Pg 1 | Presentation Title Introduction to the PIMS Certification Scheme in Korea Presenter Heung Youl YOUM, PhD./Professor, TTA/Soonchunhyang University.

Slides:



Advertisements
Similar presentations
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
“Limiting electronic fraud through an Information Security Management System (ISMS): An Introduction to ISO 27001" Presented to the ICGFM Annual Conference.
Security Controls – What Works
Information Security Policies and Standards
Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Geneva, Switzerland, 14 November 2014 Data Protection for Public Cloud (International Standard ISO 27018) Stéphane Guilloteau Engineer Expert, Orange Labs.
First Practice - Information Security Management System Implementation and ISO Certification.
SOX & ISO Protect your data and be ready to be audited!!!
Session 3 – Information Security Policies
LegalTech Asia DATA PRIVACY LAWS UPDATE Edward Chatterton 4 March 2013.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
SEC835 Database and Web application security Information Security Architecture.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Recent Cyber Attacks and Countermeasures September 2006.
Various Stages of MiFID Implementation in Lithuania Tomas Talutis Lithuanian Securities Commission.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
Engineering Essential Characteristics Security Engineering Process Overview.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
ITU-T SG17 Q.3 Telecommunication information security management An overview Miho Naganuma Q.3/17 Rapporteur 17 March 2016.
Information Security Management Goes Global
Risk management.
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
ISO Smart and Sustainable Cities developments
Lecture 09 Network Security Management through the ISMS
Understanding EU GDPR from an Office 365 perspective
Learn Your Information Security Management System
Microsoft 365 Get help with regulatory compliance
Current ‘Hot Topics’ in Information Security Governance Auditing
Introduction to the Federal Defense Acquisition Regulation
GDPR Awareness and Training Workshop
General Data Protection Regulation
Information Security based on International Standard ISO 27001
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
ISO Smart and Sustainable Cities developments
ITU-T SG17 Q.3 Telecommunication information security management
How to conduct Effective Stage-1 Audit
Business Compromise and Cyber Threat
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Pg 1 | Presentation Title Introduction to the PIMS Certification Scheme in Korea Presenter Heung Youl YOUM, PhD./Professor, TTA/Soonchunhyang University Session Strategic Topic #3: Security & Privacy Document Name/Version GSC20_Session#8_Security_HeungYoul_TTA Rev 0 Submission/Revision date: 20 April

Recent major data leakage incidents in Korea Pg 2 |

Cyber threats landscapes in Korea DDoS APT Destructive attacks Internet portals Personal data leakage Resident registration number Internet operators Pg 3 |

Recent major PII leakage incidents (1/3)  April 17, 2011, Personal Information leakage incident against the KR’s financial institute.  Personal information leakage of 420,000 customers, including their name, , and cell phone information, was caused by a hacking.  First unprecedented systematic accessing of customer financial information by hackers in Korea.  July 26, 2011, Major portal’s personal information leakage.  Personal information of its 35 million online users had been hacked.  A leakage of customers’ information took place due to hacking on July 26, 2011  Personal information of users’ name, phone numbers, , resident registration numbers and passwords was leaked. Pg 4 |

Recent major PII leakage incidents (2/3)  November 26, 2011, Personal information leakage against the online game site.  The personal data of 13.2 million subscribers was leaked from the online game site.  The password and the resident registration number are encrypted  Presumably, originated from a malicious code in China.  January 19, 2014, major credit card data leakage incidents.  Disclosed by the Korea Prosecutors’ Office on January 19, 2014  Victims: three local credit card companies, the K* Card, the L* Card and the N* Card  Who stole personal data: An employee of the subcontractor, suppliers of credit companies, who had been dispatched to upgrade the fraud detection systems of three credit card companies.  Volume of personal data leaked : 104 million pieces of cardholders’ personal and financial information. Pg 5 |

Recent major PII leakage incidents (3/3)  March 6, 2014, Personal data leakage against the Internet service operator’s website.  Personal data of 9.81 million customers leaked between last August 2013 and February 2014 in a hack on its website: the vulnerabilities of the operator’s web site were exploited to steal the personal data of customers.  Three suspects, including a telemarketer, were arrested for allegedly hacking into the company’s website and stealing the personal data of 9.81 million clients of the mobile carrier.  The leaked personal data included names, resident registration numbers, places of employment, and bank account details.  fined with 85 million won ($83,650) by the Korea Communications Commission (KCC) for personal data being leaked. Pg 6 |

ISMS/PIMS certification systems Pg 7 |

Overview of ISMS/PIMS certification  There are two types of management systems in Korea: ISMS and PIMS.  ISMS certification was put into force in 2001, while PIMS was put into force in  Legal grounds:  The ISMS and/PIMS are based on Article 47 (Certification of information security management system) in ‘Act on the Promotion of Information and Communication Network Utilization and Information Protection, etc.  Mandatory ISMS certification requirements for sizable enterprises, was enforced since  Local standards and criteria compatible with ISO/IEC  The ordinance of MSIP for ISMS certification and KCS for PIMS certification that aim to help organizations improve the safety and reliability of their information networks.  KCS.KO , Personal information management system Pg 8 |

ISMS Criteria Business Continuity Management Education and Training Asset Identification Classification Organization Security Policy Outsider Security Personnel Security Physical Security System Security Cryptographic control Access Control Operational Mgt. e-commerce Security Incident Handling Review/Monitoring/Audit Information Security Mgt. Process [Five process, 12 requirements] Countermeasures[13 areas,104 controls] ISMS Life Cycle Defining Scope Information Security Policy Risk Management Implementation Follow-up ISMS criteria (set forth in the Ordinance of MSIP and TTA standard) Pg 9 |

PIMS Criteria Technical protective measures Physical protective measures Collection Use and transfer Management and disposal Classification of personal information Education and training Personnel security Infiltration incident handling and response procedures Infiltration incident handling and response procedures Internal review and audit Privacy policy Privacy organization Policy makingScope setting Risk management ImplementationMaintenance Lifecycle of PIMS Protective measures PI Lifecycle Defines management process for personal information protection. Management process Defines managerial, technical and physical protection measures for PI. Technical and organizational Safeguards Technical and organizational Safeguards Defines privacy controls meeting legal requirements for each lifecycle stage, from generation to disposal of PI. PI lifecycle protection PIMS criteria (set forth in ordinance and KS standard) Criteria (Max. 86) Pg 10 |

ISMS/PIMS certification governance MSIP/KCC/MoI Upgrade laws and regulations & enforce policies Support budget for ISMS/PIMS Certification Authority Accept the application Develop certification criteria and guidelines Recruit certification assessors Issue/manage certificates Operate pools for the certification committee and certification assessors Offer technical advice Conduct follow-up assessment Certification Committee Approve the results of assessment Review the feasibility of the certification cancelled Consist of about 10 experts from the academia, institutes, law firms, etc Assessment Authority/Team Perform certification assessment Write report of assessment  To check if the ISMS/PIMS implemented by the enterprises comply with the criteria set forth in the ordinance. Pg 11 |

Certified organizations  As of April 2016, 410 organizations have obtained ISMS certification from KISA.  1(2002), 2(‘03), 1 (‘04), 3(‘05), 0(‘06), 5(‘07), 8(’08), 8(‘09), 8(’10), 5(‘11), 11(‘12), 118(‘13), 174(‘14), 52(‘15), 14(‘16) 60 organizations have got PIMS certification.  2(‘11), 7(’12), 11(‘13), 7(‘14), 14(‘15), 19(‘16)  The number of certified organizations for ISMS/PIMS is expected to increase in Pg 12 |

Ready for the global PIMS certification scheme Pg 13 |

WGs area in ISO/IEC JTC 1/SC 27 WG 5 Identity Management & Privacy Technologies WG 1 ISMS WG 4 Security Controls & Services WG 2 Cryptography & Security Mechanisms WG 3 Security Evaluation Product System ProcessEnvironment Techniques Guidelines Assessment Pg 14 |

Study Period on PIMS (JTC 1/SC 27)  The outcome of the joint WG1/WG5 Study Period on PIMS agreed at its Rome October 2012 SC27 meeting :  not to develop a privacy specific management system, but to use the ISO/IEC information security management, even in the privacy specific context;  to develop a standard (ISO/IEC 27009) that explains how to create and use specific standards in the ISO/IEC framework (including privacy, cloud computing, telecom...) for certification purposes;  to develop a standard (ISO/IEC 29151) that provides a set of PII protection controls for the only PII controllers. Pg 15 |

ISO/IEC (from ISO/IEC DIS 27009) Pg 16 |

ISO/IEC DIS Additional PII-specific implementing guidance  Security policy  Organization of information security  Human resources security  Physical and environmental security  Communications and operations management  Access control  Information systems acquisition, development and maintenance  Reporting security weaknesses  Business continuity management  Compliance ITU-T X.gpim | ISO/IEC Controls for :  Security policy  Organization of information security  Human resources security  Physical and environmental security  Communications and operations management  Access control  Information systems acquisition, development and maintenance  Reporting security weaknesses  Business continuity management  Compliance ISO/IEC Annex A: An extended set of PII-specific controls meeting the ISO/IEC principles:  Consent and choice  Purpose legitimacy and specification  Collection limitations  Data minimization  Accuracy and quality  Openness, transparency and notice  Individual participation and access  Accountability  Information security  Privacy compliance Pg 17 |

Global PIMS certification (proposed) ISO/IEC (Security controls ) ISO/IEC (Requirements for MS) NWIP (at April 2016 SC27 meeting) (Additional requirements for Privacy specific MS) ISO/IEC DIS (PII protection controls) ISO/IEC (Requirements for MS) ISO/IEC (Security controls) PIMS ISMS Security risk treatment Security + privacy risks treatment Pg 18 |

Concluding remark Pg 19 |

Concluding remark  Challenges for PII protection  Data leakage incidents are growing.  Increasing need for data transfer across the borders.  Need to provide confidence of level of PII protection of the organizations who wish to receive data transferred across the border.  Comprehensive solution: the PIMS certification.  International standards for the global PIMS certification ready by April  ISO/IEC 27001:2013, ISO/IEC 27002:2013, ISO/IEC 27009:2016  ITU-T X.gpim | ISO/IEC DIS (April, 2016)  NWIP for additional requirement for PIMS (agreed NWIP at April 2016 Tampa SC27 meeting) Pg 20 |

Thank you very much. hyyoum at sch.ac.kr Pg 21 |