Presentation is loading. Please wait.

Presentation is loading. Please wait.

Recent Cyber Attacks and Countermeasures September 2006.

Similar presentations


Presentation on theme: "Recent Cyber Attacks and Countermeasures September 2006."— Presentation transcript:

1 Recent Cyber Attacks and Countermeasures September 2006

2 CONTENTS  B B B Basic Concept  C C C Cyber Attack Trends  C C C Countermeasure activities  F F F Future Plans

3 Basic Concept Potential factors and means Proactive actions Result of the attack Cyber Threat Cyber Attack Cyber Crisis Collection and analysis Detection and interception Countermeasures and management Countermeasures Characteristics

4 Cyber Attack Trends

5 Changes in IT Environment RFID, U-City, Ubiquitous, etc… e-Governmente-Government 2006 The rapidly growing dependence on the internet The rapidly growing dependence on the internet Second highest high-speed internet penetration in the world Second highest high-speed internet penetration in the world 33 million internet users (73%) 33 million internet users (73%) Advanced IT Network Advanced IT Network 2007 2008~

6 Current Status of Cyber Intrusion Incidents 136,261 25,980 35,670 60% 37% 54,275 140,000 2004 20,000 40,000 60,000 2005 Total Hacking (Unit: Case)

7 Trends of Cyber Attacks Advanced and Intelligent Methods of Attack Advanced and Intelligent Methods of Attack Security systems are disabled and used as a detour Security systems are disabled and used as a detour Shortened cycle Shortened cycle Major Damages Major Damages Advanced and Integrated IT Networks, Aggravated damages Advanced and Integrated IT Networks, Aggravated damages Different Purposes of Attack Different Purposes of Attack Curiosity & Showing Off → Financial & Information Theft Curiosity & Showing Off → Financial & Information Theft

8 Countermeasure Activities

9 National Cyber Security Management System Policy Adjustment NCSC Threat Information Analysis Information NetworkedOrganizationsDomestic and overseas CooperatingOrganizations National Cyber Security Strategy Council Private Public Military Countermeasure Technology Threat Information National Cyber Security Management Regulation (Presidential Directive No. 141)

10 Handling Cyber Crisis Create a Countermeasure Manual Create a Countermeasure Manual Include “cyber security” in the scope of national crisis management Include “cyber security” in the scope of national crisis management Specify countermeasure procedures for each warning level Specify countermeasure procedures for each warning level Integrated synthetic training for handling Cyber Crisis Integrated synthetic training for handling Cyber Crisis Develop virtual scenarios Develop virtual scenarios Verify the effectiveness of the manual and check to see if everyone is familiar with the procedures Verify the effectiveness of the manual and check to see if everyone is familiar with the procedures

11 Strengthening Cooperation Establish the ‘National CERT Council’ Establish the ‘National CERT Council’ Encourage the participation of professional organizations in security monitoring Encourage the participation of professional organizations in security monitoring Share threat information and technologies, and cooperate in handling cyber incidents Share threat information and technologies, and cooperate in handling cyber incidents Establish a ‘Cyber Security Council’ in Each Region Establish a ‘Cyber Security Council’ in Each Region Encourage the participation of regional government offices and high-tech businesses Encourage the participation of regional government offices and high-tech businesses Share security technologies and threat information Share security technologies and threat information

12 Entering into the CCRA (Common Criteria Recognition Arrangement) Background and Purpose Background and Purpose an information security round of advanced countries were organized an information security round of advanced countries were organized the use of internationally certified products were encouraged the use of internationally certified products were encouraged Join the arangement as a country that can issue a certificate (’06.5) Join the arangement as a country that can issue a certificate (’06.5) * CAP ( Certificate Authorizing Participants ) * CAP ( Certificate Authorizing Participants ) Promote the information security industry and improve its competitiveness Promote the information security industry and improve its competitiveness

13 Future Plans

14 Establishing an Information Sharing System AdministrationFinanceCommunicationEnergy Transportation Monitoring Center by Area Operation Center Main National Infrastructure Systems …….

15 Development of Technical Measures Take Security Measures regarding New IT Technologies Take Security Measures regarding New IT Technologies Ubiquitous Society, RFID (Radio Frequency Identification) tags Ubiquitous Society, RFID (Radio Frequency Identification) tags Develop Cyber Attack Detection Technologies Develop Cyber Attack Detection Technologies Study predictive methods based on statistics Study predictive methods based on statistics Develop new detection technologies and 3D visualization Develop new detection technologies and 3D visualization

16 Strengthening preventive activities Carry out ‘Cyber Security Assessment’ Carry out ‘Cyber Security Assessment’ Encourage government organizations to conduct security assessments on their own Encourage government organizations to conduct security assessments on their own Support customized security measures Support customized security measures Conduct Security Check-ups on major computing networks Conduct Security Check-ups on major computing networks For government organizations and high-tech businesses For government organizations and high-tech businesses Identify security holes and support security technologies Identify security holes and support security technologies

17 Promotion of Cyber Security Awareness Develop Cyber Security Training Programs Develop Cyber Security Training Programs Hold cyber security conferences for high-ranking government/corporate officials Hold cyber security conferences for high-ranking government/corporate officials Strengthen cyber security awareness programs for elementary and middle school students Strengthen cyber security awareness programs for elementary and middle school students Offer reward Money for Reporting Cyber incidents Offer reward Money for Reporting Cyber incidents Encourage citizens to report intrusion incidents and threat information Encourage citizens to report intrusion incidents and threat information

18 Thank you.  Phone : 82-2-557-0264  E-mail : info@ncsc.go.kr


Download ppt "Recent Cyber Attacks and Countermeasures September 2006."

Similar presentations


Ads by Google