National Plan for Information Infrastructure Protection
|
|
|
- Shannon Lawrence
- 10 years ago
- Views:
Transcription
1 National Plan for Information Infrastructure Protection
2 Contents 1 Introduction Germany s information infrastructures Threats and risks to our information infrastructures Strategic objectives Shared jurisdiction for protecting information infrastructures 6 2 Prevention: Protecting information infrastructures adequately 9 3 Preparedness: Responding effectively to IT security incidents 13 4 Sustainability: Enhancing German competence in IT security/ Setting international standards 15 Abbreviations 17 Glossary 18 Page 1
3 1 Introduction 1.1 Germany s information infrastructures Germany is already far advanced on the way to the information society. State institutions, businesses and society in general make intensive use of information technology. Today, like roads, water and power supply facilities, the information infrastructures are part of the national infrastructure, without which private households and public life would come to a standstill. Information infrastructures are the nervous system of our country Because our society depends largely on information technology, it faces new kinds of threats unknown in the past. Due to the global character of IT networks, IT security incidents may cause disruptions or total failure of the German information infrastructure, even if such incidents do not originate in our country. Criminals and terrorists increasingly try to damage complex technical systems with targeted attacks, and it cannot be ruled out that vital information infrastructures in Germany may become the target of such attacks. Today our internal security is therefore inseparable from secure information infrastructures; their protection is a key priority for our national security policy. For this reason, the present National Plan has been drawn up under the aegis of the Federal Ministry of the Interior. Implementing this plan will help strengthen the defence of Germany s information infrastructures against global threats. Page 2
4 1.2 Threats and risks to our information infrastructures Technical defects, human error or deliberate acts of damage or destruction are a frequent cause of system disruptions or break-downs which, in turn, may directly affect other sectors because of the network architecture of information infrastructures. This may have a snow ball effect on the economy and society as a whole. New threats Whether used in private or business environments, IT systems are always vulnerable to hacking attacks or threats posed by computer viruses and worms. A growing number of malicious software programmes and targeted attacks can be attributed to organized crime and terrorist groups. Their main motive, in contrast to that of script kids, is not to get attention but to profit financially from such attacks or harm the national economy. Primary targets of such attacks are large companies, banks or public institutions, in addition to private household computers which criminals try to penetrate to steal online banking details or spread computer viruses and spam. Page 3
5 The attackers use a whole range of different methods, some of which have been included, by way of example, in the following list: denial of service attacks using privately owned hacked computers use of spyware interception or manipulation of data transfers taking advantage of weaknesses, or using malware, such as computer viruses and worms. The fact that the majority of PCs use standard software, from internet applications to complex administration systems, makes it easy for attackers to find vulnerabilities. Automated attacks that make use of security gaps in these programmes cause enormous damage in many systems at exactly the same time, before a response is possible or vulnerabilities could be patched. In the meantime, organized criminals have shifted their attention away from single PCs towards routers, firewalls and other security applications intended to protect the IT systems of businesses and public administrations. This new type of attack affects not only individual PCs, but possibly thousands of PCs in the attached network. In the worst-case scenario, manipulation of central IT systems may cause the entire information infrastructure to collapse, resulting in significant economic damage. Page 4
6 1.3 Strategic objectives To ensure full protection of information infrastructures in Germany, the Federal Government has set out three strategic objectives in the National Plan for Information Infrastructure Protection: Prevention: Protecting information infrastructures adequately Preparedness: Responding effectively to IT security incidents Sustainability: Enhancing German competence in IT security/ Setting international standards These objectives are a supplement to the Federal Government s IT strategy. Implementation plans for the federal administration and for critical infrastructures will be drawn up to ensure that these objectives are achieved, and additional plans may follow, if necessary. To protect information infrastructures in Germany on a sustained basis, the Federal Government will regularly review this National Plan and make necessary adjustments in accordance with actual needs. Page 5
7 1.4 Shared jurisdiction for protecting information infrastructures The growing importance of information infrastructures for our country requires joint action by the state, economy and society. With the present National Plan, the Federal Government ensures that these tasks are fulfilled. IT security in the federal administration The federal administration itself operates parts of the national information infrastructure. The present National Plan serves to guarantee medium- and longterm IT security on a high level. Therefore, the Federal Government will set out precise guidelines for the protection of the federal administration information infrastructures in an implementation plan for the federal administration (Umsetzungsplan Bund). This plan should lay down jointly prepared technical, organizational and procedural standards for the federal administration, which the ministries should apply in a flexible manner under their own responsibility. With this plan, the Federal Government sends a clear signal: protecting the administration s own infrastructure is the basis for the protection and reliable operation of national infrastructures in Germany. Thus, implementing this National Plan will also add to the attractiveness of Germany as a place to do business. Page 6
8 As the national authority in charge of IT security and as the Federal Government s main IT security service provider, the Federal Office for Information Security (BSI) is responsible for coordinating the implementation of this National Plan. To enable the BSI to fulfil this task, the number of its staff has been and to some extent still will be increased and priorities will be redefined; overall, the BSI will be assigned a more active role as IT security advising institution. Cooperation between the federal government and the private sector In Germany, the majority of information infrastructures are run by private companies. Hence, protecting these infrastructures is primarily the task of private operators and service providers. However, given the dramatic consequences damage to those infrastructures might have for the state, the economy and large parts of the population, sole responsibility of individual operators is neither sufficient nor appropriate. This holds true also for critical infrastructures in Germany. Although the Federal Government defines the necessary requirements for the protection of information infrastructures, it is not capable of implementing them all by itself. For this reason, it will enter into precise agreements with private operators on how to fulfil the necessary tasks and respond effectively and in a concerted manner to IT security incidents. Therefore, the Federal Government calls upon its partners in the private sector to take an active part in implementing the National Plan, especially where it refers to critical infrastructures. The goal must be to ensure that protective measures are taken not only to safeguard one s own business operations, but to promote Germany as a place to do business and to ensure its international competitiveness. To this effect, the Federal Government, together with operators of critical infrastructures, is preparing the CIP Implementation Plan (Umsetzungsplan KRITIS). It will lay down measures to raise the level of IT security considerably. The Federal Office for Information Security (BSI) as well as other competent public authorities will offer their expertise to assist the operators of critical infrastructures in carrying out the measures set out in the CIP Implementation Plan. Page 7
9 Citizens and society as a whole Comprehensive protection of information infrastructures in Germany is not only the business of IT specialists. It needs the commitment of everyone of manufacturers of IT products, service providers, employees, people in charge of IT matters in public authorities and private businesses, and of those who use these structures. As consumers, citizens increasingly use information infrastructures. In so doing, well-informed consumers are very aware of the security issues involved and therefore prefer trustworthy products and procedures. Hence, compliance with high security standards is also a positive economic factor for IT manufacturers and distributors and IT service providers; it is the basis of a functioning market and innovation schemes. The aim of the Federal Government is to encourage people to make more intensive use of existing information and information provided in this National Plan. By following the government s recommendations citizens actively contribute to IT security in Germany, and at the same time manufacturers and distributors of IT products and services are encouraged to give utmost priority to the security of their products already during development and adequately inform their customers of IT risks and possible protective measures. International cooperation in protecting information infrastructures In addition to cooperation with private businesses, another main pillar of the National Plan is actively advocating German interests in order to shape policy at the international level. Binding standards for checking and evaluating security features of IT products are a prerequisite for secure information infrastructures. Therefore, the Federal Government advocates the creation of appropriate international norms and standards. Page 8
10 2 Prevention: Protecting information infrastructures adequately Security risks can be reduced by spreading knowledge about threats and possibilities for protection, by clearly assigning responsibilities for security matters, by implementing security measures and by using reliable products and processes. Goal 1: Raise awareness of risks related to IT use The Federal Government continues to trust in raising the awareness of and informing the general public and the business sector about the risks to IT use. To this effect, initiatives are being launched that are directed to people at all levels, from corporate management and high-level public administration to ordinary employees and private individuals as PC users. Goal 2: Use of safe IT products and secure IT systems The Federal Government supports the use of reliable IT products and systems and trusted IT security applications in Germany, above all within the federal administration. The Federal Office for Information Security (BSI) will extend and improve its capacity to examine and evaluate IT products and systems under security aspects Page 9
11 and issue relevant certificates. The BSI publishes product recommendations, issues technical guidelines for the use of these products and lists products that were issued a German IT security evaluation certificate. Goal 3: Respect confidentiality Unprotected digital communications are extremely vulnerable, easy to intercept and manipulate. Therefore, the security of the German information society and Germany as a place to do business depend on the availability of reliable, innovative and trusted encryption products that guarantee confidential communication. The Federal Government is promoting the development and the German manufacturers of adequate products, in accordance with the 1999 decision concerning encryption; in addition, it will use encryption and security applications for its own communications. When awarding IT and IT security contracts at federal level, public authorities will pay greater heed to national security interests on the one hand and the reliability and trustworthiness of bidders on the other. The business sector is made particularly aware of the risks associated with information theft (e.g. caused by economic espionage) and the possibilities and benefits of preventing such theft by using reliable German encryption products. Goal 4: Putting safeguards in place It is necessary to put coordinated technical, physical, organizational, and structural safeguards in place. Responsibilities, duties and roles for all tasks related to IT protection must be clearly defined. Adequate IT security measures are being implemented in all public authorities at federal level. The federal ministries in charge will ensure that IT security strategies for federal authorities are kept up to date and are implemented effectively. The Federal Government is improving IT security management coordination within the federal administration to ensure uniform and generally comparable, efficient, and transparent processes and work-flows from the highest ministerial level down to every single authority within the remit of each ministry. All businesses and organizations are firmly called upon to make adequate arrangements for protecting their IT systems. Page 10
12 Goal 5: Creating framework conditions and guidelines The Federal Government undertakes to create adequate framework conditions and guidelines, taking account of international norms and standards, in order to ensure full protection in all security-relevant areas. Each federal ministry will make sure that standards and guidelines are implemented in accordance with the Umsetzungsplan Bund by its own ministry and all authorities within its remit, for example by putting the necessary structures in place (e.g. commissioner for IT security issues; reporting; role and responsibilities of the management, etc.). Appropriate guidance will be given to those branches of the economy where special requirements apply to IT security. All other areas of society will be provided with recommendations and guidelines on IT security. Goal 6: Coordinated security strategies Since security systems are only as robust as the weakest link in the chain, it is crucial to harmonize security-relevant processes and mechanisms. Therefore, the Federal Government advocates defining joint standards and coordinated application concepts, among other things, in order to optimize systems with regard to their security, technical, economic, and data protection properties. Page 11
13 Goal 7: Shaping policy at national and international level The Federal Government will intensify its efforts to actively shape policy with regard to existing and new forms of cooperation for protecting information infrastructures. In addition, it will strengthen national and international cooperation in order to bring German security interests to bear when formulating guidelines, directives and other legal instruments. To be able to respond comprehensively to threats, given the global character of networks, the federal ministries and other federal authorities will increase their cooperation with their counterparts abroad. Together with its partners, for example in the EU (especially ENISA), NATO, OECD, UN, G8 and at international level in general, the Federal Government will raise the awareness of the vulnerability of information infrastructures and support the provision of technical solutions. Page 12
14 3 Preparedness: Responding effectively to IT security incidents Information infrastructure disruptions require fast and effective responses. In addition to collecting and analysing information, this includes alerting those affected and taking action to reduce the damage. To this effect, the Federal Government is developing a national IT crisis response centre. Goal 8: Identifying, registering and evaluating incidents The IT crisis response centre at the Federal Office for Information Security (BSI), which is currently being put in place, will play the role of a national command, control and analysis centre that will be able to provide a reliable assessment of the current IT security situation in Germany at any time and that will cooperate with existing control and crisis centres in a given incident. To enable the BSI to fulfil this function, a network of sensors will be put in place to detect IT security incidents. Additional sources supplying information on IT incidents will be made available to the BSI by extending the international watch and warning network, of which the Federal Government was a founding member. All these measures will ensure that those in charge in the public and the private business sectors have the information necessary to quickly decide what action must and can be taken. Page 13
15 Goal 9: Informing, alerting and warning The competent federal authorities will provide information on current threats and risks tailored to certain target groups. All those in charge of IT systems and information infrastructures, from the ordinary private user to the IT administrator in companies, public authorities and other organizations, will get access to appropriate information. As part of the national IT crisis management concept of the Federal Government, an alert and warning system will be established to inform all those potentially affected in a rapid and comprehensive manner of imminent attacks against or severe disruptions of information infrastructures. This will help respond in time and prevent large-scale damage. Goal 10: Responding to IT security incidents The federal IT crisis response centre will enable all competent bodies to respond rapidly to serious incidents. It provides incident analyses and assessments to all relevant bodies and coordinates the cooperation with local and sector-internal crisis management organizations. If in the case of incidents affecting larger parts of the federal administration it is necessary to take measures that require greater powers than those assigned to local authorities, a coordinating body of the federal ministries will agree on the necessary measures and commission the IT crisis response centre to enforce their implementation. A prerequisite for being able to respond effectively to IT security incidents are well-prepared emergency plans and clearly defined procedures. The Federal Government requires such emergency plans to provide also for coordination and cooperation with national crisis management, in addition to regulations concerning crisis management in companies and public authorities at local level. Page 14
16 4 Sustainability: Enhancing German competence in IT security/ Setting international standards For the long-term protection of national information infrastructures Germany needs highly-qualified experts and trusted IT services and security products, in addition to the political commitment of all those in charge to improve IT security. Goal 11: Promoting trusted and reliable information technologies The Federal Government promotes the development of trusted German IT products and services, and of trusted information technologies in Germany, particularly the encryption industry. The aim is to increase the market penetration and encourage a wider community to use trusted IT products. Goal 12: Enhancing national competence in IT security The Federal Government will use the expertise of German IT security service providers, contribute to its further development and thus to national competence in IT security. In the course of implementing this National Plan, already existing competences and functions of the BSI will be expanded considerably and supplemented by the expertise in other ministries. As the key national IT security agency the BSI will work together with other important supervisory bodies such as the Regulatory Authority for Telecommunications and Posts (RegTP) and play an active part in shaping policies concerning IT security in the federal administration, largescale projects of the Federal Government and critical infrastructures. Goal 13: IT security competence in school education and professional training The Federal Government uses its expertise in the field of IT security to raise the priority of IT security in school education and professional training on a broader scale and to make sure that IT security is given due heed in developing new professions and training and study subjects. Furthermore, information services for citizens, schools, universities, the business sector and public administration will Page 15
17 be expanded and improved, increasing awareness of IT security issues within society as a whole. Goal 14: Promoting research and development The Federal Government supports basic scientific research in Germany, advocates the engagement of German businesses in international research and technology programmes, particularly in the 7th European Research Framework Programme. Developing innovative products guarantees the long-term reliability of German information infrastructures. The cooperation between industry and R&D at universities will be intensified. Goal 15: Expanding international cooperation and setting standards The Federal Government will advocate German security interests in international standard setting bodies when developing international standards for the protection of information infrastructures. To this end, inter-ministerial and inter-disciplinary cooperation in drafting relevant norms, standards and laws will be strengthened at national level. Together with European partners, the Federal Government will develop reliable IT security solutions. German IT security products and solutions will receive due consideration. Page 16
18 Abbreviations BMI BSI ENISA EU IT ITSEC KRITIS NPSI PC PGP RegTP S/MIME Federal Ministry of the Interior Federal Office for Information Security European Network and Information Security Agency European Union Information technology Information Technology Security Evaluation Criteria Critical infrastructures National Plan for Information Infrastructure Protection Personal computer Pretty Good Privacy Regulatory Authority for Telecommunications and Posts Secure Multipurpose Internet Mail Extension Page 17
19 Glossary (Definition of key terms used in the National Plan for Information Infrastructure Protection / in the present document) Information infrastructure The entirety of IT elements that are part of a given infrastructure. Interdependency The total or partial mutual dependency of several goods or services. IT security Ensures the availability, integrity, verifiability and confidentiality of information in the use of information technology. For this purpose, availability means the situation in which the necessary usability of information as well as IT systems and components is ensured; integrity refers to the exclusion of unauthorized and prohibited modifications of information as well as of IT systems and components; verifiability means the situation in which required or promised properties or features of information or transfer facilities can be verified by the user and vis-á-vis third parties; confidentiality refers to the exclusion of unauthorized obtaining or procuring of information. IT security products Products used to ensure compliance with IT security requirements, including virus scanners, firewalls, public key infrastructures (PKI), intrusion detection systems (IDS), and plug-ins for data encryption in clients, e.g. for PGP or S/MIME. IT security products help ensure protect software applications, processes, systems and/or data to a greater extent than would be possible without such products. Critical infrastructures Organizations and facilities of great significance for the community whose failure or impairment would cause a sustained shortage of supplies, significant disruptions of public order or other dramatic consequences. Page 18
20 In Germany, the following infrastructure areas are deemed as critical: (see also transport energy (electricity, oil and gas) hazardous substances (chemical and biological agents, transport of hazardous material, arms industry) information technology and telecommunications the financial, monetary and insurance system supply of vital goods and services (public health service, emergency and rescue services, civil protection, food and drinking water supply, waste disposal) public authorities, the administration, the judiciary (including police, customs and federal armed forces) other (the media, large research institutions, architectural buildings of outstanding or symbolic value, cultural heritage) Safe IT products In contrast to IT security products, the main characteristic of safe IT products is that they themselves are safe. Whether a product is safe or not can be established by evaluating it under certain security standards, such as ITSEC or Common Criteria, and can be documented in an IT security evaluation certificate. Special strategies, which strive to minimize the chance that vulnerabilities occur at all or, if they occur, to ensure that they are less complex, are used to develop safe IT products. Secure IT systems IT systems comprise several IT products and components and are used in specific environments and under given framework conditions as regards organizational structures and human resources. Secure IT systems are characterized by having in place a security management and by having implemented the necessary infrastructural, organizational, personnel and technical security measures that were evaluated by an independent body and issued a system security evaluation certificate. Page 19
21 Reliability Systems, applications or services are deemed reliable if they comply with relevant requirements (e.g. quality of service requirements) and if they function in a way that does not differ to an unacceptable degree from users' expectations. In this context, the term reliability is used as an umbrella term, including (at least) the following concepts: availability (i.e. permanent usability) robustness (i.e. functional stability) safety (i.e. possibility to operate and apply such systems or products without being harmed or without harming the environment) confidentiality (i.e. no unauthorized disclosure of information) integrity (i.e. no unauthorized modification or destruction of data) maintainability (i.e. possibility to maintain/ restore operation by repair works; possibility to upgrade the system) Page 20
22 This publication is distributed free of charge as part of the public information work of the Federal Ministry of the Interior. It may not be used by any political party, candidate or campaign workers during an election campaign for purposes of campaign advertising. This applies to elections at the European, federal, state and local levels. In particular, distributing this publication at campaign events or at information stands of political parties, or inserting, stamping or attaching to it any political information or advertising constitutes misuse. Nor may it be passed on to third parties for purposes of campaign advertising. Regardless of when, by what means and in what quantities this publication was delivered to the recipient, even without reference to any upcoming election it may not be used in a manner that could be construed as bias by the Federal Government on behalf of any individual political group. Page 21
23 Published by: Bundesministerium des Innern IT-Stab, Referat IT 3 Alt-Moabit 101D Berlin Editor: Bundesministerium des Innern IT-Stab, Referat IT 3 Design & Production: Zucker.Kommunikation, Berlin Images: Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn Status: October 2005
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
Public Private Partnerships and National Input to International Cyber Security
Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT
REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT Riga 2013 Introduction In accordance with the National Security Concept, information technology threats or
Business Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
The Crisis Management System in Germany
The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Cyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
SECURITY ORGANISATION Security Awareness and the Five Aspects of Security
SECURITY ORGANISATION Security Awareness and the Five Aspects of Security Shift Security simply used to protect information vs. Enabling business initiatives with security Bolt-on/add-on structure to business
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
STATE OF CYBER SECURITY IN ETHIOPIA
ETIOPIAN TELECOMMUNICATIONS AGENCY STATE OF CYBER SECURITY IN ETHIOPIA By Mr. Balcha Reba Ethiopian Telecommunications Agency Standards and Inspection Department Head, Standards Division email: [email protected]
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Facts about the new identity card
Facts about the new identity card Contents The new identity card At a glance... 4 In detail... 6 Photographs... 8 New ID card, new possibilities...10 Special functions... 11 The online function...12 Reader
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA ON THE AMENDMENT OF THE ORDER NO. 1V-1013 ON THE APPROVAL OF THE RULES ON THE ENSURANCE OF SECURITY AND INTEGRITY
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails
BSI TR-03108-1: Secure E-Mail Transport Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails Version: 1.0 Date: 05/12/2016 Document history Version Date Editor Description
Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Qatar Computer Emergency Team
Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based
RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES
Administrative RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES For any individual or group utilizing WRDSB technology Responsibility: Legal References: Related References:
As simple as e-mail and as secure as postal mail.
Stay up-to-date Page 1 The advantages of De-Mail for individuals, businesses and Page 2 government agencies Unencrypted, unprotected, unverified what does that mean? Page 3 Encrypted, protected, verified
RUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
INFORMATION SECURITY TESTING
INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Cyber Security and Critical Information Infrastructure
Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Cyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them
National Corporate Practice Cyber risks explained what they are, what they could cost and how to protect against them what this briefing covers ff Introduction ff Section 1: What are the risks and the
Policies and Practices on Network Security of MIIT
2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and
