Jinhyun CHO Senior Researcher Korea Internet and Security Agency.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Assignment 2 Farid Sharifi Fishbowl Enabler Software Wireless Carrier Store s Technology Smart Phone Data Enjoyment Privacy Income Habits.
Capacity Development Workshop on Public Information Management System and Policy in Korea on cyber attacks Jeong Min, Lee KISA.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Marketing of Information Security Products. The business case for Information Security Management.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Framework for development of national ICT R&D sector Milan Zdravković Innovation Center for Information Technologies Milan Zdravković Innovation Center.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Cyber Security & Fraud – The impact on small businesses.
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The Changing World of Endpoint Protection
ESME -introducing the small e to business Teppo Sulonen Senior consultant.
Recent Cyber Attacks and Countermeasures September 2006.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
FFIEC Cyber Security Assessment Tool
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Cybersecurity Test Review Introduction to Digital Technology.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
MIS323 – Business Telecommunications Chapter 10 Security.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
Securing Information Systems
E&O Risk Management: Meeting the Challenge of Change
Cybersecurity in the ECOWAS region
Ⅰ Ⅱ Contents Company Introduction Business Overview
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Securing Information Systems
Miyeon Yoon, Korea Internet & Security Agency
DhakaCom Bangladesh Cyber Security Status Global Perspective Mohammad Fakrul Alam dhakaCom Limited fakrul [at] dhakacom [dot] com
Presentation transcript:

Jinhyun CHO Senior Researcher Korea Internet and Security Agency

Security Incident Prevention and Response : 24/7 Situation Room to Respond Security Incidents : Incident Handling including Mobile/ SPAM Privacy Protection : PI Breach Reporting and Consultation : Removal of PI exposed on Websites Information Security Internet Promotion Creating a Healthy Internet Culture : Customized Internet Ethics Education Promoting Internet Business : Finding and Supporting New Quality Ventures Managing Internet Address Resources : Managing.kr domains(.kr registry) Supporting Foreign Expansion of ICT Businesses : Export Counselling, SME Consulting Cooperation with International Organizations : OECD, World Bank : Cyberspace Conference(2013), ITU PP(2014) Int’l Cooperation Policy Research and Survey Analysis : Internet Issue Research and National ICT Statistics Supporting Improvement of ICT Legal Frameworks : Supporting the Enactment of New Act like Cloud Act : Analyzing and Researching Emerging Legal Issues Policy Research

Cyber Terror on Broadcasting Stations and Banks Coordinated Attack with H-Hour : 14:00(GMT+9) Service Disruption : 3 BS and 2 Banks Affected More than 40,000 computers Destroyed (HDD Erased) Clients, Servers, and even ATMs Infected with Malware Malware Distribution Path : Vaccine Update Server Improper Security Management : Serious Security Holes March 20 Cyber Terror

Multiple Cyber Attacks : 69 Organizations Affected Web Defacement : Blue House and 43 Private Web DDoS on Integrated Government Infrastructure Destruction of Computers in Mass Media Companies Coordinated and Sophisticated Attack Attack Scale & Methods ( Web Hard Client Program ) Attribution : Who is Behind the Attack? June 25 Cyber Attack

More than 100 Mil. Card holders’ PI Leaked K CCV : 53 Mil., L CCV : 26 Mil., N CCV : 25 Mil. Including RRN, Address, Financial Status, and etc. Internal Employee of Credit Rating Company Involved Counterfeit Prevention System Development Program PI Leaked with USB Thumb Drive (No Policy or Encryption) Leaked to Loan Advertisers and Loan Brokers Serious Financial and Legal Threats to Credit Card Vendors? From Credit Card Vendors

12Mil PI Leaked through Homepage Hacking Brutal Force Attack with Billing Information Sophisticated Hacking Vs. Trial and Error (?) Security Policy for Multiple Attempts from One IP(?) Leaked PI used to Advertise and Sell Mobile Phones Customized Information for Those Who Need a New Phone 3 or 4 Phones Sold to Over 150 Phones Sold After Breach Similar Incident Occurred 2 years ago From Mobile Service Provider

Nat’l Cybersecurity Comprehensive Countermeasures BH takes the Lead in Major Cybersecurity Incidents NIS : Working-level Coordinator MND for Military Sector and MSIP for Private Sector PCRC Strategy P(Prompt) : Concurrent Situation Notification Framework C(Cooperative) : Cyberthreat Information Sharing System R(Robust) : CII Designation Increased (Around 400 in 2017) C(Creative) : Supporting 10 Key Security Technology

Financial PI Breach Prevention Countermeasures Protection of Financial Consumer Right Minimum PI Collection and Self Determination Clear and Strong Responsibility Annual Reporting on IS & Penalty ( Up to 3% of Sale) Strong Response to Security Incidents Network Separation and RRN Encryption Prevention of Potential Breaches Destruction of Collected PI

Gov (MSIP) R&D Plan for Information Security until 2017 Vision Establish Secure & Trustworthy Creative Society Safety Network Objectives Global Market Share : 2.4%(2012) to 3.0%(2017) 1 st Class Tech. : 79.9(2013) to 90%(2017) Competitiveness : Supporting 10 best IS Products R&D Focus in 2014 : Incident Response & Wireless IDS

Cybersecurity Research Center University and KISA Cooperation Joint Project to Educate and Train Cybersecurity Experts KISA : Provide the state-of-art information and technology Area : Vulnerability and Malware Analysis Providing Working Experiences in the Real Envirnoment 2 Centers to Be Selected Open to Graduate School of Information Security