{"id":3641,"date":"2021-01-05T01:37:07","date_gmt":"2021-01-05T01:37:07","guid":{"rendered":"https:\/\/lenguyenlawfirm.com\/?p=3641"},"modified":"2021-01-05T01:37:07","modified_gmt":"2021-01-05T01:37:07","slug":"national-security-information-systems","status":"publish","type":"post","link":"https:\/\/lenguyenlawfirm.com\/en\/national-security-information-systems\/","title":{"rendered":"National security information systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3642\" src=\"https:\/\/lenguyenlawfirm.com\/wp-content\/uploads\/2021\/01\/National_security_information_systems.jpg\" alt=\"\" width=\"278\" height=\"181\" \/><\/p>\n<p><strong>QUESTION:<\/strong><\/p>\n<p><strong>Please let me know what kind of national security information systems includes? How is the response to and troubleshooting of security issues for important national security information systems implemented?<\/strong><\/p>\n<p><strong>ANWSER:<\/strong><\/p>\n<p>v\u00a0\u00a0\u00a0National security information systems<\/p>\n<p>A national security information system is an information system which will cause serious cybersecurity issues if is broken down, infiltrated, overridden, interfered with, disrupted, paralyzed, attacked or sabotaged.<\/p>\n<p>According to Clause 2 Article 10 of Law on Cybersecurity 2018, the national security information systems include:<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Military, security, diplomacy and cryptography information systems;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Systems for archiving and processing state-secret information;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information systems serving storage of particularly important items and documents;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information systems serving storage of materials or substances that are particularly harmful to humans or the environment;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information systems serving storage, manufacturing and management of other facilities relevant to national security;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Important information systems serving operation of central organizations;<\/p>\n<p>&#8211;\u00a0\u00a0 National information systems serving energy, finance, banking, telecommunications, transport, resources and environment, chemical, health, culture and press authorities;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automatic monitoring and control systems at important works relevant to national security or national security targets.<\/p>\n<p>The Prime Minister shall promulgate and revise the list of national security information systems for each specific period.<\/p>\n<p>v\u00a0\u00a0\u00a0Response and remediation of cybersecurity incidents occurring to National<strong>\u00a0<\/strong>security information systems.<\/p>\n<p>Response and remediation of cybersecurity incidents occurring to National security information systems include the following activities:<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Discovery and identification of cybersecurity incidents;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scene protection and evidence collection;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Limiting the scope of and damage caused by the incident;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Determination of the scope of response and subjects that need assistance;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Verification, analysis, assessment and classification of the cybersecurity incident;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Execution of the response and remediation plan;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identifying causes and origins of the incident;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Investigation and handling;<\/p>\n<p>The responsibility of individual, organization in response and remediation of cybersecurity incidents occurring to National security information systems including:<\/p>\n<ul>\n<li>Administrators of national security information systems shall devise plans for responding to and remediating cybersecurity incidents that occur to their systems; implement such plans in case a cybersecurity incident occurs and promptly inform the competent cybersecurity force.<\/li>\n<li>Coordinating response and remediation of cybersecurity incidents occurring to national security information systems:<\/li>\n<\/ul>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0 Professional cybersecurity forces of the Ministry of Public Security shall coordinate response and remediation of cybersecurity incidents that occur to national security information systems other than those mentioned in Point b and Point c of this Clause; participate in cybersecurity incident response and remediation activities on request; inform the system administrators whenever a cyberattack or cybersecurity incident is discovered;<\/p>\n<p>&#8211;\u00a0\u00a0 The professional cybersecurity force of the Ministry of National Defense shall coordinate response and remediation of cybersecurity incidents that occur to military information systems;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0 Vietnam Government Certificate Authority shall coordinate response and remediation of cybersecurity incidents that occur to their cryptography systems.<\/p>\n<ul>\n<li>Other organizations and individuals are responsible for participating in response and remediation of cybersecurity incidents that occur to national security information systems at the request of the coordinating authority.\/.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>QUESTION: Please let me know what kind of national security information systems includes? How is the response to and troubleshooting of security issues for important national security information systems implemented? ANWSER: v\u00a0\u00a0\u00a0National security information systems A national security information system is an information system which will cause serious cybersecurity issues if is broken down, infiltrated, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[53],"tags":[],"class_list":["post-3641","post","type-post","status-publish","format-standard","hentry","category-questions-answer"],"acf":[],"_links":{"self":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/3641\/"}],"collection":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/"}],"about":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/types\/post\/"}],"author":[{"embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/users\/1\/"}],"replies":[{"embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/comments\/?post=3641"}],"version-history":[{"count":1,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/3641\/revisions\/"}],"predecessor-version":[{"id":3645,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/3641\/revisions\/3645\/"}],"wp:attachment":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/media\/?parent=3641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/categories\/?post=3641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/tags\/?post=3641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}