Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.

Slides:



Advertisements
Similar presentations
IGF Hyderabad 2008 Dimensions of Cyber Security & Cyber Crime Michael Lewis, Carnegie Mellon University & Deputy Director, Q-CERT.
Advertisements

Its a new digital world with new digital dangers….
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
Hanoi Plan of Action to implement the ARF Vision Statement.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
DHS, National Cyber Security Division Overview
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
National Election Commission, Republic of Korea. I. Why Do We Need an Association of the World Election Bodies ? II. The Role of the Association of the.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
CYBER CRIME AND SECURITY TRENDS
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Jeffery Graviet Emergency Services Coordinator, Salt Lake County Chairperson, Salt Lake Urban Area Working Group.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
BUSINESS B1 Information Security.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Resources to Support Training Programs for CSIRTs.
DPG HEALTH MEETING USAID CONFERENCE ROOM 6 NOVEMBER 2013 International Health Regulation (2005)
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
1 Korea’s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Mabito YOSHIDA Director, IT Security Office Ministry of Internal Affairs and Communications (MIC ) JAPAN November 25th 2004 Information Security Policies.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Recent Cyber Attacks and Countermeasures September 2006.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
NSF Cybersecuity Summit May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within the higher.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
Hurdles in implementation of cyber security in India.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
IFPRI INTERNATIONAL FOOD POLICY RESEARCH INSTITUTE Mutual Accountability and Joint Sector Reviews in the Implementation of CAADP Godfrey Bahiigwa – IFPRI/ReSAKSS.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CERT cooperation with ISP’s on Cybersecurity C ă t ă lin P ă trașcu CERT-RO 29 October 2015 RONOG 2 Meeting1.
Safe’n’Sec IT security solutions for enterprises of any size.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
The Practices of CERT -- Building National Computer Network Emergency Response Capability Mingqi CHEN CNCERT/CC APCERT APAN Bangkok.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
WISE 2017 Collaborating Communities
Systems Security Keywords Protecting Systems
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
U.S. Department of Justice
Intrusion Detection & Prevention
DSC Contract Management Committee Meeting
Presentation transcript:

Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus software A type of worm virus, malicious bot and Trojan combined Recent attacks are targeting specific groups rather than unspecific multiples

Cyber Attacks without boundary Spread of high-speed internet networks around the world Disguise of attacker’s location through a stop-over at 3rd country Heightened threats on critical infrastructures Concerns on attacks remotely controlled DDoS attacks exploiting Botnet Possibility of instant ripple effects to neighboring areas

Sharing cyber threat information with each other during ordinary times and preventing attack incidents In the case of a cyber attack incident, real time consultation on countermeasures and minimization of damage Pinpointing hackers through cooperative investigation among each country’s law enforcement Effective response only through international cooperation Effective response only through international cooperation

Enhanced acknowledgement about the seriousness of cyber terror threats among ARF participating countries Enhanced acknowledgement about the seriousness of cyber terror threats among ARF participating countries Agreeing upon the necessity of international cooperation for responding to cyber terror Agreeing upon the necessity of international cooperation for responding to cyber terror Building up mutual trust and drawing a variety of cooperation proposals Building up mutual trust and drawing a variety of cooperation proposals Absence of organization or a system to realize practical cooperation Absence of organization or a system to realize practical cooperation Accomplishments Limits

Regular committee composed of working-level experts against cyber terror Developing practical measures to enhance cyber security in the region Coordinating legal and systematic policies for a more effective response to cyber terrorism Serve as an official communication channel among countries

ARF seminar chair country or chair country hopeful Developing a detailed operation plan of the each sub-committee Managing official contact points of the participatings Proposing to hold a meeting among participating countries if necessary Submitting the results of consultation and meetings to the next ARF cyber terrorism seminar and ISM on CTTC

Promptly sharing information and responding with blocking the IP involved and other measures involved with cyber attacks Sharing the analyzed information on cases and cyber attack techniques and preventing similar cases from occurring Searching for legal countermeasures of law enforcement authorities against attackers Developing common response measures for new types of cyber attacks

Searching for ways to give technical support and advice on establishing a nationwide cyber terror response system (National CERT) Providing a training program enhancing response ability against cyber terror among ARF participating countries Building a cooperative system with an international cyber security network

Promoting joint research on countermeasures against new types of hacking techniques and technology sharing among participating countries Discussing the plan to construct an early warning system among ARF participating countries Developing a technology development roadmap for medium- long term cyber terror prevention

Selecting a Key Coordinating country Phase 1 Building up a cyber security network among ARF participating countries Phase 3 Composing an expert working group and sub-committees and promoting their operations Phase 2 Making a global community safe from cyber terror Making a global community safe from cyber terror Establishing a cooperative system with other international cyber security networks Phase 4