SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
CERT Collaboration with ISP
to Enhance Cybersecurity
Jinhyun CHO, KrCERT/CC
Korea Internet & Security Agency
I. Alarming call for cooperation with ISPs
Slammer Worm


 • Spread most of vulnerable SQL servers within 30 min. globally
 • All Internet infrastructure in Korea disabled
   CERT Relations with ISPs : No coordination mechanism framework
II. Cybersecurity Collaboration with ISPs : Phase I

Initial setup stage (2003~2005)

 • Formalization of cybersecurity private and public cooperation relations
 • Needs for ISP coordination mechanism and procedure recognized
 • Korea Internet Security Center(KrCERT/CC) opened in December, 2003
 • Legal, policy and technical response to cyber attacks and threats


                                   Amendment to relevant law law
                                      Amendment to relevant

                                    Threat Information Sharing

                                   Collective Emergency Response

                                   Security exercise and daily checkup
                                   Security Exercise and Daily Checkup
II. Cybersecurity Collaboration with ISPs : Phase I

Amendment to Relevant Law

 • Legal basis for the collective cybersecurity response actions
 • Minimal standard for cybersecurity in telecommunication area
 • Emergency response order
 • Mandated incident reporting and threat information sharing


Threat Information Sharing


 • Traffic and attack statistics from major ISPs
 • Concerns, difficulties and issues discussed and resolved
 • Information sharing agreement among ISPs before legislation
 • Relevant costs covered by government
II. Cybersecurity Collaboration with ISPs : Phase I

Collective Emergency Response

 • Emergency response action order to ISPs
 • Order applied to domestic ISPs within a day
 • The access blocked to foreign malicious website site or Ips
 • Legal authority and responsibility

Security exercise and daily checkup
Security Exercise and Daily Checkup


 • Major incident scenario based exercise with ISPs
 • Systemic approach to response coordination procedure & process
 • Train the relevant first-line cybersecurity staffs
 • Daily security checkup with Radio system(alternative comm. channel)
III. Cybersecurity Collaboration with ISPs : Phase II

Stabilization Phase(2006~2009)

 • Enhancing the collaboration relationship and make results with ISPs
 • Major cyberthreat from botnet and response
 • Emerging DDoS issue(availability)




                                   Coordinated Botnet Response Action

                                   Bi-annual workshop

                                   DDoS Defense Investment
III. Cybersecurity Collaboration with ISPs : Phase II

Coordinated Botnet Response Action

 • Implementation of national-wide botnet sinkhole system
 • Access restriction to botnet c&c servers by changing IP address
 • CSF: The close collaboration and voluntary participation from ISPs
 • Trustworthy information source for cyber threats : KrCERT/CC


Bi-annual workshop


 • Face-to-face trust building opportunity in a relaxed environment
 • Closed technical presentation on security issue
 • Proposal for collective security actions made in the workshop
III. Cybersecurity Collaboration with ISPs : Phase II

DDoS Defense Investment

 • To promote the investment from ISPs on DDoS attacks from 2008
 •   DDoS service commercialization and commodity service
 •   DDoS defense device provided to selective ISPs by government budget
 •   Calls for responsible ISP response to major cyber threats



                          Internet Exchange(IX)
IV. Cybersecurity Collaboration with ISPs : Phase III

Aftermath Phase(2010~ Current)

 • DDoS Attack in July 2009 and March 2011
 • Renewal of national attention to cybersecurity with major incidents
 • Collaboration and coordination among public and private sector
 • Smart response for cybersecurity needed

                                                         Cyber Remediation Service




   Hacker                                                           Victim


                                                               DDoS Shelter Service
                Control & Command Server
                                               Zombies
IV. Cybersecurity Collaboration with ISPs : Phase III

Investment on cyber security

 • Organizational restructure for strengthening incident prevention
 • DDoS shelter service for SME(limited time-frame)


Joint Voluntary Project

 • Joint initiative for cybersecurity outreach service
 • Voluntary threat information sharing and project to tackle cyber threats


High-level Attention & Support

 • Regular meeting for cybersecurity issues
 •   Awareness Raising for senior-level people for cybersecurity
V. Summary




1. Trust based Collaboration for Mutual Benefit



2. On-going Efforts for Emgerging Cyber Threats



3. Collaboration and Cooperation in Action
THANK YOU!


             Your Logo

Contenu connexe

Tendances

Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
guest50a642f
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
Amy Lenzo
 

Tendances (17)

Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
 
Cybersecurity Program Life Cycle v01 r03
Cybersecurity Program Life Cycle v01 r03Cybersecurity Program Life Cycle v01 r03
Cybersecurity Program Life Cycle v01 r03
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Tech 2 Tech Wales - Janet Network update
Tech 2 Tech Wales - Janet Network updateTech 2 Tech Wales - Janet Network update
Tech 2 Tech Wales - Janet Network update
 

Similaire à CERT collaboration with ISP to enhance cybersecurity

Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
ftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
ftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
Rizkiawan Achadi
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
Alexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
Alexander Decker
 

Similaire à CERT collaboration with ISP to enhance cybersecurity (20)

Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Bangladesh Cyber Incident Trends 2013 & bdCERT Update
Bangladesh Cyber Incident Trends 2013 & bdCERT UpdateBangladesh Cyber Incident Trends 2013 & bdCERT Update
Bangladesh Cyber Incident Trends 2013 & bdCERT Update
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Reasons to choose cloud security
Reasons to choose cloud securityReasons to choose cloud security
Reasons to choose cloud security
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
 
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

CERT collaboration with ISP to enhance cybersecurity

  • 1. CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency
  • 2. I. Alarming call for cooperation with ISPs Slammer Worm • Spread most of vulnerable SQL servers within 30 min. globally • All Internet infrastructure in Korea disabled CERT Relations with ISPs : No coordination mechanism framework
  • 3. II. Cybersecurity Collaboration with ISPs : Phase I Initial setup stage (2003~2005) • Formalization of cybersecurity private and public cooperation relations • Needs for ISP coordination mechanism and procedure recognized • Korea Internet Security Center(KrCERT/CC) opened in December, 2003 • Legal, policy and technical response to cyber attacks and threats Amendment to relevant law law Amendment to relevant Threat Information Sharing Collective Emergency Response Security exercise and daily checkup Security Exercise and Daily Checkup
  • 4. II. Cybersecurity Collaboration with ISPs : Phase I Amendment to Relevant Law • Legal basis for the collective cybersecurity response actions • Minimal standard for cybersecurity in telecommunication area • Emergency response order • Mandated incident reporting and threat information sharing Threat Information Sharing • Traffic and attack statistics from major ISPs • Concerns, difficulties and issues discussed and resolved • Information sharing agreement among ISPs before legislation • Relevant costs covered by government
  • 5. II. Cybersecurity Collaboration with ISPs : Phase I Collective Emergency Response • Emergency response action order to ISPs • Order applied to domestic ISPs within a day • The access blocked to foreign malicious website site or Ips • Legal authority and responsibility Security exercise and daily checkup Security Exercise and Daily Checkup • Major incident scenario based exercise with ISPs • Systemic approach to response coordination procedure & process • Train the relevant first-line cybersecurity staffs • Daily security checkup with Radio system(alternative comm. channel)
  • 6. III. Cybersecurity Collaboration with ISPs : Phase II Stabilization Phase(2006~2009) • Enhancing the collaboration relationship and make results with ISPs • Major cyberthreat from botnet and response • Emerging DDoS issue(availability) Coordinated Botnet Response Action Bi-annual workshop DDoS Defense Investment
  • 7. III. Cybersecurity Collaboration with ISPs : Phase II Coordinated Botnet Response Action • Implementation of national-wide botnet sinkhole system • Access restriction to botnet c&c servers by changing IP address • CSF: The close collaboration and voluntary participation from ISPs • Trustworthy information source for cyber threats : KrCERT/CC Bi-annual workshop • Face-to-face trust building opportunity in a relaxed environment • Closed technical presentation on security issue • Proposal for collective security actions made in the workshop
  • 8. III. Cybersecurity Collaboration with ISPs : Phase II DDoS Defense Investment • To promote the investment from ISPs on DDoS attacks from 2008 • DDoS service commercialization and commodity service • DDoS defense device provided to selective ISPs by government budget • Calls for responsible ISP response to major cyber threats Internet Exchange(IX)
  • 9. IV. Cybersecurity Collaboration with ISPs : Phase III Aftermath Phase(2010~ Current) • DDoS Attack in July 2009 and March 2011 • Renewal of national attention to cybersecurity with major incidents • Collaboration and coordination among public and private sector • Smart response for cybersecurity needed Cyber Remediation Service Hacker Victim DDoS Shelter Service Control & Command Server Zombies
  • 10. IV. Cybersecurity Collaboration with ISPs : Phase III Investment on cyber security • Organizational restructure for strengthening incident prevention • DDoS shelter service for SME(limited time-frame) Joint Voluntary Project • Joint initiative for cybersecurity outreach service • Voluntary threat information sharing and project to tackle cyber threats High-level Attention & Support • Regular meeting for cybersecurity issues • Awareness Raising for senior-level people for cybersecurity
  • 11. V. Summary 1. Trust based Collaboration for Mutual Benefit 2. On-going Efforts for Emgerging Cyber Threats 3. Collaboration and Cooperation in Action
  • 12. THANK YOU! Your Logo