Global Cybersecurity Center for Development Korea Internet & Security Agency Ministry of Science, ICT and Future Planning
Contents Ⅰ Background Ⅱ Vision Ⅲ Roles and Responsibilities Ⅳ Partnership Plan Ⅴ GCCD s Service for Developing Countries Ⅵ Implementation Schedule
I. Background What s happening on the Internet in 60 seconds? E-mail: 240 mill. are transmitted Flickr: 20 mill. photos are viewed Amazon: 47,000 app are downloaded Facebook: 6 mill. page views YouTube: 1.3 mill. videos are played Source: March 20, 2013 Daily of the UK 1
I. Background Cyberspace is becoming increasingly crucial for the creation of broader societal benefits. However these economic and social benefits might be put at risk by poor security, such as the growth in cyber crime or cyber attack against ICT network and system as a whole. Banking Information & Telecommunications Health Transportation Energy E-Government Water 2
I. Background Target : Expanded to national and social infrastructures A closed network isolated from the outside Attack and destroy A blaster worm caused the New York blackout (August 2003) Stuxnet infected through USB (July 2010) SCADA-controlled system Iran manipulated GPS signals to capture an American drone reconnaissance plane (December 2011) Cyber war between Russia-Estonia (2007) /Georgia cyber (2008) India hacked the intelligence bureau of Pakistan (March 2013) 3
II. Vision GCCD will bring together the knowledge and experience of Korea in cybersecurity, and its application in government and business services, with the GFCE Initiatives related expertise in development and bridging the digital divide, and its global reach and contacts in order to share experience and knowledge on cybersecurity with developing countries. 4
III. Roles and Responsibilities (1) Capacity Building for securing cyber space is becoming crucial as security incidents are increasing all around the world. Major functions Details Implementing training courses and educational programs It provides training courses for experts and policy-makers of developing countries, in the field of cybersecurity. Providing the standard & guideline for cybersecurity It will jointly review the cybersecurity guideline published in Korea. - Information security management system - CERT building/operation - cloud service information security 5
III. Roles and Responsibilities (2) It needs measures for Critical Information Infrastructure to provide secure protection against advanced hacking technologies. Major functions Details Providing Cybersecurity measurements for CIIP It will disseminate the maturity assessment for Critical Information Infrastructure Protection in developing countries. Hacking simulation and vulnerability consulting It will simulate the internal system of the government and public institutions of member states with professional equipment. 6
IV. Partnership Plan GCCD is exploring to build up close cooperation between Korean government and other organizations. Korean Gov. (MSIP, KISA) International Organization Cybersecurity Experts F/S on Cybersecurity Expert Training Course GFCE Initiatives Analyze cybersecurity component and apply it Other Organizations (WB, AfDB, IDB, ADB, OECD, ITU, etc.) GCCD Global ICT Companies Academy Developing Countries Partner countries (Univ. of Oxford - Global Cyber Security Capacity Centre, a couple of Korean Universities) External Partners 7
V. GCCD s Service for Developing Countries Countries hoping to enlist help from the GCCD in establishing information security system can benefit from the center s professional support as the following. Cybersecurity Expert Training Course(Policy and technical) Consultation for CIIP (Critical Information Infrastructure Protection) Local advisory to help build information security system Educate public officials from developing countries by dispatching them to the GCCD (In-Kind Contribution) 8
VI. Implementation Schedule Open the center in June, 2015 Major role Education & Training Consultation Details 15 16 17 18 19 Invitation-based training Joint seminar in local countries Online hacking simulation test Establishment of Cybersecurity MP Cybersecurity policy & strategies Diagnosis of Critical Networking Partnership with int l organizations Hosting global conference 9