GEORGIA S SUCCESSFUL JOURNEY TO E-GOVERNMENT

Size: px
Start display at page:

Download "GEORGIA S SUCCESSFUL JOURNEY TO E-GOVERNMENT"

Transcription

1 GEORGIA S SUCCESSFUL JOURNEY TO E-GOVERNMENT E-GOVERNMENT DEVELOPMENT IN GEORGIA Irakli Gvenetadze LEPL Data Exchange Agency Ministry of Justice of Georgia

2 GEORGIA

3 GEORGIA COUNTRY PROFILE Population: 4.2 million Capital: Tbilisi Area: 69,700 sq. km Highest point is Mkinvartsveri 5047 meter

4 GEORGIAN ALPHABET

5 GEORGIAN NATIONAL COSTUME

6 UN E-GOVERNMENT SURVEY 2014 GEORGIA Rank 2014 Rank 2012 Rank 2010 Rank 2008 E-Government E-Participation

7 GDP PER CAPITA

8 RELATION BETWEEN EGDI AND NATIONAL INCOME (GNI PER CAPITA), LOVER-MIDDLE INCOME COUNTRIES

9 WHERE GEORGIA STARTED FROM Business Registry Create information systems Digitalize internal information resources Automate information flows Create data centers Establish connection between agencies and regional offices

10 IT CRUCIAL TO DELIVER REFORM BENEFITS In Georgia, reforms were taking place actively since M ain attention was paid to business process optimization and transparency in organization processes. Reform Efficiency Transparency Time Cost Availability Accountability INFORMATION TECHNOLOGIES

11 IMPLEMENTED PROJECTS P roperty registration, e-abstracts, Business Registry Civil Registry e-id and e-signature Biometrical Passport e-filing system in the Ministry of Finance of Georgia- 90 % of taxpayers are actively using this system; Automation of tax and customs systems (the process is ongoing as reforms taking place in this direction require changes in business processes); Case management system of tax dispute resolution; Central data storage and reporting system; Electronic Treasury project. e-treasury Cash register management automation project-planned for next year; Electronic system for writing out VAT invoices; Automation of the Ministry of Internal Affairs; Case management program for Ombudsman; Computerization of schools. Schools are equipped with computers and by the end of the this year all schools (2300) will be connected to internet; Netbooks for all first graders Student Information System-ongoing; National school exam on-line Automated case management system for court system; project is in decisive phase and system is being introduced in offices Centralized criminal case management is being introduced; e-procurement; e-auction of state property; e-auction of real estate of Tbilisi City Hall; Automation project of Enforcement Bureau e-notary project; Electronic directory system for state newspaper and legislative base Official Gazette; Automation project of Social Subsidies Agency Real Time Gross Settlement System of National Bank Investment Management System of National Bank Core Banking System of National Bank Chancellery automation project is being implemented in all large ministries. Criminal case management system

12 RECURRING PROBLEMS Limited budget No security Shortage of qualified personnel No standards Infrastructure expensive Data incompatibility

13 GGN GEORGIAN GOVERNMENTAL NETWORK Design and tender procurement Contract signed Sept. 1, governmental offices connected by the end of 2007 More than 500 governmental offices connected in 2008 Since 2009, more than 1,000 governmental connections including schools Government connected throughout Georgia with no investment, only paid 25% of commercial prices for internet and telephone.

14 E-GOVERNMENT COMMISSION E-government development consulting body for government of Georgia Steering committee for GGN project

15 ARCHITECTURE OF E-GOVERNANCE SERVICES

16 ORGANIZATION CENTRIC

17 CITIZEN CENTRIC

18 CONNECTED GOVERNMENT Receive Information in Real Time Effectively Distribute Resources Health Care and Social Security Monitor Results Proper Planning of State Budget Municipalities Agriculture Data Exchange Agency Georgian Government Gateway Redundancies Eliminated Education

19 CITIZEN S CENTRIC SYSTEM Unified Automated Statistical Data State E-Governance System Automated Data Processing Medical Service Migration, Registration Education Property Demographic and other Personal Data CITIZEN Economic Activities State Development Planning, Forecast Social Condition Effective Public Policy

20 DEA DATA EXCHANGE AGENCY Due to the abovementioned problems, the need for establishment of an entity with relevant authority became inevitable, which would support the following activities: Development and coordination of E-Governance Development of legal and regulative framework Ensure information and cyber security Establishment of the integrated data exchange system and ensure access to information resources Parliament of Georgia adopted a law on the establishment of Legal entity of public law under the Ministry of Justice of Georgia - Data Exchange Agency on the basis of which since 1 January 2010, Data Exchange Agency (DEA) started its activities.

21 E-GOVERNMENT GOVERNANCE ECO SYSTEM Government of Georgia PM Ministry of Justice E-Government Governmental Commission Data Exchange Agency CIO Council - Consulting Body for Government 1. Implementation Body for Government 2. Administration Body for Commissions

22 DATA EXCHANGE INFRASTRUCTURE Citizen Ministry of Justice Response Ministry of Finance Bank Data Exchange Agency Request Ministry of Education Business Request Ministry of Health Response Other ministries Ministry of Internal Affairs

23 G3 GEORGIAN GOVERNMENTAL GATEWAY

24 G3 FUNCTIONAL DESIGN External Applications Portal e-services Catalog Submission application (not a part of GG delivery) e-forms SOAP API WS Federation Web Interface GovTalk HTTP POST Web Services (SOAP) Submission() Storages SQL Identity provider Registration & Enrolment Audit and Monitoring Audit log Transaction & Messaging Receiving module Priority Services Notification engine Known facts Admin Msgs Submission logging Routing Services Application Integration DIS Audit and Monitoring Audit log Internal Information System Communicationto Receiving module

25 MY.GOV.GE CITIZEN S PORTAL

26 CITIZEN S PERSONAL PAGE

27 PROPERTY

28 CITIZEN S ADDRESS OF REGISTRATION

29 ONLINE BUSINESS REGISTRATION

30 UTILITY PAYMENTS

31 RECOMMENDATION TO IMPROVE SERVICES

32 DEA Citizen s portal Joint document exchange system Guaranteed electronic delivery system Trade facilitation System TFS

33 TRADE FACILITATION SYSTEM TFS See Ports International Traders Shipping Lines Suppliers Trade Facilitation System Forwarder Companies Railway Tax & Custom Banks & Insurance Companies Terminals

34 E-ID CARD

35 ID CARD - WHAT IS IT? WHAT IT DOES? Identification Document Travel Document Proximity Card Online Identification Digital Signature

36 ID CARD - ONE CHIP - TWO INTERFACES Contact Contactless

37 PUBLIC SERVICE HALL - TBILISI

38 CONTACTLESS INTERFACE Work ID Card Proximity Card Loyalty Card Student Card Many other uses

39 CONTACT INTERFACE TWO CERTIFICATES Online Identification Digital Signature

40 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE

41 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE

42 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE

43 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE

44 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE

45 BATUMI

46 KVARELI

47 RUSTAVI

48 KUTAISI

49 OZURGETI

50 MESTIA

51 TBILISI SEPTEMBER 2012

52 E-GOVERNMENT LEGISLATIVE FRAMEWORK e-document and e-signature law 2007 Law on Creation of Data Exchange Agency 2010 Law on Unified Information Registry 2011 Law on Information Security 2012 Law on Personal Data Protection 2012

53 LAW OF GEORGIA ON UNIFIED STATE REGISTRY OF INFORMATION Aim of the Law: establishment of a unified state registry of registers, databases, services and information systems within the public sector of Georgia A supplementary act Instruction on standards and procedures of working with the Registry of Registers, as well as manual on the use of web-portal Categories of information to be submitted: Establishment of a registry or service (initial registration) Significant amendment of a registry or service Merger, division, revocation, deletion, transfer or archiving a registry or service Data Exchange Agency as implementer

54 E-GOVERNMENT STRATEGY

55 E-GOVERNMENT STRATEGY e-services e-participation and Open Government e-health Public Finance Management System e-business ICT-Hub Georgia Infrastructure e-security Skills and e-inclusion Enabling frameworks and governance Awareness

56 INFORMATIONAL SECURITY AVAILABILITY INTEGRITY CONFIDENTIALITY false information network jamming intrusions information stealing system paralyzing

57 CYBER SECURITY ECOSYSTEM Security Council Minister of Justice Data Exchange Agency Ministry of Internal Affair 24/7 Cyber Crime Unit Minister of Defense Military Cyber Defense Unit

58 AUGUST 2008 Cyber attacks had far less impact on Georgia than they might on a more Internet-dependent county, where vital services like transportation, power and banking are tied to the Internet. Although reasons were also very crucial in terms of war in the country: Misinformation of real facts by Russian Media Aggression and patriotic spirit of Russian supporters. Block and cut off Georgian Internet resources Shut down media, forums, blogs in Georgia. Impact on the Georgia's visibility on the internet and ability to communicate with the world. Make panic and as much damage as possible to the critical infrastructures. 58

59 Who Attacked? Traffic origin comparison by hits 08/08/08 Before Attack Started 09/08/08 Under Attack Romania Record Holder! Guatemala & Indonesia? Who are these guys?!! 10/08/08 Only Georgian traffic allow ed

60 Who Attacked? You are loosers and will fail again just like in 90ies

61 Types of attacks beside physical Romania, Telecom Italia, Roma FreeBit, Tokyo France Telecom, Toulouse VolgaTelecom, Orenburg, Russia Link Egypt, Dokki-Giza Telefonica O2 Czech Republic, Prague Telefonica de Espana, Madrid Qualitynet Co., Kuwait Techauna AUNA, Barcelona Nexon Asia Pacific, Sydney Amazon Web Services, Seattle Telia Network, Sweden Belgacom ISP SA/NV, Bruxelles Business Communication Agency, Russia Telgua, Guatemala Free SAS / ProXad, France Makedonski Telekom, Skopje Universal Telecom, Kiev, Ukraine Types of attacks: - SYN Flood - Ping Flood - Http Flood - Defacement - SPAM - SQL Injections Protocols: - HTTP - ICMP - FTP - SMTP - DNS - BGP

62 WHAT WE KNOW ABOUT HOW IT WAS DONE POWER TO THE PEOPLE Russian Hackers web sites (StopGeorgia.ru and Xakep.ru) spreaded all necessary information and tools how to attack Georgian web-sites Target web sites and codes for attacks were posted in comments of hundred forums, blogs, news and entertainment web-sites Interested individuals were asking others to help and to join in by continually sending ICMP traffic via the 'ping' and explaining how to do it. At the same time ready bat files designed to attack Georgian websites detailed list of websites attack Georgian websites were spreader using file exchange programs. Exam ple: Interpressnews.ge (New s agency) detected traffic of about 150 MB. Site was periodically going down or working too slow

63 WHAT WE KNOW ABOUT HOW IT WAS DONE HACKERS TRICKS Geographically distributed BOTNETS * sessions per IP per server SQL INJECTION of more than 100 sites *Exam ples: ww.president.gov.ge/index.php?l=g&m =0&sm=3&id=2693+union+select+1,2,3,4,5,6,7,8,9,0,1,2,3,4,5 Attempts of BGP hijacking Websites hacking *Maybe hackers knew some passwords Spamming of addresses According to many facts, It seems that cyber attacks were planned before the actual war started.

64 Approximately 90% of all gov.ge domain addresses and significant fraction of.ge domain addresses were affected by DDos attacks.

65

66 Government and so on

67 News and so on.

68 EVERYTHING ELSE and so on

69 Things to wonder about From Shadowserver, sampling of previous DDoS targets from the same botnets involved in the Georgia attacks: carder.biz Divaescort.com payclubs.biz night-fairy.com vodkaescort.net cc-hack.eu igame.ru i-german.net

70 HOW MEDIA CAN INFLUENCE THE WORLD Attacks of civil.ge after news that Estonia is in business of site hosting 70

71 WIN32/GEORBOT Malware was found in Georgian Governmental Agencies including ministries, parliament, banks, NGO s. Purpose of the malware was Collecting Sensitive, Confidential Information about Georgian and American Security Documents 71

72 WIN32/GEORBOT The Win32/Georbot malware has the following functionalities for stealing information from an infected system: Send any file from the local hard drive to the remote server. Steal certificates Search the hard drive for Microsoft Word documents Search the hard drive for remote desktop configuration files Take screenshots Record audio using the microphone Record video using the webcam Scan the local network to identify other hosts on the same network Execute arbitrary commands on the infected system The commands are activated manually and were sent to each host individually rather than being broadcast to all infected hosts. 72

73 TARGETED AUDIENCE Cyber Attack was designed very smartly. Various Georgian News-Related web-sites were hacked and modified only Specific News pages (eg. NATO delegation Visit in Georgia, US-Georgian Agreements and Meetings, Georgian Military NEWS) Site about the NEWS from Caucasian Region Caucasus Energy and Infrastructure Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site 73

74 EXAMPLE OF INJECTED SCRIPT INTO THE HACKED NEWS WEBSITE 74

75 WIN32/GEORBOT COMMAND & CONTROL SERVERS September, 2010 georgiaonline.xp3.biz (United States) FreeWebHostingArea.com March, 2011 ema.gov.ge (Georgia) (hacked webserver) April, (France) OVH Hosting June, / (Germany) DME Hosting October, (Hungary) Net23.hu November, (United States) December, (Czech Republic) January, (Germany) DME Hosting March, (Germany) DME Hosting 75

76 GEORBOT Not detected with Major Antivirus Product, Bypasses Windows 7 sp1 patched, with Firewall enabled. After Executing calc.exe itself does 3 major things: Before installing bot checks if the computer is located in UTC+3, UTC+4 Time-zone. injecting into iexplorer.exe and communicating to defaced sites, for C&C address retrieval creating usbserv.exe bot file in Application Data directory, and writing it to autorun in Windows Registry. 76

77 LEGAL FRAMEWORK Cyber Security Strategy for E-Government Strategy for Other Strategic Documents 1. Information Security Law (2012) 2. Personal Data Protection ( 2012) 3. Cyber Crime Chapter on Crime Code. (U 2010) 1. Cyber Crime Convention 24/7 2. All Major IPR Conventions 3. Processing of Personal Data Conventions (1981) CERT.GOV.GE Computer emergency Response Team Charter Presidential Decrees Approval List of Critical Information System Subjects. Requirements of Information Security Officer working in Critical Information System Subjects. Decrees of Network Sensor Configuration. Decrees of Minimal Security Requirements for Critical Information System Subjects. Decrees of Asset Management Requirements for Critical Information System Subjects. Decrees of Information Security Audit Body Accreditation. Decrees of Information Security Audit Requirements in Critical Information System Subjects

78 CYBER SECURITY STRATEGY OF GEORGIA Basic Principles Cyber Security Strategy Whole-of-Government Approach. Public-private Cooperation. Active International Cooperation. Cyber Security Strategy Main Domains Research and analysis New legislative framework Institutional coordination for ensuring cyber security Public awareness and education International cooperation

79 INFORMATION AND CYBER SECURITY Information Security policy development, implementation, monitoring. CERT.GOV.GE (Computer Emergency Response Team) Military Public Sector + Subject of Critical Infrastructure Systems State Secret

80 INFORMATION SECURITY & POLICY DIVISION Information Security Team CERT.GOV.GE Team All Team Members are BSI Certified Professionals: BSI/ISO (Information Security) LI/LA BSI/ISO (Business Continuity) LI/LA BSI/ISO 9001 (Quality Management) LA All CERT Team members are SANS Certified Professionals: SANS GIAC Certified Professionals ISO (Risk Management) 4 Member of the team are: CISM (Certified Information Security Manager) 2 Member of the team are: CISA (Certified Information System Auditor)

81 INFORMATION SECURITY Management Services Consulting Service Review of Information Securitydocumentation: Policy, Plans, Audit reportand etc. 36 ISMS Implementation Service Current Projects: Service Development Agency; Public Registry of Georgia 2 Certified Course in Management Systems ( Introduction, Implementation and Internal Auditin Information Security Management Systems, Certification Exam). 105 NATO SPS Project Trained Professionals from Moldova and Montenegro 40 Information Systems Audit Service

82 CERT.GOV.GE CERT.GOV.GE The Cyber security Executing Arm Of The UNITED NATIONS SPECIALISED AGENCY of The International Telecommunication Union (ITU) Partners: The Trusted Introducer - a.k.a. TI - is the trusted backbone of the Security and Incident Response Team community in Europe FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programs. CERT-EE

83 CERT.GOV.GE Services and Activities Proactive Services: Incident Handling IncidentSupport System Detection of Infected Web Sites Safe DNS Other Services: Source and Binary Code Analyze Service. Malware Analyze Service. Penetration Test Service Monitoring Service IP Monitoring Services. Network Monitoring System Special Activities & Awareness Cyber Security Forum Annual GITI Regional Conference Website (dea.gov.ge), Facebook (certgovge) Media Campaign (TV, Internet) Wall Calendar 83 Course in Cyber Security and Incident Handling Basic Incident Handling 20 NATO SPS Project Trained Professionals from Afghan, Macedonia, Moldova and Montenegro 90

84 INFORMATION SECURITY AWARENESS

85 GITI GEORGIAN IT INNOVATION EVENT 2008

86 THANK YOU FOR YOUR ATTENTION! Irakli Gvenetadze LEPL Data Exchange Agency Ministry of Justice of Georgia

DEVELOPMENT OF ICT AND INNOVATIONS IN GEORGIA

DEVELOPMENT OF ICT AND INNOVATIONS IN GEORGIA MINISTRY OF ECONOMY AND SUSTAINABLE DEVELOPMENT OF GEORGIA GEORGIA S INNOVATION AND TECHNOLOGY AGENCY DEVELOPMENT OF ICT AND INNOVATIONS IN GEORGIA Priorities and Projects IRAKLI KASHIBADZE Chairman,,

More information

CERT-GOV-GE Activities & Services

CERT-GOV-GE Activities & Services CERT-GOV-GE Activities & Services Tbilisi, Georgia 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and Policy division of

More information

CYBER ESPIONAGE. Against Georgian Government. (Georbot Botnet) CERT.GOV.GE. LEPL Data Exchange Agency. Ministry of Justice of Georgia

CYBER ESPIONAGE. Against Georgian Government. (Georbot Botnet) CERT.GOV.GE. LEPL Data Exchange Agency. Ministry of Justice of Georgia CYBER ESPIONAGE Against Georgian Government (Georbot Botnet) CERT.GOV.GE LEPL Data Exchange Agency Ministry of Justice of Georgia 1 P a g e Summary In march, 2011 CERT-Georgia which is Governmental Computer

More information

CERT-GOV-GE Activities & International Partnerships

CERT-GOV-GE Activities & International Partnerships CERT-GOV-GE Activities & International Partnerships Zurich, Switzerland 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and

More information

E - G O V E R N M E N T. G E

E - G O V E R N M E N T. G E N E W S L E T T E R Issue #1 May, 2012 I N S I D E T H I S I S S U E Y O U W I L L R E A D A L L E - S E R V I C E S U N D E R A S I N G L E P O R T A L M Y. G O V. G E A L L E - S E R V I C E S U N D

More information

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians? From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that

More information

Georgia. Progress Report

Georgia. Progress Report Anti-Corruption Network for Eastern Europe and Central Asia Istanbul Anti-Corruption Action Plan Second Round of Monitoring Georgia Progress Report Report is presented by Georgia at the 10 th Monitoring

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Introducing Elements of E-Government E Russia: Achievements, Lessons Learnt, and Possible Prospects

Introducing Elements of E-Government E Russia: Achievements, Lessons Learnt, and Possible Prospects Introducing Elements of E-Government E in Russia: Achievements, Lessons Learnt, and Possible Prospects Yelena Dobrolyubova General Director Center for Economic and Financial Consulting UNDESA Expert Group

More information

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

Introduction: 1. Daily 360 Website Scanning for Malware

Introduction: 1. Daily 360 Website Scanning for Malware Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers How to Protect Your from Hackers Web attacks are the greatest threat facing organizations today. In the last year, Web attacks have brought down businesses of all sizes and resulted in massive-scale data

More information

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected]

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia helmi.rais@ansi.tn helmi.rais@gmail.com Promoting a Cybersecurity Culture: Tunisian Experience ITU Regional Cybersecurity Forum for Eastern and Southern Africa Lusaka, Zambia, 25-28 August 2008 Helmi Rais CERT-TCC Team Manager National Agency

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system

More information

DDoS Attacks Can Take Down Your Online Services

DDoS Attacks Can Take Down Your Online Services DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill

More information

INFORMATION SECURITY REVIEW

INFORMATION SECURITY REVIEW INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology

More information

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

E-governance development history in Georgia

E-governance development history in Georgia E-governance development history in Georgia In 2010 under the Ministry of Justice, LEPL Data Exchange Agency has been created. One of the main priorities of the agency is support of e-governance development

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

honeytarg Chapter Activities

honeytarg Chapter Activities honeytarg Chapter Activities Marcelo Chaves [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Managed Security Services

Managed Security Services Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s

More information

Attacks from the Inside

Attacks from the Inside Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The

More information

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks

More information

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used

More information

LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016

LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016 LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016 DDoS Atacks: Detection, Analysis and Mitigation Lucimara Desiderá [email protected] Klaus Steding-Jessen [email protected] Internet Governance in Brazil:

More information

Kaspersky DDoS Prevention

Kaspersky DDoS Prevention Kaspersky DDoS Prevention The rapid development of the online services industry and remote customer service systems forces entrepreneurs to consider how they can protect and ensure access to their resources.

More information

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.

More information

Cyber Security ( Lao PDR )

Cyber Security ( Lao PDR ) ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Jort Kollerie SonicWALL

Jort Kollerie SonicWALL Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013 Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 616 Securing Windows Infrastructure Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security

More information

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd [email protected]

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd michaels@radware.com Protection against DDoS and WEB attacks Michael Soukonnik Radware Ltd [email protected] Landscape Ponemon Research 2012: Cyber security threats Cyber security threats according to risk mitigation priority

More information

Current Threat Scenario and Recent Attack Trends

Current Threat Scenario and Recent Attack Trends Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks

More information

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Understanding Security Testing

Understanding Security Testing Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many

More information

Egyptian Best Practices Securing E-Services

Egyptian Best Practices Securing E-Services Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015: COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

Tech Report. Targeted attack on. France s TV5Monde

Tech Report. Targeted attack on. France s TV5Monde Tech Report Targeted attack on France s TV5Monde May 05, 2015 Tabel of Content Introduction... 3 Attack Outline... 3 Findings #1: Njrat and Njworm, based in the Middle East... 6 Findings #2: Source code

More information

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your

More information

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager [email protected]

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager Helmi.rais@ansi.tn Fast overview about the CERT-TCC Helmi Rais CERT-TCC Team Manager [email protected] Les IT en Tunisie: Quelques Statistiques Les IT en Tunisie: Quelques Statistiques a fast Historical Overview end 1999

More information

Distributed Denial of Service protection

Distributed Denial of Service protection Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd michaels@radware.com Riga. Baltic IT&T. 21.04. Data Centers Protection from DoS attacks. Trends and solutions Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.2010 Cybercrime Trends Page 2 Types of DoS attacks and classical

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

HEC Security & Compliance

HEC Security & Compliance HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information

More information

Cisco RSA Announcement Update

Cisco RSA Announcement Update Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of

More information

Reducing Application Vulnerabilities by Security Engineering

Reducing Application Vulnerabilities by Security Engineering Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information

More information

Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

The Security Organization p. 1 Anecdote p. 2. Introduction

The Security Organization p. 1 Anecdote p. 2. Introduction Preface p. xxiii Introduction p. xxv The Security Organization p. 1 Anecdote p. 2 Introduction p. 2 Where to Put the Security Team p. 2 Where Should Security Sit? Below the IT Director Report p. 3 Where

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information