GEORGIA S SUCCESSFUL JOURNEY TO E-GOVERNMENT
|
|
|
- Linette Murphy
- 10 years ago
- Views:
Transcription
1 GEORGIA S SUCCESSFUL JOURNEY TO E-GOVERNMENT E-GOVERNMENT DEVELOPMENT IN GEORGIA Irakli Gvenetadze LEPL Data Exchange Agency Ministry of Justice of Georgia
2 GEORGIA
3 GEORGIA COUNTRY PROFILE Population: 4.2 million Capital: Tbilisi Area: 69,700 sq. km Highest point is Mkinvartsveri 5047 meter
4 GEORGIAN ALPHABET
5 GEORGIAN NATIONAL COSTUME
6 UN E-GOVERNMENT SURVEY 2014 GEORGIA Rank 2014 Rank 2012 Rank 2010 Rank 2008 E-Government E-Participation
7 GDP PER CAPITA
8 RELATION BETWEEN EGDI AND NATIONAL INCOME (GNI PER CAPITA), LOVER-MIDDLE INCOME COUNTRIES
9 WHERE GEORGIA STARTED FROM Business Registry Create information systems Digitalize internal information resources Automate information flows Create data centers Establish connection between agencies and regional offices
10 IT CRUCIAL TO DELIVER REFORM BENEFITS In Georgia, reforms were taking place actively since M ain attention was paid to business process optimization and transparency in organization processes. Reform Efficiency Transparency Time Cost Availability Accountability INFORMATION TECHNOLOGIES
11 IMPLEMENTED PROJECTS P roperty registration, e-abstracts, Business Registry Civil Registry e-id and e-signature Biometrical Passport e-filing system in the Ministry of Finance of Georgia- 90 % of taxpayers are actively using this system; Automation of tax and customs systems (the process is ongoing as reforms taking place in this direction require changes in business processes); Case management system of tax dispute resolution; Central data storage and reporting system; Electronic Treasury project. e-treasury Cash register management automation project-planned for next year; Electronic system for writing out VAT invoices; Automation of the Ministry of Internal Affairs; Case management program for Ombudsman; Computerization of schools. Schools are equipped with computers and by the end of the this year all schools (2300) will be connected to internet; Netbooks for all first graders Student Information System-ongoing; National school exam on-line Automated case management system for court system; project is in decisive phase and system is being introduced in offices Centralized criminal case management is being introduced; e-procurement; e-auction of state property; e-auction of real estate of Tbilisi City Hall; Automation project of Enforcement Bureau e-notary project; Electronic directory system for state newspaper and legislative base Official Gazette; Automation project of Social Subsidies Agency Real Time Gross Settlement System of National Bank Investment Management System of National Bank Core Banking System of National Bank Chancellery automation project is being implemented in all large ministries. Criminal case management system
12 RECURRING PROBLEMS Limited budget No security Shortage of qualified personnel No standards Infrastructure expensive Data incompatibility
13 GGN GEORGIAN GOVERNMENTAL NETWORK Design and tender procurement Contract signed Sept. 1, governmental offices connected by the end of 2007 More than 500 governmental offices connected in 2008 Since 2009, more than 1,000 governmental connections including schools Government connected throughout Georgia with no investment, only paid 25% of commercial prices for internet and telephone.
14 E-GOVERNMENT COMMISSION E-government development consulting body for government of Georgia Steering committee for GGN project
15 ARCHITECTURE OF E-GOVERNANCE SERVICES
16 ORGANIZATION CENTRIC
17 CITIZEN CENTRIC
18 CONNECTED GOVERNMENT Receive Information in Real Time Effectively Distribute Resources Health Care and Social Security Monitor Results Proper Planning of State Budget Municipalities Agriculture Data Exchange Agency Georgian Government Gateway Redundancies Eliminated Education
19 CITIZEN S CENTRIC SYSTEM Unified Automated Statistical Data State E-Governance System Automated Data Processing Medical Service Migration, Registration Education Property Demographic and other Personal Data CITIZEN Economic Activities State Development Planning, Forecast Social Condition Effective Public Policy
20 DEA DATA EXCHANGE AGENCY Due to the abovementioned problems, the need for establishment of an entity with relevant authority became inevitable, which would support the following activities: Development and coordination of E-Governance Development of legal and regulative framework Ensure information and cyber security Establishment of the integrated data exchange system and ensure access to information resources Parliament of Georgia adopted a law on the establishment of Legal entity of public law under the Ministry of Justice of Georgia - Data Exchange Agency on the basis of which since 1 January 2010, Data Exchange Agency (DEA) started its activities.
21 E-GOVERNMENT GOVERNANCE ECO SYSTEM Government of Georgia PM Ministry of Justice E-Government Governmental Commission Data Exchange Agency CIO Council - Consulting Body for Government 1. Implementation Body for Government 2. Administration Body for Commissions
22 DATA EXCHANGE INFRASTRUCTURE Citizen Ministry of Justice Response Ministry of Finance Bank Data Exchange Agency Request Ministry of Education Business Request Ministry of Health Response Other ministries Ministry of Internal Affairs
23 G3 GEORGIAN GOVERNMENTAL GATEWAY
24 G3 FUNCTIONAL DESIGN External Applications Portal e-services Catalog Submission application (not a part of GG delivery) e-forms SOAP API WS Federation Web Interface GovTalk HTTP POST Web Services (SOAP) Submission() Storages SQL Identity provider Registration & Enrolment Audit and Monitoring Audit log Transaction & Messaging Receiving module Priority Services Notification engine Known facts Admin Msgs Submission logging Routing Services Application Integration DIS Audit and Monitoring Audit log Internal Information System Communicationto Receiving module
25 MY.GOV.GE CITIZEN S PORTAL
26 CITIZEN S PERSONAL PAGE
27 PROPERTY
28 CITIZEN S ADDRESS OF REGISTRATION
29 ONLINE BUSINESS REGISTRATION
30 UTILITY PAYMENTS
31 RECOMMENDATION TO IMPROVE SERVICES
32 DEA Citizen s portal Joint document exchange system Guaranteed electronic delivery system Trade facilitation System TFS
33 TRADE FACILITATION SYSTEM TFS See Ports International Traders Shipping Lines Suppliers Trade Facilitation System Forwarder Companies Railway Tax & Custom Banks & Insurance Companies Terminals
34 E-ID CARD
35 ID CARD - WHAT IS IT? WHAT IT DOES? Identification Document Travel Document Proximity Card Online Identification Digital Signature
36 ID CARD - ONE CHIP - TWO INTERFACES Contact Contactless
37 PUBLIC SERVICE HALL - TBILISI
38 CONTACTLESS INTERFACE Work ID Card Proximity Card Loyalty Card Student Card Many other uses
39 CONTACT INTERFACE TWO CERTIFICATES Online Identification Digital Signature
40 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE
41 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE
42 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE
43 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE
44 PUBLIC SERVICE HALL EVERYTHING IN ONE SPACE
45 BATUMI
46 KVARELI
47 RUSTAVI
48 KUTAISI
49 OZURGETI
50 MESTIA
51 TBILISI SEPTEMBER 2012
52 E-GOVERNMENT LEGISLATIVE FRAMEWORK e-document and e-signature law 2007 Law on Creation of Data Exchange Agency 2010 Law on Unified Information Registry 2011 Law on Information Security 2012 Law on Personal Data Protection 2012
53 LAW OF GEORGIA ON UNIFIED STATE REGISTRY OF INFORMATION Aim of the Law: establishment of a unified state registry of registers, databases, services and information systems within the public sector of Georgia A supplementary act Instruction on standards and procedures of working with the Registry of Registers, as well as manual on the use of web-portal Categories of information to be submitted: Establishment of a registry or service (initial registration) Significant amendment of a registry or service Merger, division, revocation, deletion, transfer or archiving a registry or service Data Exchange Agency as implementer
54 E-GOVERNMENT STRATEGY
55 E-GOVERNMENT STRATEGY e-services e-participation and Open Government e-health Public Finance Management System e-business ICT-Hub Georgia Infrastructure e-security Skills and e-inclusion Enabling frameworks and governance Awareness
56 INFORMATIONAL SECURITY AVAILABILITY INTEGRITY CONFIDENTIALITY false information network jamming intrusions information stealing system paralyzing
57 CYBER SECURITY ECOSYSTEM Security Council Minister of Justice Data Exchange Agency Ministry of Internal Affair 24/7 Cyber Crime Unit Minister of Defense Military Cyber Defense Unit
58 AUGUST 2008 Cyber attacks had far less impact on Georgia than they might on a more Internet-dependent county, where vital services like transportation, power and banking are tied to the Internet. Although reasons were also very crucial in terms of war in the country: Misinformation of real facts by Russian Media Aggression and patriotic spirit of Russian supporters. Block and cut off Georgian Internet resources Shut down media, forums, blogs in Georgia. Impact on the Georgia's visibility on the internet and ability to communicate with the world. Make panic and as much damage as possible to the critical infrastructures. 58
59 Who Attacked? Traffic origin comparison by hits 08/08/08 Before Attack Started 09/08/08 Under Attack Romania Record Holder! Guatemala & Indonesia? Who are these guys?!! 10/08/08 Only Georgian traffic allow ed
60 Who Attacked? You are loosers and will fail again just like in 90ies
61 Types of attacks beside physical Romania, Telecom Italia, Roma FreeBit, Tokyo France Telecom, Toulouse VolgaTelecom, Orenburg, Russia Link Egypt, Dokki-Giza Telefonica O2 Czech Republic, Prague Telefonica de Espana, Madrid Qualitynet Co., Kuwait Techauna AUNA, Barcelona Nexon Asia Pacific, Sydney Amazon Web Services, Seattle Telia Network, Sweden Belgacom ISP SA/NV, Bruxelles Business Communication Agency, Russia Telgua, Guatemala Free SAS / ProXad, France Makedonski Telekom, Skopje Universal Telecom, Kiev, Ukraine Types of attacks: - SYN Flood - Ping Flood - Http Flood - Defacement - SPAM - SQL Injections Protocols: - HTTP - ICMP - FTP - SMTP - DNS - BGP
62 WHAT WE KNOW ABOUT HOW IT WAS DONE POWER TO THE PEOPLE Russian Hackers web sites (StopGeorgia.ru and Xakep.ru) spreaded all necessary information and tools how to attack Georgian web-sites Target web sites and codes for attacks were posted in comments of hundred forums, blogs, news and entertainment web-sites Interested individuals were asking others to help and to join in by continually sending ICMP traffic via the 'ping' and explaining how to do it. At the same time ready bat files designed to attack Georgian websites detailed list of websites attack Georgian websites were spreader using file exchange programs. Exam ple: Interpressnews.ge (New s agency) detected traffic of about 150 MB. Site was periodically going down or working too slow
63 WHAT WE KNOW ABOUT HOW IT WAS DONE HACKERS TRICKS Geographically distributed BOTNETS * sessions per IP per server SQL INJECTION of more than 100 sites *Exam ples: ww.president.gov.ge/index.php?l=g&m =0&sm=3&id=2693+union+select+1,2,3,4,5,6,7,8,9,0,1,2,3,4,5 Attempts of BGP hijacking Websites hacking *Maybe hackers knew some passwords Spamming of addresses According to many facts, It seems that cyber attacks were planned before the actual war started.
64 Approximately 90% of all gov.ge domain addresses and significant fraction of.ge domain addresses were affected by DDos attacks.
65
66 Government and so on
67 News and so on.
68 EVERYTHING ELSE and so on
69 Things to wonder about From Shadowserver, sampling of previous DDoS targets from the same botnets involved in the Georgia attacks: carder.biz Divaescort.com payclubs.biz night-fairy.com vodkaescort.net cc-hack.eu igame.ru i-german.net
70 HOW MEDIA CAN INFLUENCE THE WORLD Attacks of civil.ge after news that Estonia is in business of site hosting 70
71 WIN32/GEORBOT Malware was found in Georgian Governmental Agencies including ministries, parliament, banks, NGO s. Purpose of the malware was Collecting Sensitive, Confidential Information about Georgian and American Security Documents 71
72 WIN32/GEORBOT The Win32/Georbot malware has the following functionalities for stealing information from an infected system: Send any file from the local hard drive to the remote server. Steal certificates Search the hard drive for Microsoft Word documents Search the hard drive for remote desktop configuration files Take screenshots Record audio using the microphone Record video using the webcam Scan the local network to identify other hosts on the same network Execute arbitrary commands on the infected system The commands are activated manually and were sent to each host individually rather than being broadcast to all infected hosts. 72
73 TARGETED AUDIENCE Cyber Attack was designed very smartly. Various Georgian News-Related web-sites were hacked and modified only Specific News pages (eg. NATO delegation Visit in Georgia, US-Georgian Agreements and Meetings, Georgian Military NEWS) Site about the NEWS from Caucasian Region Caucasus Energy and Infrastructure Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site Georgian NEWS Site 73
74 EXAMPLE OF INJECTED SCRIPT INTO THE HACKED NEWS WEBSITE 74
75 WIN32/GEORBOT COMMAND & CONTROL SERVERS September, 2010 georgiaonline.xp3.biz (United States) FreeWebHostingArea.com March, 2011 ema.gov.ge (Georgia) (hacked webserver) April, (France) OVH Hosting June, / (Germany) DME Hosting October, (Hungary) Net23.hu November, (United States) December, (Czech Republic) January, (Germany) DME Hosting March, (Germany) DME Hosting 75
76 GEORBOT Not detected with Major Antivirus Product, Bypasses Windows 7 sp1 patched, with Firewall enabled. After Executing calc.exe itself does 3 major things: Before installing bot checks if the computer is located in UTC+3, UTC+4 Time-zone. injecting into iexplorer.exe and communicating to defaced sites, for C&C address retrieval creating usbserv.exe bot file in Application Data directory, and writing it to autorun in Windows Registry. 76
77 LEGAL FRAMEWORK Cyber Security Strategy for E-Government Strategy for Other Strategic Documents 1. Information Security Law (2012) 2. Personal Data Protection ( 2012) 3. Cyber Crime Chapter on Crime Code. (U 2010) 1. Cyber Crime Convention 24/7 2. All Major IPR Conventions 3. Processing of Personal Data Conventions (1981) CERT.GOV.GE Computer emergency Response Team Charter Presidential Decrees Approval List of Critical Information System Subjects. Requirements of Information Security Officer working in Critical Information System Subjects. Decrees of Network Sensor Configuration. Decrees of Minimal Security Requirements for Critical Information System Subjects. Decrees of Asset Management Requirements for Critical Information System Subjects. Decrees of Information Security Audit Body Accreditation. Decrees of Information Security Audit Requirements in Critical Information System Subjects
78 CYBER SECURITY STRATEGY OF GEORGIA Basic Principles Cyber Security Strategy Whole-of-Government Approach. Public-private Cooperation. Active International Cooperation. Cyber Security Strategy Main Domains Research and analysis New legislative framework Institutional coordination for ensuring cyber security Public awareness and education International cooperation
79 INFORMATION AND CYBER SECURITY Information Security policy development, implementation, monitoring. CERT.GOV.GE (Computer Emergency Response Team) Military Public Sector + Subject of Critical Infrastructure Systems State Secret
80 INFORMATION SECURITY & POLICY DIVISION Information Security Team CERT.GOV.GE Team All Team Members are BSI Certified Professionals: BSI/ISO (Information Security) LI/LA BSI/ISO (Business Continuity) LI/LA BSI/ISO 9001 (Quality Management) LA All CERT Team members are SANS Certified Professionals: SANS GIAC Certified Professionals ISO (Risk Management) 4 Member of the team are: CISM (Certified Information Security Manager) 2 Member of the team are: CISA (Certified Information System Auditor)
81 INFORMATION SECURITY Management Services Consulting Service Review of Information Securitydocumentation: Policy, Plans, Audit reportand etc. 36 ISMS Implementation Service Current Projects: Service Development Agency; Public Registry of Georgia 2 Certified Course in Management Systems ( Introduction, Implementation and Internal Auditin Information Security Management Systems, Certification Exam). 105 NATO SPS Project Trained Professionals from Moldova and Montenegro 40 Information Systems Audit Service
82 CERT.GOV.GE CERT.GOV.GE The Cyber security Executing Arm Of The UNITED NATIONS SPECIALISED AGENCY of The International Telecommunication Union (ITU) Partners: The Trusted Introducer - a.k.a. TI - is the trusted backbone of the Security and Incident Response Team community in Europe FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programs. CERT-EE
83 CERT.GOV.GE Services and Activities Proactive Services: Incident Handling IncidentSupport System Detection of Infected Web Sites Safe DNS Other Services: Source and Binary Code Analyze Service. Malware Analyze Service. Penetration Test Service Monitoring Service IP Monitoring Services. Network Monitoring System Special Activities & Awareness Cyber Security Forum Annual GITI Regional Conference Website (dea.gov.ge), Facebook (certgovge) Media Campaign (TV, Internet) Wall Calendar 83 Course in Cyber Security and Incident Handling Basic Incident Handling 20 NATO SPS Project Trained Professionals from Afghan, Macedonia, Moldova and Montenegro 90
84 INFORMATION SECURITY AWARENESS
85 GITI GEORGIAN IT INNOVATION EVENT 2008
86 THANK YOU FOR YOUR ATTENTION! Irakli Gvenetadze LEPL Data Exchange Agency Ministry of Justice of Georgia
DEVELOPMENT OF ICT AND INNOVATIONS IN GEORGIA
MINISTRY OF ECONOMY AND SUSTAINABLE DEVELOPMENT OF GEORGIA GEORGIA S INNOVATION AND TECHNOLOGY AGENCY DEVELOPMENT OF ICT AND INNOVATIONS IN GEORGIA Priorities and Projects IRAKLI KASHIBADZE Chairman,,
CERT-GOV-GE Activities & Services
CERT-GOV-GE Activities & Services Tbilisi, Georgia 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and Policy division of
CYBER ESPIONAGE. Against Georgian Government. (Georbot Botnet) CERT.GOV.GE. LEPL Data Exchange Agency. Ministry of Justice of Georgia
CYBER ESPIONAGE Against Georgian Government (Georbot Botnet) CERT.GOV.GE LEPL Data Exchange Agency Ministry of Justice of Georgia 1 P a g e Summary In march, 2011 CERT-Georgia which is Governmental Computer
CERT-GOV-GE Activities & International Partnerships
CERT-GOV-GE Activities & International Partnerships Zurich, Switzerland 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and
E - G O V E R N M E N T. G E
N E W S L E T T E R Issue #1 May, 2012 I N S I D E T H I S I S S U E Y O U W I L L R E A D A L L E - S E R V I C E S U N D E R A S I N G L E P O R T A L M Y. G O V. G E A L L E - S E R V I C E S U N D
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Georgia. Progress Report
Anti-Corruption Network for Eastern Europe and Central Asia Istanbul Anti-Corruption Action Plan Second Round of Monitoring Georgia Progress Report Report is presented by Georgia at the 10 th Monitoring
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Introducing Elements of E-Government E Russia: Achievements, Lessons Learnt, and Possible Prospects
Introducing Elements of E-Government E in Russia: Achievements, Lessons Learnt, and Possible Prospects Yelena Dobrolyubova General Director Center for Economic and Financial Consulting UNDESA Expert Group
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers
How to Protect Your from Hackers Web attacks are the greatest threat facing organizations today. In the last year, Web attacks have brought down businesses of all sizes and resulted in massive-scale data
Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected]
Promoting a Cybersecurity Culture: Tunisian Experience ITU Regional Cybersecurity Forum for Eastern and Southern Africa Lusaka, Zambia, 25-28 August 2008 Helmi Rais CERT-TCC Team Manager National Agency
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
E-governance development history in Georgia
E-governance development history in Georgia In 2010 under the Ministry of Justice, LEPL Data Exchange Agency has been created. One of the main priorities of the agency is support of e-governance development
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
honeytarg Chapter Activities
honeytarg Chapter Activities Marcelo Chaves [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th
Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016 DDoS Atacks: Detection, Analysis and Mitigation Lucimara Desiderá [email protected] Klaus Steding-Jessen [email protected] Internet Governance in Brazil:
Kaspersky DDoS Prevention
Kaspersky DDoS Prevention The rapid development of the online services industry and remote customer service systems forces entrepreneurs to consider how they can protect and ensure access to their resources.
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Cyber Security ( Lao PDR )
ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 616 Securing Windows Infrastructure Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape now requires
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd [email protected]
Protection against DDoS and WEB attacks Michael Soukonnik Radware Ltd [email protected] Landscape Ponemon Research 2012: Cyber security threats Cyber security threats according to risk mitigation priority
Current Threat Scenario and Recent Attack Trends
Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks
EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Understanding Security Testing
Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many
Egyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Tech Report. Targeted attack on. France s TV5Monde
Tech Report Targeted attack on France s TV5Monde May 05, 2015 Tabel of Content Introduction... 3 Attack Outline... 3 Findings #1: Njrat and Njworm, based in the Middle East... 6 Findings #2: Source code
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your
Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager [email protected]
Fast overview about the CERT-TCC Helmi Rais CERT-TCC Team Manager [email protected] Les IT en Tunisie: Quelques Statistiques Les IT en Tunisie: Quelques Statistiques a fast Historical Overview end 1999
Distributed Denial of Service protection
Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.
Data Centers Protection from DoS attacks. Trends and solutions Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.2010 Cybercrime Trends Page 2 Types of DoS attacks and classical
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
HEC Security & Compliance
HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
The Security Organization p. 1 Anecdote p. 2. Introduction
Preface p. xxiii Introduction p. xxv The Security Organization p. 1 Anecdote p. 2 Introduction p. 2 Where to Put the Security Team p. 2 Where Should Security Sit? Below the IT Director Report p. 3 Where
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
