Recent Cyber Attacks and Countermeasures September 2006.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
T HE ROLE OF GOVERNMENTS AND STAKEHOLDERS IN THE ICT PROMOTION DEVELOPMENT.
Khammar Mrabit Director Office of Nuclear Security
GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Speaker: Tamar Shapatava
Security Controls – What Works
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
1 Case Study ESTABLISHING NATIONAL CERT By Saleem Al-Balooshi Etisalat - AE.
Overseas Security Advisory Council University of Washington OSAC Overview University of Washington International Health, Safety & Security Seminar March.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
National Cybersecurity Management System
UK Office for Security & Counter Terrorism Future threats and the potential role of the CBRN Action plan in supporting the BTWC Dr Catherine Terry International.
1 Kuwait Central Agency for information technology.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
Information Security Group DSD & E-Security DSD and E-Security Tim Burmeister Information Security Policy Defence Signals Directorate
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Korea Environment Institute KEI Introduction Government-sponsored research institute, under the Prime Minster’s office involved in policy development.
SEC835 Database and Web application security Information Security Architecture.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
InWEnt | Qualified to shape the future1 Capacity Development Programme in Industrial Disaster Risk Management Cooperation under the Programme on Advisory.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
Regional Seminar on Developing a Program for the Implementation of the 2008 SNA and Supporting Statistics İlknur YÜCE September 2013 Ankara - Turkey.
Cyber-security policy to encourage CSIRTs activities Yasuhiro KITAURA Ministry of Economy, Trade and Industry, JAPAN.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Safe’n’Sec IT security solutions for enterprises of any size.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
10 STEPS TO SET-UP A SUSTAINABLE TELECENTRE 16 September 2015 CAMBODIA.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
MCIT’s Human Resource Development Programs in ICT Ayman El-Dessouki Professional Training Program Supervisor MCIT Ministry of Communications & Information.
World Health Organization Department of Chronic Diseases and Health Promotion World Health Organization Strengthening Institutions: Indicators for Measuring.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Korea's Anti-Corruption Strategies and Experiences Korea's Anti-Corruption Strategies and Experiences 3 September 2013 Lee Sungbo, Chairman Anti-Corruption.
Society for Maintenance and Reliability Professionals (SMRP)
Application Of Cloud Computing On Cooperative Supply Chain Management
Cybersecurity, competence and preparedness
Joe, Larry, Josh, Susan, Mary, & Ken
Cert Store Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
NERC Cyber Security Standard
Cyber Security Culture
Community of Users.
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

Recent Cyber Attacks and Countermeasures September 2006

CONTENTS  B B B Basic Concept  C C C Cyber Attack Trends  C C C Countermeasure activities  F F F Future Plans

Basic Concept Potential factors and means Proactive actions Result of the attack Cyber Threat Cyber Attack Cyber Crisis Collection and analysis Detection and interception Countermeasures and management Countermeasures Characteristics

Cyber Attack Trends

Changes in IT Environment RFID, U-City, Ubiquitous, etc… e-Governmente-Government 2006 The rapidly growing dependence on the internet The rapidly growing dependence on the internet Second highest high-speed internet penetration in the world Second highest high-speed internet penetration in the world 33 million internet users (73%) 33 million internet users (73%) Advanced IT Network Advanced IT Network ~

Current Status of Cyber Intrusion Incidents 136,261 25,980 35,670 60% 37% 54, , ,000 40,000 60, Total Hacking (Unit: Case)

Trends of Cyber Attacks Advanced and Intelligent Methods of Attack Advanced and Intelligent Methods of Attack Security systems are disabled and used as a detour Security systems are disabled and used as a detour Shortened cycle Shortened cycle Major Damages Major Damages Advanced and Integrated IT Networks, Aggravated damages Advanced and Integrated IT Networks, Aggravated damages Different Purposes of Attack Different Purposes of Attack Curiosity & Showing Off → Financial & Information Theft Curiosity & Showing Off → Financial & Information Theft

Countermeasure Activities

National Cyber Security Management System Policy Adjustment NCSC Threat Information Analysis Information NetworkedOrganizationsDomestic and overseas CooperatingOrganizations National Cyber Security Strategy Council Private Public Military Countermeasure Technology Threat Information National Cyber Security Management Regulation (Presidential Directive No. 141)

Handling Cyber Crisis Create a Countermeasure Manual Create a Countermeasure Manual Include “cyber security” in the scope of national crisis management Include “cyber security” in the scope of national crisis management Specify countermeasure procedures for each warning level Specify countermeasure procedures for each warning level Integrated synthetic training for handling Cyber Crisis Integrated synthetic training for handling Cyber Crisis Develop virtual scenarios Develop virtual scenarios Verify the effectiveness of the manual and check to see if everyone is familiar with the procedures Verify the effectiveness of the manual and check to see if everyone is familiar with the procedures

Strengthening Cooperation Establish the ‘National CERT Council’ Establish the ‘National CERT Council’ Encourage the participation of professional organizations in security monitoring Encourage the participation of professional organizations in security monitoring Share threat information and technologies, and cooperate in handling cyber incidents Share threat information and technologies, and cooperate in handling cyber incidents Establish a ‘Cyber Security Council’ in Each Region Establish a ‘Cyber Security Council’ in Each Region Encourage the participation of regional government offices and high-tech businesses Encourage the participation of regional government offices and high-tech businesses Share security technologies and threat information Share security technologies and threat information

Entering into the CCRA (Common Criteria Recognition Arrangement) Background and Purpose Background and Purpose an information security round of advanced countries were organized an information security round of advanced countries were organized the use of internationally certified products were encouraged the use of internationally certified products were encouraged Join the arangement as a country that can issue a certificate (’06.5) Join the arangement as a country that can issue a certificate (’06.5) * CAP ( Certificate Authorizing Participants ) * CAP ( Certificate Authorizing Participants ) Promote the information security industry and improve its competitiveness Promote the information security industry and improve its competitiveness

Future Plans

Establishing an Information Sharing System AdministrationFinanceCommunicationEnergy Transportation Monitoring Center by Area Operation Center Main National Infrastructure Systems …….

Development of Technical Measures Take Security Measures regarding New IT Technologies Take Security Measures regarding New IT Technologies Ubiquitous Society, RFID (Radio Frequency Identification) tags Ubiquitous Society, RFID (Radio Frequency Identification) tags Develop Cyber Attack Detection Technologies Develop Cyber Attack Detection Technologies Study predictive methods based on statistics Study predictive methods based on statistics Develop new detection technologies and 3D visualization Develop new detection technologies and 3D visualization

Strengthening preventive activities Carry out ‘Cyber Security Assessment’ Carry out ‘Cyber Security Assessment’ Encourage government organizations to conduct security assessments on their own Encourage government organizations to conduct security assessments on their own Support customized security measures Support customized security measures Conduct Security Check-ups on major computing networks Conduct Security Check-ups on major computing networks For government organizations and high-tech businesses For government organizations and high-tech businesses Identify security holes and support security technologies Identify security holes and support security technologies

Promotion of Cyber Security Awareness Develop Cyber Security Training Programs Develop Cyber Security Training Programs Hold cyber security conferences for high-ranking government/corporate officials Hold cyber security conferences for high-ranking government/corporate officials Strengthen cyber security awareness programs for elementary and middle school students Strengthen cyber security awareness programs for elementary and middle school students Offer reward Money for Reporting Cyber incidents Offer reward Money for Reporting Cyber incidents Encourage citizens to report intrusion incidents and threat information Encourage citizens to report intrusion incidents and threat information

Thank you.  Phone : 