Recent Cyber Attacks and Countermeasures September 2006.
Transcript of Recent Cyber Attacks and Countermeasures September 2006.
Recent Cyber Attacks and CountermeasuresRecent Cyber Attacks and Countermeasures
September 2006September 2006
CONTENTS CONTENTS
Basic Concept Basic Concept
Cyber Attack TrendsCyber Attack Trends
Countermeasure activities Countermeasure activities
Future PlansFuture Plans
Basic ConceptBasic Concept
Potential factors Potential factors and meansand means Proactive actionsProactive actions Result of the attackResult of the attack
Cyber Threat
Cyber Attack
Cyber Crisis
Collection Collection and analysisand analysis
Detection Detection and interceptionand interception
Countermeasures Countermeasures and managementand management
Countermeasures
Characteristics
Changes in IT EnvironmentChanges in IT Environment
RFID, U-City, Ubiquitous, etc…RFID, U-City, Ubiquitous, etc…RFID, U-City, Ubiquitous, etc…RFID, U-City, Ubiquitous, etc…
e-Governmente-Governmente-Governmente-Government
20062006
The The rapidly growing dependencerapidly growing dependence on the internet on the internet
Second highest high-speed internet penetration in the Second highest high-speed internet penetration in the
worldworld
33 million internet users (73%) 33 million internet users (73%)
Advanced IT NetworkAdvanced IT Network
20072007 2008~2008~
Current Status of Cyber Intrusion Current Status of Cyber Intrusion IncidentsIncidents
136,261136,261
25,98025,98035,67035,670
60%60%
37%37%54,27554,275
140,000140,000
20042004
20,00020,000
40,00040,000
60,00060,000
20052005
TotalTotal
HackingHacking
(Unit: Case)
Trends of Cyber AttacksTrends of Cyber Attacks
Advanced and Intelligent Methods of AttackAdvanced and Intelligent Methods of Attack
Security systems are disabled and used as a detourSecurity systems are disabled and used as a detour
Shortened cycleShortened cycle
Major DamagesMajor Damages
Advanced and Integrated IT Networks, Aggravated damagesAdvanced and Integrated IT Networks, Aggravated damages
Different Purposes of AttackDifferent Purposes of Attack
Curiosity & Showing Off Curiosity & Showing Off → → Financial & Information TheftFinancial & Information Theft
National Cyber Security Management National Cyber Security Management SystemSystem
Policy Adjustment
NCSCThreat
Information
Analysis InformationAnalysis Information
Networked Networked OrganizationsOrganizations
Domestic Domestic and overseas and overseas Cooperating Cooperating OrganizationsOrganizations
National Cyber Security Strategy CouncilNational Cyber Security Strategy Council
Private Public Military
Countermeasure TechnologyCountermeasure Technology
Threat Information
National Cyber Security Management Regulation(Presidential Directive No. 141)
Handling Cyber Crisis Handling Cyber Crisis
Create a Countermeasure ManualCreate a Countermeasure Manual
Include “cyber security” in the scope of national crisis Include “cyber security” in the scope of national crisis
managementmanagement
Specify countermeasure procedures for each warning levelSpecify countermeasure procedures for each warning level
Integrated synthetic training for handling Cyber CrisisIntegrated synthetic training for handling Cyber Crisis
Develop virtual scenariosDevelop virtual scenarios
Verify the effectiveness of the manual and check to see if Verify the effectiveness of the manual and check to see if
everyone is familiar with the procedureseveryone is familiar with the procedures
Strengthening CooperationStrengthening Cooperation
Establish the ‘National CERT Council’Establish the ‘National CERT Council’
Encourage the participation of professional organizations in Encourage the participation of professional organizations in
security monitoringsecurity monitoring
Share threat information and technologies, and cooperate in Share threat information and technologies, and cooperate in
handling cyber incidentshandling cyber incidents
Establish a ‘Cyber Security Council’ in Each RegionEstablish a ‘Cyber Security Council’ in Each Region
Encourage the participation of regional government offices Encourage the participation of regional government offices
and high-tech businessesand high-tech businesses
Share security technologies and threat informationShare security technologies and threat information
Entering into the CCRA Entering into the CCRA (Common Criteria Recognition (Common Criteria Recognition Arrangement) Arrangement)
Background and PurposeBackground and Purpose
an information security round of advanced countries were organizedan information security round of advanced countries were organized
the use of internationally certified products were encouragedthe use of internationally certified products were encouraged
Join the arangement as a country that can issue a certificate (’06.5)Join the arangement as a country that can issue a certificate (’06.5)
* CAP (Certificate Authorizing Participants)* CAP (Certificate Authorizing Participants)
Promote the information security industry and improve its competitivPromote the information security industry and improve its competitivenesseness
Establishing an Information Sharing Establishing an Information Sharing SystemSystem
Administration Finance Communication Energy
Transportation
Monitoring Center by AreaMonitoring Center by AreaMonitoring Center by AreaMonitoring Center by Area
Operation CenterOperation CenterOperation CenterOperation Center
Main National Infrastructure Main National Infrastructure SystemsSystems
…………..
Development of Technical MeasuresDevelopment of Technical Measures
Take Security Measures regarding New IT Take Security Measures regarding New IT
TechnologiesTechnologies
Ubiquitous Society, RFID (Radio Frequency Identification) tagsUbiquitous Society, RFID (Radio Frequency Identification) tags
Develop Cyber Attack Detection TechnologiesDevelop Cyber Attack Detection Technologies
Study predictive methods based on statisticsStudy predictive methods based on statistics
Develop new detection technologies and 3D visualizationDevelop new detection technologies and 3D visualization
Strengthening preventive activitiesStrengthening preventive activities
Carry out ‘Cyber Security Assessment’Carry out ‘Cyber Security Assessment’
Encourage government organizations to conduct security Encourage government organizations to conduct security
assessments on their ownassessments on their own
Support customized security measuresSupport customized security measures
Conduct Security Check-ups on major computing Conduct Security Check-ups on major computing
networksnetworks
For government organizations and high-tech businessesFor government organizations and high-tech businesses
Identify security holes and support security technologiesIdentify security holes and support security technologies
Promotion of Cyber Security Promotion of Cyber Security AwarenessAwareness
Develop Cyber Security Training ProgramsDevelop Cyber Security Training Programs
Hold cyber security conferences for high-ranking Hold cyber security conferences for high-ranking
government/corporate officialsgovernment/corporate officials
Strengthen cyber security awareness programs for Strengthen cyber security awareness programs for
elementary and middle school studentselementary and middle school students
Offer reward Money for Reporting Cyber incidentsOffer reward Money for Reporting Cyber incidents
Encourage citizens to report intrusion incidents and threat Encourage citizens to report intrusion incidents and threat
informationinformation
Thank you.Thank you.
Phone : 82-2-557-0264Phone : 82-2-557-0264
E-mail : [email protected] : [email protected]