Cyber Security a Global Challenge; What and how Thailand is doing



Similar documents
Cyber Security and Critical Information Infrastructure

Cyber Security ( Lao PDR )

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Emerging Security Technological Threats

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber Essentials Scheme

Information Security Threat Trends

Top tips for improved network security

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

BSA-ISSA Information Security Study Online Survey of ISSA Members

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Introduction (Contd )

Reducing Application Vulnerabilities by Security Engineering

National Cyber Security Policy -2013

The Information Security Problem

Capacity Building to Strengthen Cybersecurity: Thailand Update

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Attacks from the Inside

Managing Security Risks in Modern IT Networks

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Common Cyber Threats. Common cyber threats include:

Chapter 1: Information Security Fundamentals. Security+ Guide to Network Security Fundamentals Second Edition

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Information Security and Risk Management

^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Patch and Vulnerability Management Program

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Cybersecurity and Incident Response Initiatives: Brazil and Americas

A New Approach to Assessing Advanced Threat Solutions

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Cisco Security IntelliShield Alert Manager Service

Cyber Security solutions

Security aspects of e-tailing. Chapter 7

Section 12 MUST BE COMPLETED BY: 4/22

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Top 10 Tips to Keep Your Small Business Safe

ISO27032 Guidelines for Cyber Security

Malware & Botnets. Botnets

What legal aspects are needed to address specific ICT related issues?

Promoting Network Security (A Service Provider Perspective)

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

(Instructor-led; 3 Days)

Nine Steps to Smart Security for Small Businesses

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

2014 State of Endpoint Risk. Sponsored by Lumension. Independently conducted by Ponemon Institute LLC Publication Date: December 2013

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

INFORMATION SECURITY FOR YOUR AGENCY

Cisco ASA 5500 Series Business Edition

Policies and Practices on Network Security of MIIT

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

How-To Guide: Cyber Security. Content Provided by

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

Defending Against Cyber Attacks with SessionLevel Network Security

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Defending Against Data Beaches: Internal Controls for Cybersecurity

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Business Case. for an. Information Security Awareness Program

Current Threat Scenario and Recent Attack Trends

Security awareness training is not a substitute for the LEADS Security Policy.

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Global Cybersecurity Index Good Practices

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

DDoS Attacks & Defenses

Cyber Security Threats and Countermeasures

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

Security Controls What Works. Southside Virginia Community College: Security Awareness

ABB s approach concerning IS Security for Automation Systems

SECURITY. Risk & Compliance Services

Cyber Security Solutions:

Transcription:

Cyber Security a Global Challenge; What and how Thailand is doing Pansak SIRIRUCHATAPONG Executive Director National Electronics and Computer Technology Center February 19, 2009 1

Global IT Security Market According to RNCOS The global IT security market (includes security software & security appliances) is expected to grow at a CAGR (Compound Annual Growth Rate) of 15.5% through 2012 from 2008, according to RNCOS The increasing number of IT security attacks, ongoing vulnerability discoveries, and the need for companies to comply with new legislations are fostering the growth of global IT security market. The Asia-Pacific region is anticipated to account for the majority of IT security solutions market by 2012. 2

Internet Usage in Thailand Millions 14 12 Thailand Internet user 10 8 6 4 2 0 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 Year Source : http://internet.nectec.or.th/webstats/internetuser.iir?sec=internetuser 3

Thailand IT Security Market Thai Government 's enforcement of the Computer Crime Act B.E.2550 (2007) create awareness in businesses about information security. It alerts businesses to protect their information technology system and requires businesses to keep computer traffic data for at least 90 days. This is the driver to push Thailand IT security market growing. Overall IT security market is approximately 3,000 to 5,000 million baht (100-150 million US$) and still growing and expanding in Thailand. Approximately 2-million customers in government and private sectors More than 50% not ready for the Computer Crime Act, and have no IT security system 4

หมายเหต@ รCปแสดง Cyber Threat ตIาง ๆ ทLMกOาลQงเปRนปTญหาอยC IในปTจจ@บQน ปTญหาใหญIในวQนนL[ก\ค^อ เร^Mอง Spyware, Phishing, SPAM และ Peer-to-Peer Exploit 5

Trends Of Information Security Mobile Devices Government Action Attack Targets Attack Techniques Defensive Strategies BCP, DRP, Security Standard 6

Mobile Devices 1. Laptop encryption will be made mandatory at many government agencies and other organizations that store customer/patient data and will be preinstalled on new equipment. 2. Theft on PDA smart phones will grow significantly. Both the value of the devices for resale and their content will draw large numbers of thieves 7

Government Action 1. Legislation : Congress and state governments will pass more legislation governing the protection of customer information. state attorneys general and state legislatures will find ways to enact harsh penalties for organizations that lose sensitive personal information 8

Attack Target 1. Government agencies : Targeted attacks will be more prevalent, in particular on government agencies, demonstrating the failure of federal cyber security activities. Other antagonistic nations and terrorist groups will radically expand the number of attacks. Targeted attacks on commercial organizations will target military contractors and businesses with valuable customer information. 9

Attack Target 1. Cell phone worms : infect 100,000 phone, jumping form phone to phone over wireless data network. Cell Phone are more powerful. That makes them fertile territory for attackers fueled by cellphone adware profitability 2. Voice over IP (VoIP) : deployed hastily without fully understanding security 10

Attack Techniques 1. Spyware will continue to be huge and growing issue. 2. 0-day vulnerabilities will result in major outbreaks resulting in many thousands of PCs being infected worldwide. 3. BotNet bundled with rootkits : rootkits will change the operating system to hide the attack s presence 11

Defensive Strategies 1. Network Access Control will become common and will grow in sophistication. As defending laptops becomes increasingly difficult, large organizations will try to protect their internal networks and users by testing computers that want to connect to the internal network. Tests will grow from today s simple configuration checks and virus signature validation to deeper analysis searching for traces of malicious code 12

Thai s ICT laws Electronic Transaction Act 2001 Computer Crime Law 2006 Data Protection Law (On process) Electronic Fund Transfer Law (On process) 13

Nectec s roles in ICT Policy Policy and Planning Development Steering Committee (คณะอน@กรรมการนโยบายและแผน) E-Transaction and Government Business Supervisory Steering Committee (คณะอน@กรรมการกOากQบดCแลธ@รกkจบรkการเกLMยวกQบธ@รกรรมทาง อkเล\กทรอนkกสlและธ@รกรรมทางอkเล\กทรอนkกสlภาครQฐ) Legal Infrastructure Steering Committee (คณะอน@กรรมการโครงสรpางพ^ [นฐานทางกฎหมาย) E-Transaction Support Steering Committee (คณะอน@กรรมการสIงเสรkมและสนQบสน@นการประกอบธ@รกkจเกL MยวกQบธ@รกรรมทาง อkเล\กทรอนkกสl) Security Steering Committee (คณะอน@กรรมการดpานความมQMนคง) Thailand PKI Forum Steering Committee (คณะอน@กรรมการโครงการ Thailand PKI Forum ) 14

Security Road map 15

Information Security Big Picture Security Management Risk Policy, Law, Regulation, Ethnic Security Standard i.e. BS7799 /ISO17799 Vulnerability & Threat attack ASSETS Availability Confidentiality Integrity Cryptography, Network Security, Physical Security, Wireless Security, Malicious Code, BCP, etc. Security Implementation 16

How to operate Information Security T Technology P Process P People 17

Causes of Security Problem Technology Lack of security feature Bug, hole, no patch No standard Hard to upto-date Process Design for security Role + Responsibility Audit, track Disaster plans Stay up-todate People Lack of knowledge Lack of commitment Lack of good communicati on Human error 18

Nectec provide ISO/IEC 27001 (Thai s version 1.0, 2.0) 19

ThaiCERT CERT Computer Emergency Response Team An organization or a team that provides, to defined constituency, services and support for both preventing and responding the computer security incidents. 20

International Forum Collaboration ThaiCERT is a full member of APCERT (Asia Pacific Computer Emergency Response Team) Training collaboration on computer security techniques with APCERT Incidence response coordination (continuously) Incidence response drill (July 28 th, 2006) ThaiCERT is a national CERT in Thailand supported by FIRST (Forum of Incident Response and Security Team) Point of contact for ITU Forum for spam mail protection 21

International Forum Collaboration Play roles in APT Forum (Asia Pacific Telecommunity Forum) in raising the level of many important security issues, such as security standards, spam problems Play roles in e-security Task Group under APEC TEL Working Group Play roles in RAISS Forum (Regional Asia Information Security Standards) in security standard activities 22

About ThaiCERT Ministry of Science and Technology National Science and Development Agency (NSTDA) National Electronics and Computer Technology Center (NECTEC) Thai Computer Emergency Response Team (ThaiCERT) Thailand National CERT Full member of FIRST, APCERT www.thaicert.org 23

Objectives of ThaiCERT To handle the computer crime and coordinate with the related organization. To gain the knowledge and skill in the information security which is the factor effect to the stability of Thailand. To establish the team, which can handle the incidence of computer security and develop team personnel s skill. 24

ThaiCERT Services Public Services User security awareness raising i.e. publication of security knowledge on the web, and Safety-Net Booklet E-learning on computer security Incident Response Virus Alert Security Advisory Incident Coordinator 25

ThaiCERT Website 26

Incident Response Process 1 Via E-Mail,Call,Web,Fax 2 3 Attacker Reporting Process Verify 5 NO 4 Coordination Process Site Constituency Checking YES 6 Analysis and response 27

Constituency NSTDA and under NECTEC BIOTEC MTEC NANOTEC Government organizations some ISPs other organizations by request 28

Thank you for your attention. 29