Nominated Projects



Category 5 — AL C5. Building confidence and security in use of ICTs (20 Projects)


Anti-spam Comprehensive Treatment Platform

The Anti-spam Comprehensive Treatment Platform, which is run by the Internet Society of China (ISC), has formally opened. The new platform is part of ISC's efforts in fulfilling the ‘Sunshine and Green Network Project’ of the Ministry of Information Indu… more »


Advanced Persistent Threat (APT) Attack Detection and Prevention

Information and Communication Technology (ICT) is now an significant driving force for economic growth, however, recent incidents in which organized attackers severely compromised several large-scale enterprises and government agencies indicates that pro… more »


Central Biometric Verification Monitoring Platform

Project Description During the last decade the usage of cellular mobile phones has infiltrated and revolutionized peoples’ life style in Bangladesh. Although it has already been proved that such usage has positive impact on the development of various dis… more »


Cloud-based Parental Control Services for Preventing the Child from Addiction and Pornography

Information and communication technology has made the Internet increasingly popular among children. About one-third of Internet users in the world are children, and there are 175 million children accessing Internet in China. Affected by Covid-19, 572 mil… more »


Cyber Security Capacity Building through the National Cyber Security Drills

STAR-X is Qatar's annual national cybersecurity exercise that aims to improve the cybersecurity resiliency of the Critical National Infrastructure (CNI) in Qatar by developing and maintaining a high standard of cyber skills within their workforce. STAR-X… more »


Cybersecurity Education in the Philippines in the time of Pandemic

Philippines is considered the largest known source of online sexual exploitation of children (OSEC) cases with an upsetting 264.63% increase between March 1 to May 24,2020 compared to the same period in 2019. Last year, 957 cybercrime cases were reported… more »


Cybersecurity inno6

- Filling the skills gap in cybersecurity - Working with the young adults in Africa - Creating leaders and Entrepreneurs - Changing the narrative for the Continent … more »


CyberVictim.help

All human activity has gone online since the coronavirus lockdown began. This has resulted in an exponential rise in fraudulent online activity. TaC International has developed a real-time free assistance for victims of cybercrime. The assistance is offe… more »


Digital Citizen

Digital Citizen (Cidadao Digital) is a mixture of capacity building and creative labs that aims to inspire, empower and support the protagonism of young people, by train the trainer model, to foster online safety, well-being, and media/digital literacy a… more »


Digital Mobile Key

The Digital Mobile Key (DMK) is the national mobile eID solution which allows citizens to digitally authenticate themselves in public and private websites as well as digitally sign documents, in a secure manner. It was developed to address the increasing… more »


Facebook Soy Digital

Soy Digital aims to train users with basic digital skills as well as the ability to think critically about what they see online, communicate respectfully and be responsible digital citizens in the online world. Working in partnership with experts from ar… more »


Free/Dem Media Pathshala

Free/Dem - short for FREEDOM and DEMOCRACY - is a Digital and Media Literacy movement with and by marginalized communities to reclaim online media spaces. Research reveals a huge digital gender divide across South Asia, with women nearly 50% less likely … more »


IPification is building the backbone of mobile authentication of today and tomorrow

IPification is building the backbone of mobile authentication of today and tomorrow. By verifying the device, SIM & phone number via IP address. IPification patented technology is enabling secure, passwordless, zero-tap compatible mobile user authenticat… more »


IT Risk management application

Risk management is the process of identifying and assessing risks in order to develop a plan to address those risks and their potential consequences for a business. A risk represents the probability of loss or damage, which may be of an unintentional nat… more »


Joint Agreement Protecting Subscribers

The President of UKE together with the Minister of Digital Affairs, NASK and Orange Polska, Polkomtel, P4 and T-Mobile Polska have entered into an agreement on cooperation in the special protection of Internet users against data phishing sites,including … more »


Leaf Wallet

Leaf is bringing the financially excluded into the formal economy by creating a virtual bank for refugees, migrants, and cross border traders. Blockchain backed and accessible from a mobile device, Leaf offers secure storage and transport of assets acros… more »


NATIONAL CYBER SECURITY COMPETITION

One of the TCRA’s strategic objective is to protect interests of stakeholders and enhance awareness of their rights and obligations. In order to fulfill the strategic objective TCRA implemented a project called cybersecurity competition. Cybersecurity co… more »


Research and practice of 5G security assurance evaluation Technology

5G has more and more impact on human society. Security issue becomes key point on 5G communication development. The security and trustworthiness on network element is highlighted by industrials and governments. It also requires global co-operation to mak… more »


Role Management & Mining – RBAC Implementation

stc Cybersecurity has adopted and implemented the capabilities of Identity Management Governance, which paved the road towards the enablement of role mining and management, thus helped stc to classify and managed the accesses of stc users based on their … more »


Security Awareness Training Platforms

The challenge of raising awareness is to develop a security culture within the company, so that all employees can contribute to strengthening the IT security of their company. For a company, information security awareness consists of : 1. Complying with … more »