SlideShare une entreprise Scribd logo
1  sur  38
Current Conditions and
Challenges of Cybersecurity
in Taiwan
Chou, Chih-Ho (周智禾)
Section Chief,
Department of Cyber Security,
Executive Yuan, Taiwan (ROC)
9/12/2017
Outline
• Cybersecurity Overview of Taiwan
Government
• Cyber Attack Trends
• Cases Studies
• Attack via Network Equipment
• Mobile Botnet
• Avalanche
• Conclusions
行政院資通安全處 1
Introduction of NICST
• National Information and Communication Security
Taskforce (NICST)
• Established since January 2001
• Convened by Vice Premier, Executive Yuan
• Steering Committee comprised of central government
CISOs/Municipality CISOs/Deputy Director of NSB/Experts
• Secretariat by Department of Cyber Security (DCS),
Executive Yuan
• 8 major working groups for cyber security related tasks
execution and coordination among agencies
• One service center (National Center for Cyber Security
Technology, NCCST) plays the role of National CSIRT
行政院資通安全處 2
Organization Chart
行政院資通安全處 3
 MJIB: Ministry of Justice
Investigation Bureau
 CIB: Criminal Investigation
Bureau
PDCA Cycle of Government Sector
Information Security Management System
行政院資通安全處 4
Cyber Offensive and Defensive Exercise
Annual Audit (1st Party/3rd Party)
Cyber Health Check, VA, PT
Incident Report and Social Engineering Drills
Agency Governance Maturity and Protection
Capability Level Assessment
National Cyber Security Indicators
Domestics/Intl. Contests
Agencies
- Implement Agency TDL
(ISMS/Defense-in-Depth/24x7
Monitoring/Dedicated Staff)
- Implement IT System TDL
- Deploy Agency-wide GCB
- Incident Report and Handling…
NCCST
- G-ISMS Services
(Early Warning/Incident
Response/System Security/Mgmt
Process/Awareness Training)
- Public-Private Partnership
(G-SOC/G-ISAC)
- International Cooperation…
Competent Authorities
- Cyber Crime Investigation
- Content Security
- Human Resources Development
- Personal Information Protection
- Mobile App Test
 NICST Committee Meeting
 NICST Consulting Committee Meeting
 NICST Working Group Meeting
 CIO and CISO Meeting
 Quarterly Workshop for IT Personnel
 Cybersecurity Management Act
(Draft)
 National Strategy for
Cybersecurity Development
Program (2017~2020)
 National Cyber Security
Whitepaper
 Directives for Agencies
- Agency Responsibility Ranking Criteria
- Agency To-Do List (TDL)
- IT System To-Do List
- Incident Report Guideline
• Cyber Security Overview of Taiwan
Government
• Cyber Attack Trends
• Cases Studies
• Attack via Network Equipment
• Mobile Botnet
• Avalanche
• Conclusions
行政院資通安全處 5
International Cybersecurity Trends
行政院資通安全處 6
The open systems and the
Internet are used in
critical infrastructures
increasingly. That results
in the growing of the risks.
Organized hackers use
Advanced Persistent
Threat (APT) attacks to
steal the confidential data
of official, national
defense and business
Information and security
providers have been
hacked to lead to damage
the trusted supply chain
Cyber criminals steal personal
data to affect the operations
of e-commerce and finance
Cyber-warfare and DDoS
paralyzed national
network operations
International Cybersecurity Trends
• Ransomware expands
• Almost 10% of organizations detected ransomware
activity last quarter
• Automatic attacks
• 80% of organizations reported high-or critical-severity
exploits
• More mobile malwares
• The total malware volume jumped from 1.7%(in Q4
2016) to 8.7%(in Q1 2017)
• Build botnets out of IoT(Internet of Thing) devices
to launch the DDoS attack – e.g. Mirai
行政院資通安全處 7
Source:Fortinet (Taiwan Security View: IOT Threats on Rise)
APT Hackers Around the Globe
• Over 20 APT hacker teams (2014~2015)
• US, UK, China, Russia, and Israel
• North Korea and Middle East
行政院資通安全處 8
Source:https://apt.securelist.com/
APT Attacks
• APT Attack Analysis
• 91% of APT Attacks started from a spear phishing e-mail
• 94% of spear phishing e-mails have attachment files
• Most common file types are .doc、.exe、.scr、.au3、.jpg、.pdf
行政院資通安全處 9
Source:2015 Symantec Internet Security Threat Report
Hard to Detect
行政院資通安全處 10
Source:2015 Mandiant Annual Threat Report
Problems with Website Vulnerabilities
• So far, most websites around the globe still have
vulnerabilities
行政院資通安全處 11
Source: 2015 Symantec Internet Security Threat Report
• Cyber Security Overview of Taiwan
Government
• Cyber Attack Trends
• Cases Studies
• Attack via Network Equipment
• Mobile Botnet
• Avalanche
• Conclusions
行政院資通安全處 12
Network Equipment at Risk
• Network equipment are hard to manage, and very
easily get hacked
• Hacking network equipment is old news, but
hackers continue to do so because it relatively easy
• We were collecting phishing mails and analyzed
them
• We traced this C&C IP, and found it was located in a
civilian household
行政院資通安全處 13
It is a Wireless Router
• The C&C actually is
a wireless router
• default password
• built-in VPN function
行政院資通安全處 14
The account created by hacker
Transfer Data
• Router transferred packets automatically
• Transfer all packets came from port 80, 443 to
192.168.10.2
• 192.168.10.2 is the VPN IP
• The hacker would continuously receive victims'
reporting packets sending through port 80, 443
行政院資通安全處 15
Looking at the Log
• From the router log we could find the record of the
hacker activities
行政院資通安全處 16
The hacker used the VPN service
The VPN IP that hacker used
Hacker Collect Victim Data via C&C
• This wireless router was set to transfer packets
automatically
• The hacker only needed to connect to the VPN service,
then it will receive all packets automatically
• After further investigation, victims were not only the
Taiwan government agencies, there are other countries
IP such as U.S., France, U.K., and Germany, reported to
this C&C
• We have sent alert info to CERTs of these countries
行政院資通安全處 17
• Cyber Security Overview of Taiwan
Government
• Cyber Attack Trends
• Cases Studies
• Attack via Network Equipment
• Mobile Botnet
• Avalanche
• Conclusions
行政院資通安全處 18
Mobile Botnet
行政院資通安全處 19
2014/6/3
APNIC noticed Dropbox to
remove the malicious files
2014/6/7
TWNCERT received this
intelligence from APNIC
2014/6/9
TWNCERT cooperated to
trace the Botnet with MJIB
2014/6/19~2014/7/10
Sniffing the network
traffic from the victims
2014/7/18
MJIB starts
investigating this case
C&C Server
行政院資通安全處 20
C&C Server
行政院資通安全處 21
one-to-many mode
cell phone number /
devices ID
SMS message with malicious URL
C&C Server
行政院資通安全處 22
many-to-one mode
cell phone number /
devices ID
SMS message SMS message
many-to-one mode
行政院資通安全處 23
Hackers swindle money
about $144,148 USD
($4,324,440 NTD )
• We discovered 43,899 Bots IPs, The 98%
Bots IPs located in Malaysia.
行政院資通安全處 24
• We also found 393,471 contact information from
packets (About 1% of the total population in Malaysia)
行政院資通安全處 25
No. Organization
1 MCMC
2 MyCERT
3 SingCERT
4 US-CERT
5 AusCERT
6 ID-SIRTII/CC
7 ThaiCERT
8 JPCERT/CC
9 HKCERT
10 KrCERT/CC
11 CNCERT/CC
行政院資通安全處 26
• Cyber Security Overview of Taiwan
Government
• Cyber Attack Trends
• Cases Studies
• Attack via Network Equipment
• Mobile Botnet
• Avalanche
• Conclusions
行政院資通安全處 27
Avalanche
• On Nov. 30th, 2016, Avalanche, a large global
network hosting infrastructure used by cyber
criminals was dismantled.
• Crimeware-as-a-service (CaaS)
• Targeting over 40 major financial institutions
• Sensitive personal information stolen
• Victims’ compromised systems might also have been
used to conduct other malicious activities.
• Money mule
行政院資通安全處 28
Malware families
• Corebot
• stealing banking and credential infomation
• Matsnu
• Malware dropper
• Nymaim
• multipurpose malware family
• Gozi + Nymaim = Goznym
• Ranbyus (use DGA to generate .tw domain)
• Banking Trojan
• Rovnix
• Banking Trojan with bootkit
• Tinba
• Tiny banking trojan
• URLZone/Bebloh
• Banking trojan
行政院資通安全處 29
Double Fast Flux
行政院資通安全處 30
DNS server
a.b.com
1.2.3.4
5.6.7.8 11.12.13.14
b.tw
DN Period Malicious IP
a.b.com. 100 IN A 1.2.3.4
a.b.com. 100 IN A 5.6.7.8
a.b.com. 100 IN A 11.12.13.14
a.b.com. 100 IN A 15.16.17.18.19
a.b.com. 100 IN A 20.21.22.23
b.com. 1000 IN NS Ns1.a.tw.
b.com. 1000 IN NS Ns2.a.tw.
b.com. 1000 IN NS Ns3.a.tw.
b.com. 1000 IN NS Ns4.a.tw.
Ns1.a.tw. 200 IN A 24.25.26.27
Ns2.a.tw. 200 IN A 28.29.30.31
Ns3.a.tw. 200 IN A 32.33.34.35
Ns4.a.tw. 200 IN A 36.37.38.39
The actions in Taiwan
• MJIB cooperated with TWNIC (Taiwan Network
Information Center)
• 27,987 .tw domain names generated by Domain
Generation Algorithm (DGA)
• Those domain names had not been registered in TWNIC
• Takedown operation was executed at 13:30 UTC on Nov.
30th, 2016
行政院資通安全處 31
• Shadowserver worked
with partners to build the
sinkholing infrastructure
and coordinate the
international DNS
Registry/Registrar
activities
Results
• MJIB in Taiwan collaborated with investigators
from 30 countries, including the FBI, the United
States Department of Homeland Security (DHS),
Europol and Eurojust
• Crucial support of prosecutors and investigators from
30 countries
• 5 individuals were arrested
• 37 premises were searched
• 39 servers were seized
• Victims of malware infections were identified in over
180 countries
• 221 servers were put offline through abuse
notifications sent to the hosting providers
• Over 800,000 domains seized, sinkholed or blocked.
行政院資通安全處 32
• Cyber Security Overview of Taiwan
Government
• Cyber Attack Trends
• Cases Studies
• Attack via Network Equipment
• Mobile Botnet
• Avalanche
• Conclusions
行政院資通安全處 33
Challenges
• Lack of timeliness in terms of information sharing
of criminal intelligence
• Crime investigation mode overemphasize on
individual case basis
• The issues about the protection of personal data
• It is hard to trace the origins of attacks
• TOR (The Onion Router) network
• Changes in technology - Cloud Computing
• Where the data resides
• What law applies
• The data obtained from suspect’s computer may have
little meaning
行政院資通安全處 34
Suggestions
• Facilitate trans-border law enforcement exchange
visitors
• NICs may
• establish a platform to record the malicious domains or
IPs
• provide the query records of Root DNS Server
• help law enforcement agencies block malicious domains
or IPs
• Establish contact window for intelligence exchanges
行政院資通安全處 35
Contact information
• TWNCERT
• http://www.twncert.org.tw/
• +886-2-27339922; twncert@twncert.org.tw
• TWCERT/CC
• https://www.twcert.org.tw/
• +886-2-23776418; twcert@cert.org.tw
• MJIB
• http://www.mjib.gov.tw/
• +886-2-29112241ext2971; safenet@mjib.gov.tw
• CIB
• https://www.cib.gov.tw/English/
• +886-2-27652111~5; https://www.cib.gov.tw/Service/EMail
行政院資通安全處 36
行政院資通安全處 37
Thanks for your attentions

Contenu connexe

Tendances

Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Rogerio Ferraz
 
Network scanning
Network scanningNetwork scanning
Network scanningoceanofwebs
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printingCHETAN THAKRE
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligencePhilippe Lin
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
157 zaštita osobnih podataka na internetu
157 zaštita osobnih podataka na internetu157 zaštita osobnih podataka na internetu
157 zaštita osobnih podataka na internetuPogled kroz prozor
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Cyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_riseCyphort
 
DIY Education in Cyber Security
DIY Education in Cyber SecurityDIY Education in Cyber Security
DIY Education in Cyber SecurityKelly Shortridge
 

Tendances (20)

Nmap
NmapNmap
Nmap
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Network security
Network securityNetwork security
Network security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source Intelligence
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
157 zaštita osobnih podataka na internetu
157 zaštita osobnih podataka na internetu157 zaštita osobnih podataka na internetu
157 zaštita osobnih podataka na internetu
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
Firewalls
FirewallsFirewalls
Firewalls
 
Recon like a pro
Recon like a proRecon like a pro
Recon like a pro
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Cyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_rise
 
Firewall
FirewallFirewall
Firewall
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
DIY Education in Cyber Security
DIY Education in Cyber SecurityDIY Education in Cyber Security
DIY Education in Cyber Security
 

Similaire à Current Conditions and Challenges of Cybersecurity in Taiwan

ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...TI Safe
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in ActionSatnam Singh
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Analysis of a “/0” Stealth Scan From a Botnet
Analysis of a “/0” Stealth Scan From a BotnetAnalysis of a “/0” Stealth Scan From a Botnet
Analysis of a “/0” Stealth Scan From a BotnetNexgen Technology
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system운상 조
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediationNorth Texas Chapter of the ISSA
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture Vrince Vimal
 

Similaire à Current Conditions and Challenges of Cybersecurity in Taiwan (20)

ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in Action
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Analysis of a “/0” Stealth Scan From a Botnet
Analysis of a “/0” Stealth Scan From a BotnetAnalysis of a “/0” Stealth Scan From a Botnet
Analysis of a “/0” Stealth Scan From a Botnet
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 

Plus de APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 

Plus de APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 

Dernier

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 

Dernier (20)

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 

Current Conditions and Challenges of Cybersecurity in Taiwan

  • 1. Current Conditions and Challenges of Cybersecurity in Taiwan Chou, Chih-Ho (周智禾) Section Chief, Department of Cyber Security, Executive Yuan, Taiwan (ROC) 9/12/2017
  • 2. Outline • Cybersecurity Overview of Taiwan Government • Cyber Attack Trends • Cases Studies • Attack via Network Equipment • Mobile Botnet • Avalanche • Conclusions 行政院資通安全處 1
  • 3. Introduction of NICST • National Information and Communication Security Taskforce (NICST) • Established since January 2001 • Convened by Vice Premier, Executive Yuan • Steering Committee comprised of central government CISOs/Municipality CISOs/Deputy Director of NSB/Experts • Secretariat by Department of Cyber Security (DCS), Executive Yuan • 8 major working groups for cyber security related tasks execution and coordination among agencies • One service center (National Center for Cyber Security Technology, NCCST) plays the role of National CSIRT 行政院資通安全處 2
  • 4. Organization Chart 行政院資通安全處 3  MJIB: Ministry of Justice Investigation Bureau  CIB: Criminal Investigation Bureau
  • 5. PDCA Cycle of Government Sector Information Security Management System 行政院資通安全處 4 Cyber Offensive and Defensive Exercise Annual Audit (1st Party/3rd Party) Cyber Health Check, VA, PT Incident Report and Social Engineering Drills Agency Governance Maturity and Protection Capability Level Assessment National Cyber Security Indicators Domestics/Intl. Contests Agencies - Implement Agency TDL (ISMS/Defense-in-Depth/24x7 Monitoring/Dedicated Staff) - Implement IT System TDL - Deploy Agency-wide GCB - Incident Report and Handling… NCCST - G-ISMS Services (Early Warning/Incident Response/System Security/Mgmt Process/Awareness Training) - Public-Private Partnership (G-SOC/G-ISAC) - International Cooperation… Competent Authorities - Cyber Crime Investigation - Content Security - Human Resources Development - Personal Information Protection - Mobile App Test  NICST Committee Meeting  NICST Consulting Committee Meeting  NICST Working Group Meeting  CIO and CISO Meeting  Quarterly Workshop for IT Personnel  Cybersecurity Management Act (Draft)  National Strategy for Cybersecurity Development Program (2017~2020)  National Cyber Security Whitepaper  Directives for Agencies - Agency Responsibility Ranking Criteria - Agency To-Do List (TDL) - IT System To-Do List - Incident Report Guideline
  • 6. • Cyber Security Overview of Taiwan Government • Cyber Attack Trends • Cases Studies • Attack via Network Equipment • Mobile Botnet • Avalanche • Conclusions 行政院資通安全處 5
  • 7. International Cybersecurity Trends 行政院資通安全處 6 The open systems and the Internet are used in critical infrastructures increasingly. That results in the growing of the risks. Organized hackers use Advanced Persistent Threat (APT) attacks to steal the confidential data of official, national defense and business Information and security providers have been hacked to lead to damage the trusted supply chain Cyber criminals steal personal data to affect the operations of e-commerce and finance Cyber-warfare and DDoS paralyzed national network operations
  • 8. International Cybersecurity Trends • Ransomware expands • Almost 10% of organizations detected ransomware activity last quarter • Automatic attacks • 80% of organizations reported high-or critical-severity exploits • More mobile malwares • The total malware volume jumped from 1.7%(in Q4 2016) to 8.7%(in Q1 2017) • Build botnets out of IoT(Internet of Thing) devices to launch the DDoS attack – e.g. Mirai 行政院資通安全處 7 Source:Fortinet (Taiwan Security View: IOT Threats on Rise)
  • 9. APT Hackers Around the Globe • Over 20 APT hacker teams (2014~2015) • US, UK, China, Russia, and Israel • North Korea and Middle East 行政院資通安全處 8 Source:https://apt.securelist.com/
  • 10. APT Attacks • APT Attack Analysis • 91% of APT Attacks started from a spear phishing e-mail • 94% of spear phishing e-mails have attachment files • Most common file types are .doc、.exe、.scr、.au3、.jpg、.pdf 行政院資通安全處 9 Source:2015 Symantec Internet Security Threat Report
  • 11. Hard to Detect 行政院資通安全處 10 Source:2015 Mandiant Annual Threat Report
  • 12. Problems with Website Vulnerabilities • So far, most websites around the globe still have vulnerabilities 行政院資通安全處 11 Source: 2015 Symantec Internet Security Threat Report
  • 13. • Cyber Security Overview of Taiwan Government • Cyber Attack Trends • Cases Studies • Attack via Network Equipment • Mobile Botnet • Avalanche • Conclusions 行政院資通安全處 12
  • 14. Network Equipment at Risk • Network equipment are hard to manage, and very easily get hacked • Hacking network equipment is old news, but hackers continue to do so because it relatively easy • We were collecting phishing mails and analyzed them • We traced this C&C IP, and found it was located in a civilian household 行政院資通安全處 13
  • 15. It is a Wireless Router • The C&C actually is a wireless router • default password • built-in VPN function 行政院資通安全處 14 The account created by hacker
  • 16. Transfer Data • Router transferred packets automatically • Transfer all packets came from port 80, 443 to 192.168.10.2 • 192.168.10.2 is the VPN IP • The hacker would continuously receive victims' reporting packets sending through port 80, 443 行政院資通安全處 15
  • 17. Looking at the Log • From the router log we could find the record of the hacker activities 行政院資通安全處 16 The hacker used the VPN service The VPN IP that hacker used
  • 18. Hacker Collect Victim Data via C&C • This wireless router was set to transfer packets automatically • The hacker only needed to connect to the VPN service, then it will receive all packets automatically • After further investigation, victims were not only the Taiwan government agencies, there are other countries IP such as U.S., France, U.K., and Germany, reported to this C&C • We have sent alert info to CERTs of these countries 行政院資通安全處 17
  • 19. • Cyber Security Overview of Taiwan Government • Cyber Attack Trends • Cases Studies • Attack via Network Equipment • Mobile Botnet • Avalanche • Conclusions 行政院資通安全處 18
  • 20. Mobile Botnet 行政院資通安全處 19 2014/6/3 APNIC noticed Dropbox to remove the malicious files 2014/6/7 TWNCERT received this intelligence from APNIC 2014/6/9 TWNCERT cooperated to trace the Botnet with MJIB 2014/6/19~2014/7/10 Sniffing the network traffic from the victims 2014/7/18 MJIB starts investigating this case
  • 22. C&C Server 行政院資通安全處 21 one-to-many mode cell phone number / devices ID SMS message with malicious URL
  • 23. C&C Server 行政院資通安全處 22 many-to-one mode cell phone number / devices ID SMS message SMS message many-to-one mode
  • 24. 行政院資通安全處 23 Hackers swindle money about $144,148 USD ($4,324,440 NTD )
  • 25. • We discovered 43,899 Bots IPs, The 98% Bots IPs located in Malaysia. 行政院資通安全處 24
  • 26. • We also found 393,471 contact information from packets (About 1% of the total population in Malaysia) 行政院資通安全處 25
  • 27. No. Organization 1 MCMC 2 MyCERT 3 SingCERT 4 US-CERT 5 AusCERT 6 ID-SIRTII/CC 7 ThaiCERT 8 JPCERT/CC 9 HKCERT 10 KrCERT/CC 11 CNCERT/CC 行政院資通安全處 26
  • 28. • Cyber Security Overview of Taiwan Government • Cyber Attack Trends • Cases Studies • Attack via Network Equipment • Mobile Botnet • Avalanche • Conclusions 行政院資通安全處 27
  • 29. Avalanche • On Nov. 30th, 2016, Avalanche, a large global network hosting infrastructure used by cyber criminals was dismantled. • Crimeware-as-a-service (CaaS) • Targeting over 40 major financial institutions • Sensitive personal information stolen • Victims’ compromised systems might also have been used to conduct other malicious activities. • Money mule 行政院資通安全處 28
  • 30. Malware families • Corebot • stealing banking and credential infomation • Matsnu • Malware dropper • Nymaim • multipurpose malware family • Gozi + Nymaim = Goznym • Ranbyus (use DGA to generate .tw domain) • Banking Trojan • Rovnix • Banking Trojan with bootkit • Tinba • Tiny banking trojan • URLZone/Bebloh • Banking trojan 行政院資通安全處 29
  • 31. Double Fast Flux 行政院資通安全處 30 DNS server a.b.com 1.2.3.4 5.6.7.8 11.12.13.14 b.tw DN Period Malicious IP a.b.com. 100 IN A 1.2.3.4 a.b.com. 100 IN A 5.6.7.8 a.b.com. 100 IN A 11.12.13.14 a.b.com. 100 IN A 15.16.17.18.19 a.b.com. 100 IN A 20.21.22.23 b.com. 1000 IN NS Ns1.a.tw. b.com. 1000 IN NS Ns2.a.tw. b.com. 1000 IN NS Ns3.a.tw. b.com. 1000 IN NS Ns4.a.tw. Ns1.a.tw. 200 IN A 24.25.26.27 Ns2.a.tw. 200 IN A 28.29.30.31 Ns3.a.tw. 200 IN A 32.33.34.35 Ns4.a.tw. 200 IN A 36.37.38.39
  • 32. The actions in Taiwan • MJIB cooperated with TWNIC (Taiwan Network Information Center) • 27,987 .tw domain names generated by Domain Generation Algorithm (DGA) • Those domain names had not been registered in TWNIC • Takedown operation was executed at 13:30 UTC on Nov. 30th, 2016 行政院資通安全處 31 • Shadowserver worked with partners to build the sinkholing infrastructure and coordinate the international DNS Registry/Registrar activities
  • 33. Results • MJIB in Taiwan collaborated with investigators from 30 countries, including the FBI, the United States Department of Homeland Security (DHS), Europol and Eurojust • Crucial support of prosecutors and investigators from 30 countries • 5 individuals were arrested • 37 premises were searched • 39 servers were seized • Victims of malware infections were identified in over 180 countries • 221 servers were put offline through abuse notifications sent to the hosting providers • Over 800,000 domains seized, sinkholed or blocked. 行政院資通安全處 32
  • 34. • Cyber Security Overview of Taiwan Government • Cyber Attack Trends • Cases Studies • Attack via Network Equipment • Mobile Botnet • Avalanche • Conclusions 行政院資通安全處 33
  • 35. Challenges • Lack of timeliness in terms of information sharing of criminal intelligence • Crime investigation mode overemphasize on individual case basis • The issues about the protection of personal data • It is hard to trace the origins of attacks • TOR (The Onion Router) network • Changes in technology - Cloud Computing • Where the data resides • What law applies • The data obtained from suspect’s computer may have little meaning 行政院資通安全處 34
  • 36. Suggestions • Facilitate trans-border law enforcement exchange visitors • NICs may • establish a platform to record the malicious domains or IPs • provide the query records of Root DNS Server • help law enforcement agencies block malicious domains or IPs • Establish contact window for intelligence exchanges 行政院資通安全處 35
  • 37. Contact information • TWNCERT • http://www.twncert.org.tw/ • +886-2-27339922; twncert@twncert.org.tw • TWCERT/CC • https://www.twcert.org.tw/ • +886-2-23776418; twcert@cert.org.tw • MJIB • http://www.mjib.gov.tw/ • +886-2-29112241ext2971; safenet@mjib.gov.tw • CIB • https://www.cib.gov.tw/English/ • +886-2-27652111~5; https://www.cib.gov.tw/Service/EMail 行政院資通安全處 36