Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning



Similar documents
Introduction of the GCCD. (Global Cybersecurity Center for Development)

Cyber security Country Experience: Establishment of Information Security Projects.

Romanian National Computer Security Incident Response Team CERT-RO.

Capacity Building in Cyberspace Security

Korea s s Approach to Network Security

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Introduction to Cybersecurity Overview. October 2014

Cybersecurity: Taking Stock and Looking Ahead

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Protection of Essential Infrastructure and Services

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Safety & Security: Cyber Security

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Bradford J. Willke, CISSP

Cyber Security Strategy of Georgia

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

ITU National Cybersecurity/CIIP Self-Assessment Tool

e-government of Korea

Cybersecurity in the Commonwealth: Setting the Stage

Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.

Cyber Security ( Lao PDR )

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7

Information security education for students in Japan

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

National Cyber Security Strategy of Afghanistan (NCSA)

On the European experience in critical infrastructure protection

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS

NSA Surveillance, National Security and Privacy

Cybersecurity Strategic Talent Management. March, 2012

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Energy Cybersecurity Regulatory Brief

Cloud and Critical Information Infrastructures

Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective

Cybersecurity in Nepal

The State-of-the-State of Control System Cyber Security

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

Executive Director Centre for Cyber Victim Counselling /

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Emerging Trends in Malware - Antivirus and Beyond

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

Information Security Outreach and Awareness Program. July 8, 2011 Established by the Information Security Policy Council

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Making our Cyber Space Safe

Cyber intelligence exchange in business environment : a battle for trust and data

OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE)

Cyber security Indian perspective & Collaboration With EU

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

ITU Global Cybersecurity Agenda (GCA)

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Towards closer EU-ASEAN collaboration in cybersecurity

Cyberspace Situational Awarness in National Security System

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Internet Access in Korea

Cyber Europe Key Findings and Recommendations

Qatar Computer Emergency Team

Guiding principles for security in a networked society

What is Cyber Liability

Cyber ITU. By Tomas Lamanauskas, ITU

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Cyber Diplomacy A New Component of Foreign Policy 6

CYBERSECURITY INDEX OF INDICES

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cybersecurity Strategy of the Republic of Cyprus

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Enterprise Capabilities Descriptions

THE CASE FOR AN INDIA-US PARTNERSHIP IN CYBERSECURITY

Women in an Age of Cyber Wars: Risks, Management and Opportunity

Promoting a cyber security culture and demand compliance with minimum security standards;

CYBERSPACE SECURITY CONTINUUM

Internet security: Shutting the doors to keep hackers off your network

Public Private Partnerships and National Input to International Cyber Security

WORKPLACE INTERNET, AND NETWORK USAGE POLICY

Hybrid Risk Management for Utility Networks

National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA

National Initiative for Cybersecurity Education

ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.

European Commission Per

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

National Cybersecurity & Communications Integration Center (NCCIC)

Harmful Interference into Satellite Telecommunications by Cyber Attack

Lessons from Defending Cyberspace

Transcription:

Global Cybersecurity Center for Development Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Contents Ⅰ Background Ⅱ Vision Ⅲ Roles and Responsibilities Ⅳ Partnership Plan Ⅴ GCCD s Service for Developing Countries Ⅵ Implementation Schedule

I. Background What s happening on the Internet in 60 seconds? E-mail: 240 mill. are transmitted Flickr: 20 mill. photos are viewed Amazon: 47,000 app are downloaded Facebook: 6 mill. page views YouTube: 1.3 mill. videos are played Source: March 20, 2013 Daily of the UK 1

I. Background Cyberspace is becoming increasingly crucial for the creation of broader societal benefits. However these economic and social benefits might be put at risk by poor security, such as the growth in cyber crime or cyber attack against ICT network and system as a whole. Banking Information & Telecommunications Health Transportation Energy E-Government Water 2

I. Background Target : Expanded to national and social infrastructures A closed network isolated from the outside Attack and destroy A blaster worm caused the New York blackout (August 2003) Stuxnet infected through USB (July 2010) SCADA-controlled system Iran manipulated GPS signals to capture an American drone reconnaissance plane (December 2011) Cyber war between Russia-Estonia (2007) /Georgia cyber (2008) India hacked the intelligence bureau of Pakistan (March 2013) 3

II. Vision GCCD will bring together the knowledge and experience of Korea in cybersecurity, and its application in government and business services, with the GFCE Initiatives related expertise in development and bridging the digital divide, and its global reach and contacts in order to share experience and knowledge on cybersecurity with developing countries. 4

III. Roles and Responsibilities (1) Capacity Building for securing cyber space is becoming crucial as security incidents are increasing all around the world. Major functions Details Implementing training courses and educational programs It provides training courses for experts and policy-makers of developing countries, in the field of cybersecurity. Providing the standard & guideline for cybersecurity It will jointly review the cybersecurity guideline published in Korea. - Information security management system - CERT building/operation - cloud service information security 5

III. Roles and Responsibilities (2) It needs measures for Critical Information Infrastructure to provide secure protection against advanced hacking technologies. Major functions Details Providing Cybersecurity measurements for CIIP It will disseminate the maturity assessment for Critical Information Infrastructure Protection in developing countries. Hacking simulation and vulnerability consulting It will simulate the internal system of the government and public institutions of member states with professional equipment. 6

IV. Partnership Plan GCCD is exploring to build up close cooperation between Korean government and other organizations. Korean Gov. (MSIP, KISA) International Organization Cybersecurity Experts F/S on Cybersecurity Expert Training Course GFCE Initiatives Analyze cybersecurity component and apply it Other Organizations (WB, AfDB, IDB, ADB, OECD, ITU, etc.) GCCD Global ICT Companies Academy Developing Countries Partner countries (Univ. of Oxford - Global Cyber Security Capacity Centre, a couple of Korean Universities) External Partners 7

V. GCCD s Service for Developing Countries Countries hoping to enlist help from the GCCD in establishing information security system can benefit from the center s professional support as the following. Cybersecurity Expert Training Course(Policy and technical) Consultation for CIIP (Critical Information Infrastructure Protection) Local advisory to help build information security system Educate public officials from developing countries by dispatching them to the GCCD (In-Kind Contribution) 8

VI. Implementation Schedule Open the center in June, 2015 Major role Education & Training Consultation Details 15 16 17 18 19 Invitation-based training Joint seminar in local countries Online hacking simulation test Establishment of Cybersecurity MP Cybersecurity policy & strategies Diagnosis of Critical Networking Partnership with int l organizations Hosting global conference 9