Introduction of the GCCD. (Global Cybersecurity Center for Development)



Similar documents
Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Cyber security Country Experience: Establishment of Information Security Projects.

Introduction to Cybersecurity Overview. October 2014

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

Romanian National Computer Security Incident Response Team CERT-RO.

Cyber Security ( Lao PDR )

ITU National Cybersecurity/CIIP Self-Assessment Tool

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cloud and Critical Information Infrastructures

Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Strategic Talent Management. March, 2012

DDoS Attacks & Defenses

Trends in Security Incidents and Hitachi s Activities

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

Towards closer EU-ASEAN collaboration in cybersecurity

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Security Threats on National Defense ICT based on IoT

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

Making our Cyber Space Safe

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Global Cybersecurity Index Good Practices

KCC announces 'Comprehensive Plans for Smart Mobile Security'

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Department of Homeland Security Federal Government Offerings, Products, and Services

Protecting critical infrastructure from Cyber-attack

NSA Surveillance, National Security and Privacy

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

Protecting Organizations from Cyber Attack

Promoting a cyber security culture and demand compliance with minimum security standards;

Capacity Building in Cyberspace Security

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

CYBERSECURITY INDEX OF INDICES

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Assuring Telecom (Infrastructure and Services) An Operations Perspective

Preventing and Defending Against Cyber Attacks November 2010

Cyber Security Trends and Challenges

OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE)

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia

Korea s Innovative GIDC Development

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Protecting against cyber threats and security breaches

Cyberspace Situational Awarness in National Security System

National Cybersecurity & Communications Integration Center (NCCIC)

Korea s experience of massive DDoS attacks from Botnet

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Critical Controls for Cyber Security.

Public Private Partnerships and National Input to International Cyber Security

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Harmful Interference into Satellite Telecommunications by Cyber Attack

International Strategy on Cybersecurity Cooperation

DANCERT RFC2350 Description Date: Dissemination Level:

National Cyber Security Strategy of Afghanistan (NCSA)

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

DDos Monitoring System using Cloud AV AhnLab, Inc. SiHaeng Cho, Director of R & D Center

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Legislative Language

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

How To Protect The Internet From Natural Disasters

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

A Research on Security Awareness and Countermeasures for the Single Server

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Actions and Recommendations (A/R) Summary

Policy Title: HIPAA Security Awareness and Training

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Capabilities for Cybersecurity Resilience

Enterprise Capabilities Descriptions

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Malware & Botnets. Botnets

Current counter-measures and responses by CERTs

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Transcription:

Introduction of the GCCD (Global Cybersecurity Center for Development)

Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD s Service for Developing Countries Implementation Schedule

I. Background What s happening on the Internet in 60 seconds? e-mail: 240 mill. are transmitted Flickr: 20 mill. photos are viewed Amazon: 47,000 app are downloaded Facebook: 6 mill. page views YouTube: 1.3 mill. videos are played Source: March 20, 2013 Daily of the UK 1

I. Background Cyberspace is becoming increasingly crucial for the creation of broader societal benefits. However these economic and social benefits might be put at risk by poor security, such as the growth in cyber crime or cyber attack against ICT network and system as a whole. Information & Telecommunications Banking Health Transportation E-Government Energy Water 2

I. Background Target : Expanded to national and social infrastructures A closed network isolated from the outside Attack and destroy A blaster worm caused the New York blackout (August 2003) Stuxnet infected through USB (July 2010) SCADA-controlled system Iran manipulated GPS signals to capture an American drone reconnaissance plane (December 2011) Cyber war between Russia-Estonia (2007) /Georgia cyber (2008) India hacked the intelligence bureau of Pakistan (March 2013) 3

II. Vision GCCD will bring together the knowledge and experience of Korea in cybersecurity, and its application in government and business services, with the WBG related expertise in development and poverty reduction, and its global reach and contacts in order to help developing countries build a trusted and secure environment. 4

III. Roles and Responsibilities (1) Capacity Building for securing cyber space is becoming crucial as security incidents are increasing all around the world. Roles and functions Capacity Building through Human Resource Development Key contents It will provide training courses for experts and policy-makers of WB member states, especially developing countries, in the field of cybersecurity. It will jointly review the information security guideline (information security Providing the standard guideline for Information Security management system, CERT building/operation, wireless LAN security, cloud service information security, standards for technical and administrative measures to protect personal information, etc.), published by KISA, and translate the standard guideline into English and disseminate it to developing countries. Free dissemination of security S/W in developing countries It will translate the security software (vaccines, firewall, self-inspection tools, etc.) developed by KISA and the private sector into English for developing countries and prevent the global dissemination of malicious codes and DDoS by disseminating it free of charge in developing countries 5

III. Roles and Responsibilities (2) It needs measures for Critical Information Infrastructure to provide secure protection against advanced hacking technologies. Roles and functions Providing information security measures for Critical Information Infrastructure Mobile Information Security Key contents It will disseminate the maturity check system for Critical Information Infrastructure (CII) Protection in developing countries to evaluate the protection level of the Critical Information Infrastructure in developing countries and provide response plans. It will develop the mobile information security check system for mobile apps so that a virtual machine is utilized to check for unauthorized data access or malicious code insertion. It will monitor the Internet networks of Worldbank member states without Computer Establishing the Early Warning System Security Incident Response Team (CSIRT) in real time, and if any sign of abnormality is detected, it will notify the country and neighboring countries so that the dissemination of malicious codes and traffic can be blocked in early stage. Hacking simulation and vulnerability consulting It will simulate the internal systems of the governments and public institutions of member states with professional equipment, and develop the simulation system for assessing vulnerability through simulation attacks and performing defense training. 6

IV. Organizational Structure and Facilities Organization is consists of Steering Committee, Director, Cooperation Team, Outreach Team, Academy Team, R&D Team and Management. (Total (at least) 19 Staffs until 2017) Cooperation Team : 3 staffs(csirt, External Partnership, etc. ) Outreach Team : 3 staffs(ciip, F/S, etc.) Capacity Building Team : 3 staffs(development, Operation, etc.) R&D Team : 3 staffs(mobile security, Standardization, etc.) Management Team : 5 staffs(planning, Accounting, Administration, etc. ) Co-Directors : 2 staffs The function and organization of the center will be established in three years time frame by stages. Minimum requirements for the center to start business and operate educational programs are as below. Office, Lecture, Laboratory, Conference rooms should be equipped A variety of N/W equipments, Hacking simulation equipments, and Briefing and Monitoring facilities for CSIRT should be added to the Center for future activities. 7

V. Partnership Plan GCCD is going to be set up with close cooperation between Korean government and World Bank Korean Gov. (MSIP, KISA) Korea-Worldbank Co-Workshop Cybersecurity Experts F/S on Cybersecurity ICT Expert Training Course Developing Countries WB GCCD International Organization World Bank ICT Project Analyze cybersecurity component and apply it Other Organizations (EBRD, AfDB, WEF, IDB, ADB, ASEAN, APEC, OAS, OECD, ITU IMPACT, ENISA, etc.) Global ICT Companies Academy (Univ. of Oxford - Global Cyber Security Capacity Centre, a couple of Korean Universities) Member States External Partner 8

VI. GCCD s Service for Developing Countries Countries hoping to enlist help from the GCCD in establishing information security system can benefit from the center s professional support as the following. Information Security Expert Training Course Consultation for CIIP (Critical Information Infrastructure Protection) Local advisory to help build information security system Educate public officials from developing countries by dispatching them to the GCCD (In-Kind Contribution) 9

Ⅶ. Implementation Schedule Aim to open the center in 2 nd Half of 2014 March Design Detailed Action Plan (Schedule, Fund, Location, Environment setup etc.) Selection of a hosting city April~ Conduct F/S to establish the WB GCCD July~ Employment of Personnel of the Center Building of cooperation relationship with WB GCCD Building of Partnership with companies Development of courses and subjects Installation of Facilities (N/W, PC, etc.) December Opening of the center (2 nd Half of 2014) 10