SlideShare une entreprise Scribd logo
1  sur  43
고려대학교정보보호대학원
마스터 제목 스타일 편집
How South Korea Is Fighting
North Korea's Cyber Threats
1
Presented at Asia Transnational Threats Forum - Virtual Roundtable on North Korean Cyber Threats,
Center for East Asia Policy Studies at BROOKINGS, October 15, 2020.
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ 2000 : Founded Graduate School of
Information Security in Korea for the first
time
◼ 2009 & 2010 : Successively won DC3
Digital Forensic Challenge 2009 & 2010
◼ 2012 : Established Undergraduate Dept.
of Cyber Defense
◼ 2015 & 2018 : Won DEFCON CTF 2015 &
2018
Brief History of Korea University
2
고려대학교정보보호대학원
마스터 제목 스타일 편집
3
Current Status of Korea
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ In Korea, cyber warfare has become real,
not a virtual one. North Korea continues
to expand its cyber warfare capabilities.
1,350,000
Current Status of Cyber Threats in KR
4
(As of March 2018)
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ In Korea, cyber warfare has become real,
not a virtual one. North Korea continues
to expand its cyber warfare capabilities.
◼ South Korean government groups and
agencies experience more than 1.35
million hacking attempts a day
according to South Korean National
Intelligence Service (NIS, Korean CIA).
Current Status of Cyber Threats in KR
5
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ In Korea, cyber warfare has become real,
not a virtual one. North Korea continues
to expand its cyber warfare capabilities.
◼ South Korean government groups and
agencies experience more than 1.35
million hacking attempts a day
according to South Korean National
Intelligence Service (NIS, Korean CIA).
◼ From North Korea : 96% / China : 3% /
Russia : 1% / Iran and Pakistan : ↑
Current Status of Cyber Threats in KR
6
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Also, in recent years, there have been
more attacks mainly targeting private
companies rather than public institutions.
◼ The hacking damage is estimated at 86%
and 14% for the private and public,
respectively.
Current Status of Cyber Threats in KR
7
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Korean government believes that North
Korean General Bureau of
Reconnaissance (偵察總局), specifically
Unit 121, dedicates 6,000+ full-time
hackers who create malicious computer
codes.
◼ 1,700 are experts and 5,100 are supportive
members
North Korean Hacking Workforce
8
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
9
"Nation-State Moneymule’s Hunting Season - APT Attacks Targeting Financial Institutions -", Black Hat Asia 2018
Representative North Korean hacking groups include …
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Depending on the analysis company, North
Korean hacking groups are called differently.
For example,
◼ [Andariel = Silent Chollima] Acts against the
media and government agencies, primarily in
South Korea
◼ [Red Dot = Labyrinth Chollima] Focuses on
countering intelligence services
◼ [Red Eyes = Scarcruft = Group123 = APT37 =
Reaper = Ricochet Chollima] Engaged in
stealing user data
◼ [Bluenoroff = Stardust Chollima] Specializes in
commercial attacks
❖ ‘Chollima’ means a fine horse in Korean.
North Korean Hacking Workforce
10
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
(Comm. of the ACM, August 2012)
North Korean students have a good foundation for computer science itself.
◼ NK's hacking skills are really good?
11
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
◼ NK's hacking skills are really good?
12
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
◼ NK's hacking skills are really good?
13
Students from Kim Il-Sung University in North Korea were ranked higher than
Stanford University in International Collegiate Programming Contest, ACM-ICPC.
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
◼ NK's hacking skills are really good?
14
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
15
◼ NK's hacking skills are really good?
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
16
◼ NK's hacking skills are really good?
고려대학교정보보호대학원
마스터 제목 스타일 편집
North Korean Hacking Workforce
◼ As seen before, North Korean hackers
have good hacking skills and good base
in computer science.
◼ But above all, they have very strong
motivation such as Kim Jung-un’s
encouragements.
◼ Furthermore, North Korean hackers are
state-sponsored soldiers. Thus they have
the solid knowledge of (military)
operation. As we can see in SWIFT
hacking, they can carry out very well
organized operation.
17
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Tracking North Korea's hacker attacks
is becoming increasingly difficult
because the level of training in North
Korea is growing, and the groups
themselves are scattered all over the
world, from Japan to the countries of the
Middle East.
◼ Thus ‘traditional’ methods for identifying
the organizers of attack (by IP, servers, or
‘linguistic traces’ within the code)
practically do not work very well any
more.
North Korean Hacking Workforce
18
고려대학교정보보호대학원
마스터 제목 스타일 편집
19
What kind of efforts is SK
doing to stop NK hacking?
- Ⅰ. Government Organizations -
19
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Blue House National Security Office as Control
Tower
◼ NIS (National Intelligence Service (Korean CIA))
for Public Sector
◼ NSR (National Security Research Institute) for Technical
Support
◼ MSIT (Ministry of Science and ICT) for Private
Sector
◼ KISA (Korea Internet & Security Agency) for Technical
Support
◼ Cyber Security Research Division of ETRI (Electronics and
Telecommunications Research Institute) for Development
of Fundamental Security Technologies
◼ PIPC (Personal Information Protection
Commission) for the Citizens’ Personal Information
Protection
Gov. Org. for Cyber Threat Response
20
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ MOI (Ministry of the Interior) for E-Gov.
◼ FSC (Financial Services Commission) & FSS
(Financial Supervisory Service) for Financial
Sector
◼ FSI (Financial Security Institute) for Technical
Support
◼ MND (Ministry of National Defense) &
Cyber Command for Military Sector
◼ ADD (Agency for Defense Development) for
Technical Support
◼ SPO (Supreme Prosecutors' Office) & NPA
(National Police Agency) for Cyber Crime
Gov. Org. for Cyber Threat Response
21
고려대학교정보보호대학원
마스터 제목 스타일 편집
- Ⅱ. Very Strong Network Separation Policy -
22
What kind of efforts is SK
doing to stop NK hacking?
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ From 2007, South Korean government
(National Intelligence Service & Ministry of the Interior)
adopted the network separation policy.
◼ All the state agencies
◼ Government ministries & their affiliated
agencies
◼ Local governments & their affiliated
agencies
◼ Public enterprises
◼ Public institutions
Network Separation @ Public Sector
23
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ From August 2012, our government (Korea
Communications Commission) adopted network
separation policy also for the private
sector.
◼ ISP (Internet Service Providers)
◼ Big web portals with an average of more
than 1 million visitors a day
◼ Naver, Daum, etc.
◼ Recently, also for defense companies
Network Separation @ Private Sector
24
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ On 20 March 2013, the computer
networks of major television stations and
6 financial institutions went down by
cyberattack. ATMs and mobile payments
were also affected.
◼ After this attack, on July 2013, our
government (Financial Services Commission & Financial
Supervisory Service) extended their coverage to
the financial sector.
Network Separation @ Financial Sector
25
고려대학교정보보호대학원
마스터 제목 스타일 편집
Internet
Intranet
Korea vs. Other Countries – Korea –
Korea has a policy to completely disconnect the organization's intranet from the Internet.
26
고려대학교정보보호대학원
마스터 제목 스타일 편집
Internet
Intranet
Korea vs. Other Countries – Others –
Top Secret
Secret
Unclassified
On the other hand, foreign countries have a policy to separate networks according to the importance of
data, and to keep non-confidential business computer systems connected to the Internet at all times.27
고려대학교정보보호대학원
마스터 제목 스타일 편집
- Ⅲ. Cyber Threat Information Sharing -
28
What kind of efforts is SK
doing to stop NK hacking?
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Today, information sharing is recognized as
a means to effectively prevent cyber attacks,
which are becoming more intelligent and
advanced, so that many countries such as
U.S., EU, UK, Japan, etc. are establishing
cyber threat information sharing system
at national level.
◼ In particular, the United States has enacted the
"Cyber Threat Information Sharing Act
(CISA)" in December 2015, and has been
promoting the establishment of a legal and
institutional basis for sharing threat information
and the implementation of the system.
29
Cyber Threat Information Sharing in KR
고려대학교정보보호대학원
마스터 제목 스타일 편집
30
Cyber Threat Information Sharing in KR
◼ Korea is sharing cyber threat information
in public and private sectors mainly
through the NIS’s National Cyber
Security Center(NCSC) and the Korea
Internet & Security Agency(KISA).
◼ From 2014, KISA developed C-TAS(Cyber
Threat Analysis & Sharing) system to
profile and share not only the collected
malware but also the hacked hosts, used
vulnerabilities and even the attackers.
고려대학교정보보호대학원
마스터 제목 스타일 편집
- Ⅳ. Investing in Human Resources -
31
What kind of efforts is SK
doing to stop NK hacking?
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Established in 2012 (Inspired by Israel's
Talpiot program)
◼ In 2016, we graduated 30 students for the first
time.
◼ Joint educational programs with Korea
Army (Cyber Command)
◼ Full Scholarship over Guaranteed Employment
◼ Upon graduation, they are to be commissioned as
second lieutenants and must serve in the military for
seven years
◼ Accept top 0.4%~0.6% of students in the
national college entrance exam
Dept. of Cyber Defense @ Korea Univ.
32
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ Public Sector & Government-Run Cyber
Security Education Programs
◼ Education and Training for Public Officers
◼ NSR’s CSTEC(Cyber Security Training and Exercise
Center), KISA Academy, etc.
◼ Education and Training for Non-Officers
◼ KISA’s K-Shield
◼ KITRI’s BoB(Best of the Best) Program :
Running strong peer-to-peer mentoring style
of education. And so far, it has made so may
pretty good results.
◼ Private Sector-Run Cyber Security
Education Programs
Other Education Programs
33
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – Network Separation Policy :
1. Strong network separation policy of Korea
conflicts with other policies such as smart
work, cloud service, cross-border private
data transfers, etc. Furthermore, wrong
belief on network separation usually
weakens the security mind or security
awareness of people.
◼ In the coming industry 4.0 era, it will be worse
and worse.
34
Remaining Problems to Solve Ⅰ
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – Tracking Hackers :
1. Recently, OSINT companies have been in
the spotlight. However, as cyber threat
intelligence companies are competitively
disclosing threat profiling information
for promotional purposes, it is becoming
more difficult to track hackers.
2. If there are no legal issues, private
companies tend not to try to analyze the
causes of hacking incidents. This makes
tracking the source of the hack more
difficult.
35
Remaining Problems to Solve Ⅱ
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – Tracking Hackers :
3. It is possible to freely move the hacking
tool development base by using the
cloud or docker (like submarine-launched
ballistic missile or road-mobile missiles).
4. Furthermore, hacking groups start to share
their exploit code and use it. This makes
tracking more difficult.
36
Remaining Problems to Solve Ⅱ
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – Tracking Hackers :
1. As can be seen from the COVID-19
situation, countries around the world have
begun to intensify competition for
technological hegemony.
◼ This creates a situation where today's friend
may become tomorrow's enemy. i.e., This
makes it more difficult to distinguish enemies.
37
Remaining Problems to Solve Ⅱ
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – HRD :
1. A Hacker is not a panacea!
◼ Compared to North Korea, South Korea is very
dependent on the Internet. Thus, it is important
to cultivate vulnerability analysis experts, but it is
equally important to train advanced S/W
development experts.
◼ However, students tend to bias their studies
because they think vulnerability analysts are
more attractive than developers. ⇒⇒⇒ Need
more emphasis on ‘security engineering’ such as
security architecture development, RMF
documentation, etc.
38
Remaining Problems to Solve Ⅲ
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – HRD :
2. Offer a meaningful internship program.
◼ Students who graduated from medical school
must go through internship (a.k.a. Medical
intern).
◼ The same goes for security. No matter how
good a student is, field experience is essential.
◼ However, COVID-19 makes it very difficult for
companies to operate internship programs.
39
Remaining Problems to Solve Ⅲ
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – HRD :
3. Don't appeal to patriotism anymore!
◼ Most countries tend to appeal to patriotism in
fostering their national hacking workforce, which
should be avoided.
◼ Need to give clear future direction to the
workforce like lawyer, doctor, etc. :
◼ Good salary?
◼ Good working environment?
◼ Talented company colleagues?
◼ Experience that others can not? ((e.g.) Access to secret)
40
Remaining Problems to Solve Ⅲ
고려대학교정보보호대학원
마스터 제목 스타일 편집
◼ However, there are still problems to be
improved. – Sanction :
1. Since North Korea is less dependent on the
Internet, “an eye for an eye” style is
meaningless. i.e., retaliation through cyber attacks
is meaningless.
◼ Therefore, proportional response is important.
◼ However, it is difficult to do this without the
participation of many countries around the world.
2. Some experts say that North Korea's exports
of cyber weapons should be banned, but this
could lead to controversy over cyber
espionage between countries.
41
Remaining Problems to Solve Ⅳ
고려대학교정보보호대학원
마스터 제목 스타일 편집
❖ ©2020 by Seungjoo Gabriel Kim. Permission to
make digital or hard copies of part or all of this
material is currently granted without fee
provided that copies are made only for personal
or classroom use, are not distributed for profit
or commercial advantage, and that new copies
bear this notice and the full citation.
42
고려대학교정보보호대학원
마스터 제목 스타일 편집
How South Korea Is Fighting
North Korea's Cyber Threats
43
Presented at Asia Transnational Threats Forum - Virtual Roundtable on North Korean Cyber Threats,
Center for East Asia Policy Studies at BROOKINGS, October 15, 2020.

Contenu connexe

Tendances

Energi
EnergiEnergi
EnergiTsets
 
Хашшагай-компьютерт томографи
Хашшагай-компьютерт томографиХашшагай-компьютерт томографи
Хашшагай-компьютерт томографи1up Shagai
 
физик 11 р анги
физик 11 р ангифизик 11 р анги
физик 11 р ангиtumee53
 
Бүдүүн гэдэсний хорт хавдар
Бүдүүн гэдэсний хорт хавдарБүдүүн гэдэсний хорт хавдар
Бүдүүн гэдэсний хорт хавдарBeku Jagaa
 
汎用人工知能の研究動向
汎用人工知能の研究動向汎用人工知能の研究動向
汎用人工知能の研究動向Naoya Arakawa
 
тригонометрийн үндсэн адилтгалууд 1
тригонометрийн үндсэн адилтгалууд 1тригонометрийн үндсэн адилтгалууд 1
тригонометрийн үндсэн адилтгалууд 1superzpv
 
Hogjiltei bodlogo
Hogjiltei bodlogoHogjiltei bodlogo
Hogjiltei bodlogoenhee0404
 
11 р ангийн математикийн хичээлийн тест
11 р ангийн математикийн хичээлийн тест11 р ангийн математикийн хичээлийн тест
11 р ангийн математикийн хичээлийн тестMunguuzb
 
Dotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliin
Dotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliinDotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliin
Dotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliinGantulga Nyamdorj
 
INNOMED - 2015 Lkhagvasuren_SHUTIS
INNOMED - 2015 Lkhagvasuren_SHUTISINNOMED - 2015 Lkhagvasuren_SHUTIS
INNOMED - 2015 Lkhagvasuren_SHUTISMedimpex Mongolia
 
Revit 製品紹介
Revit 製品紹介Revit 製品紹介
Revit 製品紹介AutodeskCIM
 
механик энерги
механик энергимеханик энерги
механик энергиnsuren1
 
Energi
EnergiEnergi
EnergiNTsets
 
таньд тустай жор
таньд тустай жортаньд тустай жор
таньд тустай жорTamjid Tamja
 

Tendances (20)

хүч
хүчхүч
хүч
 
Energi
EnergiEnergi
Energi
 
Хашшагай-компьютерт томографи
Хашшагай-компьютерт томографиХашшагай-компьютерт томографи
Хашшагай-компьютерт томографи
 
физик 11 р анги
физик 11 р ангифизик 11 р анги
физик 11 р анги
 
Бүдүүн гэдэсний хорт хавдар
Бүдүүн гэдэсний хорт хавдарБүдүүн гэдэсний хорт хавдар
Бүдүүн гэдэсний хорт хавдар
 
Havdar sudlal
Havdar sudlalHavdar sudlal
Havdar sudlal
 
汎用人工知能の研究動向
汎用人工知能の研究動向汎用人工知能の研究動向
汎用人工知能の研究動向
 
тригонометрийн үндсэн адилтгалууд 1
тригонометрийн үндсэн адилтгалууд 1тригонометрийн үндсэн адилтгалууд 1
тригонометрийн үндсэн адилтгалууд 1
 
Hogjiltei bodlogo
Hogjiltei bodlogoHogjiltei bodlogo
Hogjiltei bodlogo
 
11 р ангийн математикийн хичээлийн тест
11 р ангийн математикийн хичээлийн тест11 р ангийн математикийн хичээлийн тест
11 р ангийн математикийн хичээлийн тест
 
8-р ангийн Физикийн хичээлийн шалгалтын материал
8-р ангийн Физикийн хичээлийн шалгалтын материал8-р ангийн Физикийн хичээлийн шалгалтын материал
8-р ангийн Физикийн хичээлийн шалгалтын материал
 
Dotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliin
Dotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliinDotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliin
Dotor, erchimt emchilgee,_yaraltai_tuslamj,_emnelzuin_emgeg_sudlaliin
 
INNOMED - 2015 Lkhagvasuren_SHUTIS
INNOMED - 2015 Lkhagvasuren_SHUTISINNOMED - 2015 Lkhagvasuren_SHUTIS
INNOMED - 2015 Lkhagvasuren_SHUTIS
 
Phys
PhysPhys
Phys
 
Ulamjlaltiin baga emch
Ulamjlaltiin baga emchUlamjlaltiin baga emch
Ulamjlaltiin baga emch
 
Physics
PhysicsPhysics
Physics
 
Revit 製品紹介
Revit 製品紹介Revit 製品紹介
Revit 製品紹介
 
механик энерги
механик энергимеханик энерги
механик энерги
 
Energi
EnergiEnergi
Energi
 
таньд тустай жор
таньд тустай жортаньд тустай жор
таньд тустай жор
 

Similaire à How South Korea Is Fighting North Korea's Cyber Threats

Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
How South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-SecurityHow South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-SecuritySeungjoo Kim
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
Network Separation Policy in Korea
 Network Separation Policy in Korea Network Separation Policy in Korea
Network Separation Policy in KoreaSeungjoo Kim
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...CODE BLUE
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle David Sweigert
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022Dawn Yankeelov
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infrasimisterchristen
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speedjcichelli
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategiesEyesOpen Association
 

Similaire à How South Korea Is Fighting North Korea's Cyber Threats (20)

Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
How South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-SecurityHow South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-Security
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Network Separation Policy in Korea
 Network Separation Policy in Korea Network Separation Policy in Korea
Network Separation Policy in Korea
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 

Plus de Seungjoo Kim

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리Seungjoo Kim
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. SyllabusSeungjoo Kim
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto BlockchainSeungjoo Kim
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart ContractSeungjoo Kim
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and MetaverseSeungjoo Kim
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other AltcoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark CoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Seungjoo Kim
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCSeungjoo Kim
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessSeungjoo Kim
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Seungjoo Kim
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Seungjoo Kim
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -Seungjoo Kim
 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Seungjoo Kim
 

Plus de Seungjoo Kim (20)

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0
 

Dernier

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Dernier (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

How South Korea Is Fighting North Korea's Cyber Threats

  • 1. 고려대학교정보보호대학원 마스터 제목 스타일 편집 How South Korea Is Fighting North Korea's Cyber Threats 1 Presented at Asia Transnational Threats Forum - Virtual Roundtable on North Korean Cyber Threats, Center for East Asia Policy Studies at BROOKINGS, October 15, 2020.
  • 2. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ 2000 : Founded Graduate School of Information Security in Korea for the first time ◼ 2009 & 2010 : Successively won DC3 Digital Forensic Challenge 2009 & 2010 ◼ 2012 : Established Undergraduate Dept. of Cyber Defense ◼ 2015 & 2018 : Won DEFCON CTF 2015 & 2018 Brief History of Korea University 2
  • 4. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ In Korea, cyber warfare has become real, not a virtual one. North Korea continues to expand its cyber warfare capabilities. 1,350,000 Current Status of Cyber Threats in KR 4 (As of March 2018)
  • 5. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ In Korea, cyber warfare has become real, not a virtual one. North Korea continues to expand its cyber warfare capabilities. ◼ South Korean government groups and agencies experience more than 1.35 million hacking attempts a day according to South Korean National Intelligence Service (NIS, Korean CIA). Current Status of Cyber Threats in KR 5
  • 6. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ In Korea, cyber warfare has become real, not a virtual one. North Korea continues to expand its cyber warfare capabilities. ◼ South Korean government groups and agencies experience more than 1.35 million hacking attempts a day according to South Korean National Intelligence Service (NIS, Korean CIA). ◼ From North Korea : 96% / China : 3% / Russia : 1% / Iran and Pakistan : ↑ Current Status of Cyber Threats in KR 6
  • 7. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Also, in recent years, there have been more attacks mainly targeting private companies rather than public institutions. ◼ The hacking damage is estimated at 86% and 14% for the private and public, respectively. Current Status of Cyber Threats in KR 7
  • 8. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Korean government believes that North Korean General Bureau of Reconnaissance (偵察總局), specifically Unit 121, dedicates 6,000+ full-time hackers who create malicious computer codes. ◼ 1,700 are experts and 5,100 are supportive members North Korean Hacking Workforce 8
  • 9. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce 9 "Nation-State Moneymule’s Hunting Season - APT Attacks Targeting Financial Institutions -", Black Hat Asia 2018 Representative North Korean hacking groups include …
  • 10. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Depending on the analysis company, North Korean hacking groups are called differently. For example, ◼ [Andariel = Silent Chollima] Acts against the media and government agencies, primarily in South Korea ◼ [Red Dot = Labyrinth Chollima] Focuses on countering intelligence services ◼ [Red Eyes = Scarcruft = Group123 = APT37 = Reaper = Ricochet Chollima] Engaged in stealing user data ◼ [Bluenoroff = Stardust Chollima] Specializes in commercial attacks ❖ ‘Chollima’ means a fine horse in Korean. North Korean Hacking Workforce 10
  • 11. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce (Comm. of the ACM, August 2012) North Korean students have a good foundation for computer science itself. ◼ NK's hacking skills are really good? 11
  • 12. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce ◼ NK's hacking skills are really good? 12
  • 13. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce ◼ NK's hacking skills are really good? 13 Students from Kim Il-Sung University in North Korea were ranked higher than Stanford University in International Collegiate Programming Contest, ACM-ICPC.
  • 14. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce ◼ NK's hacking skills are really good? 14
  • 15. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce 15 ◼ NK's hacking skills are really good?
  • 16. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce 16 ◼ NK's hacking skills are really good?
  • 17. 고려대학교정보보호대학원 마스터 제목 스타일 편집 North Korean Hacking Workforce ◼ As seen before, North Korean hackers have good hacking skills and good base in computer science. ◼ But above all, they have very strong motivation such as Kim Jung-un’s encouragements. ◼ Furthermore, North Korean hackers are state-sponsored soldiers. Thus they have the solid knowledge of (military) operation. As we can see in SWIFT hacking, they can carry out very well organized operation. 17
  • 18. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Tracking North Korea's hacker attacks is becoming increasingly difficult because the level of training in North Korea is growing, and the groups themselves are scattered all over the world, from Japan to the countries of the Middle East. ◼ Thus ‘traditional’ methods for identifying the organizers of attack (by IP, servers, or ‘linguistic traces’ within the code) practically do not work very well any more. North Korean Hacking Workforce 18
  • 19. 고려대학교정보보호대학원 마스터 제목 스타일 편집 19 What kind of efforts is SK doing to stop NK hacking? - Ⅰ. Government Organizations - 19
  • 20. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Blue House National Security Office as Control Tower ◼ NIS (National Intelligence Service (Korean CIA)) for Public Sector ◼ NSR (National Security Research Institute) for Technical Support ◼ MSIT (Ministry of Science and ICT) for Private Sector ◼ KISA (Korea Internet & Security Agency) for Technical Support ◼ Cyber Security Research Division of ETRI (Electronics and Telecommunications Research Institute) for Development of Fundamental Security Technologies ◼ PIPC (Personal Information Protection Commission) for the Citizens’ Personal Information Protection Gov. Org. for Cyber Threat Response 20
  • 21. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ MOI (Ministry of the Interior) for E-Gov. ◼ FSC (Financial Services Commission) & FSS (Financial Supervisory Service) for Financial Sector ◼ FSI (Financial Security Institute) for Technical Support ◼ MND (Ministry of National Defense) & Cyber Command for Military Sector ◼ ADD (Agency for Defense Development) for Technical Support ◼ SPO (Supreme Prosecutors' Office) & NPA (National Police Agency) for Cyber Crime Gov. Org. for Cyber Threat Response 21
  • 22. 고려대학교정보보호대학원 마스터 제목 스타일 편집 - Ⅱ. Very Strong Network Separation Policy - 22 What kind of efforts is SK doing to stop NK hacking?
  • 23. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ From 2007, South Korean government (National Intelligence Service & Ministry of the Interior) adopted the network separation policy. ◼ All the state agencies ◼ Government ministries & their affiliated agencies ◼ Local governments & their affiliated agencies ◼ Public enterprises ◼ Public institutions Network Separation @ Public Sector 23
  • 24. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ From August 2012, our government (Korea Communications Commission) adopted network separation policy also for the private sector. ◼ ISP (Internet Service Providers) ◼ Big web portals with an average of more than 1 million visitors a day ◼ Naver, Daum, etc. ◼ Recently, also for defense companies Network Separation @ Private Sector 24
  • 25. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ On 20 March 2013, the computer networks of major television stations and 6 financial institutions went down by cyberattack. ATMs and mobile payments were also affected. ◼ After this attack, on July 2013, our government (Financial Services Commission & Financial Supervisory Service) extended their coverage to the financial sector. Network Separation @ Financial Sector 25
  • 26. 고려대학교정보보호대학원 마스터 제목 스타일 편집 Internet Intranet Korea vs. Other Countries – Korea – Korea has a policy to completely disconnect the organization's intranet from the Internet. 26
  • 27. 고려대학교정보보호대학원 마스터 제목 스타일 편집 Internet Intranet Korea vs. Other Countries – Others – Top Secret Secret Unclassified On the other hand, foreign countries have a policy to separate networks according to the importance of data, and to keep non-confidential business computer systems connected to the Internet at all times.27
  • 28. 고려대학교정보보호대학원 마스터 제목 스타일 편집 - Ⅲ. Cyber Threat Information Sharing - 28 What kind of efforts is SK doing to stop NK hacking?
  • 29. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. ◼ In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. 29 Cyber Threat Information Sharing in KR
  • 30. 고려대학교정보보호대학원 마스터 제목 스타일 편집 30 Cyber Threat Information Sharing in KR ◼ Korea is sharing cyber threat information in public and private sectors mainly through the NIS’s National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). ◼ From 2014, KISA developed C-TAS(Cyber Threat Analysis & Sharing) system to profile and share not only the collected malware but also the hacked hosts, used vulnerabilities and even the attackers.
  • 31. 고려대학교정보보호대학원 마스터 제목 스타일 편집 - Ⅳ. Investing in Human Resources - 31 What kind of efforts is SK doing to stop NK hacking?
  • 32. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Established in 2012 (Inspired by Israel's Talpiot program) ◼ In 2016, we graduated 30 students for the first time. ◼ Joint educational programs with Korea Army (Cyber Command) ◼ Full Scholarship over Guaranteed Employment ◼ Upon graduation, they are to be commissioned as second lieutenants and must serve in the military for seven years ◼ Accept top 0.4%~0.6% of students in the national college entrance exam Dept. of Cyber Defense @ Korea Univ. 32
  • 33. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ Public Sector & Government-Run Cyber Security Education Programs ◼ Education and Training for Public Officers ◼ NSR’s CSTEC(Cyber Security Training and Exercise Center), KISA Academy, etc. ◼ Education and Training for Non-Officers ◼ KISA’s K-Shield ◼ KITRI’s BoB(Best of the Best) Program : Running strong peer-to-peer mentoring style of education. And so far, it has made so may pretty good results. ◼ Private Sector-Run Cyber Security Education Programs Other Education Programs 33
  • 34. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – Network Separation Policy : 1. Strong network separation policy of Korea conflicts with other policies such as smart work, cloud service, cross-border private data transfers, etc. Furthermore, wrong belief on network separation usually weakens the security mind or security awareness of people. ◼ In the coming industry 4.0 era, it will be worse and worse. 34 Remaining Problems to Solve Ⅰ
  • 35. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – Tracking Hackers : 1. Recently, OSINT companies have been in the spotlight. However, as cyber threat intelligence companies are competitively disclosing threat profiling information for promotional purposes, it is becoming more difficult to track hackers. 2. If there are no legal issues, private companies tend not to try to analyze the causes of hacking incidents. This makes tracking the source of the hack more difficult. 35 Remaining Problems to Solve Ⅱ
  • 36. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – Tracking Hackers : 3. It is possible to freely move the hacking tool development base by using the cloud or docker (like submarine-launched ballistic missile or road-mobile missiles). 4. Furthermore, hacking groups start to share their exploit code and use it. This makes tracking more difficult. 36 Remaining Problems to Solve Ⅱ
  • 37. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – Tracking Hackers : 1. As can be seen from the COVID-19 situation, countries around the world have begun to intensify competition for technological hegemony. ◼ This creates a situation where today's friend may become tomorrow's enemy. i.e., This makes it more difficult to distinguish enemies. 37 Remaining Problems to Solve Ⅱ
  • 38. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – HRD : 1. A Hacker is not a panacea! ◼ Compared to North Korea, South Korea is very dependent on the Internet. Thus, it is important to cultivate vulnerability analysis experts, but it is equally important to train advanced S/W development experts. ◼ However, students tend to bias their studies because they think vulnerability analysts are more attractive than developers. ⇒⇒⇒ Need more emphasis on ‘security engineering’ such as security architecture development, RMF documentation, etc. 38 Remaining Problems to Solve Ⅲ
  • 39. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – HRD : 2. Offer a meaningful internship program. ◼ Students who graduated from medical school must go through internship (a.k.a. Medical intern). ◼ The same goes for security. No matter how good a student is, field experience is essential. ◼ However, COVID-19 makes it very difficult for companies to operate internship programs. 39 Remaining Problems to Solve Ⅲ
  • 40. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – HRD : 3. Don't appeal to patriotism anymore! ◼ Most countries tend to appeal to patriotism in fostering their national hacking workforce, which should be avoided. ◼ Need to give clear future direction to the workforce like lawyer, doctor, etc. : ◼ Good salary? ◼ Good working environment? ◼ Talented company colleagues? ◼ Experience that others can not? ((e.g.) Access to secret) 40 Remaining Problems to Solve Ⅲ
  • 41. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ◼ However, there are still problems to be improved. – Sanction : 1. Since North Korea is less dependent on the Internet, “an eye for an eye” style is meaningless. i.e., retaliation through cyber attacks is meaningless. ◼ Therefore, proportional response is important. ◼ However, it is difficult to do this without the participation of many countries around the world. 2. Some experts say that North Korea's exports of cyber weapons should be banned, but this could lead to controversy over cyber espionage between countries. 41 Remaining Problems to Solve Ⅳ
  • 42. 고려대학교정보보호대학원 마스터 제목 스타일 편집 ❖ ©2020 by Seungjoo Gabriel Kim. Permission to make digital or hard copies of part or all of this material is currently granted without fee provided that copies are made only for personal or classroom use, are not distributed for profit or commercial advantage, and that new copies bear this notice and the full citation. 42
  • 43. 고려대학교정보보호대학원 마스터 제목 스타일 편집 How South Korea Is Fighting North Korea's Cyber Threats 43 Presented at Asia Transnational Threats Forum - Virtual Roundtable on North Korean Cyber Threats, Center for East Asia Policy Studies at BROOKINGS, October 15, 2020.