administrative data on telecommunications/ICT. Examples provided address data gaps and challenges faced by countries and suggests possible solutions.