Services are required for Strengthening the ICT border connectivity in borders in Central America
Business and Professional Services
IDB ProjectRG-T3044 : Strengthening the ICT Border Connectivity in Borders in Central-America
This action will open an external link.
The objectives of this TC are: (i) identifying gaps in infrastructure, equipment, Information Technology (IT) Security and border surveillance technologies, software and procedures necessary to improve connectivity and data transmission reliability of border control agencies and regional institutions in Central America; (ii) designing a safe border management infrastructure to enhance security of critical information and enhance the control environment at the border crossings; and (iii) develop a short- and medium-term action plan to identify priorities, responsibilities and cost of interventions to improve the connectivity of border control agencies.
The Inter-American Development Bank (IDB) is executing the above mentioned operation. For this operation, the IDB intends to contract consulting services described in this Request for Expressions of Interest.
The consulting form will conduct the following activities:
● Data analysis: Identify important information stored in data center of the control agencies and analysis the capacity security, classification and reliability of the data into the data center. It will include an analysis of encryption method used when important data is stored and transmitted.
● Identify critical technological infrastructure: Identify critical systems which will store or transmit important data in border area. The systems that require seamless service in particular will be identified into major critical infrastructure including servers, storage hardware, cables and racks.
● Technological Security threat analysis: Analysis of threats and vulnerabilities on identified critical infrastructure systems. It will cover technological issues (e.g. unauthorized access, service failure), and managerial issues (e.g. information security policy, awareness as well as a variety of information security elements, such as firewalls.
● Design technological infrastructure protection measures: Development of infrastructure protection recommendations to strengthen each of the critical infrastructure systems identified previous assessment. These recommendations will include the design of response strategy against external attacks and system failure, cybersecurity resilience system, and capacity building for the safety of critical infrastructure systems.
● Operation staff: Identify the actual profiles of the staff in charge of data center monitor operations and maintain IT and infrastructural equipment. Including recommendation of the actualization of this staff in the state of the art.
The estimated timeframe for completion is 9 months.