The Proposed Website Template Guidelines and Website Migration Plan
|
|
|
- Alaina Boyd
- 10 years ago
- Views:
Transcription
1 Proposed Website Template Guidelines and Website Migration Plan Alberto B. Salvador, Jr National ICT Summit June 25-26, 2013
2 Offline Offline isis not not an an option option Establish a persistent online presence with at least basic services in order to build trust in government. Approved and adopted as framework and guide for the computerization of key frontline and common services and operations of the government to enhance overall governance and improve the efficiency and effectiveness of the bureaucracy. State recognizes the vital role of communication and information in nation-building Philippine Constitution
3 Offline Offline isis not not an an option option Establish a persistent online presence with at least basic services in order to build trust in government. Approved and adopted as framework and guide for the computerization of key frontline and common services and operations of the government to enhance overall governance and improve the efficiency and effectiveness of the bureaucracy. State recognizes the vital role of communication and information in nation-building Philippine Constitution
4 1,285 1,285 Government Government Websites Websites Hacked Hacked Sulu-Sabah Incident 1, 157 Govt Websites Defaced 2006 recorded highest (457) Sources: PNP - ITMS (Web Services and Cyber Security Division), ICTO, zone-h.org, pastebin, wikipedia and Idefense USA
5 Proposed Proposed Website Template General General Guidelines Guidelines General Policy Statement
6 Proposed Proposed Website Template General General Guidelines Guidelines Top Bar Masthead Banner Auxiliary Menu Content Area Homepage Basic Layout Agency Footer Standard Footer
7 Proposed Proposed Website Template General General Guidelines Guidelines Top Bar Masthead Banner Auxiliary Menu
8 Proposed Proposed Website Template General General Guidelines Guidelines
9 Proposed Proposed Website Template General General Guidelines Guidelines Agencies shall adhere to the following main navigation specifications:
10 Proposed Proposed Website Template General General Guidelines Guidelines Content Area
11 Proposed Proposed Website Template General General Guidelines Guidelines Agency Footer
12 Proposed Proposed Website Template General General Guidelines Guidelines Standard Footer
13 Proposed Proposed Website Template General General Guidelines Guidelines
14 Website Website Migration Migration Plan Plan Objective Aims to ensure the smooth migration of a government website to the Integrated Government Philippines (igovphil) Web Hosting Service
15 Website Website Migration Migration Plan Plan Migration Compliance Procedures Assessment of a government agency's current website Prioritization (First and Second Priority) Implementation of a Migration Checklist Initial Security and Audit Checks Actual Migration Implementation of a Staging Server Regular Backups, Security and Performance Monitoring Implementation of a trouble-ticketing and feedback system
16 Website Website Migration Migration Plan Plan For the operations phase 1) Maintain a team of CMS-expert developers that will continue to develop and produce templates as needed to provide updates; 2) Check on potential plug-ins that agencies can adopt; 3) Continuously upgrade to enable a self-service facility in the future; and 4) Maintain a team of security experts that will proactively check on all CMS templates and plug-in s vulnerabilities, as well as to ensure security of all hosted applications.
17 Website Website Migration Migration Plan Plan Sustainability of the Initiative 1) Conduct continuous capability building and knowledge exchange conference for our security experts, accredited developers and trainers, and agency web developers. 2) Involve the CMS community in the continuous development of templates and continuous evaluation of plug-ins as well as to ensure continuous supply of manpower for the pool. 3) Create a team of network security experts from the private sector and the academe that will collaboratively work in case of an attack; and devise an incentive mechanism for this.
18 Website Template and and Migration Migration Plan Plan Documents Documents
19 Maraming salamat po. ALBERTO B. SALVADOR, JR. Policies and Standards Office National Computer Center DOST ICT Office NCC-ICTO Building Carlos P. Garcia Avenue U.P. Campus, Diliman, Q.C. Phone: (+632)
Annex E - Capability Building Policy
Page 1 DEPARTMENT OF Version: 1.5 Effective: December 18, 2014 Annex E - Capability Building Policy This Capability Building Policy is an annex to the Government Web Hosting Service (GWHS) Memorandum Circular
ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT
MALACAÑANG PALACE MANILA BY THE PRESIDENT OF THE PHILIPPINES ADMINISTRATIVE ORDER NO. ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT WHEREAS, Section 24,
USER S MANUAL JOOMLA! GOVERNMENT WEB TEMPLATE
USER S MANUAL JOOMLA! GOVERNMENT WEB TEMPLATE 1 TABLE OF CONTENTS Introduction 3 Parts of the Government Web Template (GWT) 4 Logging In and Getting Started 5 GWT Joomla! Module Map 8 Editing the Top Bar
WEBSITE MIGRATION PLAN
WEBSITE MIGRATION PLAN This plan aims to ensure the smooth migration of a government website to the Integrated Government Philippines (igovphil) Web Hosting Service. It is divided into three parts: first
Technical and Security Guidelines on the Government Web Hosting Service (GWHS)
Version: 1.3 Effective: November 20, 2013 Technical and Security Guidelines on the Government Web Hosting Service (GWHS) This Technical and Security Guidelines on the Government Web Hosting Service (GWHS)
Degree Works User Guide for Advisers
Degree Works User Guide for Advisers September 2015 Contents Access Degree Works... 2 Access Student/s Records... 2 Navigation... 2 Notes... 2 Student Information Header... 3 Audit Types... 3 Student View...
Performance Management Process. Department of Human Resources Presented by: Wendy Davis
Management Process Department of Human Resources Presented by: Wendy Davis 1 Agenda Why Management? Management Cycle Roles Job Descriptions Goal Setting and Development Plan Mid Year Review Self Assessment
Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop
Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional
Government Website Template Design (GWTD) Guidelines
Version: 1.6 Effective: January 13, 2014 Government Website Template Design (GWTD) Guidelines This GWTD Guidelines is an annex to the Memorandum Circular of the Government Web Hosting Service (GWHS) issued
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5
Getting Started with SharePoint Three projects. Legislative Service Center (LSC) Homepage Employee Bulletin Board CMS to SharePoint Migration
Tom A. Puleo Legislative Service Center State of Washington NALIT 2008 Getting Started with SharePoint Three projects Legislative Service Center (LSC) Homepage Employee Bulletin Board CMS to SharePoint
G-Cloud Definition of Services Security Penetration Testing
G-Cloud Definition of Services Security Penetration Testing Commercial in Confidence G-Cloud Services An Overview Inner Security is a leading CREST registered information security services provider. We
Oracle Enterprise Manager 12c Microsoft SQL Server Plug-in version 12.1.0.6
Oracle Enterprise Manager 12c Microsoft SQL Server Plug-in version 12.1.0.6 July 2015 Heterogeneous Datacenter Management Oracle s Philosophy Productize our deep understanding of the Oracle stack to provide
Content management system (CMS) guide for editors
Content management system (CMS) guide for editors This guide is intended for content authors and editors working on the TfL website using the OpenText Web Site Management Server (RedDot) content management
THE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
Wordpress Training Manual
Client Adviser CPD Job name: Wordpress CMS Manual Step / Task: Training of Wordpress Content Management System Date: 20 th April, 2013 Training Team: Sami El-Titi 07593 634 5864 / [email protected]
Word Press Theme Video Stream Apptha
Word Press Theme Video Stream Apptha Steps for Installation: Extract the downloaded UNZIP_THIS_FIRST_videostream.zip file. Once you have extract, follow the below steps: Go to Admin Appearance Themes Install
Response to Web Design & Development RFP Questions
1. Most responses will offer Open Source Software (OSS) as the Content Management System (CMS). While our organization is fluent in OSS (WordPress, Drupal, Joomla etc.) we have developed our own CMS that
Process Document Campus Community: Create Communication Template. Document Generation Date 7/8/2009 Last Changed by Status
Document Generation Date 7/8/2009 Last Changed by Status Final System Office Create Communication Template Concept If you frequently send the same Message Center communication to selected students, you
Regis University Web Governance Policy. May 2012
Regis University Web Governance Policy May 2012 Table of Contents Web Governance Policy Ownership... 3 Goals of the Web Governance Policy... 4 Guiding Principles... 5 Governance Roles and Responsibilities...
Responsive Banner Slider Extension By Capacity Web Solutions
CONTENT Introduction 2 Features 2 Installation 3 Configuration Settings 4 Manage Responsive Banner Slider Extension 5 Manage Group Section 5 Manage Slides Section 9 Display Responsive Banner Slider 11
Legislative Council Panel on Security Creation of a permanent Chief Superintendent of Police post of the Cyber Security and Technology Crime Bureau
LC Paper No. CB(2)1621/13-14(05) For discussion on 3 June 2014 Legislative Council Panel on Security Creation of a permanent Chief Superintendent post of the Cyber Security and Technology Crime Bureau
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
The STAGEnet Security Model
NDSU 2015 Cyber Security Conference The STAGEnet Security Model Peeling Away the Layers March 17, 2015 NDSU Memorial Union Rose Room NDSU 2015 Cyber Security Conference Art Bakke Enterprise Information
Unit Title: Content Management System Website Creation
Unit Credit Value: 7 Unit Level: Three Unit Guided Learning Hours: 36 Ofqual Unit Reference Number: H/503/9327 Unit Review Date: 31/12/2016 Unit Sector: 15.3 Business Management Unit Summary This unit
What s New Guide: Version 5.6
What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3
Welcome to Your Polycom Support Portal
Welcome to Your Polycom Support Portal Your Entry Point to Online Support Overview Welcome to Polycom Online Support What s New New Look & Feel Most Popular Questions on Home Page Access to Polycom Security
INVITATION TO TENDER E-COMERCE PROMOTION WEB SITE
Belgrade, 18 August 2015 INVITATION TO TENDER E-COMERCE PROMOTION WEB SITE CONTRACT OBJECTIVES & EXPECTED RESULTS Background to the Project Project Title: e-business Development Project No.: EuropeAid/133836/C/SER/RS
How-to Guide: Creating a Mobile Website Using bmobilized
Mobile Websites How-to Guide: Creating a Mobile Website Using Content Provided by Mobile Websites Content 1. What is a mobile website? 2. Why you need a mobile website? 3. Who is? 4. How to create a mobile
Annex D - Technical and Security Guidelines on the Government Web Hosting Service (GWHS)
Page 1 DEPARTMENT OF Version: 1.6 Effective: December 18, 2014 Annex D - Technical and Security Guidelines on the Government Web Hosting Service (GWHS) This Technical and Security Guidelines on the Government
With Windows, Web and Mobile clients Richmond SupportDesk is accessible to Service Desk operators wherever they are.
Richmond Systems Richmond Systems is a leading provider of software solutions enabling organisations to implement enterprise wide, best practice, IT Service Management. Richmond SupportDesk is currently
Your 12 step plan to a successful SharePoint implementation. SharePoint Project Checklist
Your 12 step plan to a successful SharePoint implementation SharePoint Project Checklist SharePoint Project Checklist Your 12 step plan to success in implementing SharePoint 1. Pre-Project Planning Identify
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
TENDERS INVITED FOR DESIGN, DEVELOPMENT, HOSTING AND MAINTENANCE OF WEBSITE FOR ICAR - CENTRAL CITRUS RESEARCH INSTITUTE LOCATION: OPP. N.B.S.S.
TENDERS INVITED FOR DESIGN, DEVELOPMENT, HOSTING AND MAINTENANCE OF WEBSITE FOR ICAR - CENTRAL CITRUS RESEARCH INSTITUTE LOCATION: OPP. N.B.S.S. & L.U.P. AMRAVATI ROAD,NAGPUR-440 010 Proposals are invited
Themes and Templates Manual FOR ADVANCED USERS
Manual FOR ADVANCED USERS Table of Contents Introduction... 3 Key Information... 3 Portal Structure... 4 Portal Structure: Template... 5 Overview... 5 1) Editing a Portal Template... 6 2) Adding a Portal
Cloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
Boundary Commission for England Website technical development - Statement of Work. Point of Contact for Questions. Project Director.
Point of Contact for Questions Project Director Project Manager Website technical development Statement of Work Reading Room Ltd 65-66 Frith Street Soho London W1D 3JR T: +44 (20) 7173 2800 F: +44 (20)
ITU Service - Content Management System (CMS) - 2012
ITU Service - Content Management System (CMS) - 2012 Table of Contents 1 Purpose and General Overview... 2 2 Service Description: Content Management System... 2 2.1 How to Request Service... 3 2.2 Service
Service OnBoarding: A Process Approach for Uniting ITIL and DevOps. Bill Cunningham
Service OnBoarding: A Process Approach for Uniting ITIL and DevOps Bill Cunningham Service OnBoarding A Process Approach for Uniting ITIL and DevOps through Standardized Non- Functional Requirements DevOps:
Unique Value Proposition (UVP) and Your Website Designing
Law Firm Marketing Checklist By Alan Weiss, aussiedivorce.com.au criminallegal.com.au t h e r e a r e o v e r 4 0, 0 0 0 s e a r c h e s o n G o o g l e e v e r y s e c o n d. I t t a k e s 5 s e c o n
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. http://bechtsoudis.com abechtsoudis (at) ieee.
Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING Anestis Bechtsoudis http://bechtsoudis.com abechtsoudis (at) ieee.org Athena Summer School 2011 Course Goals Highlight modern
Operating Level Agreement (OLA) Template
Operating Level Agreement (OLA) Template About this template This template provides a consistent format for all Operating Level Agreements (OLAs) between internal departments of ITS and a recognized IT
How To Use Haccp 4.1.1
Standard V4.1 Announcing Version 4.1 Standard has been updated to version 4.1. The goal was to make the program more user friendly, implement customer feedback and to present the user with a more focussed
Step Up to Microsoft Dynamics GP
Step Up to Microsoft Dynamics GP BENEFITS Do more with your business. Take advantage of significant additional functionality found in Microsoft Dynamics GP, including project tracking, analytical accounting,
1703 Discovering SharePoint 2007 for Developers
1703 Discovering SharePoint 2007 for Developers Custom Authentication SharePoint = ASP.NET Application ASP.NET Providers Microsoft Single Sign-On Demonstration: Custom Authentication o Lab : Custom Authentication
Diver-Office Backup and Restore the Database
Contents Determine the database type... 1 Backup and RESTORE The Diver-Office SQL CE Database... 1 Backup and Restore the Diver-Office SQL Express database... 2 SQL Server Management Studio Express...
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
Your OUTLOOK configuration may not include all of the following files. Some files are created only when you customize Outlook features.
Page 1 of 9 Outlook 2003 - Backing Up mail files The following is a list of data store and configuration files used by Microsoft Outlook 2003 Some of the folders might be hidden folders. To view hidden
Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method
NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation
ConnectWise 6.0 Plugin: Synchronization
LabTech ConnectWise 6.0 Plugin: Synchronization CONNECTWISE 6.0 PLUGIN: SYNCHRONIZATION... 1 Overview... 1 Synchronizing Clients (Companies)... 2 Creating Clients (Companies) in ConnectWise... 3 Mapping
$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES
e-commerce Website Hosting Service HOSTING:: WHAT YOU GET Where you host your website is an extremely important decision to make, if you choose simply on price, you may be making a huge mistake. We encourage
Incident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open
SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
Systems Support - Standard
1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets
Standard CIP 003 1 Cyber Security Security Management Controls
A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-1 3. Purpose: Standard CIP-003 requires that Responsible Entities have minimum security management controls in place
WEB GUIDELINES Last Updated July 22, 2014
WEB GUIDELINES Last Updated July 22, 2014 Contents INTRODUCTION... 3 GOVERNANCE STRUCTURE... 4 TECHNOLOGY COUNCIL... 4 WEB ADVISORY COMMITTEE (WAC)... 4 WEBMASTER... 4 ADMINISTRATION AND DEPARTMENT HEADS...
Utah State University Web Standards
Utah State University Web Standards Table of Contents: 1. Introduction 1.1 About Web Identity.2 1.2 General Web Standards...2 1.3 Who should use the USU Web Template...3 2. The USU Website 2.1 USU Homepage
What s New Guide. Help Desk Authority 9.1
What s New Guide Help Desk Authority 9.1 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
Cyber Security Solutions Integrated. Proactive. Resilient.
Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions
Start Learning Joomla!
Start Learning Joomla! Mini Course Transcript 2010 StartLearningJoomla.com The following course text is for distribution with the Start Learning Joomla mini-course. You can find the videos at http://www.startlearningjoomla.com/mini-course/
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and
How to Build a SharePoint Website
How to Build a SharePoint Website Beginners Guide to SharePoint Overview: 1. Introduction 2. Access your SharePoint Site 3. Edit Your Home Page 4. Working With Text 5. Inserting Pictures 6. Making Tables
Decision Maker's Guide - Evaluation Checklist for ITSM Solutions High Level Requirements
Decision Maker's Guide - Evaluation Checklist for ITSM Solutions High Level Requirements Ability to support a 24x7 service desk operation Ability to provide workflow capabilities for efficient incident,
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
COMPLIANCE MATRIX of GIGW
COMPLIANCE MATRIX of GIGW Sl. No. Guide Lines 1.Government of India Identifiers Compliance 1 Association to Government is demonstrated by the use of Emblem/Logo, prominently displayed on the homepage of
Web Design Foundations (2015-16)
Course Description Web Design Foundations is a course that prepares students with work-related web design skills for advancement into postsecondary education and industry. The course is intended to develop
Information Technology Strategic Plan 2013 9/23/2013
Information Technology Strategic Plan 2013 9/23/2013 Unit Mission Statement: Information Technology Shared Services is dedicated to providing unparalleled service and support to the UC Davis College of
