63. Egypt 35.06

63rd National Cyber Security Index
14th Global Cybersecurity Index
103rd ICT Development Index
96th Networked Readiness Index
Population 91.3million
Area (km2) 1.0million
GDP per capita ($) 12.6thousand
NCSI FULFILMENT PERCENTAGE
NCSI Update Data source
11 May 2018 Government officials
1 Mar 2018 Government officials
NCSI DEVELOPMENT TIMELINE 2 years All data

Version 11 May 2018

GENERAL CYBER SECURITY INDICATORS
BASELINE CYBER SECURITY INDICATORS
INCIDENT AND CRISIS MANAGEMENT INDICATORS
  • 9. Cyber incidents response 3/6 50%
    3
    6 50%
    • 9.1. Cyber incidents response unit 3
      3
      3
      Requirements
      Criteria

      The government has a unit (CSIRT, CERT, CIRT, etc.) that is specialised in national-level cyber incident detection and response.

      Accepted references

      Official website or legal act

      Evidence

      EG-CERT is charged with providing computer and information security incident response, support, defense and analysis against cyber attacks and collaboration with governmental, financial entities and any other critical information infrastructure sectors EG-CERT also provides early warning against malware spreading and massive cyber attacks against Egypt's telecom infrastructure. EG-CERT consists of four main departments, which are Incident Handling,Cyber forensics,Malware Analysis and Penetration Testing.

    • 9.2. Reporting responsibility 0
      0
      1
      Requirements
      Criteria

      Digital service providers and operators of essential services have an obligation to notify appointed government authorities of cyber security incidents.

      Accepted references

      Legal act

      Evidence
    • 9.3. Single point of contact for international coordination 0
      0
      2
      Requirements
      Criteria

      The government has designated a single point of contact for international cyber security coordination.

      Accepted references

      Official website or legal act

      Evidence
  • 10. Cyber crisis management 1/5 20%
    1
    5 20%
  • 11. Fight against cybercrime 4/9 44%
    4
    9 44%
    • 11.1. Cybercrimes are criminalised 1
      1
      1
      Requirements
      Criteria

      Cybercrimes are defined by legislation.

      Accepted references

      Legal act

    • 11.2. Cybercrime unit 0
      0
      3
      Requirements
      Criteria

      There is a government entity with a specific function of combatting cybercrime.

      Accepted references

      Official website or legal act

      Evidence
    • 11.3. Digital forensics unit 3
      3
      3
      Requirements
      Criteria

      There is a government entity with a specific function of digital forensics.

      Accepted references

      Official website or legal act

      Evidence

      From the EG-CERT website: EG-CERT is charged with providing computer and information security incident response, support, defense and analysis against cyber attacks and collaboration with governmental, financial entities and any other critical information infrastructure sectors EG-CERT also provides early warning against malware spreading and massive cyber attacks against Egypt's telecom infrastructure. EG-CERT consists of four main departments, which are Incident Handling,Cyber forensics,Malware Analysis and Penetration Testing. Forensics services: This service includes crime investigations that are Cyber or computer related using computer forensics science which simply is the science of examination and explanation of a digital artifact (Computer systems , storage media , documents ..etc) .

    • 11.4. 24/7 contact point for international cybercrime 0
      0
      2
      Requirements
      Criteria

      The government has designated an international 24/7 contact point for cybercrimes.

      Accepted references

      Official website or legal act

      Evidence
  • 12. Military cyber operations 0/6 0%
    0
    6 0%
    • 12.1. Cyber operations unit 0
      0
      3
      Requirements
      Criteria

      Military forces have a unit (cyber command, etc.) that is specialised in planning and conducting cyber operations.

      Accepted references

      Official website or legal act

      Evidence
    • 12.2. Cyber operations exercise 0
      0
      2
      Requirements
      Criteria

      Military forces have conducted a cyber operations exercise or an exercise with a cyber operations component in the country in the last 3 years.

      Accepted references

      Exercise document/website or press release

      Evidence
    • 12.3. Participation in international cyber exercises 0
      0
      1
      Requirements
      Criteria

      The country's military team has participated in an international cyber operations exercise in the last 3 years.

      Accepted references

      Exercise document/website or press release

      Evidence

CONTRIBUTORS

Sherif Hashem
National Telecom Regulation Authority
Ahmed Tharwat
EgyCERT