Presentation is loading. Please wait.

Presentation is loading. Please wait.

Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.

Similar presentations


Presentation on theme: "Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus."— Presentation transcript:

1

2

3 Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus software A type of worm virus, malicious bot and Trojan combined Recent attacks are targeting specific groups rather than unspecific multiples

4 Cyber Attacks without boundary Spread of high-speed internet networks around the world Disguise of attacker’s location through a stop-over at 3rd country Heightened threats on critical infrastructures Concerns on attacks remotely controlled DDoS attacks exploiting Botnet Possibility of instant ripple effects to neighboring areas

5 Sharing cyber threat information with each other during ordinary times and preventing attack incidents In the case of a cyber attack incident, real time consultation on countermeasures and minimization of damage Pinpointing hackers through cooperative investigation among each country’s law enforcement Effective response only through international cooperation Effective response only through international cooperation

6 Enhanced acknowledgement about the seriousness of cyber terror threats among ARF participating countries Enhanced acknowledgement about the seriousness of cyber terror threats among ARF participating countries Agreeing upon the necessity of international cooperation for responding to cyber terror Agreeing upon the necessity of international cooperation for responding to cyber terror Building up mutual trust and drawing a variety of cooperation proposals Building up mutual trust and drawing a variety of cooperation proposals Absence of organization or a system to realize practical cooperation Absence of organization or a system to realize practical cooperation Accomplishments Limits

7 Regular committee composed of working-level experts against cyber terror Developing practical measures to enhance cyber security in the region Coordinating legal and systematic policies for a more effective response to cyber terrorism Serve as an official communication channel among countries

8

9 ARF seminar chair country or chair country hopeful Developing a detailed operation plan of the each sub-committee Managing official contact points of the participatings Proposing to hold a meeting among participating countries if necessary Submitting the results of consultation and meetings to the next ARF cyber terrorism seminar and ISM on CTTC

10 Promptly sharing information and responding with blocking the IP involved and other measures involved with cyber attacks Sharing the analyzed information on cases and cyber attack techniques and preventing similar cases from occurring Searching for legal countermeasures of law enforcement authorities against attackers Developing common response measures for new types of cyber attacks

11 Searching for ways to give technical support and advice on establishing a nationwide cyber terror response system (National CERT) Providing a training program enhancing response ability against cyber terror among ARF participating countries Building a cooperative system with an international cyber security network

12 Promoting joint research on countermeasures against new types of hacking techniques and technology sharing among participating countries Discussing the plan to construct an early warning system among ARF participating countries Developing a technology development roadmap for medium- long term cyber terror prevention

13

14 Selecting a Key Coordinating country Phase 1 Building up a cyber security network among ARF participating countries Phase 3 Composing an expert working group and sub-committees and promoting their operations Phase 2 Making a global community safe from cyber terror Making a global community safe from cyber terror Establishing a cooperative system with other international cyber security networks Phase 4

15


Download ppt "Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus."

Similar presentations


Ads by Google