Korea s s Approach to Network Security



Similar documents
Cyber security Country Experience: Establishment of Information Security Projects.

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Cyber Security Recommendations October 29, 2002

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Trends and Tactics in Cyber- Terrorism

Safety & Security: Cyber Security

THE CURRENT SITUATION AND COUNTERMEASURES TO CYBERCRIME AND CYBER-TERROR IN THE REPUBLIC OF KOREA

DATA PROTECTION LAWS OF THE WORLD. India

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

CYBER SECURITY IN INDIA

Legislative Language

Network Security and the Small Business

Current counter-measures and responses by CERTs

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

Using big data analytics to identify malicious content: a case study on spam s

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Attachment G.18. SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change. 03 July, 2015

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Korea s experience of massive DDoS attacks from Botnet

Network Security in Vietnam and VNCERT. Network Security in Vietnam and VNCERT

Future of the Internet Cyber Security

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the Proposed Cyber Security Information Act of Testimony

Bellevue University Cybersecurity Programs & Courses

How To Protect Information Security In Japanese Government Computers

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Educational Requirement Analysis for Information Security Professionals in Korea

Nationwide Cyber Security Survey

White Paper on Financial Industry Regulatory Climate

Cyber Security ( Lao PDR )

Cyber Security Threats and Countermeasures

Emerging risks for internet users

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

National Cyber Threat Information Sharing. System Strengthening Study

California State University, Chico. Information Security Incident Management Plan

ACE Advantage PRIVACY & NETWORK SECURITY

CYBERSPACE SECURITY CONTINUUM

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

more dangerous. One way that private entities may defend against cyber attacks is by

How To Audit The Mint'S Information Technology

GAO COMPUTER SECURITY. Progress Made, But Critical Federal Operations and Assets Remain at Risk. Testimony

What legal aspects are needed to address specific ICT related issues?

National Plan for Information Infrastructure Protection

Vulnerability Assessment & Compliance

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Protecting Organizations from Cyber Attack

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION

Executive Director Centre for Cyber Victim Counselling /

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Policies and Practices on Network Security of MIIT

Contingency Planning in ICSA Member Countries

Actions and Recommendations (A/R) Summary

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

MIC s Efforts on Cybersecurity Human Resource Development

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Safe Internet, Happy Future!

Korea s Innovative GIDC Development

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Cyber-Security: Private-Sector Efforts Addressing Cyber Threats

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Information Assurance. and Critical Infrastructure Protection

Security Measures of Personal Information of Smart Home PC

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Cyber security in an organization-transcending way

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. CHAPTER I GENERAL PROVISIONS

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Security Assessment through Google Tools -Focusing on the Korea University Website

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Promoting a cyber security culture and demand compliance with minimum security standards;

Information Security Summit 2005

Multi-Step Security System

Korean Space Law Dr. Joon Lee Korea Aerospace Research Institute.

ITU National Cybersecurity/CIIP Self-Assessment Tool

Cyber/ Network Security. FINEX Global

Thank you for your very kind introduction.

Cybersecurity Strategy of the Republic of Cyprus

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

An Overview of Cybersecurity and Cybercrime in Taiwan

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager

Better secure IT equipment and systems

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Subject: Critical Infrastructure Identification, Prioritization, and Protection

KCC announces 'Comprehensive Plans for Smart Mobile Security'

Incident Object Description and Exchange Format

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India

National Cyber Security Policy -2013

U. S. Attorney Office Northern District of Texas March 2013

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

Transcription:

Korea s s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1

Contents Advancement in the Information Society and New Threats Information Infrastructure Protection Act Information Infrastructure Protection Framework Incident Prevention and Response Other Activities Future Policy Direction 2

Advancement in the Information Society and New Threats 3

Rapid Growth in in Information Society World s Best Info-Communication Infrastructure and Dramatic Increase of Internet Users Connect Every Region of the Country with Info-Super-highway Approximately 25 Million Internet Users (Dec. 2001) 1999.1 2000.8 2000.12 2001.12 Users (in thousands) Percentage of Users 9,433 16,403 19,045 24,380 22.4 38.5 44.7 56.0 More than 7.8 Million Broadband Subscribers (Dec. 2001) 4

Importance of of the Information Infrastructure Increased Dependency on IT Systems E-Government E-Business E-Education E-Healthcare, etc. Increased Interdependency National Administration Network, Korean Education Network, Online Banking, Electronic Commerce, etc. 5

Challenges & Threats to to the Information Society Hacking and Computer Virus Viruses, Trojan Horses, Logic Bombs, Internet worm Manipulation or Destruction of Operating Systems, Application Software or Data Manipulation by Insiders Manipulation of Communication Links Information Warfare, etc. < Hacking & Computer Virus Incidents in '99 - '01 > 70,000 65,033 60,000 50,000 40,000 30,000 39,348 50,124 hacking incidents Computer Viruses incidents 20,000 10,000-5,333 572 1,943 1999? 2000? 2001? 6

Information Infrastructure Protection Act 7

Legislation ( Background I ) MIC Director General for Information Security Cyber Crime Investigation bodies in Public Prosecutors office Internet Crime Investigation Center, SPPO Computer Crime Investigation Squad in 20 District PPO KNPA Cyber Terror Response Center MoD, NIS, MoGHHA, etc Korea Information Security Agency, etc 8

Legislation ( Background II II ) Facilities protected by Diverse Laws in each Sectors Focused on Physical Protection Insufficient Counter-Measures against Cyber-Attack Outbreak of Cyber-Attacks on Internet Web-sites DoS Attack on Yahoo, CNN, e-bay, etc. (Feb. 2000) Enormous Econo-Social Damage due to Cyber-Attack Need for Overall Info-Communication Infrastructure Protection Initiatives 9

Information Infrastructure Protection Act ( ( 1 ) ) Developments Ministerial Meeting on the Prevention of Cyber-Terrorism (Feb. 2000) Decided to Legislate a Law covering Comprehensive and Systematic Information Infrastructure Protection and Counter Measures against Cyber-Terrorism Legislation Committee (Feb. 2000 to Dec. 2000) Enactment of Information Infrastructure Protection Act (Jan. 2001) Effective from July 2001 Framework for II Protection 10

Information Infrastructure Protection Act ( ( 2 ) ) Outlines Establish Governmental Framework for Information Infrastructure Protection Committee on Protection of Information Infrastructure CII Related Ministries Infrastructure Management Bodies Protection Measures Selection and designation of CII Vulnerability Assessment => Protection Measures & Plans 11

Information Infrastructure Protection Act ( ( 3 ) ) Outlines (Cont.) Prevention & Response Prevention : Security Guideline, Protection Measures Response : Security Warning, Recovery Technical Support Development of Technologies International Cooperation Severer Punishment for Cyber Crimes against II 12

Information Infrastructure Protection Framework 13

Overall Government Protection Framework ( 1 ) Committee on the Protection of Information Infrastructure Chair : Prime Minister Members : Ministers related to CII Mission : Deliberation and Coordination of Selection of CII and Security Plans and Policies Ministers related to CII Designation of CII, Establishment of Security Plan Security Guidelines, Demand/Recommendation of Security Measures 14

Overall Government Protection Framework ( 2 ) CII Management bodies Vulnerability Assessment, Security Measures Cyber Incidents Prevention and Response Technical Supporting bodies Accredited Vulnerability Assessment bodies KISA ETRI Information Security Consulting Service Providers Technical support in vulnerability assessment, Security Measures Implementation, Prevention and Response 15

Designation of of CII ( 1 ) Information Infrastructure Electronic Control and Management Systems Information Systems and Communication Networks, etc. Critical Information Infrastructure Have Major Impact on National, Economic and Social Security Designated by Ministers through Committee on the Protection of Information Infrastructure 16

Designation of of CII ( 2 ) Criteria for Selection Importance of its Service to the People and Nation Reliance on CII in Performing its Missions Interconnection with other Information and Communication Infrastructures Scope of Impact on the Defense or Economic Security High Incidence, Difficulties of Efforts Needed for the Restoration 17

Vulnerability Assessment Who CII Management Body When How Within 6 Months after the Designation of CII Re-Assessment in Every Other Year Assessment by Infrastructure Management Body by assistance of Technical Supporting bodies Technical Supporting bodies KISA, ETRI, Information Security Consulting Service Provider 18

Plan & Measures for Protection Infrastructure Management Body After the Assessment, Develop Security Measures Submit Security measures to the Ministry Concerned Ministries Combine Individual Infrastructure Protection Measures to form a Security Plan under their Jurisdiction Committee on the Protection of Information Infrastructure Review and Coordinate Security Plans Developed by Ministers 19

Support ( 1 ) Korea Information Security Agency(KISA) Develop and Disseminate Information Security Guideline Used by Infrastructure Management Bodies and Industries Vulnerability Assessment Develop Security Measures, Provide Technical Support for Prevention and Recovery Develop and Disseminate II Security Technology 20

Support ( 2 ) Information Security Consulting Service Provider(ISCSP) Authorized by MIC to Provide Consulting Service regarding Vulnerability Assessment and Security Measure on CII Designation Requirements More than 15 Qualified Technical Engineers Capital greater than 2 Billion KRW (USD 1.5 M) Equipments provided in Presidential Decree 21

Support ( 3 ) Information Sharing and Analysis Center(ISAC) Prevention and Response to Incidents in Specific Sectors such as Financial or Telecommunication Mission Real-Time Warning and Analysis on Incidents Provide Information on Vulnerabilities and Countermeasures Vulnerability Assessment if Accredited by MIC Telecommunication ISAC established, Financial ISAC to be formed soon 22

Incident Prevention and Response 23

Incident Response Incident Response and Recovery ( 1 ) Self Response by Infrastructure Management Body Report to Minister, KISA or Investigation Offices If Necessary, Request for Technical Assistance from Technical Supporting bodies such as KISA, ETRI For Large Scale Incidents, Establish Temporary Incident Response Headquarters 24

Incident Response and Recovery ( 2 ) Recovery Prompt and Necessary Steps to Restore and Protect CII If necessary, Request for Technical Assistance from KISA International Cooperation Share Information on Vulnerability and Incident Responses (FIRST, APSIRC, etc) Collaborative Incident Investigation 25

Incident Response and Recovery ( 3 ) Incident Response Headquarters Established Temporarily, When Large Scale Incidents occurs, by the Chairman of the Committee on the Protection of Information Infrastructure Mission Emergency Response, Technical Assistance and Recovery Members Chief : Appointed by the Chairman(the Prime Minister) Members : Government Officers from the CII related Ministries, Civil Specialists for IT Security 26

Offences and Penalties Disrupt, Paralyze and Destroy Critical Information Infrastructure by Unauthorized Access to CII, or Fabrication, Destruction, etc., in excess of his or her authority. Installation of Malicious Programs/Code Denial of Service Attack => Imprisonment for 10 Years or a Fine of 100 Million Won Incidents against Ordinary Information Systems Imprisonment for 5 years or a fine of 50 Million Won 27

CII Protection related Activities Nov. 2001, 9 Companies were Accredited as ISCSPs Dec. 2001, First Meeting of the Committee on Protection of the Information Infrastructure Meeting Designated 23 Infrastructures under 4 Ministries as CIIs MIC, MoGAHA, MoFA, MoHW First half of 2002 Vulnerability Assessment and Development of Security Measures for CIIs under way Develop Security Plans for 2003 2nd Designation of CIIs(Financial, Industrial Support Sectors) 28

Other Activities 29

Other Activities ( 1 ) Prevention and Awareness Program(MIC, KISA) Operation of Anti-Hacking & Virus Consulting Center Remote Vulnerability Assessment Anti-Hacking & Virus Day (15th of Every Month) Develop & Disseminate Security and Response Guidelines Education & Training for Managers(Schools, PC Room, Small & Middle Sized Companies) Early Warning & Alert System (e-was) (being developed) 30

Other Activities ( 2 ) Develop Cyber-Terror Prevention Technology E-WAS and Secure Messenger Real-Time Scan Detector(RTSD) Develop Vulnerability Assessment and Intrusion Detection Tools => Build Vulnerability DB Foster Industry Develop and Disseminate Information Security Technologies Information Security Industry Support Center(Test-Bed) 31

International Cooperation Other Activities(3) Participate in International Meetings including OECD, APEC, ITU Measures for Enhancing Information and Network Security Exchange of information with Regard to Policies and Practices Frameworks for Security Information Sharing Raise Awareness of Security by Education & Training Cross-border Information sharing on Incidents and Responses Promotion of International Cooperation on Cyber-Terror Prevention Technologies Cooperation on Cyber-Terror Investigation 32

Future Policy Direction 33

Future Policy Direction Continue to Improve and Develop Information Security Management Framework for II R&D on II Security Technologies Enhance Level of Information Security in Public / Private Sectors Strengthen International Cooperation Activities Global Leader, e-korea Global Leader, s-korea 34

Well begun is half done! 35