Security Implementation Framework
Security Implementation Framework
4, July 2013
1. Introduction
The National Information Assurance and Cyber
Security Strategy (NIACSS) developed recently by the
Ministry of Information and Communications
Technology (MoICT) of Jordan represents only the
first step. The Government of Jordan (GoJ) will most
likely be confronted with challenges that will emerge
from the implementation of this Strategy. According
to Alrawabdeh [1], the Arab World is facing
challenges related to a number of social, technological,
financial and legal issues. As a result, there is an
inevitable need to develop well-defined plans that
anticipate and address these challenges before they are
triggered.
According to the MoICT, the NIACSS is intended
to augment the overall national security strategy for
Jordan. The NIACSS identifies strategic objectives and
national priorities. The strategic objectives aim to:
strengthen National security, minimize risks to Critical
National Infrastructure (CNI), minimize damage and
recovery time, enhance economy and National
prosperity, and increase Cyber Security and
Information Assurance (CS&IA) awareness. National
priorities address the critical needs required to guide
the implementation towards achieving the National
objectives. The national priorities cover the following
areas: risk management, Jordan Computer Emergency
Response Team (JO-CERT), awareness, standards and
policies, international cooperation, securing national
The International Arab Journal of Information Technology, Vol. 10, No. 4, July 2013
2. Implementation Framework
According to Fred David, A strategic planning process
shown in Figure 1 consists of the following: strategy
formulation, strategy implementation, and strategy
evaluation [3].
Strategy
Formulation
Strategy
Implementation
Strategy
Evaluation
2.2. NIACSA
The NIACSA will be the major entity responsible for
the implementation of the NIACSS. This entity does
not exist yet and it has to be established. The NIACSA
is foreseen as a central national entity for governmental
and non-governmental organizations regarding all
information assurance and cyber security related
issues. The transition from strategy formulation to
strategy implementation shifts the responsibility to this
The International Arab Journal of Information Technology, Vol. 10, No. 4, July 2013
High
Cost
Medium
Low
2
3
1
2
High
Medium
Priority (Pay Off)
6
5
2
Low
2.6. Objectives
3. Future Research
Implementing the NIACSS is a big challenge; both
technically and financially. The GoJ needs to support
researchers in this regard for an efficient
implementation within limited resources. This paper
pinpoints several areas that may require further
research:
Perform a complete analysis for the NIACSS
according to the framework described in section 2.1.
Build a complete and detailed organizational
structure for the NIACSA by considering:
a.
b.
c.
d.
e.
several
4. Conclusions
This paper presents an IF that aims to guide the
implementation efforts of the NIACSS. It proposes a
The International Arab Journal of Information Technology, Vol. 10, No. 4, July 2013
Disclaimer
This paper does not represent the thoughts, intentions,
plans or strategies of the NITC, Jordans MoICT, or
any other Governmental or nongovernmental entity; it
is solely the opinion of the authors. The NITC,
MoICT, and/or any other entities are not responsible
for the accuracy of any of the information supplied
herein.
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Acknowledgements
The authors would like to thank the NITC for giving
the first author of this paper a key role in the
development and the implementation of the NIACSS.
We are also grateful to Eng. Fahd Batayneh and Dr.
Mohammad Al-Hammouri for their valuable
comments and fruitful discussions. Last but not least,
we wish to thank Miss Auhood Majali for editing this
paper.
[14]
[15]
References
[1]
[2]
[3]
[16]
[17]