Protecting Our Infrastructure: utilizing everything we have. Suguru Yamaguchi Advisor on Information Security, Cabinet Secretariat, Government of Japan.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Steps towards E-Government in Syria
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
E-commerce Strategies
Thailand National Focal Point for IFCS Chemical Safety Section Food and Drug Administration Ministry of Public Health July 2003.
DHS, National Cyber Security Division Overview
A Case Study of Kenya’s National Broadband Strategy
Network/Technology Infrastructure Plan Section 5 – 6 – 7 As prepared for the TUSD Governing Board Summer 2007 John Bratcher Network Security Systems Analyst.
INDUSTRIAL & SYSTEMS ENGINEERING
Chapter 15 The Third Component: Powerful Networks.
Supply Chain Management
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
HSGP Funding for Security Efforts Presented by Michele Robinson.
E-Business Romania Adriana Ţicău State Secretary for Information Technology Conferinţele Piaţa Financiară Bucharest, the 26 th of March 2002.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
BCNET Security Policies Jens Haeusser Information Security Officer, UBC and Chair, Security Working Group, BCNET Internet2 Joint Techs Vancouver, BC July.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
1 One Stop Shop eKosova Portal Think Big, Start Small Scale Fast A Framework for Development Ministry of Transport and Communication ICT Depatment
METI Realizing a World-Class “Highly Reliable Society” November 25, 2004 Yutaka Hayami Director, Office of IT Security Policy Ministry of Economy, Trade.
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Other Laws (Primarily for E-Government) COEN 351.
Business Data Communications, Fourth Edition Chapter 1: Introduction to Communications.
Utilizing BPL to create a 21 st Century Grid. Agenda > Electrical Infrastructure Review > Oncor Electric Delivery - Current Relationship > Project Status.
Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
NEW JICA and Project Evaluation
Roles and Responsibilities
1 Current Status of Broadband Services in Japan Hideki Yagi Communications and Information network Association of Japan 10th ATIE.
National Communications Commission 2006 International Digital Cities Convention - Broadband Policies and Regulatory Reform - NCC Chairman, Dr. Su Yeong-Chin.
A National approach to Cyber security/CIIP: Raising awareness.
Mr. Nguyen Trong Duong Director of Information Technology Department
Task Group on development of e-Government indicators (TGEG) 2008 Global Event on Measuring the Information Society Report on e-Government indicators 2008.
February 21, JAS Consultation between the Government of Tanzania and Development Partners February 21, 2006 Courtyard Hotel, Dar es Salaam.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Environmental Management System Definitions
Understanding and Building Basic Networks Chapter 6 Creating a Network.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.
Arnsburger Str. 64, Frankfurt, Germany Tel , Fax Internet:
ICT-C Meeting, 25 July 2007 Jacques Bus Head of Unit, INFSO-F5 “Security” ICT and Security FP7 Themes Joint Call on Critical Infrastructure Protection.
National Information Communication Technologies Strategy Vasif Khalafov “National strategy” working group - Web -
ICT Developments in Lao PDR Mr. Snith XAPHAKDY Director Telecom Division Ministry of Communication, Transport, Post and Construction. Lao P.D.R.
Chapter 1 The Data Communication Industry The best way to approach data communication The data communication industry Challenge & solution to business-oriented.
Institutional Frameworks and Leadership for E-government Development Kenji Hiramoto Executive Advisor to the Government CIO Cabinet Secretariat, Japan.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
A Framework for Marketing Management International Edition 2 Developing Marketing Strategies and Plans 1.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School THE INTERNET AND ELECTRONIC COMMERCE LESSON 10.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
September 2009Network Neutrality – the Norwegian ApproachPage 1 Network Neutrality – the Norwegian Approach Senior Adviser Frode Soerensen Norwegian Post.
CARIBBEAN WORKSHOP ON E-GOVERNMENT BEST PRACTICES Port of Spain, Trinidad & Tobago, July 26-28, 2005.
National Information Technology Center : An Introduction 1.
MGMT 452 Corporate Social Responsibility
PRESENTATION ON THE STATUS AND THE BUDGET OF THE RAILWAY SAFETY REGULATOR TO THE PORTFOLIO COMMITTEE ON TRANSPORT PARLIAMENT OF THE REBUPLIC OF SOUTH.
CONNECTING TO THE INTERNET
Information Technology Sector
Chapter 17 Risks, Security and Disaster Recovery
Systems Security Solutions, Inc.
Part 1 Marketing Strategy and Customer Relationships
eGov Strategy of Kazakhstan
The Current Issues in IPv6 Policy
Infrastructure investments – source of future well-being
Presentation transcript:

Protecting Our Infrastructure: utilizing everything we have. Suguru Yamaguchi Advisor on Information Security, Cabinet Secretariat, Government of Japan

Large-scale Accident in Critical Infrastructure  Typical Examples –Mizuho Bank ( ) –FDP at Tokyo ATC ( )  Hard for Gov. to know what’s going on.→ first response is always in their hand.  Troubles/Accidents at Dependable infrastructure make huge impacts on our life.  Prevention  Response: minimize impact and involved areas  Learn from accidents: analysis and expertise (読売新聞:2002年4月3日報道写真)

Analysis on Inter-dependency among Critical Infrastructure By JST RISTEX Mission Program II Area with Large impact 0 hr.1 hr.12 hr.24 hr. Simulation on spreading impact on social systems in the case of critical accidents on core system of large scale bank in Japan (simulation)

Internet = Critical Infrastructure  Internet is critical infrastructure –Various kinds of our activities are now on the Internet. Online banking / reservations / shopping and commerce / money transfer / …. –We can’t imagine our life without the Internet.  “Dependable” infrastructure –What and how we can make this? –Need research

Internet: Global and Ubiquitous Infrastructure for Communication Communication Technology Wireless Satellite ATM Optical Fiber Copper Cable WDM/SDH ISDN Internet Technology CATV Cable Modem Society TCP/IP

Internet for Everything  Always connected with global address  New services with various kind of devices

Targets and Schedule of CEIIS Targets and Schedule of CEIIS Critical InfrastructureCompaniesIndividuals ◎ Establish Ground-Design of Japanese Information Security Policy ◎ Implement Effective Measures and Policy To be reliable for private sectors as their counter-party To be reliable in global arena Implement balanced investment toward technologies Keep transparency Maintain function as highly reliable infrastructure Keep verifiable design of function and business continuity Promote coordination and mutual assistance Support security-culture as major stakeholders Reach consensus in management and circulation methods of privacy information The First proposal (Oct/04) The Second Proposal (Mar/05) The Third Proposal (July/05) (1)Implementation Structure of Overall Information Security Policy (2)Measures for Government itself

Recommendations #1 (as of Nov. 2004)  “Information Security Policy Committee” (tentative name) –Under IT Strategy Headquarter –By FY2006 –Set mid / long term strategy –Recommendations –Evaluations  “National Information Security Center” (tentative name) –Operational guidelines for government systems –Audit and inspections –Response for IT incidents on government systems –Repository of “expertise”

E-government in 2005 (JP) Comm. Biz Edu. Transport National Resource National Resource Broadcast The Internet Various kind of digital communication infrastructure

 E-gov portal site –One stop service –Single window service –“online”

Targets and Schedule of CEIIS Targets and Schedule of CEIIS Critical InfrastructureCompaniesIndividuals ◎ Establish Ground-Design of Japanese Information Security Policy ◎ Implement Effective Measures and Policy To be reliable for private sectors as their counter-party To be reliable in global arena Implement balanced investment toward technologies Keep transparency Maintain function as highly reliable infrastructure Keep verifiable design of function and business continuity Promote coordination and mutual assistance Support security-culture as major stakeholders Reach consensus in management and circulation methods of privacy information The First proposal (Oct/04) The Second Proposal (Mar/05) The Third Proposal (July/05)

Catalyst: each ministries Sectors and Roles Government Local Government Critical infrastructure Companies Individuals Government “Culture of Security” Top down approach from Gov., Bottom up from private sectors

Top down & bottom up  Top down approach from Government –Standards and guidelines for procurement / installation / operation and responses –Critical Infrastructure Protection (CIP) –Minimum requirements on systems / networks –regulations  Bottom up approach from Private Sectors –Expertise from real operational systems –“Know How” on profitability / cost-down / actual operation / customizing systems / ….

Cabinet Secretariat FSAMETIMLITMPHPT Ele.FinanceGasTrainCommAir Critical Infrastructure Local Gov. Information flow

More works required  Exercise on Large scale accident –Within an identical infrastructure –With other infrastructures –We don’t know the effect of “Inter-dependency” Research required.  Awareness program –Classic / Legacy approach on generic security management –Changes on its systems drastically More computers and networks in their systems –Sharing Best Practices

Services Monitoring Traffic and access Other ISP’s X ISP Blocking the traffic Define their handlings in contract IT section Not enough expertise Out sourcing Top Management Decisions on business operations Attacker Conducting intentional activities Need to work globally Attack Traffic Forging source address Mission difficult (not impossible) (1) Improving Technology and Operation (2) Gov/Private Sector collaboration (3) Re-designing Security functions (4) HQ role (5) Learn more from accidents (6) Preparation / Prevention

Sharing Best Practices Best Practice developed through competition: high quality expertise on technology, engineering, and operation Distributing Best Practice Work with Non-profit area Improving business environment Private Sectors Government

Improving Information Sharing Government Critical Infrastructure Companies ISAC model? Inter-sector communication Anonymity / Responsibility Among Ministries LEA

Summary  Collaboration and mutual understandings on what we are doing is quite important among Government / private sector relationship  Need to do more –Improving information sharing –Exercises & Awareness –Research, esp. on analysis on “inter-dependency” among CI  CEIIS (Committee of Essensial Issues on Information Security) –Recommendations #2 by the end of FY2004 (Mar. 2005)