Korea s s Approach to Network Security

Size: px
Start display at page:

Download "Korea s s Approach to Network Security"

Transcription

1 Korea s s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1

2 Contents Advancement in the Information Society and New Threats Information Infrastructure Protection Act Information Infrastructure Protection Framework Incident Prevention and Response Other Activities Future Policy Direction 2

3 Advancement in the Information Society and New Threats 3

4 Rapid Growth in in Information Society World s Best Info-Communication Infrastructure and Dramatic Increase of Internet Users Connect Every Region of the Country with Info-Super-highway Approximately 25 Million Internet Users (Dec. 2001) Users (in thousands) Percentage of Users 9,433 16,403 19,045 24, More than 7.8 Million Broadband Subscribers (Dec. 2001) 4

5 Importance of of the Information Infrastructure Increased Dependency on IT Systems E-Government E-Business E-Education E-Healthcare, etc. Increased Interdependency National Administration Network, Korean Education Network, Online Banking, Electronic Commerce, etc. 5

6 Challenges & Threats to to the Information Society Hacking and Computer Virus Viruses, Trojan Horses, Logic Bombs, Internet worm Manipulation or Destruction of Operating Systems, Application Software or Data Manipulation by Insiders Manipulation of Communication Links Information Warfare, etc. < Hacking & Computer Virus Incidents in '99 - '01 > 70,000 65,033 60,000 50,000 40,000 30,000 39,348 50,124 hacking incidents Computer Viruses incidents 20,000 10,000-5, , ? 2000? 2001? 6

7 Information Infrastructure Protection Act 7

8 Legislation ( Background I ) MIC Director General for Information Security Cyber Crime Investigation bodies in Public Prosecutors office Internet Crime Investigation Center, SPPO Computer Crime Investigation Squad in 20 District PPO KNPA Cyber Terror Response Center MoD, NIS, MoGHHA, etc Korea Information Security Agency, etc 8

9 Legislation ( Background II II ) Facilities protected by Diverse Laws in each Sectors Focused on Physical Protection Insufficient Counter-Measures against Cyber-Attack Outbreak of Cyber-Attacks on Internet Web-sites DoS Attack on Yahoo, CNN, e-bay, etc. (Feb. 2000) Enormous Econo-Social Damage due to Cyber-Attack Need for Overall Info-Communication Infrastructure Protection Initiatives 9

10 Information Infrastructure Protection Act ( ( 1 ) ) Developments Ministerial Meeting on the Prevention of Cyber-Terrorism (Feb. 2000) Decided to Legislate a Law covering Comprehensive and Systematic Information Infrastructure Protection and Counter Measures against Cyber-Terrorism Legislation Committee (Feb to Dec. 2000) Enactment of Information Infrastructure Protection Act (Jan. 2001) Effective from July 2001 Framework for II Protection 10

11 Information Infrastructure Protection Act ( ( 2 ) ) Outlines Establish Governmental Framework for Information Infrastructure Protection Committee on Protection of Information Infrastructure CII Related Ministries Infrastructure Management Bodies Protection Measures Selection and designation of CII Vulnerability Assessment => Protection Measures & Plans 11

12 Information Infrastructure Protection Act ( ( 3 ) ) Outlines (Cont.) Prevention & Response Prevention : Security Guideline, Protection Measures Response : Security Warning, Recovery Technical Support Development of Technologies International Cooperation Severer Punishment for Cyber Crimes against II 12

13 Information Infrastructure Protection Framework 13

14 Overall Government Protection Framework ( 1 ) Committee on the Protection of Information Infrastructure Chair : Prime Minister Members : Ministers related to CII Mission : Deliberation and Coordination of Selection of CII and Security Plans and Policies Ministers related to CII Designation of CII, Establishment of Security Plan Security Guidelines, Demand/Recommendation of Security Measures 14

15 Overall Government Protection Framework ( 2 ) CII Management bodies Vulnerability Assessment, Security Measures Cyber Incidents Prevention and Response Technical Supporting bodies Accredited Vulnerability Assessment bodies KISA ETRI Information Security Consulting Service Providers Technical support in vulnerability assessment, Security Measures Implementation, Prevention and Response 15

16 Designation of of CII ( 1 ) Information Infrastructure Electronic Control and Management Systems Information Systems and Communication Networks, etc. Critical Information Infrastructure Have Major Impact on National, Economic and Social Security Designated by Ministers through Committee on the Protection of Information Infrastructure 16

17 Designation of of CII ( 2 ) Criteria for Selection Importance of its Service to the People and Nation Reliance on CII in Performing its Missions Interconnection with other Information and Communication Infrastructures Scope of Impact on the Defense or Economic Security High Incidence, Difficulties of Efforts Needed for the Restoration 17

18 Vulnerability Assessment Who CII Management Body When How Within 6 Months after the Designation of CII Re-Assessment in Every Other Year Assessment by Infrastructure Management Body by assistance of Technical Supporting bodies Technical Supporting bodies KISA, ETRI, Information Security Consulting Service Provider 18

19 Plan & Measures for Protection Infrastructure Management Body After the Assessment, Develop Security Measures Submit Security measures to the Ministry Concerned Ministries Combine Individual Infrastructure Protection Measures to form a Security Plan under their Jurisdiction Committee on the Protection of Information Infrastructure Review and Coordinate Security Plans Developed by Ministers 19

20 Support ( 1 ) Korea Information Security Agency(KISA) Develop and Disseminate Information Security Guideline Used by Infrastructure Management Bodies and Industries Vulnerability Assessment Develop Security Measures, Provide Technical Support for Prevention and Recovery Develop and Disseminate II Security Technology 20

21 Support ( 2 ) Information Security Consulting Service Provider(ISCSP) Authorized by MIC to Provide Consulting Service regarding Vulnerability Assessment and Security Measure on CII Designation Requirements More than 15 Qualified Technical Engineers Capital greater than 2 Billion KRW (USD 1.5 M) Equipments provided in Presidential Decree 21

22 Support ( 3 ) Information Sharing and Analysis Center(ISAC) Prevention and Response to Incidents in Specific Sectors such as Financial or Telecommunication Mission Real-Time Warning and Analysis on Incidents Provide Information on Vulnerabilities and Countermeasures Vulnerability Assessment if Accredited by MIC Telecommunication ISAC established, Financial ISAC to be formed soon 22

23 Incident Prevention and Response 23

24 Incident Response Incident Response and Recovery ( 1 ) Self Response by Infrastructure Management Body Report to Minister, KISA or Investigation Offices If Necessary, Request for Technical Assistance from Technical Supporting bodies such as KISA, ETRI For Large Scale Incidents, Establish Temporary Incident Response Headquarters 24

25 Incident Response and Recovery ( 2 ) Recovery Prompt and Necessary Steps to Restore and Protect CII If necessary, Request for Technical Assistance from KISA International Cooperation Share Information on Vulnerability and Incident Responses (FIRST, APSIRC, etc) Collaborative Incident Investigation 25

26 Incident Response and Recovery ( 3 ) Incident Response Headquarters Established Temporarily, When Large Scale Incidents occurs, by the Chairman of the Committee on the Protection of Information Infrastructure Mission Emergency Response, Technical Assistance and Recovery Members Chief : Appointed by the Chairman(the Prime Minister) Members : Government Officers from the CII related Ministries, Civil Specialists for IT Security 26

27 Offences and Penalties Disrupt, Paralyze and Destroy Critical Information Infrastructure by Unauthorized Access to CII, or Fabrication, Destruction, etc., in excess of his or her authority. Installation of Malicious Programs/Code Denial of Service Attack => Imprisonment for 10 Years or a Fine of 100 Million Won Incidents against Ordinary Information Systems Imprisonment for 5 years or a fine of 50 Million Won 27

28 CII Protection related Activities Nov. 2001, 9 Companies were Accredited as ISCSPs Dec. 2001, First Meeting of the Committee on Protection of the Information Infrastructure Meeting Designated 23 Infrastructures under 4 Ministries as CIIs MIC, MoGAHA, MoFA, MoHW First half of 2002 Vulnerability Assessment and Development of Security Measures for CIIs under way Develop Security Plans for nd Designation of CIIs(Financial, Industrial Support Sectors) 28

29 Other Activities 29

30 Other Activities ( 1 ) Prevention and Awareness Program(MIC, KISA) Operation of Anti-Hacking & Virus Consulting Center Remote Vulnerability Assessment Anti-Hacking & Virus Day (15th of Every Month) Develop & Disseminate Security and Response Guidelines Education & Training for Managers(Schools, PC Room, Small & Middle Sized Companies) Early Warning & Alert System (e-was) (being developed) 30

31 Other Activities ( 2 ) Develop Cyber-Terror Prevention Technology E-WAS and Secure Messenger Real-Time Scan Detector(RTSD) Develop Vulnerability Assessment and Intrusion Detection Tools => Build Vulnerability DB Foster Industry Develop and Disseminate Information Security Technologies Information Security Industry Support Center(Test-Bed) 31

32 International Cooperation Other Activities(3) Participate in International Meetings including OECD, APEC, ITU Measures for Enhancing Information and Network Security Exchange of information with Regard to Policies and Practices Frameworks for Security Information Sharing Raise Awareness of Security by Education & Training Cross-border Information sharing on Incidents and Responses Promotion of International Cooperation on Cyber-Terror Prevention Technologies Cooperation on Cyber-Terror Investigation 32

33 Future Policy Direction 33

34 Future Policy Direction Continue to Improve and Develop Information Security Management Framework for II R&D on II Security Technologies Enhance Level of Information Security in Public / Private Sectors Strengthen International Cooperation Activities Global Leader, e-korea Global Leader, s-korea 34

35 Well begun is half done! 35

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Introduction of the GCCD. (Global Cybersecurity Center for Development) Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

Trends and Tactics in Cyber- Terrorism

Trends and Tactics in Cyber- Terrorism Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends

More information

Safety & Security: Cyber Security

Safety & Security: Cyber Security Introduction to Homeland Security Chapter 5 Part III Safety & Security: Cyber Security Information Security and National Network Infrastructure Security Information Security: Techniques used to protect

More information

THE CURRENT SITUATION AND COUNTERMEASURES TO CYBERCRIME AND CYBER-TERROR IN THE REPUBLIC OF KOREA

THE CURRENT SITUATION AND COUNTERMEASURES TO CYBERCRIME AND CYBER-TERROR IN THE REPUBLIC OF KOREA 139TH INTERNATIONAL TRAINING COURSE RESOURCE VISITING MATERIAL EXPERTS SERIES PAPERS No.79 THE CURRENT SITUATION AND COUNTERMEASURES TO CYBERCRIME AND CYBER-TERROR IN THE REPUBLIC OF KOREA Junsik Jang

More information

DATA PROTECTION LAWS OF THE WORLD. India

DATA PROTECTION LAWS OF THE WORLD. India DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

CYBER SECURITY IN INDIA

CYBER SECURITY IN INDIA CYBER SECURITY IN INDIA Introduction In the last couple of decades India has carved a niche for itself in the field of Information technology. Optimization of Information technology in Banking, Defence,

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

Current counter-measures and responses by CERTs

Current counter-measures and responses by CERTs Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of

More information

Using big data analytics to identify malicious content: a case study on spam emails

Using big data analytics to identify malicious content: a case study on spam emails Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime

More information

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.

More information

Attachment G.18. SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change. 03 July, 2015

Attachment G.18. SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change. 03 July, 2015 Attachment G.18 SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change 03 July, 2015 Table of contents 1 Executive summary... 3 2 SA Power Networks Original Proposal... 11 2.1 Summary...

More information

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning Global Cybersecurity Center for Development Korea Internet & Security Agency Ministry of Science, ICT and Future Planning Contents Ⅰ Background Ⅱ Vision Ⅲ Roles and Responsibilities Ⅳ Partnership Plan

More information

Korea s experience of massive DDoS attacks from Botnet

Korea s experience of massive DDoS attacks from Botnet Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview

More information

Network Security in Vietnam and VNCERT. Network Security in Vietnam and VNCERT

Network Security in Vietnam and VNCERT. Network Security in Vietnam and VNCERT Network Security in Vietnam and VNCERT 1. Information Security Problems 2. Legal and Law 3. Plan for establishing VNCERT 4. Cooperation Network Security in Vietnam and VNCERT Information Security Problems:

More information

Future of the Internet Cyber Security

Future of the Internet Cyber Security Future of the Internet Cyber Security Issue Leader (Asia/Oceania): Shigemi Tamura Chairman Tokyo Electric Power Company (TEPCO) November, 2003 Implementing a Culture of Security New issues in cyber security

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the Proposed Cyber Security Information Act of 2000. Testimony

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the Proposed Cyber Security Information Act of 2000. Testimony GAO United States General Accounting Office Testimony Before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives For Release

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

How To Protect Information Security In Japanese Government Computers

How To Protect Information Security In Japanese Government Computers Study on the Current Situation of Information Security in Cambodia Hitoshi ARAKI JICA Expert Needs of Information Security Use of the Internet is essential and indispensable for any business nowadays;

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea shkim@kaist.ac.kr

More information

Nationwide Cyber Security Survey

Nationwide Cyber Security Survey Research Nationwide Cyber Security Survey Presented by Harris Poll Executive Summary: Cyber-Security Cyber-security is a low priority for many because the threat is not palpable Eight in ten (79%) have

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Cyber Security ( Lao PDR )

Cyber Security ( Lao PDR ) ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts

More information

Cyber Security Threats and Countermeasures

Cyber Security Threats and Countermeasures GBDe 2006 Issue Group Cyber Security Threats and Countermeasures Issue Chair: Buheita Fujiwara, Chairman, Information-technology Promotion Agency (IPA), Japan 1. Overview Cyber security is expanding its

More information

Emerging risks for internet users

Emerging risks for internet users Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

National Cyber Threat Information Sharing. System Strengthening Study

National Cyber Threat Information Sharing. System Strengthening Study Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening

More information

California State University, Chico. Information Security Incident Management Plan

California State University, Chico. Information Security Incident Management Plan Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

CYBERSPACE SECURITY CONTINUUM

CYBERSPACE SECURITY CONTINUUM CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

more dangerous. One way that private entities may defend against cyber attacks is by

more dangerous. One way that private entities may defend against cyber attacks is by DEPARTMENT OF JUSTICE AND FEDERAL TRADE COMMISSION: ANTITRUST POLICY STATEMENT ON SHARING OF CYBERSECURITY INFORMATION Executive Summary Cyber threats are becoming increasingly more common, more sophisticated,

More information

How To Audit The Mint'S Information Technology

How To Audit The Mint'S Information Technology Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit

More information

GAO COMPUTER SECURITY. Progress Made, But Critical Federal Operations and Assets Remain at Risk. Testimony

GAO COMPUTER SECURITY. Progress Made, But Critical Federal Operations and Assets Remain at Risk. Testimony GAO For Release on Delivery Expected at 10 a.m., EST Tuesday, November 19, 2002 United States General Accounting Office Testimony Before the Subcommittee on Government Efficiency, Financial Management

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

National Plan for Information Infrastructure Protection

National Plan for Information Infrastructure Protection National Plan for Information Infrastructure Protection www.bmi.bund.de Contents 1 Introduction 2 1.1 Germany s information infrastructures 2 1.2 Threats and risks to our information infrastructures 3

More information

Vulnerability Assessment & Compliance

Vulnerability Assessment & Compliance www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats

More information

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online

More information

Protecting Organizations from Cyber Attack

Protecting Organizations from Cyber Attack Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 cliff.glantz@pnnl.gov guy.landine@pnnl.gov 1 Key Topics

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION

INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION LOGO INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION A. BUDI SETIAWAN The Center of Research and Development of Informatic Application. Agency of Human Resource Research and Development,

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Policies and Practices on Network Security of MIIT

Policies and Practices on Network Security of MIIT 2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and

More information

Contingency Planning in ICSA Member Countries

Contingency Planning in ICSA Member Countries Contingency Planning in ICSA Member Countries Australia In an effort to review and upgrade Australia s capacity to deal with threats to critical infrastructure, the government has formed a Trusted Information

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

MIC s Efforts on Cybersecurity Human Resource Development

MIC s Efforts on Cybersecurity Human Resource Development ASEAN-Japan Cyber Security International Symposium MIC s Efforts on Cybersecurity Human Resource Development October 9 th 2014 Yuji NAKAMURA Director for the ICT Security Strategy, Ministry of Internal

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian

More information

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

Safe Internet, Happy Future!

Safe Internet, Happy Future! Safe Internet, Happy Future! CONTENTS Chapter 1 National Information Security System of Korea 1 Chapter 2 Information Security Legal/Institutional Framework 5 Sec. 1 Sec. 2 Sec. 3 Sec. 4 Sec. 5 Laws/Regulations

More information

Korea s Innovative GIDC Development

Korea s Innovative GIDC Development Korea s Innovative GIDC Development Definition of Government Integrated Data Center GIDC provides facility infrastructures, ICT infrastructures and e-government application services that are required

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

More information

Cyber-Security: Private-Sector Efforts Addressing Cyber Threats

Cyber-Security: Private-Sector Efforts Addressing Cyber Threats Cyber-Security: Private-Sector Efforts Addressing Cyber Threats Testimony of Dave McCurdy President, Electronic Industries Alliance Executive Director, Internet Security Alliance Before the Subcommittee

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

Information Assurance. and Critical Infrastructure Protection

Information Assurance. and Critical Infrastructure Protection Information Assurance and Critical Infrastructure Protection A Federal Perspective Information Assurance Presented by the Government Electronics and Information Technology Association 2001 Executive Summary

More information

Security Measures of Personal Information of Smart Home PC

Security Measures of Personal Information of Smart Home PC , pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. CHAPTER I GENERAL PROVISIONS

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. CHAPTER I GENERAL PROVISIONS ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. Wholly Amended by Act No. 6360, Jan. 16, 2001 Amended by Act No. 6585, Dec. 31, 2001 Act No. 6797,

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

Security Assessment through Google Tools -Focusing on the Korea University Website

Security Assessment through Google Tools -Focusing on the Korea University Website , pp.9-13 http://dx.doi.org/10.14257/astl.2015.93.03 Security Assessment through Google Tools -Focusing on the Korea University Website Mi Young Bae 1,1, Hankyu Lim 1, 1 Department of Multimedia Engineering,

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

Multi-Step Security System

Multi-Step Security System IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December 2006 275 Research on Constructing an Internet-based Multi-step Security System Hoesung Ki * and Seongjin Ahn

More information

Korean Space Law 2014. 11. Dr. Joon Lee Korea Aerospace Research Institute. www.kari.re.kr

Korean Space Law 2014. 11. Dr. Joon Lee Korea Aerospace Research Institute. www.kari.re.kr Korean Space Law 2014. 11 Dr. Joon Lee Korea Aerospace Research Institute Contents 1. Introduction to Korean Space Law 2. Space Object Registration 3. Launcher Regulations 4. Space Accident Inquiry 5.

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing: Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager Helmi.rais@ansi.tn

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager Helmi.rais@ansi.tn Fast overview about the CERT-TCC Helmi Rais CERT-TCC Team Manager Helmi.rais@ansi.tn Les IT en Tunisie: Quelques Statistiques Les IT en Tunisie: Quelques Statistiques a fast Historical Overview end 1999

More information

Better secure IT equipment and systems

Better secure IT equipment and systems Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

KCC announces 'Comprehensive Plans for Smart Mobile Security'

KCC announces 'Comprehensive Plans for Smart Mobile Security' KCC announces 'Comprehensive Plans for Smart Mobile Security' - Promoting 10 key tasks in 3 fields to preemptively prepare for security threats and to develop Korea into a powerful nation of mobile security

More information

Incident Object Description and Exchange Format

Incident Object Description and Exchange Format Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson Andrew Cormack Yuri Demchenko

More information

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies

More information

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India Intellectual Property & Information Technology Laws Division Flat No 903, Indra Prakash Building, 21, Barakhamba Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information