Cyber Security in Japan (v.2)

Similar documents
Cybersecurity Strategy in Japan

How To Protect Critical Infrastructure

An Overview of Cybersecurity and Cybercrime in Taiwan

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012

Cyber Crime and Digital Forensics in Japan

Working Towards the 2020 Tokyo Olympics

Cyber Security Threats and Countermeasures

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

Information security education for students in Japan

MIC s Efforts on Cybersecurity Human Resource Development

Global Cybersecurity Index Good Practices

The Second Action Plan on. Information Security Measures for. Critical Infrastructures. Safety as a matter of course for our daily lives

Basic Law on Intellectual Property (Law No.122 of 2002) (Provisional Translation)

Executive Director Centre for Cyber Victim Counselling /

About Botnet, and the influence that Botnet gives to broadband ISP

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Cyber Security Recommendations October 29, 2002

Promoting a cyber security culture and demand compliance with minimum security standards;

Acceptable Use Policy

Computer Crime & Security Survey

Information Security Outreach and Awareness Program. July 8, 2011 Established by the Information Security Policy Council

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Viewpoint: Implementing Japan s New Cyber Security Strategy*

Provisional Translation

National Cyber Security Strategy of Afghanistan (NCSA)

Trends Concerning Cyberspace

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Privacy and Security in Healthcare

International Strategy on Cybersecurity Cooperation

National Cyber Crime Unit

Security Intelligence

How To Prevent Cyber Crime

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Strategies for Countering Cyber Threats

Australia s proposed accession to the Council of Europe Convention on Cybercrime

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Information Security Human Resource Development Program

CSSC-CL Announces ISASecure Certification of Hitachi and Yokogawa Industrial Control Devices. ~For More Globally Competitive Control System Devices ~

SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT Employee Technology Acceptable Use Agreement

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Acceptable Use (Anti-Abuse) Policy

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of

Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl

Policies and Practices on Network Security of MIIT

The European Response to the rising Cyber Threat

Computer Crime & Security Survey

FKCC AUP/LOCAL AUTHORITY

Mustafa AYDINLI NLO CYBER SECURITY ADVISOR

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

El Camino College Homeland Security Spring 2016 Courses

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

U. S. Attorney Office Northern District of Texas March 2013

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, June 2006)

CYBERSECURITY EXAMINATION SWEEP SUMMARY

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Acceptable Use Policy ("AUP")

SPEAR PHISHING AN ENTRY POINT FOR APTS

2009 Antispyware Coalition Public Workshop

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

The Danish Cyber and Information Security Strategy

Contact Points on Government Procurement as of January 1, 2005

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Vulnerability Disclosure Guideline for Software Developers

Cyber-Crime Protection

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; (COLLECTIVELY BROADVOX )

Response to the Great East Japan Earthquake By the Ministry of Health, Labour and Welfare, the Government of Japan

Transcription:

Cyber Security in Japan (v.2) Ryusuke Masuoka (masuoka@cipps.org) and Tsutomu Ishino (ishino@cipps.org) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December 2012

Outline Japanese Government s Approach Situation in Japan NISC and Four Key Agencies Cyber Incidents Cybercrime Trends in Japan References 1

JAPANESE GOVERNMENT S APPROACH 2

Approach by Japanese Government Cross-sectional Framework Lead by Cabinet Secretariat Director-General: Prime Minister Vice Director-Generals: Minister of State for Science and Technology Policy Chief Cabinet Secretary Minister of Internal Affairs Minister of Economy, Trade and Industry Members: All other Ministers of State and Experts (10) Secretariat IT Strategic Headquarters Cabinet Secretariat IT Dep t Chief : Assistant Chief Cabinet Secretary (Domestic affairs) Agencies in charge of critical infrastructures Financial Services Agency: Financial Institutes Minister of Internal Affairs: Municipals, Communication Ministry of Health, Labour and Welfare: Hospitals, Water Minister of Economy, Trade and Industry: Electric Power, Gas Ministry of Land, Infrastructure, Transport and Tourism: Railways, Airlines, Distribution Other agencies Ministry of Education, Culture, Sports, Science and Technology: Cyber Security Education Chairman: Chief Cabinet Secretary Deputy Chairman: Minister of State for Science and Technology Policy Members: CISO Conference Secretariat Director: Assistant Chief Cabinet Secretary (Risk & Security) Deputy Director: Councillor, Cabinet Secretariat (2) Cabinet Counsellors (6) Advisors on Information Security (3) Information Security Policy Council National Public Safety Commission Chairman Minister of Internal Affairs Minister of Economy, Trade and Industry Minister of Defense Members from the private-sector (6) Special Committee on Critical Infrastructures National Information Security Center (NISC) Special Committee on Technological Strategy National Police Agency Ministers from four key agencies Special Committee on Edification and Education Four Key Agencies Ministry of Internal Affairs and Communications Ministry of Economy, Trade and Industry Ministry of Defense 3 Critical Infrastructures Governmental Agencies Businesses Individuals

NISC and Four Key Agencies National Information Security Center (NISC) Coordinating government efforts National Police Agency (NPA) Fighting Cybercrimes Ministry of Internal Affairs and Communications (MIC) Communication and Network Policies Ministry of Economy, Trade and Industry (METI) IT Policies Ministry of Defense (MOD) National Security 4

SITUATION IN JAPAN 5

Situation in Japan - Started bearing fruit, but still a long way to go Wake up call Mitsubishi Heavy Industries (MHI), Sep. 2011 Cyber security particularly hot after a cyber attack on MHI revealed Anonymous hits Japan July 2012 (Sony in 2011) Stuxnet raised awareness for cyber attacks on critical infrastructures Many relevant books published Information Security 2012 July 2012 http://www.nisc.go.jp/eng/pdf/is2012 eng.pdf 1. Strengthening Measures for Sophisticated Threats to Companies and Organizations Handling Important National Information on Security 2. Maintaining a Safe and Secure User Environment for Addressing the Emerging Risks Associated with the Proliferation of New Information and Communications Technology Including the Full-Fledged Widespread Use of Smart Phones 3. Reinforcement of International Alliances 6

Situation in Japan - Progresses and Setbacks Progresses Laws are being updated Cybercrime Convention into force 1 Nov. 2012 MOD stands up to meet the challenges beyond its IT infrastructure Control System Security Center (CSSC) Mar. 2012 Setbacks PC Hijack Case Concern of too many pilots 7

NISC AND FOUR KEY AGENCIES 8

National Information Security Center (NISC) - Coordinating government efforts Information Security 2012 July 2012 http://www.nisc.go.jp/eng/pdf/is2012 eng.pdf 1. Strengthening Measures for Sophisticated Threats to Companies and Organizations Handling Important National Information on Security 2. Maintaining a Safe and Secure User Environment for Addressing the Emerging Risks Associated with the Proliferation of New Information and Communications Technology Including the Full-Fledged Widespread Use of Smart Phones 3. Reinforcement of International Alliances FY2013 31.5B JPY Planned (Japanese Government Total) 9

National Police Agency (NPA) Fighting Cybercrimes Cyber-Security Activities 1. Cyber Force Center (Reorganized 140 IT Staffs of NPA) 2. Information sharing with CCI-Designated Companies 3. Council to Prevent Unauthorized Communications to Counter Cyber-Intelligence (with 4,800 companies all over Japan) FY 2013 2.4B JPY Planned 1. Improve response capability against cybercrimes 2. Improve response capability against cyber attacks to state secrets and critical infrastructures 3. Extend international collaboration 4. Keep analysis and law enforcement capabilities up to date with changing IT technologies and laws CCI: Counter Cyber Intelligence 10

Ministry of Internal Affairs and Communications (MIC) - Communication and Network Policies Cyber Security Activities Cyber Attack Analysis Council, jointly with METI IPA, JPCERT/CC, NICT, Telecom-ISAC Japan Smart Phone Information Security FY2013 3.66B JPY Planned Comprehensive security environment ready for new types of cyber attacks 2.62B JPY IPA: Information-technology Promotion Agency, Japan JPCERT/CC: Japan Computer Emergency Response Team Coordination Center METI: Ministry of Economy, Trade and Industry NICT: National institution of information and communications technology Telecom-ISAC Japan: Telecom Information Sharing and Analysis Center Japan 11

Ministry of Economy, Trade and Industry (METI) - IT Policies Cyber Security Activities Initiative for Cyber Security Information sharing Partnership Japan (J-CSIP) Information sharing of cyber attacks Cyber Attack Analysis Council, jointly with MIC IPA, JPCERT/CC, NICT, Telecom-ISAC Japan Building a pool of advanced information security experts National security competitions, etc. Securing control systems Cyber security exercises, etc. Control System Security Center (CSSC) Mar. 2012 Established in Tokyo and Tsunami-affected area (Miyagi Reconstruction Park) FY 2013-2.15B JPY Planned Information security promotion projects 1.6B JPY Hubs for security verification and education Control systems test beds at CSSC - 0.55B JPY IPA: Information-technology Promotion Agency, Japan JPCERT/CC: Japan Computer Emergency Response Team Coordination Center MIC: Ministry of Internal Affairs and Communications NICT: National institution of information and communications technology Telecom-ISAC Japan: Telecom Information Sharing and Analysis Center Japan 12

Ministry of Defense (MOD) National Security Cyber Security Activities 6 core approaches 1. Improve information and telecommunication systems security 2. Reinforce protection systems 3. Prepare rules and regulations 4. Develop Human resources 5. Promote information sharing 6. R&D of latest technologies FY 2013 21.2B JPY Planned Cyberspace Guard (tentative name) ~100 members, 10B JPY MOD Cyber Range 1.59B JPY Add network monitoring equipment Training through Japan-U.S. joint exercises 13

CYBER INCIDENTS 14

Case: Advanced Persistent Threat (APT) (4) Final Attack Execution (3) System Survey Confidential Info Obtained Attacker Spear Phishing Email (0) Preliminary Investigation (1) Initial Penetration (2) Building Attack Infrastructure Based on a Fujitsu slide, Modified by CIPPS 15

Case: PC Hijack 2012 TOR (6) Culprit Writes commands TOR? TOR Livedoor Shitaraba BB (Used as C&C) Uploads software with virus to Dropbox (1) Post to 2 Channel with link to Dropbox file Reads commands regularly Dropbox Timer.zip (BKDR_SYSIE.A) 2 Channel Siberia Super Fast BB (2) Siberia PO 405th [Repost Request] Executes software and gets infected (7) (9) Writes Post is done when successful Software BB Is there software like? Part. 149 How about this? http://... Reads the post and downloads software Announces crime plans (5) Suspect (11) Arrests him based on IP Address (4) (8) 8/1 (8) 7/29 BB: Bulletin Board C&C: Command and Control TOR: The Onion Router This figure based on http://d.hatena.ne.jp/ Kango/20121008/1349660951 JAL (Customer Service) Unsuspecting proxy to repost Osaka City (Suggestion Box) (10) (3) (3) Proxy Consults with police 16

CYBERCRIME TRENDS IN JAPAN 17

Cybercrime Offenses Cleared 8,000 7,000 6,000 5,000 4,000 1,442 113 1,740 2,534 247 195 1,601 133 248 105 Unauthorized Access Violations 3,000 2,000 3,918 4,334 3,961 5,199 5,388 Crimes Targeting Computers / Electronic Records Networking Crimes 1,000 0 2007 2008 2009 2010 2011 Source: NPA 18

Networking Crimes Cleared in 2011 - Details Violations of Trademark Law 4% Copyright Infringements 7% Others 16% Unauthorized Access Violations 4% Crimes Targeting Computers / Electronic Records 2% Frauds 16% Violations of Youth Protection Laws 8% Networking Crimes Child Pornography Offenses 15% Child Prostitution Offenses 8% Violations of Dating Site Regulation Act 8% Distribution of Obscene Materials 12% Source: NPA 19

Cybercrime Counseling 90,000 80,000 70,000 60,000 50,000 40,000 73,193 7,644 3,497 3,005 12,707 8,871 4,645 81,994 9,095 4,039 4,522 8,990 11,516 6,038 83,739 9,502 3,785 4,183 7,859 11,557 6,538 75,810 10,009 3,847 3,668 6,905 10,212 9,836 80,273 11,259 3,382 4,619 5,905 10,549 11,667 Others Illegal / Harmful Information Unauthorized Accesses / Computer Viruses Auctioning Defamation / Libels Spams 30,000 Frauds / Fraudulent Businesses 20,000 32,824 37,794 40,315 31,333 32,892 10,000 0 2007 2008 2009 2010 2011 Source: NPA 20

Calls to Internet Hotline Center (IHC) Calls Forwarded to Police 189,388 182,757 Harmful Information Illegal Information 44,683 9,667 41,400 4,827 33,968 143,280 140,391 6,217 20,333 16,418 3,600 6,122 27,751 35,016 36,573 91,769 12,818 14,211 2007 2008 2009 2010 2011 8,310 8,221 20,659 22,964 23,846 Calls about Illegal/Harmful Information 2007 2008 2009 2010 2011 Source: NPA 21

REFERENCES 22

References Documents Information Security 2012, http://www.nisc.go.jp/eng/pdf/is2012 eng.pdf Japanese Government's Efforts to Address Information Security Issues (November 2007), http://www.nisc.go.jp/eng/pdf/overview eng.pdf The White Paper on Police 2011 [Digest Edition] Cyber Security in Special Feature II http://www.npa.go.jp/hakusyo/h23/english/contents WHITE PAPER on POLICE2011.htm Police of Japan 2012 Section 7 of Community Safety on Cybercrime http://www.npa.go.jp/english/kokusai/2012contents.htm Organizations CIPPS: Center for International Public Policy Studies http://cipps.org/english/ IPA: Information-technology Promotion Agency, Japan http://www.ipa.go.jp/index-e.html JPCERT/CC: Japan Computer Emergency Response Team Coordination Center http://www.jpcert.or.jp/english/ NICT: National institution of information and communications technology http://www.nict.go.jp/en/ NISC: National Information Security Center http://www.nisc.go.jp/eng/ Telecom-ISAC Japan: Telecom Information Sharing and Analysis Center Japan https://www.telecom-isac.jp/english/ 23