Promotion on Information Security Certification Programs

Size: px
Start display at page:

Download "Promotion on Information Security Certification Programs"

Transcription

1 Promotion on Information Security Certification Programs Wan S. Yi Ph.D., CISSP. ISC2 APAC Korea Internet & Security Agency

2 1 KISA Introduction 2 Certification Concept 3 Certification

3 Ⅰ. KISA Introduction

4 1. Introduction History History Korea Internet & Security Agency (merger of KISA, NIDA and KIICA) Korea IT International Cooperation Agency (KIICA) National Internet Development Agency (NIDA) Korea Information Security Agency (KISA) Responsibility Internet Development Information Security on Public and Private sector International Cooperation

5 2. Internet Security Framework Senior Secretary to the President for National Crisis Management National Intelligence Service Ministry of Science, ICT & Future Planning Ministry of National Defense Public Private National Defense National Cyber Security Center Korea Internet & Security Agency Military Cyber Command & Control Center

6 2. Internet Security Framework Cyber crisis response cooperation system Related organizations in Korea Responsible Organization Investigative Agency NIS MND Supreme Prosecutor s office National Police Agency Share incident analysis Raise public awareness and treat malicious codes Share malicious codes & analysis result, Remove zombie PC, Block C&C server access Related organizations abroad CERT abroad Organizations abroad FIRST APCERT MS Symantec McAfee FireEye Checkpoint Block malicious site, notify zombie PC and request treatment Share security incident information request to check failure of network Share malicious codes and produce dedicated vaccines KT LG U+ SK broadband Dreamline Onse telecom, 112 others IDC service provider (ex. KIDC) Control organization (ex. SK Infosec) Communications ISAC, finance ISAC IGLOOSECURITY AhnLab (V3) Security Global Alliance REDBC Hauri (Virobot) Eastoft(AlYac) SG advantec (virus chaser)

7 3. Mission Security Incident Prevention & Response Monitor internet network in Korea for abnormal signs 24/7 Check 2.3 million Korean websites for malicious codes Inspect information security vulnerability and take measures for protection Information protection inspection on ICT service providers Make remote inspection on website vulnerability and take protection measure Operate KrCERT for rapid response of cyber security incident and cooperate at home and abroad Cyber exercise for security incident response with AP regional CERT and related agencies in Korea twice a year

8 3. Mission Information Security Protection Public Key Infrastructure(PKI) for user identification & authentication More than 32million people uses for e-trade, e-bank, stock exchange, public service, etc. Critical Information Infrastructure Protection 14 : 292 facilities are identified(99 are in private sector), 17 : targeting 400 facilities Information Security Product Evaluation CC Testing Facilities are evaluating against Common Criteria Information Security Management System(ISMS), G-ISMS 272 organizations received ISMS or G-ISMS Information Security Training & Education In-class, cyber range, on-line training on Financial security, Forensic, etc.

9 3. Mission Healthy Cyber Culture Run national campaign for healthy cyber culture Set up national association Established in August, 2010 With 65 organizations including the government, internet companies and private organizations Initiated campaign and signed a MOU for good replies for 100 days Korea Internet Star(KIS) Comprised of elementary and middle school students to lead healthy cyber culture Internet ethics education Educate teenagers, parents, teachers and children on internet ethics Produce and distribute Internet ethics B.I(Brand Identity) Develop and utilize character and logo song for Internet ethics to give impression on people

10 3. Mission Promote ICT Service Abroad Support ICT business to advance into the global market Global Market for Digital Convergence Roadshow, showcase, government consulting service Support ICT strategic items Items: Smart 4G, media contents, broadband, information protection, mobile TV, IPTV, etc ICT Expert Training Program (K-LINK: Korea-Global ICT Leaders Information Network) 12 courses, 330 trainees in 2013 Provide education for overseas experts (about 4,300 officials, 145 countries) since 1998 International conference and international organization activities WICS ITU-PP 14, Telecom World OECD World Bank

11 3. Mission 118 Call Center Run related to the Internet call center to provide consulting service Receive complaints and provide consulting service related to the Internet (hacking, virus, spam, PI disclosure) Q&A and counseling service for PI protection act Easy to remember, anytime/anywhere Call : free consulting service 24/7 the average number of call per day in 2011: 1,300 Website : Twitter & Facebook ID : kisa Illegal spam Personal information Hacking, virus Loss of certificate Others Connect to related agencies

12 Ⅱ. Certification Concept

13 1. Type of Certification Users C&C X DNS Internet ISP DDoS system At IX node ISMS Company PC Zombie PC Notebook Zombie Notebook Domain Security System ISP 6 Kr DNS ISP SME website Vul. Check for web site VoIP service provider 9개 VoIP service monitoring ISP Tablet PC Smart Phone Wireless network Security verification ISP DNS cyber shelter MC collection System Web hard, P2P App security system Mobile office, Cloud service provider ISMS Organization and companies CC Evaluation Information Security Products Professional Certification People Public Key Infrastructure Certificate Device and users

14 Ⅲ. Certification

15 1. ISMS - Objective Objective To secure stability in an information communications network and reliability of information by assessing the ISMS of a certain organization to determine whether or not it meets the certification criteria. Legal Background Created in 2001 and first certificate was issued in 2002 Until 2013, it was recommendation but became mandatory for companies sales over 10 million dollars a year or has one million visitors a day In 2014, 482 organizations and companies received certificates

16 1. ISMS - Definition Comprehensive system that ensures a consistent management and operation of information security, by putting proper procedures and processes in place. ㆍ Partialㆍ One time ㆍ Sporatic ㆍ Balanced ㆍ Sustained ㆍ Systematic <Security Level> <Security Level> Evaluated Level Evaluated Level Islanded Faci lity Equip ment Orga nizati on Doc. Policy Integrated Faci lity Equip ment Orga nizat ion Doc. Policy Without Management System With Management System

17 1. ISMS Who needs ISMS Bidding Companies participating in public or private bidding ISMS Major Assets Finance : Account, Transaction Info. Education : Student info. Medical : Diagnose Info. Communication : Customer info. Portal : Member info. Etc. : Industrial Tech. Info. External Audit Companies who needs IT management evaluation, credit evaluation or financial audit. Outsourcing Company Contracted companies to manage and operate customer s critical assets

18 1. ISMS - Criteria

19 1. ISMS - Procedure 1 certification application 2 pre-assessment and contract certification committee certification body 3 compose assessment team assessment team 4 certification assessment certification applicant 7 request to deliberate assessment result 6 certification assessment report 5 supplement deficiency 8 notify the deliberation result 9 issue certification

20 2. Information Security Product Evaluation - Overview Objective Gain global trust and reliability of IT security system Contribute to the realization of a sound information society Improve IT security level of national communication networks Improve international competitiveness of IT products Legal Background CC : Common Criteria for Information Technology Security Evaluation CEM : Common Evaluation Methodology for Information Technology Security CCRA : Arrangement on the Recognition of Common Criteria Certificates in the field of Information Technology Security

21 2. Information Security Product Evaluation - Overview Background Provide secure products, proven by 3 rd party, for the people to use to build safe and secure information society Evaluation Act of analyzing and testing of an IT product security against evaluation criteria using evaluation methodology Certification Act of oversight evaluation process and reviewing final evaluation report thus result in issuing certificate Accreditation Act of testing certified products in real environment and decide whether the product is suitable for operation or not

22 2. Information Security Product Evaluation Who needs CC Consumers - as a guide for the procurement of products with IT security features Product Developers and Integrators - as a basis for the development of products with IT security features Evaluators - as the basis for the evaluation of IT security products Auditors, Certifiers, Accreditors - to support their specific needs

23 2. Information Security Product Evaluation - Process Document Mission Phase 1 Definition SSAA Phase 2 Verification Regis tration Negotia tion No Agree ment Yes SSAA System Develop Revision Certi. Analysis Accept able ReanalysisNo Yes Ready For Eval. No Yes SSAA Phase 3 Validation SSAA Phase 4 Accreditation Eval & Cert. System Operation No Change Requir. Certify System Develop Recom. No Yes No Verifi cation Yes No Accredit ation Yes Yes 23

24 2. Information Security Product Evaluation - Process Apply for Validate Certification Maintain Evaluation Deliverables Board Certificate Review Validate TOE FR Issue Certificate Reevaluation deliverables Validate Register TOE in Sign Contract Vulnerability CL 24

25 2. Information Security Product Evaluation - CCRA 인증서발행국(CAP) : 17개국 ( 98) ( 98) ( 98) ( 98) ( 98) ( 99) ( 99) 미국 캐나다 영국 프랑스 독일 호주 뉴질랜드 ( 03) ( 06) ( 06) ( 06) ( 06) ( 08) ( 09) 일본 네덜란드 노르웨이 한국 스페인 스웨덴 이탈리아 ( 10) ( 11) ( 13) 터키 말레이시아 인도 인증서수용국(CCP) : 9개국 ( 00) ( 00) ( 00) ( 02) 그리스 핀란드 이스라엘 오스트리아 헝가리 ( 03) 체코 ( 04) ( 05) ( 06) ( 08) 싱가폴 덴마크 파키스탄 25

26 3. Information System Security Professional ISC2 (International Information System Security Certification Consortium) CAP Certified Authorization Professional CCFP Certified Cyber Forensics Professional CCSP Certified Cloud Security Professional CISSP Certified Information System Security Professional(#3) CCLP Certified Secure Software Lifecycle Professional HCISPP HealthCare Information Security and Privacy Practitioner SSCP Systems Security Certified Practitioner Information Security Professional National certification program

27 4. PKI Certificate Objective A system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. Security Services Threat Solution Root-CA Certificate Authority (CA) Authenticity Confidentiality Integrity Non-repudiation Unauthorized User Data Leakage Data Forgery Repudiation Digital Signature Encryption Digital Signature Digital Signature C Certificate R CRL Management Y T Operation O Management G Registration Authority (RA) R Registrarion A P Certificate Y Management P U B L I C K E Y Issue Revoke Renew Individual Corporation Server S/MiME

28 4. PKI Certificate u-authentication BIO OTP RFID/USN Environment Broadcasting Telecommunication Environment U-City Environment Certs. i-pin ID/Pass Internet Banking, Log-in SSL Server, ETC U-home Environment U-health Environment Human Device

29 4. PKI Certificate Framework

30 4. PKI Certificate Business Model(Banking)

31 4. PKI Certificate Business Model

32 4. PKI Certificate Oversea Cooperation

33 Conclusion and Q&A

Emerging issues on public information management. November 2011 Prof. Bae, Kyoung Yul Sangmyung University

Emerging issues on public information management. November 2011 Prof. Bae, Kyoung Yul Sangmyung University Emerging issues on public information management and information security November 2011 Prof. Bae, Kyoung Yul Sangmyung University 01 Introduction Contents 02 03 04 05 Digital Convergence Information Security

More information

KCC announces 'Comprehensive Plans for Smart Mobile Security'

KCC announces 'Comprehensive Plans for Smart Mobile Security' KCC announces 'Comprehensive Plans for Smart Mobile Security' - Promoting 10 key tasks in 3 fields to preemptively prepare for security threats and to develop Korea into a powerful nation of mobile security

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Current counter-measures and responses by CERTs

Current counter-measures and responses by CERTs Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Korea IT Security Evaluation and Certification Scheme

Korea IT Security Evaluation and Certification Scheme Korea IT Security Evaluation and Certification Scheme 2005. 9. 28 Korea Certification Body Dae Ho, Lee Agenda I KECS Introduction II Role and Responsibility of CB III Evaluation and Certification Procedure

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Korea s experience of massive DDoS attacks from Botnet

Korea s experience of massive DDoS attacks from Botnet Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

South Korea Information and Communication Industry

South Korea Information and Communication Industry South Korea Information and Communication Industry Compiled by: Swiss Business Hub Korea Seoul, August 2011 Korea s ICT industry is divided into the ICT equipment, telecommunications services and software

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

Since 1992, Total Solution Provider. Company Introduction. Samjung Data Service co., Ltd. http://www.sds.co.kr

Since 1992, Total Solution Provider. Company Introduction. Samjung Data Service co., Ltd. http://www.sds.co.kr Since 1992, Total Solution Provider Company Introduction Samjung Data Service co., Ltd. http://www.sds.co.kr Index 1. Overview 2. History 3. Organization 4. Business Area 5. Service Introduction 6. Acquiring

More information

Egyptian Best Practices Securing E-Services

Egyptian Best Practices Securing E-Services Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats

More information

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers

More information

Cyber Security and Critical Information Infrastructure

Cyber Security and Critical Information Infrastructure Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes

More information

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis , pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security

More information

Human and Institutional Capacity Building for Information Security

Human and Institutional Capacity Building for Information Security Human and Institutional Capacity Building for Information Security 2014. 10. 14 Wan S. Yi VP, Ph.D., CISSP Korea Internet & Security Agency 1 Need for Information Security 2 Current Status 3 Main Activities

More information

Security Assessment through Google Tools -Focusing on the Korea University Website

Security Assessment through Google Tools -Focusing on the Korea University Website , pp.9-13 http://dx.doi.org/10.14257/astl.2015.93.03 Security Assessment through Google Tools -Focusing on the Korea University Website Mi Young Bae 1,1, Hankyu Lim 1, 1 Department of Multimedia Engineering,

More information

Human Factors in Information Security

Human Factors in Information Security University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

FRAMEWORK for NATIONAL NETWORK & CYBER SECURITY

FRAMEWORK for NATIONAL NETWORK & CYBER SECURITY FRAMEWORK for NATIONAL NETWORK & CYBER SECURITY 23 September 2009 1 06-02-200906.02.2009 Ram Narain Email: ramnarain@hotmail.com 7 Tier Approach to Network & Cyber Security 5 levels of Security Tier 1

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager Helmi.rais@ansi.tn

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager Helmi.rais@ansi.tn Fast overview about the CERT-TCC Helmi Rais CERT-TCC Team Manager Helmi.rais@ansi.tn Les IT en Tunisie: Quelques Statistiques Les IT en Tunisie: Quelques Statistiques a fast Historical Overview end 1999

More information

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia helmi.rais@ansi.tn helmi.rais@gmail.com Framework

More information

Safe Internet, Happy Future!

Safe Internet, Happy Future! Safe Internet, Happy Future! CONTENTS Chapter 1 National Information Security System of Korea 1 Chapter 2 Information Security Legal/Institutional Framework 5 Sec. 1 Sec. 2 Sec. 3 Sec. 4 Sec. 5 Laws/Regulations

More information

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators Profile MicroSolved, Inc. is an Ohio corporation with a Dun and Bradstreet number of 022904119. Since 1992, MSI has

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea shkim@kaist.ac.kr

More information

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Introduction of the GCCD. (Global Cybersecurity Center for Development) Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD

More information

I. Multilingualization of the Internet Including Internationalized Domain Names

I. Multilingualization of the Internet Including Internationalized Domain Names Q1. What action have been undertaken or to be undertaken by governments in relations to each of the international Internet-related public policy issues identified in Annex 1 to Resolution 1305? The activities

More information

Achieving the creative economy and citizens happiness through informatization

Achieving the creative economy and citizens happiness through informatization National IT Policy Group e-government Group ICT Service Policy Division Achieving the creative economy and citizens happiness through informatization Smart Network Division Digital Culture Division Digital

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Secure Authentication for the Development of Mobile Internet Services Critical Considerations Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s

More information

Result of the Attitude Survey on Information Security

Result of the Attitude Survey on Information Security Presentation Result of the Attitude Survey on Information Security Conducted toward the companies Operating in Thailand February, 2009 Center of the International Cooperation for Computerization of Japan

More information

About Botnet, and the influence that Botnet gives to broadband ISP

About Botnet, and the influence that Botnet gives to broadband ISP About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology

More information

Accredited Certification Services on Cloud Environment. SungEun Moon KOSCOM mse@koscom.co.kr. 17 September, 2012

Accredited Certification Services on Cloud Environment. SungEun Moon KOSCOM mse@koscom.co.kr. 17 September, 2012 Accredited Certification Services on Cloud Environment SungEun Moon KOSCOM mse@koscom.co.kr 17 September, 2012 Index Existing Accredited Certificate Use and Enhanced Security Measure Accredited Certificate

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

A Study on Information Technology Plan and Status of University 2013

A Study on Information Technology Plan and Status of University 2013 , pp. 47-54 http://dx.doi.org/10.14257/ijseia.2014.8.10.05 A Study on Information Technology Plan and Status of University 2013 Tae-Yong Shim 1, Il-Jun Choi 2, Jin Kim 3 and Young-Hun Lee 4 1 Department

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Cyber Security ( Lao PDR )

Cyber Security ( Lao PDR ) ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Contents. The Genesis of i-pin. The Concept of i-pin & Integrated IDM. The Trust Foundation of i-pin. The Function of i-pin. The Future of i-pin

Contents. The Genesis of i-pin. The Concept of i-pin & Integrated IDM. The Trust Foundation of i-pin. The Function of i-pin. The Future of i-pin i-pin Service (internet-personal Identification Number Service) Identity Management across the Public and Private Sectors in Korea 1 Contents The Genesis of i-pin The Concept of i-pin & Integrated IDM

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Recent Researches in Electrical Engineering

Recent Researches in Electrical Engineering The importance of introducing Information Security Management Systems for Service Providers Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis**** * Faculty of Electrical Engineering

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup. Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services

More information

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY Security Services Identify and reduce risks The reliable protection of your assets information, workforce,

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment , pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer

More information

Fujitsu s Approach to Cloud-related Information Security

Fujitsu s Approach to Cloud-related Information Security Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

Security Forensics Training

Security Forensics Training Security Forensics Training Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber

More information

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering

More information

Cyber Security a Global Challenge; What and how Thailand is doing

Cyber Security a Global Challenge; What and how Thailand is doing Cyber Security a Global Challenge; What and how Thailand is doing Pansak SIRIRUCHATAPONG Executive Director National Electronics and Computer Technology Center February 19, 2009 1 Global IT Security Market

More information

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

A Study on User Access Control Method using Multi-Factor Authentication for EDMS , pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

Korea s s Approach to Network Security

Korea s s Approach to Network Security Korea s s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1 Contents Advancement in the Information Society and New Threats Information Infrastructure

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS Minnesota Department of Commerce July 2014 GENERIC FIRM INFORMATION Has your firm been the subject of a cyber-security

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

Challenges and Opportunities in Fostering Value Creation and Convergence of Digital

Challenges and Opportunities in Fostering Value Creation and Convergence of Digital Challenges and Opportunities in Fostering Value Creation and Convergence of Digital 2015. 8. 27 Wan S. Yi Ph.D., CISSP, ISMS, ISC2 APAC Korea Internet & Security Agency Professor/Lecturers Name: Wan S.

More information

Information security education for students in Japan

Information security education for students in Japan Information security education for students in Japan Introduction This article aims to introduce the current situation of elementary and secondary school education on information security in Japan, as

More information

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated

More information

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim tkkim@stu.ac.kr

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim tkkim@stu.ac.kr Mobile Security Framework; Advances in Mobile Governance in Korea TaeKyung Kim tkkim@stu.ac.kr I. e-banking in Korea 1. e-banking? BIS (Bank for International Settlements) - e-finance(electronic banking)

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES (ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES 2015 (ISC)² CPE Policies & Guidelines (Rev. 10, April 21, 2015) 2015 International Information Systems Security Certification Consortium,

More information

The Information Security Problem

The Information Security Problem Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013 Ponemon Institute Research Report

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

Protection of Essential Infrastructure and Services

Protection of Essential Infrastructure and Services Protection of Essential Infrastructure and Services NOR AZUWA MUHAMAD PAHRI CONSULTANT, MIMOS CONSULTING GROUP, MIMOS BERHAD azuwa@mimos.my Table of Content Introduction Reality of Cyber Attack Cyber Issues

More information

Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015

Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015 For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh Hanan.Abulebdeh@ed.gov System Owner: Ganesh Reddy Ganesh.Reddy@ed.gov Office of Federal Student

More information

THE HACKERS NEXT TARGET

THE HACKERS NEXT TARGET Governance and Risk Management THE HACKERS NEXT TARGET YOUR WEB AND SOFTWARE Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software ISC2 CyberSecurity Conference 09 Kuala

More information

Information Security Training & Awareness

Information Security Training & Awareness Online Training & Project Briefing Expectations & Responsibilities Information Security Manager s Forum, March 4, 2008 Revised September 20, 2010 (1) Why is awareness important? Obligation to protect private

More information

Exploring the Landscape of Philippine Cybersecurity

Exploring the Landscape of Philippine Cybersecurity Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright

More information

The detailed process of becoming a FIRST member is described at http://first.org/membership/.

The detailed process of becoming a FIRST member is described at http://first.org/membership/. FIRST Site Visit Requirements and Assessment Document originally produced by CERT Program at the Software Engineering Institute at Carnegie Mellon University And Cisco Systems PSIRT Revision When Who What

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

What is Management Responsible For?

What is Management Responsible For? What is Management Responsible For? Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf & Company, P.C Regional

More information

Capability Statement (Organizational)

Capability Statement (Organizational) Capability Statement (Organizational) Aspiryon, LLC. Email:info@aspiryon.net Web: www.aspiryon.net Summary of Services Aspiryon has been an award-winning provider of strategic staffing, technology and

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Computer Concepts And Applications CIS-107-TE. TECEP Test Description Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security LC Paper No. CB(1)2407/10-11(05) For Information on 13 June 2011 Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper informs Members about the progress

More information

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information