Protection of Critical Information Infrastructure in Korea

Similar documents
Corporate Compliance vs. Enterprise-Wide Risk Management

Enterprise Risk Management Software Buyer s Guide

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24,

Portfolio approach to information technology security resource allocation decisions

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

In addition, the following elements form an integral part of the Agency strike prevention plan:

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Industrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Small Business Networking

Assessing authentically in the Graduate Diploma of Education

Psychological health and safety in the workplace Prevention, CAN/CSA-Z /BNQ /2013

VoIP for the Small Business

PETER M. ROSS 22 Four Oaks Crescent London, Ontario N6J 4B7 Telephone: /Facsimile: pmross@,uwo.

VoIP for the Small Business

Introducing Kashef for Application Monitoring

How To Network A Smll Business

VoIP for the Small Business

Balanced Scorecard. Linking Strategy to Actions. KPMG Swiss Practice Benchmarking Congress, Bürgenstock May 28 th, 1997, Roger Jaquet

VoIP for the Small Business

Curriculum for the Master Program in Accounting, Auditing and Taxation at the University of Innsbruck School of Management

Curriculum for the Master Program in Business Education at the University of Innsbruck School of Management

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

How To Set Up A Network For Your Business

Curriculum for the Master Program in Strategic Management at the University of Innsbruck School of Management

Innovative and applied research on big data platforms of smart heritage

How To Reduce Telecommunictions Costs

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

Small Business Networking

VoIP for the Small Business

VoIP for the Small Business

QUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C.

Small Business Networking

prevention loss Data loss strategies, data practices and tools are more important than ever. Here s what you need to know. i n s i d e p DLP: It s

Advanced Baseline and Release Management. Ed Taekema

Small Business Networking

VoIP for the Small Business

PROPERTY AND CASUALTY INSURANCE. Effects of the Nonadmitted and Reinsurance Reform Act of 2010

Governance, Risk, Compliance

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Unleashing the Power of Cloud

Health insurance exchanges What to expect in 2014

VoIP for the Small Business

Recognition Scheme Forensic Science Content Within Educational Programmes

Health insurance marketplace What to expect in 2014

The 8 Essential Layers of Small-Business IT Security

Performance Evaluation of Academic Libraries Implementation Model

File Storage Guidelines Intended Usage

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory

Health Information Systems: evaluation and performance of a Help Desk

A Study on Autonomous Cooperation between Things in Web of Things

Strategic Plan SACRED HEART MAJOR SEMINARY

Long Term Financial Planning

INJURY MANAGEMENT & REHABILITATION

Cecilia K.C. Fung. Department of Applied Science Institute of Vocational Education Hong Kong 1.0 ABSTRACT

COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials

Structuring. Your Business a Brazilian or in Brazil

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors

PEDAGOGICAL DESIGN FOR A CROSS-FUNCTIONAL COURSE IN THE ACCELERATED MBA PROGRAM

Information and Software Technology

Health insurance exchanges What to expect in 2014

Aarti Deveshwar and Dhawal Modi

Factors Affecting Electronic Medical Record System Adoption in Small Korean Hospitals

DEVELOPING A NEW GRADUATE PROGRAM IN HEALTHCARE MANAGEMENT: EMBRACING THE TRANSFORMATION OF HEALTHCARE MANAGEMENT EDUCATION ON A PATHWAY TO SUCCESS

Humana Critical Illness/Cancer

Application Bundles & Data Plans

Learner-oriented distance education supporting service system model and applied research

Improving Library Users' Perceived Quality, Satisfaction and Loyalty: An Integrated Measurement and Management System

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team

Transcription:

Protection of Criticl Informtion Infrstructure in Kore Kim, Woonyon 2005. 10 Ntionl Security Reserch Institute

Contents Ntionl Cyber Security Mngement System Criticl Informtion Infrstructure (CII) Mngement System Cse Study of Criticl Informtion Infrstructure Threts Conclusions

Estblishment of Ntionl Cyber Security Mngement System Internet crisis of Jnury 25, 2003 by Slmmer Worm Prlysis of internet bnking services shopping mll services A deepening informtion system dependency Ntionl infrstructure control systems tend to be connected to internet. We cn predict prlysis of criticl infrstructures from n internet ttck. Ntionl Cyber Security Mngement System

Cyber Security Mngement System President Ntionl Cyber Security Strtegy Council Centrl dministrtive Agencies Ntionl Cyber Security Countermesures Committee Locl Government Government-invested Orgniztion Government-ffilited institutions Reserch Institutes Legl Legl Bsis: Bsis: Ntionl Cyber Cyber Security Mngement Regultion (Presidentil Directive No.141)

Relevnt Lws Regultions Relevnt Lws Regultions Ntionl Intelligence Service Act (Security Affirs Regultion) Ntionl Cyber Security Mngement Regultion Frmework Guideline on Ntionl Informtion communiction Security E-Government Act Informtion Security Issues Functions of Ntionl Intelligence Service Security Activities for Documents, Mterils, Fcilities Ares relted to Ntionl Security Plnning Coordintion of Intelligence Security Affirs Provisions for Ntionl Cyber Security Orgniztionl Structure Opertion Apply to Informtion Communiction Networks of Ministries Agencies of Centrl Locl Government, s well s Public Agencies Bsic Activities for n Informtion Communiction Security Mngement of n Informtion Communiction Security Provisions for Protection Mesures ginst modifiction, disruption, disclosure or destruction of n Electronic document Informtion Infrstructure Protection Act Identify Criticl Informtion Communiction Infrstructure, n estblish implement Protection Pln Review ssess its Security Vulnerbility every 2 yers

Roles of Ntionl Intelligence Service Technicl support for criticl informtion infrstructure which is defined by Informtion Communiction Infrstructure Protection Act Supervising coordinting ll ntionl-level cyber security policies mngement systems Plnning Coordinting ntionl informtion security opertions Ntionl-wide comprehensive systemtic countermesures ginst cyber terror ttck Key roles re to protect criticl informtion infrstructures.

CII Mngement System Committee on on of of informtion infrstructure Coordinting Coordinting policy policy pln pln Improving Improving system system Delibertion Delibertion on on policy policy Reviewing Reviewing gend gend Ministries Assignment Assignment or or bolition bolition of of CII CII Estblish Estblish pln pln guidelines guidelines for for CII CII Crete Crete strds strds for for Vulnerbility Vulnerbility nlysis nlysis ssessment ssessment CII CII Mngement Body Body Implement Implement pln pln Anlyze Anlyze ssess ssess security security vulnerbilities vulnerbilities (every (every 2 2 yers) yers) Criticl Informtion Infrstructure

Cse for Ntionl Public Sectors Reverse Connection Top Secret Attcker (Abrod) Ntionl Orgniztions

Informtion shring mong ARF members Trends of Cyber Intrusions Globliztion of cyber ttcks Vrious types of cyber intrusions from simple to sophisticted ttcks Complicted ttcks Informtion shring mong ARF member countries Informtion shring of cyber threts Informtion shring of incidents responses Informtion Shring mong ARF Countries

Conclusions Cyber Security Mngement System is min system for protecting ntionl criticl informtion infrstructure. We need coopertion mong ARF member countries regrding cyber intrusion ttempts. Kore s ntionl cyber incidents response orgniztion : Ntionl Cyber Security Center Tel : 82-2-557 557-0264 E-Mil : info@ncsc.go.kr

Thnk you very much for your kind ttention.