Lith Networking and Network Marketing Safety



Similar documents
Romanian National Computer Security Incident Response Team CERT-RO.

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

ITU Cybersecurity Work Programme to Assist Developing Countries

ITU Global Cybersecurity Agenda (GCA)

COMMISSION OF THE EUROPEAN COMMUNITIES

What legal aspects are needed to address specific ICT related issues?

Security - A Holistic Approach to SMBs

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Draft WGIG Issues Paper on Spam

ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Policies and Practices on Network Security of MIIT

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security

Cyber security Country Experience: Establishment of Information Security Projects.

Bookmarks for Desktop Self-Defense

Clavister InSight TM. Protecting Values

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

e-government and Free Open Source Software Tomas Jonušas June 28, 2004

MEMORANDUM. Characterisation of actions to combat spam. Analysis of responses to questionnaire

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cybersecurity for ALL

Cyber Security and Critical Information Infrastructure

Security for Small Businesses: What's the Right Solution For You?

Top tips for improved network security

ENISA s contribution to the development of Network and Information Security within the Community

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

How To Understand The Security Posture Of Home Internet Users In Australia

Council 2014 Geneva, 6-15 May 2014

Cyber Security Threats and Countermeasures

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cyber Security Recommendations October 29, 2002

McAfee Total Protection Reduce the Complexity of Managing Security

ITU National Cybersecurity/CIIP Self-Assessment Tool

National Cyber Security Policy -2013

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Information Security Summit 2005

INTERNATIONAL TELECOMMUNICATION UNION

Information Security Threat Trends

(BDT) BDT/POL/CYB/Circular

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

CERT-GOV-GE Activities & International Partnerships

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

How To Write A Cybersecurity Framework

Domain 1 The Process of Auditing Information Systems

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Cybersecurity: Taking Stock and Looking Ahead

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

The global challenge

Protect Your Enterprise With the Leader in Secure Boundary Services

The EU s approach to Cyber Security and Defence

MANAGED SECURITY SERVICES

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

CERT-GOV-GE Activities & Services

Trend Micro Encryption (TMEE) Delivering Secure . Veli-Pekka Kusmin Pre-Sales Engineer

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Prof. Udo Helmbrecht

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

Charter of Consumer Rights in the Digital World

THE WORLD IS MOVING FAST, SECURITY FASTER.

Cyber security Indian perspective & Collaboration With EU


Limiting the Damage from a Denial of Service Attack

Network Security in Vietnam and VNCERT. Network Security in Vietnam and VNCERT

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Connect Smart for Business SME TOOLKIT

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

External Supplier Control Requirements

Incident Reporting Guidelines for Constituents (Public)

International Training Program 2011 ITU Global Cybersecurity Agenda

Is your business secure in a hosted world?

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

2012 Endpoint Security Best Practices Survey

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

How To Run A Realtime Blackhole List (Rbl) In Hkong Kong Ken Kong

Internet Security. Submitted Testimony of Dave McCurdy President Electronic Industries Alliance

Let us take care of your protection so you can focus on your business.

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Brainloop Cloud Security

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

Logging In: Auditing Cybersecurity in an Unsecure World

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Transcription:

DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva, 15-16 May 2006 1

Outline of the presentation Challenges in network and information security NRA actions area Direction to success: public and private sectors partnerships Conclusions 2

Trends in social life Majority of social relations is moving to the virtual space People use electronic communications ever more actively not only for finding important information on the Internet, but also for ordering and purchasing goods, paying for utility services and transferring money electronically. Developments in electronic devices and data transfer technologies allows connectivity to services anywhere, anytime. Unfortunately, together with social relations criminal activities are also moving to the virtual space. 3

Survey aiming to identify main problems The study demonstrated that the major part of users face computer viruses and spam. Lithuanian case 85 100 100 79 75 76 10 28 5 6 3 6 3 Users Enterprises ISP 44 24 Viruses Spam Intrusions Phishing DoS attacks Illegal content Taking into consideration that during the 20 years of existence of computer viruses approximately 150.000 viruses have been created and the fact that at present spam reaches 80% of the global e-mail volume, the results are not surprising. 4

Survey aiming to identify main problems Despite the fact, that majority of users employ different security tools, the quarter of home users and enterprises and most of ISPs suffer from threats to security. Lithuanian case 27 25 68 Home users Enterprises ISP Incurred damage due to security incidents Since all the Internet stream goes over ISPs networks, they naturally incur the biggest damage of security incidents. 5

Current challenges in network and information security Increasing complexity of networks and software; Internet has been created without security in mind; Lack of cross-jurisdictional regulatory measures; Critical infrastructures linkage to relatively insecure networks; Security underestimation in building of new technical platforms; Users themselves are responsible for vulnerability of the system; IT security balance with issues such as interoperability, privacy and ease of use. 6

NRA response to challenges Objective secure information society: Execution of CERT functions; Rising of consumer awareness; Reduction of security incidents negative impact; Enhancement of legal and standardization measures; Drafting law on electronic communication networks and information security in Lithuania; Inter-institutional and international cooperation; Staff training; Monitoring of network and information security situation. 7

Survey aiming to identify Lithuanian CERT map The survey, executed in 2005 showed that only 17% of ISP have introduced CERT units, 49% handle incidents only when they occur and the remaining part (34%) is in essence not ready to handle security incidents. Lithuanian case Different Lithuania s Internet networks have different security level, which brings negative effect to the general security situation 34 The ISP, having a CERT group 8 17 49 The ISP, not having a CERT group, but managing their IT security The ISP, not managing IT security

Specific actions: CERT functions ISP Sector is a critical spot. If efficient management of security incidents in the networks of ISP is ensured, there will be no need to resolve the security problems at the users level. Government resolution of 24 March 2005 projects creation of CERT within RRT till the end of 2006: coordination of incidents investigation and response to them; security alerts & warnings (EWS); prevention and exchange of information with other CERTs and similar organisations on national and international levels; promotion and advise of local CERTs establishment. Separate CERT teams need a coordination centre and country in/out contact point. 9

CERT international partnership RRT actively participates and collaborates within international CERT community: FIRST (Forum for Incident Response and Security Teams); TERENA (Trans-European Research and Education Networking Association); NATO CERT group on information and best practice exchange. TRANSITS training workshop for CERT on 29-30 March 2006 in Vilnius was a goog example of international cooperation: co-organized and sponsored by ENISA, TERENA and FIRST; CERT staff trained from numerous Europe and Asia countries; concentrated on operational, organizational and legal aspects of response to incidents. 10

In broader terms: public and private sectors partnership Broad policy for trust and security requires Public and Private Sectors Partnership: Industry, science and public authorities may ensure the right balance between technology development, regulations and policy measures; Risk assessment, management and mainly allocation require close cooperation between technological and regulatory levels; The right balance between governance, policy and market dynamics should be assessed in terms of economics; There is a need for understanding conflicts and synergies between consumer interests (including privacy) and economics; Demand for technology and regulation that lead to the desired economic growth whilst providing the desired level of consumer protection. 11

Lithuanian public and private sectors partnership: Rising of awareness In close cooperation with commerce banks 200.000 flyers with basic information about phishing threats have been distributed to users at time when growing phishing activities in Lithuania has been observed. 12

Lithuanian and private sectors partnership: Rising of awareness Interactive website www.esaugumas.lt has been created by NRA and now is being developed by numerous partners and is going to became the Internet portal of Lithuania for all interested parties which strive to provide the Internet consumers, organizations or institutions with relevant information on network and information security issues. For home users For enterprises For institutions CERT 13

Lithuanian and private sectors partnership: Inter-institutional cooperation RRT has signed The Memorandum of Understanding on the Progress in the Area of Security of Information and Networks with the Association of Lithuanian Banks and the Association "Infobalt. Memorandum PRIORITIES: I. Investigation of information and network security incidents; II. Usage of information and network security tools; III. Public education and training in the area of security; IV. Drafting of laws with the view to proper regulation of security of information and networks in the Republic of Lithuania. Memorandum Implementation Committee, formed of the representatives of the parties, is established to take care of implementation of the Memorandum and working projects. 14

Lithuanian actions: Reduction of negative impact RRT in cooperation with well-known security vendors work together on project Safeguard your computer! to produce particular tool for home users which will help to improve security on their personal computers. It will be realized through special CD with collection of necessary safeguard programs (antivirus, antispam, antispyware and other) and relevant information about secure use of Internet; About 100.000 CDs are planned to be issued and distributed for free; CD distribution action will go through Lithuanian regions in July 2006. 15

International partnership RRT actively participates and collaborates on international level: ENISA (European Network and Information Security Agency); IRG (Independent Regulators Group) IT security working group; ISACA association; London action plan combating spam; Spam zombies initiative. RRT in cooperation with ENISA and Ministry of Transport and Communications in November 2005 organized the European Network and Information Security Conference Readiness for advanced solutions on handling network and information security incidents. 16

Initiatives areas for international partnership Promotion of timely information exchange between CERT teams is extremely important for security incidents prevention. FIRST (Forum for Incident Response and Security Teams); TERENA (Trans-European Research and Education Networking Association). Botnet networks are a major reason of biggest part of incidents. Latest surveys show that botnets can connect up to hundreds thousands of compromised computers; so usually it s an international problem. FTC initiative Spam zombie is a good example and should be resumed and developed. It s necessary to promote security policy standards and security audit implementation for reaching more common worldwide security level of IT systems and products. ISACA (Forum for Incident Response and Security Teams). 17

International gaps There s a lack of general plan and precise work program for reaching global secure information technology. Internet network is not adapted to high-level security requirements and needs to be replaced by new generation protocols and standards that have more security options and should be promoted their worldwide implementation : IPv6 (internet protocol); DNSsec (Domain Name System Security Extension); SPF (Sender Policy Framework, extension for secure e-mail system). There are no contact points in some countries to deal with security issues and those white spots should be eliminated. 18

Conclusions An increasing usage of information technologies results in bigger threats. It is necessary to draw attention to the increasing number of incidents in virtual space and the growing professionalisms of perpetrators. Wide co-operation among various public and private sectors is needed in order to create coherent network that will effect security inside the region. ITU can be a body that will facilitate global actions based on the broad cooperation of various stakeholders in the IT security field. 19

Thank you for your attention Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) of the Republic of Lithuania Address: Algirdo Str. 27, 03219 Vilnius E-mail: tlamanauskas@rrt.lt Telephone: +370 5 210 56 27 20