State of RP Cyber Security
|
|
|
- Oliver Houston
- 10 years ago
- Views:
Transcription
1 Office of the President of the Philippines Malacanang State of RP Cyber Security 4 th ARF Seminar on Cyber Terrorism Busan, South Korea October
2 Backgrounder DEMOGRAPHIC INFORMATION Size: 300,000 sq km land: 298,170 sq km water: 1,830 sq km 7,100 islands 82 million population 13 international gateways (airports) 30 major seaports Democratic Form of Government 16 Regions 110 provinces 60 cities REPUBLIC OF THE PHILIPPINES 2
3 State of RP Cyber Security Republic of the Philippines: An Overview Status of the RP Internet and Cyber Incidents Internet Threat Reports on RP Assessment of RP Cyber Defense The Role of Cyber Security Coordinator Cyber Security Roadmap 3
4 Legend Microwave Fiber Optic TELOF PLDT Bayantel Globe PT&T Digitel Sinat Mt. Caniaw Mt. Pila Don Mariano San Fernando Mt. Sto Thomas Binalona n Cuyapo Cabanatuan Mt. Makurukuru Mamburao o Leme r Tuban Sapat Paoa San Bontoc Sagada Mateo Mt. Data Santiag Mt. Kawal o Buaya Bayongbon g Dalton Pass R.S Kita -Kita Balagta s Backgrounder Calapan Alagao Mt. Sair Pata Sanches Mira Ballester os Apar ri Mt. Banoy Riz al Mayabobo L.Naujan Panamalaya n San Jose LE Panulian Nasiping Tuguegara o Roma Laga n Ibajay LE San Miguel Sta. Maria Iloilo Toll Cntr. Jordan L.E. Bagakay Kalibo LE Supo Caniapasan Villazar Naga City Bariw PHILIPPINE BACKBONE NETWORK Mt. Canlandog Balisong San Juan Gubat Lipata Catarman Palason L.E. Macagtas Adga Calbayog Tulibao Cebu Toll Ctr. Ormoc Toll Ctr Catbalogan Maasin Tacloba n San Roque Buscayan Borongan L.E. BoronganPassive Canceledes Naparaan Manufacturing 26% Insurance 3% Real Estate 0% RP Dependency on ICT Philippine IT Infrastructure per Sector 2005 Computer World Survey Transportation and Storage 2% Wholesale and Retail Trade 6% Agriculture, Fishery and Forestry 2% Banking 46% Camanggay Surigao LE Surigao Hill Salvacion Santiago Tibon-tibon Sipaca Butuan SugbongkogonPt. Mt. LE Mambayan Medina Gingoog Mayapay LE New Leyte Jimenez Manticao CagayanDe Oro Guihian San Andres Ozamis Ilagan Mapayapang LE Marawi Musuan San Vicente Maramag LE Peak Palpalan Asuncion Tubura Pinisikan LE LE n Nabunturan Pikit Carmen Tagum LE Cotobato LE Kabakalan MatinaLE LE DatuPian LE Davao City Isulan Tacurong LE LE LE Digos Koronada Hill l Malabakid Polonoling General Santos Pamolok LE LE Financial Intermediaries 2% Electricity, Gas, and Water 7% Construction 0% Community, Personal and Social Services 4% Communications 2% 4
5 Status of the Internet Number of ISPs are continuously increasing. Status of Internet Service Providers (ISPs) and Internet Exchanges (IXs( IXs) ) in 2004 # of ISPs 177 Status NTC-Registered ISPs Major ISPs Infocom Technologies (PLDT) MosCom CBCPNet Gnet (Globe Telecom) Pacific Internet Major IXs Philippine Internet Exchange (PHIX) Common Routing Exchange (CORE) Manila Internet Exchange (MIX) Globe Internet Exchange (GIX) <Source: Paul Budde, 2006> Source: National Telecommunications Commission 5
6 Status of the Internet The number of Internet users and subscribers increases continuously Average increment of 200,000~300,000 subscribers per year Users Subscribers <Source: Paul Budde, 2006> 6
7 Status of the Internet The number of host PCs increases The number of cyber incidents is proportional to the number of Internet subscribers, users, and host PCs Number of Host PCs <Source: Paul Budde, 2006> 7
8 Status of the Internet Number of Internet subscribers is much larger than number of broadband subscribers PCs for public use are prevalent, while the portion of individual l PCs is relatively small Public PCs are used as attack source, since it is hard to track and guarantees anonymity <Source: Paul Budde, 2006> 8
9 Status of the Internet Status of Philippine online game market (USD) Continuous expansion of online game market Possibility of cyber incidents (Online game cheating, identity theft, t item trading, etc.) is increasing Market size Growth rate <Source: Korea Game Development Promotion and Institute, 2005> 9
10 Status of Cyber Incidents US FBI recently estimated that the LOVEBUG,, made by a Philippine student in 2000, has caused a worldwide damage of approximately US$ 12Billion. NBI handled 30 various cyber crime cases as of 2005 TYPE OF CASE NBI CYBERCRIMES STATISTICS JAN - DEC Computer Fraud 8 2. Internet Pornography 3 3. Hacking 5 4. Computer s Violation of the E-Commerce Law 4 6. Verification 0 NO. OF CASES TOTAL 30 10
11 Status of Cyber Incidents In 2006, PNP monitored 446 defaced government websites mostly owned by local governments Defaced Government Websites, Source: 2007 PNP-CIDG Report * January to June data only Local Gov't National Govt * National Govt Local Gov't
12 Status of Cyber Incidents Data from Philippine Honeynet ( US and China are the major attack sources. More than 700 events occur by day when cyber attacks are fierce. 12
13 Status of Cyber Incidents Threats to nation s critical infrastructures 13
14 Status of Cyber Incidents Tarlac 1 cell site Bataan 1 cell site Oriental Mindoro 2 cell sites Nueva Ecija - 2 cell sites Bulacan 1 cell site Camarines Sur 3 cell sites Sorsogon 3 cell sites Masbate 1 cell site Palawan 1 cell site Bohol 1 cell site Compostela Valley 1 cell site Davao Oriental 1 cell site Davao del Norte 1 cell site 14
15 Status of Cyber Incidents Camarines Sur 3 cell sites Sorsogon 1 cell site Masbate 2 cell sites Surigao del Sur 1 cell site Bukidnon 1 cell site Basilan 1 cell site 15
16 Status of Cyber Incidents Case Study: Oplan Bojinka Oplan Bojinka was a 1995 plan by Al-Qaeda to simultaneously destroy 11 passenger aircraft over the Pacific Ocean. Reports indicate that Oplan Bojinka is the earlier version of 9/11 plot. If the operation had been successful, Al-Qaeda would have murdered thousands of airline passengers. 16
17 Status of Cyber Incidents Case Study: Oplan Bojinka The plot was discovered after a fire broke out in the Philippines apartment of Ramzi Yousef,, a Kuwaiti of Pakistani extraction and member of Al-Qaeda. Yousef was involved in the first World Trade Center bombing in
18 Status of Cyber Incidents Case Study: Oplan Bojinka Philippines police found bomb making material and a laptop computer in his apartment. The laptop computer contained encrypted messages that could not be read by the police or intelligence officials. 18
19 Status of Cyber Incidents Case Study: Oplan Bojinka Extensive analysis of the computer by law enforcement and intelligence officials eventually broke the encryption on the messages. The unencrypted messages detailed Yousef s plans to destroy the airliners and messages to his fellow co-conspirators. conspirators. Ramzi Yousef was sentenced to 240 years in prison in the United States. 19
20 Status of Cyber Incidents Case Study: Oplan Bojinka Plotters of the Oplan Bojinka used the Philippines as a launching pad for terrorist acts by providing training bomb making and logistical support the violent local terrorist group, Abu Sayyaf (ASO). In April 2000, the ASO demanded the release of Yousef from jail in the United States. 20
21 Lessons Learned Status of Cyber Incidents Case Study: Oplan Bojinka Computer forensics was critical to this investigation. The computer investigation allowed Philippine officials to analyze and decrypt the messages on the laptop. The information acquired was important in thwarting a deadly terrorist attack. 21
22 Status of Cyber Incidents Case Study: Oplan Bojinka Conclusion The use of the Internet by terrorist organizations will increase as these groups acquire the skills to conduct offensive operations. The interdependence of the critical infrastructure used by nation-states will allow terrorist groups these facilities with deadly results. 22
23 PH-CERT Assessment: Organization for RP Cyber Defense The first CERT in the Philippines Localized assistance Funding from membership fees and sponsorships No permanent staff purely voluntary Provides and phone based technical assistance (No on-site services) Coordination with law enforcement agencies Technical training However, the operation of PH-CERT encountered difficulty due to lack of financial support and human resources 23
24 Assessment: Organization for RP Cyber Defense National Bureau of Investigation - Anti Fraud and Cyber Crime Division Feb 1997: NBI-AFCCD created, through an Administrative Order, in order to address all computer related crimes and other offenses using technology Supported by the US-FBI to set up it Forensic Laboratory The NBI-AFCCD needs legislation in order to empower it, organizationally and financially, and make it effective in responding to cyber crime incidents 24
25 Assessment: Organization for RP Cyber Defense NBI Anti-Fraud and Computer Crimes Division 25
26 PNP - CIDG Assessment: Organization for RP Cyber Defense (Government Computer Security Incident Response Team) GCSIRT was created through TFSCI To suppress, detect and investigate computer network intrusions and other related internet or computer crimes Projected capability: digital analysis, log file analysis, forensic media analysis, etc. Issues: lack of specific legislation, overlapping roles of IT government bodies, lack of proper training of law enforcers, public awareness, etc. 26
27 Assessment: Organization for RP Cyber Defense The Philippine Honeynet Project It is a non-profit, all volunteer group dedicated to honeynet and security research. It is a part of a larger global security initiative called the Honeynet Research Alliance. 27
28 Assessment: Organization for RP Cyber Defense Honeynet s Infrastructure Study hackers tools and techniques to be able to use it against them by: Capturing new and existing attacks for research and analysis Profiling hackers / attacker behavior Analyzing attack trends and statistics Analyzing malware and hacker tools Publishing security research papers Coordinating with other security research organizations Sending out security advisories Sharing lessons learned to the community 28
29 Assessment: Organization for RP Cyber Defense 29
30 Assessment: Organization for RP Cyber Defense Other Organizations ISSSP (Information Systems Security Specialists of the Philippines) involved in the effort of creating awareness and raising the level el of information security practice security management in the Philippines PH-CISSP (Philippine Certified Information Systems Security Professionals) CISSP certified Filipinos with security professional work experience ence ISACA (Information Systems and Audit and Control) Manila Chapter sponsors local educational seminars and workshops, engages in IT research projects, conducts regular chapter meetings, and helps to further promote and elevate the visibility of the IS audit, control and security professional. 30
31 Assessment: Organization for RP Cyber Defense Status of CERTs in the Philippines Lack of human resource and systems to address cyber emergencies. Korea: More than 80 major CERTs CONCERT: Consortium of CERTs in Korea ( concert.or.kr) Requires national management to encourage development of CERTs and production of critical mass of cyber security professionals. 31
32 Assessment: Enabling Laws and Regulations e-commerce law RA 8792 Philippine E-Commerce E Law - not particular about emergency readiness but it does set the legal framework for recognition of electronic documents and transactions. Hacking and cracking Piracy or the unauthorized copying Violations of the Consumer Act or Republic Act (No. 7394) Bangko Sentral ng Pilipinas,, BSP (Central Bank of the Philippines) Circulars that apply to banks and financial institutions that dictate: Financial systems stability and service levels Connectivity security and redundancy requirements Presence of disaster recovery site and systems 32
33 Assessment: Enabling Laws and Regulations Pending laws including provisions for cyber security and ICT readiness HB 1246 Anti-Cyber Crime Act of 2001 HB 2251 Convergence Policy Act of the Philippines of 2004 SB 428 The Anti-Telecommunications Fraud Act of 2004 SB 2073 Data Protection Act of 2005 HB 3777 Cybercrime Prevention Act of 2005 A new Cyber-Crime Crime Prevention bill is being prepared by an Inter-Agency Cyber Law group for submission to the 14 th Congress 33
34 Role of the Cyber Security Coordinator q Learning from the 2 nd ARF Seminar on Cyber Terrorism: Our country needs a Focal Point to comprehensively address the task of coordinating domestic and foreign cyberterrorism countermeasures to spearhead publicprivate sector partnership in protecting our critical cyber infrastructures Note * As reported to Her Excellency the President 34
35 Role of the Cyber Security Coordinator q Task of the National Cybersecurity Coordinator: Deal with all domestic and transnational programs Oversee and provide direction to government countermeasures Coordinate operational responsibilities Note * As reported to Her Excellency the President 35
36 Role of the Cyber Security Coordinator q Task of the National Cybersecurity Coordinator: Integrate public and private efforts Organize and provide leadership to various CERTs Enhance national cybersecurity capability Spearhead collaboration with international organizations AUDIT REPORT PERIODIC RISK AND VULNERABILITY REPORTS 3RD PARTY ASSES SO AUDIT JOB Risk Assessment INVENTORY OF ASSETS Cyberspace Security Coordination Process RISK AND VULNERABILITY REPORTS INCIDENT REPORTS National Coordinator for Cyber Security Incident Response INCIDENT INCIDENT REPORTS INCIDENT REPORTS TRAINING COUES CONSEQUENCE MANAGEMENT ASSISTANCE POLICIES Laws & Policy INCIDENT REPORTS INCIDENT REPORTS TRAINING COUES POLICIES POLICIES LIST OF TRAINING COUES POLICIES Technical Training TRAINING COUES TRAINING COUES PRIVATE/PUBLIC CRITICAL INFORMATION INFRASTRUCTURE OPERATING UNITS REPORT ON TRIP PROGRAMS Awareness/ Advocacy TRIP CAMPAIGN AND ADVOCACY PROGRAMS Note * As reported to Her Excellency the President 36
37 RP Cyber Security Roadmap First step Second Step Make a complete goal for N-CERT Make a TFT (Task Force Team) for establishment of N-CERT Set-up the related Law and system Establish official N-CERT organization -Establish organization and it s function -Define the role of existing organizations -Define the coverage of N- CERT Make a National Cyber Security Framework Increase ability of Analyzing and responding to computer emergencies Technical Support Domestic and International Cooperation -gathering information on current Computer threats and vulnerabilities -Analysis and response to security incidents -supporting and consulting for Security technology (receive /cope with security incidents) Third step Build -up Computer emergency Response system Manage Information Security Education program Identify vulnerabilitiesand monitor responses to computer incidents -Collect information by using Honeynet -Collect information bye the local/domestic sensor -Detect infection of Malicious Code -Detect a hacked homepage -Fundamental course for information security administrator -Advanced course for information security administrator -Course for Establishment of CERT and Operation -As a Nation POC for computer incidents responses -Establish cooperation system with related organizations -Establish cooperation system with private CERTs 37
38 RP Cyber Security Roadmap IMPLEMENTING AGENCIES Military 38
39 Role of the Cyber Security Coordinator Office of the National Cyber Security Coordinator is the point of contact (PoC)) in nation and provides support to decrease occurrence of incidents in local systems National Coordinator Internal CERT Point of contact in nation The point of contact in the organization Technical support to cyber incident in nation The incident response in internal system and network Publication of information about prevention, detection, and recovery of vulnerabilities Detecting and patching Vulnerabilities Construction of system to analyze and respond the cyber incidents Analysis of internal cyber incidents and operation of the response system Training of security specialists and distribution of security guidelines Service protection according to the policy of the organization 39
40 Thank you UNDEECRETARY VIRTUS V. GIL National Coordinator for Cyber Security Office of the President, Republic of the Philippines Telephone numbers: /72/78 Facsimile number:
PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay City, Metro Manila 1308
PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay City, Metro Manila 1308 GSIS BIDS AND AWARDS COMMITTEE FOR INFRASTRUCTURE AND INFORMATION TECHNOLOGY
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Capacity Building in Cyberspace Security
Capacity Building in Cyberspace Security Muhammad Amir Malik Member (IT), Government of Pakistan [email protected] Sequence of Presentation Country Profile of Pakistan ICT Profile of Pakistan Cyberspace
The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
COUNTRY REPORT ON CYBERCRIME: THE PHILIPPINES
139TH INTERNATIONAL TRAINING COURSE RESOURCE VISITING MATERIAL EXPERTS SERIES PAPERS No.79 COUNTRY REPORT ON CYBERCRIME: THE PHILIPPINES Gilbert C. Sosa* I. INTRODUCTION Cybercrime goes beyond the technical,
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
Trends and Tactics in Cyber- Terrorism
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
MARCH 2016 MECHANICAL ENGINEER LICENSURE EXAMINATION PERFORMANCE OF SCHOOLS IN ALPHABETICAL ORDER
The performance of schools in the March 2016 Mechanical Engineer Licensure Examination in alphabetical order as per R.A. 8981 otherwise known as PRC Modernization Act of 2000 Section 7(m) "To monitor the
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
Pacific Islands Telecommunications Association
Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: [email protected] www.pita.org.fj INVITATION
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
National Cybersecurity & Communications Integration Center (NCCIC)
National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
Common Threats and Vulnerabilities of Critical Infrastructures
International Journal of Control and Automation 17 Common Threats and Vulnerabilities of Critical Infrastructures Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim 1, Gil-cheol Park 1,
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Legal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
Computer Crime & Security Survey
3 rd Japan & US Computer Crime & Security Survey Katsuya Uchida Associate Professor Institute of Information Security [email protected] Graduate School of Information Security Intentionally blank Respondents
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Cyber Security Strategy(Information Security Policy Council, June 10, 2013)
Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
CYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
CHED LIST OF MARITIME HIGHER EDUCATION INSTITUTIONS (MHEIs) offering BSMT and BSMarE programs as of March 2013
CHED LIST OF MARITIME HIGHER EDUCATION INSTITUTIONS (MHEIs) offering BSMT and BSMarE programs as of March 2013 PRIVATE MARITIME HIGHER EDUCATION INSTITUTIONS (PHEIs) 1 I Northern Philippine College For
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
The Battlefield. critical infrastructure:
CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency
CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
Cyber Security a Global Challenge; What and how Thailand is doing
Cyber Security a Global Challenge; What and how Thailand is doing Pansak SIRIRUCHATAPONG Executive Director National Electronics and Computer Technology Center February 19, 2009 1 Global IT Security Market
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
INDEPENDENT BUSINESS CENTER
INDEPENDENT BUSINESS CENTER National Capital Region (NCR) 1. A. BONIFACIO AVE., QUEZON CITY MS. JANELLE KHO 926 Kho Building, A. Bonifacio Avenue Balintawak, Quezon City Landline: 5772526 Mobile No.: 09178980189
Qatar Computer Emergency Team
Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based
Gregg Gerber. Strategic Engagement, Emerging Markets
Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Security & privacy in the cloud; an easy road?
Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands [email protected] THE SHIFT O L D W O R L D
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
INFRAGARD.ORG. Portland FBI. Unclassified 1
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
International Journal of Enterprise Computing and Business Systems
PREVENTING CYBER CRIME: A STUDY REGARDING AWARENESS OF CYBER CRIME IN TRICITY Ms.Arpana(PhD in Progress) Lecturer GJIMT, Ph-II,Mohali,India Dr.Meenal Chauhan Assistant Professor GJIMT,Ph-II, Mohali, India
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police
Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
Strategies for Countering Cyber Threats
UNDERWRITTEN BY Strategies for Countering Cyber Threats By Aliya Sternstein The federal government is out to stop cybercrooks by reaching potential victims before they do. Public outreach is one of the
Philippine Postal Corporation 2013 ANNUAL PROCUREMENT PLAN
Philippine Postal Corporation 2013 ANNUAL PROCUREMENT PLAN PARTICULARS A. OPERATIONAL & ADMINISTRATIVE SUPPLIES & MATERIALS B. ACCOUNTABLE FORMS C. REPAIRS AND MAINTENANCE 1. Buildings and Structures 2.
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
US-CERT Overview & Cyber Threats
US-CERT Overview & Cyber Threats National Cyber Security Division United States Computer Emergency Readiness Team June 2006 Agenda Introduction to US-CERT Overview of why we depend on a secure cyberspace
