Information Security Policies in Japan
|
|
- Jasmin Newton
- 6 years ago
- Views:
Transcription
1 Information Security Policies in Japan Towards a safe and secure network infrastructure Fumiaki TAKAHASHI Director, ICT Security Office, Information and Communications Policy Bureau, Ministry of Internal Affairs and Communications (MIC) May 2007
2 Ninfrastructures. PAETIODInformation security policy of the entire government and roles of MIC MIC : Information and communications field Trustworthy information and communications services as the infrastructure for other Know-how to develop the framework for sharing information in the information and communications field. Know-how of network security technologies. MMSupporting establishment Supporting implementation of the strategy Cyber-attacks including DoS attacks. Threats of cyber-terrorism. Unintentional factors including humancaused mistakes and hardware malfunctions. The scale of IT-malfunctions has become larger. IT-malfunctions directly effect citizens lives and business activities. The air control system was down and 215 flights were canceled (Mar 2003). The Tokyo Stock Exchange system was down and the exchange stopped for half a day (Nov 2005). Etc. Information Security Policy Council National Information Security Centre (NISC) The First National Strategy on Information Security (2006.2) Secure Japan 2006 (2006.6) Policy of each ministry Central and local governments Critical Infrastructures (telecommunications, finance, electricity, civil aviation, medical services, etc.) Businesses Individuals 1
3 Outline of The First National Strategy on Information Security and Secure Japan 2007 The First National Strategy on Information Security (2 February 2006 Information Security Policy Council) Three-year plan for FY Aimed at establishing a New public-private collaboration model in which all bodies play appropriate roles Objectives Central and local governments By the beginning of FY 2009, all governmental agencies should take measures according to he United Standards. Critical infrastructure By the beginning g of FY2009, the number of ITmalfunctions should be reduced as close as possible to zero. Businesses Individuals By the beginning of FY 2009, the state of implementation of By the beginning g of FY 2009, information security measures the number of individuals should be enhanced to the feeling insecure about IT world s top level. use should be reduced as close as possible to zero. Key sectoral policies Key crosssectoral policies Assessment based on the Unified Standards of governmental agencies. Increasing the ability to respond to emergencies including cyber attacks, Promoting information security technology strategy Developing CEPTOAR. Establishing the CEPTOAR- Council. Implementing cross-sectoral exercises and interdependency analysis. Promoting international cooperation and collaboration Fixing the public bidding process for government purchases. Promoting usage of third-party evaluation systems. Reinforcing the framework to respond to computer viruses, etc. Developing human resources Promoting information security education. Enhancing publicity and awareness. Improving the environment to provide user-friendly services. Crime control and protection/remedial measures for rights and interests FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 Secure Japan The action plan in FY 2006 ~Establishment of a cooperation model for security measures in the public and private sectors. 2 The direction of key policy in FY 2007 ~Enhancement of security measures in the public and private sectors. Secure Japan The action plan in FY 2007 ~Enhancement of security measures in the public and private sectors. 2 The direction of key policy in FY 2008 ~Intensive efforts for strengthening security basis. Secure Japan
4 MIC s efforts to ensure reliability of information and communications networks We realize secure and safe communications as a social infrastructure by promoting policies that reinforce information security from the three aspects of Network, Terminal System and Equipment and Person. Measures against cyber-attacks. Measures against concurrent attacks from a lot of commandeered PCs called Botnets. Establishing tracing-back technology to specify the source of the attack. Establishing technology to prevent hijacking communication routes. Promotion to share information between telecommunications carriers. Cooperation with Telecom-ISAC Japan. Promotion to develop T-CEPTOAR. Ⅱ Improvement of human ability Ⅰ Making robust and reliable networks Security and safety in telecommunications Coping with rapid increase of traffic. Development of the next-generation backbone enabling the stable control of traffic that doubles every year by optimizing the data exchange points. Preparation against disasters. Supporting the introduction of such equipment as back-up machines against disasters and machines capable of investigating the cause of obstacles. Ⅲ Coping with diversification of goods connecting to networks Implementing exercises against cyber- attacks. Telecommunications carriers implement exercises against cyber-attacks. Ensuring the security in the era when various equipments are connected to networks. Establishment of security management system. Identification of measures to ensure the security necessary for various Establishing a guideline for telecommunications carriers; Promoting and networked equipment to establish ubiquitous environment by IPv6. spreading the guideline, aiming for international rules. Enhancement of educational and enlightening activities for individuals. Implementing e-net caravan which is an activity for enlightening students parents and teachers. Development of a system to foster children s ICT media literacy. Supporting opening information and communication security training centers. R&D for preventing information leaks. Development of technology to prevent information leaks through file sharing software. Simplifying and making more sophisticated the cryptography and authentication systems. 3
5 T-CEPTOAR (Telecommunications CEPTAOR) Objective CEPTOAR (Capability for Engineering of Protection, Technical Operation, Analysis and Response) was established in each of the 10 critical infrastructure fields based on The First National Strategy on Information Security. (The CEPTOAR in information and communications (telecommunications) field is called T-CEPTOAR (Telecommunications CEPTOAR).) What is CEPTOAR? CEPTOAR is the function for sharing and analysing information to improve the ability to maintain and recover services of critical infrastructures. Critical infrastructure companies communicate and share information provided from governments for prevention of IT-malfunctions, prevention of expansion of suffering, rapid resumption from suffering and prevention of recurrence. Framework T-CEPTOAR is the CEPTOAR in the information and communications (telecommunications) field. T-CEPTOAR is based on existing organizations including Telecom-ISAC Japan, TCA and others, and has 4 Sub-groups categorized by type of services under the steering committee. Leading telecommunications carriers (27 carriers) participate in this framework. SG1 : Fixed-line carriers providing network infrastructure and closely related companies. SG2 : Access line carriers and closely related companies. SG3 : ISP carriers and closely related companies. T-CEPTOAR Steering Committee (Sub-PoC of each SG) T-PoC(main sub) Sub-PoC(main) Sub-PoC(sub) SG4 : Mobile carriers and closely related ed companies. SG1(L1) SG2(L2) SG3(L3) SG4(Mobile) T-PoC Sub-PoC Sub-PoC Sub-PoC Sub-PoC Functions SG1(L1)members SG2(L2)members SG3(L3)members SG4(mobile) members 1. Sharing information and cooperating for prevention of IT-malfunctions, prevention of expansion of suffering, rapid resumption from suffering and prevention of recurrence through analysis/verification of causes of IT-malfunctions. 2. Forwarding information from governments and other CEPTOARs to members. 3. Sharing additional information related with the information described 2 above among members. 4
6 Bot Countermeasures for Botnet 6) ISP 5) Detect infected PC Recommend to install the removal tool ISP Recommend to install the removal tool 7) ISP 4) Detect infected PCs Distribute the removal tool Information on attack sources or spam distributers 1),3) Super Honey Pot 2) Seeking solutions Information on attack sources or spam distributers Portal site ccc.go.jp 1)To capture infecting and propagating computer viruses, set up Super Honey Pots containing a large number of IP addresses. 2)Reverse engineering i of the captured computer viruses, and create a removal tool for the computer viruses. 3)To capture newly distributed computer viruses, maintain activity of the captured computer viruses based on the results of reverse engineering 2). 4)Report traffic characteristics i of finfected PCs to ISPs, based on the results of reverse engineering 2). 5)Detect infected PCs, based on 4). 6)Recommend to owners of infected PCs (subscribers of internet services) that they use the removal tool. 7)Distribute the removal tool on the portal site. 5
7 R&D of tracing-back to IP packets Most data transmitted by cyber attacks including unauthorized accesses and denial of service attacks falsify addresses of the transmitting equipment of the sender. It is thus too difficult to discover the true transmitting equipment at present. MIC is developing the technology to enable tracing-back to IP packets for detecting the true transmitting equipment even if the addresses are falsified. Host A Getting address numbers Host B Host A Getting address numbers Host B Packets falsifying addresses [B C] Router X Router Y Before introduction Router Z Host C Transmitting equipment cannot be discovered. After introduction Packets falsifying transmitting equipments [B C] Router X Router Y Tracing back platform Router Z Host C Transmitting equipment can be discovered by tracing back. Tracing-back platform Installing equipment to collect tracing-back (TB) data on the Internet and collecting TB data and compiling it on databases. Detection of true transmitting equipment by analyzing compiled data. Equipment to search TB data Equipment to analyze TB data 2Requirement to search TB data 1Requirement of Collecting TB data detection 3Result of search 4Result of Internet detection Database of compiling TB data Equipment to collect TB data including : below Equipment to collect packets Equipment to convert data (anonymizing, etc.) 6
8 Incident Analysis System: nicter(network Incident analysis Center for Tactical Emergency Response) Bot Macro analysis System (MacS) Virus Visualizing Engine Analysis Engine! Monitoring network attacks 3D Display World map Worm Phenomenon Macro-micro Correlation Analysis system Government organizations Report ! Correlation Analysis Engine Incident Reports Cause Incident Handling by Human Operator Internet Service Providers Collecting illegal code samples Micro analysis System (MicS) Static analysis of illegal code Dynamic analysis of illegal code! Honey pot End Users 7
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationDevelopment of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan
Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan October 1, 2009 Hideaki Kobayashi *1, Kenji Watanabe *2, Takahito Watanabe *1,
More informationOverview of nicter - R&D project against Cyber Attacks in Japan -
Overview of nicter - R&D project against Cyber Attacks in Japan - Daisuke INOUE Cybersecurity Laboratory Network Security Research Institute (NSRI) National Institute of Information and Communications
More informationInformation Security and Cyber Security
Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information
More informationJapanese Government s s Efforts to Address Information Security Issues - Focusing on the Cabinet Secretariat s s Efforts -
Japanese Government s s Efforts to Address Information Security Issues - Focusing on the Cabinet Secretariat s s Efforts - September, 2006 National Information Security Center (NISC) http://www.nisc.go.jp/eng/
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationOUTLINE of NICT. ~ INTRODUCTION of R&D ACTIVITIES for INFORMATION SECURITY ~
OUTLINE of NICT ~ INTRODUCTION of R&D ACTIVITIES for INFORMATION SECURITY ~ Yuichi Matsushima Executive Director; Information and Network Systems Department NICT: National Institute of Information and
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationIPv6 Deployment Overview & Policy Update
IPv6 Deployment Overview & Policy Update Takuya MIYOSHI Internet Policy Office Ministry of Internal Affairs and Communications, Japan 24 th February, 2005 History and Acceleration of Japan s IT Strategy
More informationValérie Andrianavaly European Commission DG INFSO-A3
Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:
More informationSecurity Solutions Assisting Social Infrastructure Digitalization
FEATURED ARTICLES Social Infrastructure and its Digitalization Overview Solutions Assisting Social Infrastructure Digitalization Takeshi Miyao Junichi Tanimoto 1. Digitalization and Threats The rise of
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationForum. Ningbo, China 25 February
2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee
More informationVulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures)
Vulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures) Ichiro Murase Team Leader of Security Technology Team, Information Technology
More informationDisaster Management and Security Solutions to Usher in the IoT Era
Disaster Management and Solutions for a Safe and Secure Way of Life Overview Disaster Management and Solutions to Usher in the IoT Era Takeshi Miyao Toshihiko Nakano, Ph.D. 1. The Bright and Dark Sides
More informationThailand Initiatives and Challenges in Cyber Terrorism
Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationManagement Frameworks
Chapter I Internal Fujitsu Group Information Security Independent of the chief information officer (CIO), the Fujitsu Group has appointed a chief information security officer (CISO) under the authority
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationSIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov
SIP Automated Driving System SEIGO KUZUMAKI Program Director Nov.14.2017 Welcome back to SIP-adus WS! `Is it not delightful to have friends coming from distant quarters? (The Analects of Confucius) Intensive
More informationDevelopment of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization
Hitachi Review Vol. 65 (2016), No. 1 741 Featured Articles Development of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization Atsushi Kawai Yuuji Ikawa Hiroaki
More informationFRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING
Safety and Security Engineering VII 273 FRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING HIDEKAZU HIRAI, TOMOMI AOYAMA, DAVAADORJ NYAMBAYAR & ICHIRO KOSHIJIMA Industrial Management Engineering, Nagoya Institute
More informationCaribbean Cyber Security: Not Only Government s Responsibility
Caribbean Cyber Security: Not Only Government s Responsibility AWARENESS AND VIGILANCE IS EVERYBODY S RESPONSIBILITY Preseted at: ICT Symposium Antigua and Barbuda March 2017 Caribbean Cyber Security Events
More informationInternational Policy Division, Global ICT Strategy Bureau
MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationHitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers
302 Hitachi Review Vol. 65 (2016), No. 8 Overview Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers Takeshi Miyao Toshihiko Nakano, Ph.D. ADVANCES
More informationCSIRT Models in Japanese Large Companies
CSIRT Models in Japanese Large Companies Toshio NAWA Cyber Defense Institute, Inc. 1 Do you know the real Japan? 2 AGENDA 1. Cyber Security Threats in Japan 2. Efforts Against Cyber Security Threats in
More informationSecurity Technologies for Dynamic Collaboration
Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi
More informationNational Institute of Information and Communications Technology. Cybersecurity Laboratory Security Fundamentals Laboratory Planning Office
National Institute of Information and Communications Technology Cybersecurity Research Institute Cybersecurity Laboratory Security Fundamentals Laboratory Planning Office National Institute of Information
More informationRESOLUTION 67 (Rev. Buenos Aires, 2017)
524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationFeatured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure
Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki
More informationRFD. for ICERT ( ) RESULTS-FRAMEWORK DOCUMENT. Department of Information Technology. Results-Framework Document (RFD) for CERT-In ( )
Results-Framework Document (RFD) for CERT-In (-) RFD RESULTS-FRAMEWORK DOCUMENT for ICERT Department of Information Technology (-) Page 1 of 13 Results-Framework Document (RFD) for CERT-In (-) SECTION
More informationCountermeasures against Mobile spam
8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry
More informationOutline of Interim Report from Study Group on Countermeasures against Spam
International Affairs Department, Telecommunications Bureau Vol. 18 No. 18 Biweekly Newsletter of the Ministry of Internal Affairs and Communications (MIC), Japan ISSN 1349-7987 Please feel free to use
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationControl System Security for Social Infrastructure
277 Hitachi Review Vol. 63 (201), No. 5 Featured Articles Control System Security for Social Infrastructure Toshihiko Nakano, Ph.D. Katsuhito Shimizu Tsutomu Yamada Tadashi Kaji, Dr. Info. OVERVIEW: The
More informationCYBERSECURITY INITIATIVES IN VANUATU
CYBERSECURITY INITIATIVES IN VANUATU OUTLINE COUNTRY OVERVIEW TELECOMMUNICATIONS/ICT SECTOR REFORM PROGRAM MODERN BUSINESS ENABLING ENVIRONMENT POLICIES RELATING TO TELECOMMS POLICIES RELATING TO ICT LESSONS
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationOverview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project
Ministry of Communication Technologies Information and Communication Technologies Sector Development Project Video conference on from strategy to implementation: Lessons learned in World Bank funded ICT
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationCompetition Policy in the Broadband and IP Era
0 Competition Policy in the Broadband and IP Era January 2008 Hiroya IZUMI (h-izumi@soumu.go.jp) Director, International Economic Affairs Division Telecommunications Bureau Ministry of Internal Affairs
More informationGovernment-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection
Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection L. Laile Di Silvestro Senior Strategist Worldwide Public Sector Microsoft Government Industry Collaboration
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationSIP Automated Driving System ー Mobility bringing everyone a smile ー
AASHTO International Day SIP Automated Driving System ー Mobility bringing everyone a smile ー Masato MINAKATA (TOYOTA MOTOR CORPORATION) SIP-adus International Cooperative WG 29 October 2017 Intensive R&D
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationFiscal 2015 Activities Review and Plan for Fiscal 2016
Fiscal 2015 Activities Review and 1. The Ricoh Group s Information Security Activities In response to changes emerging in the social environment, the Ricoh Group is promoting its PDCA management system
More informationFederal Information Sharing Resources for Small and Midsize Businesses
Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationNATIONAL STRATEGY:- MALAYSIAN EXPERIENCE
NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications
More informationSUMMARY OF SMARTPHONE PRIVACY INITIATIVE
SUMMARY OF SMARTPHONE PRIVACY INITIATIVE -INNOVATION FOR A NEW ERA THROUGH PROPER HANDLING OF USER INFORMATION AND ENHANCED LITERACY- November 2, 2012 Kuniko Ogawa Director, Telecommunications Consumer
More informationWORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationChallenges in Developing National Cyber Security Policy Frameworks
Challenges in Developing National Cyber Security Policy Frameworks Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection William McCrum Deputy Director General
More informationCritical Infrastructure Partnership
Critical Infrastructure Partnership Overview Chris Boyer AVP Global Public Policy December 11, 2017 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV
More informationICTs for inclusive social and economic development in Japan
ICTs for inclusive social and economic development in Japan 3 December, 2013 Mari ICHIKAWA Ministry of Internal Affairs and Communications (MIC), Japan 1. Overview of Japan's ICT policies Basic Act on
More informationSecurity and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy
Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and
More informationPolice Technical Approach to Cyber Threats
Police Technical Approach to Cyber Threats Jumpei Kawahara Director of High-Tech Crime Technology Division, National Police Agency, Japan 1 Overview (cases) Current Situation 140000 140,000 120000 100000
More informationSecurity activities in Japan towards the future standardization. Cybersecurity
Security activities in Japan towards the future standardization Side Event Cybersecurity Koji NAKAO KDDI, Japan Content Current threats - Internet User in Japan - However, observation of many scans (by
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationRESOLUTION 45 (Rev. Hyderabad, 2010)
212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationStrategy for information security in Sweden
Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information
More informationExamining Cooperative Strategies through Cyber Exercises
Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict
More informationCybersecurity and Vulnerability Assessment
Cybersecurity and Vulnerability Assessment Wayne Zeuch Vice Chair: Working Group on Deployment of Technologies and Services ITU /CITEL Regional Cybersecurity Workshop for the Americas Salta, Argentina
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationImplementing a National Strategy : the case of the Tunisian CERT
Implementing a National Strategy : the case of the Tunisian CERT Belhassen ZOUARI, CEO, National Agency for Computer Security, Head of Cert-Tcc, E-mail : B.Zouari@ansi.tn a fast Historical Overview end
More informationEmergency Management Response and Recovery. Mark Merritt, President September 2011
Emergency Management Response and Recovery Mark Merritt, President September 2011 Evolution of Response and Recovery Emergency Management Pendulum Hurricane Andrew August 24, 1992 9/11 Terrorist Attacks
More informationRegional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar
Regional Workshop on Frameworks for Cybersecurity and CIIP 18 21 Feb 2008 Doha, Qatar A National Cybersecurity Strategy aecert Roadmap Eng. Fatma Bazargan aecert Project Manager Technical Affairs Department
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationEnhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationInformation Security of the Beijing 2008 Olympic Games. Yonglin ZHOU
Information Security of the Beijing 2008 Olympic Games Yonglin ZHOU About CNCERT Government MIIT others Internet Infrastructure ISPs.CN Critical Information System Power, Banks Public Users SME End Users
More informationVulnerability-centric assurance activities for MFP PP as a candidate for cpp
Vulnerability-centric assurance activities for MFP PP as a candidate for cpp Fumiaki Manabe JISEC / IPA, Japan September 11, 2013 1 Agenda The security surrounding the MFP PP development for Government
More informationICT and Disaster Risk Reduction Division ESCAP
1 ICT and Disaster Risk Reduction Division ESCAP http://www.unescap.org/publications/artificial-intelligence-and-broadband-divide-state-ict-connectivity-asia-and-pacific Landscape 2 3 Trends Potentials
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationCybersecurity, safety and resilience - Airline perspective
Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,
More informationSummary of the Cybersecurity Policy for CIP (4th Edition)
Summary of the Cybersecurity Policy for CIP (4th Edition) April 18, 2017 Published July 25, 2018 Revised 1 Purpose of the Cybersecurity Policy for CIP (4 th Edition) ( this Cybersecurity Policy ) Promotion
More informationThe UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC
The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime
More informationDrinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012
Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Christine Campbell Team Leader, Drinking Water Emergency Planning Ministry of the
More informationNew Zealand National Cyber Security Centre Incident Summary
New Zealand National Cyber Security Centre 2013 Incident Summary National Cyber Security Centre 2013 Incident Summary Foreword The incidents summarised in this report reinforce that cyber security is truly
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationThe Information Security Guideline for SMEs in Korea
The Information Security Guideline for SMEs in Korea Ho-Seong Kim Mi-Hyun Ahn Gang Shin Lee Jae-il Lee Abstract To address current difficulties of SMEs that are reluctant to invest in information security
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationNational Open Source Strategy
National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationIPv6 Deployment Status in Japan
IPv6 Deployment Status in Japan Takashi L. Nakamura IPv6 Promotion Council of Japan / Mitsubishi Research Institute, INC. Agenda 1. Governmental Activities 2. IPv6 Application and Service 3. Conclusion
More informationIPCOM EX Series for Realizing Network Stability and Safety
IPCOM EX Series for Realizing Stability and Safety V Shoji Temma (Manuscript received June 8, 2007) Stability and safety are essential requirements in today s enterprise IT systems. This paper discusses
More information