Information Security of the Beijing 2008 Olympic Games. Yonglin ZHOU

Similar documents
How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Thailand Initiatives and Challenges in Cyber Terrorism

Resolution: Advancing the National Preparedness for Cyber Security

Safety & Security of Major Sporting Events: Risk Management Challenges of Olympic proportions!

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges

Certified Cyber Security Analyst VS-1160

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Gujarat Forensic Sciences University

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Information Security Controls Policy

About Issues in Building the National Strategy for Cybersecurity in Vietnam

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

CASE STUDY: REGIONAL BANK

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Information Security and Cyber Security

Cyber Security and Cyber Fraud

Cyber Risks in the Boardroom Conference

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017

Implementation Strategy for Cybersecurity Workshop ITU 2016

EC-Council C EH. Certified Ethical Hacker. Program Brochure

DDoS MITIGATION BEST PRACTICES

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

Emergency Management Response and Recovery. Mark Merritt, President September 2011

People Assets Reputation

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

Max Security Solutions

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Statement for the Record

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Sage Data Security Services Directory

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Information Security Policies in Japan

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Cyber Security Strategy

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Cloud Security Myths Paul Mazzucco, Chief Security Officer

PIPELINE SECURITY An Overview of TSA Programs

Putting security first for critical online brand assets. cscdigitalbrand.services

Provisional Translation

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

The GenCyber Program. By Chris Ralph

Cyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:

Business Continuity Management Standards A Side-by-Side Comparison

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Company Introduction

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

DHS Cybersecurity: Services for State and Local Officials. February 2017

Business continuity management and cyber resiliency

Security, For DNS and by DNS. ZHOU Yonglin Beijing, Nov 009

Information Technology Branch Organization of Cyber Security Technical Standard

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Disaster Risk Management (DRM) and Infrastructure

RFD. for ICERT ( ) RESULTS-FRAMEWORK DOCUMENT. Department of Information Technology. Results-Framework Document (RFD) for CERT-In ( )

CCISO Blueprint v1. EC-Council

Stakeholders Analysis

ACM Retreat - Today s Topics:

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

POSITION DESCRIPTION

Donor Countries Security. Date

RISING CYBER SECURITY CAPABILITY WITH A UNIQUE NETWORK OF TRUSTED PARTNERS. Jan De Blauwe Chairman Cyber Security Coalition Belgium

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Flagship Programme for Disaster Risk Management as proposed by the Nepal Risk Reduction. Outcomes

Counter-Terrorism Working Group Proposed Workplan for 2017

Breaking down information silos to improve GSOC efficiency and effectiveness

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat

Cybersecurity Session IIA Conference 2018

Caribbean Cyber Security: Not Only Government s Responsibility

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)

Cybersecurity, safety and resilience - Airline perspective

Kaspersky Security. The Power to Protect Your Organization

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

Defending Our Digital Density.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

National Cybersecurity preparation to deal with Cyber Attacks

Emerging Issues: Cybersecurity. Directors College 2015

Bradford J. Willke. 19 September 2007

Computer Security Trend 2008 from Japan. SQL Injection, DNS cache poisoning, Phishing, Key logger Malware and Targeted Attacks

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Transcription:

Information Security of the Beijing 2008 Olympic Games Yonglin ZHOU

About CNCERT Government MIIT others Internet Infrastructure ISPs.CN Critical Information System Power, Banks Public Users SME End Users ational computer network security team of China on-government agency on-profitable Monitoring Pre-warning Responding

Recap the Beijing 2008 Olympics

Three Themes Hi-tech Olympics Green Olympics Secure Olympics Humanistic Olympics Digital Olympics

Threats Serious Internet Environment Vulnerabilities in OS and applications Malwares DDoS DNS Hijack Phishing Hostile Groups To Show off High tech terrorism Ideology difference Political opponents: Tibet Isolationism

Challenges Scale Only the competition networks connected to more than 10 thousands of computers distributed around 66 venues. Vulnerability Information Systems Operation Level Management Level Risks After many times security evaluation, the systems were still found with high risks Operation faults, human damages, natural disaster Situation Hacker groups Hostile group Experience less First time to hold such scale events Internet grew so fast and reach a statues that never appears before

Targets of protection Competition system Online ticketing system Office network Official Website Central Networks Main Media Systems CCTV Xinhuanet.com Sohu.com etc. ISP DNS Power, Civil Aviation,...etc Network infrastructures & Critical Information systems Public online environment End user

General Goals The nation s leaders, including the president HU Jintao, issued many orders to enhance the information security of Beijing Olympics. In summary, the general goals are: Keep the connectivity of networks Keep the availability of information systems Keep the order and safety of online environment In short: Try best to avoid serious incidents and make sure every common incidents can be solved appropriately.

Collaboration Framework Framework In Dec 2004, the Beijing Olympic Games Security Coordination Team was founded, which consist of 20 departments, including Ministry of Public Security, Ministry of National Security, Ministry o f Defense, Ministry of Foreign Affairs, Ministry of Information Industry, the Government of Beijing, etc, to lead the safeguarding of Beijing 2008 Olympics. Under the coordination team, instructing headquarters for 25 special fields and 10 regions were established. The Information Security Headquarter was responsible for the network security coordination, which consisted of 14 departments, such as MPS, MII, BOGOC ( organizing committee), etc. The information security headquarter organized more than 50 special technical teams and 20 famous experts to help as volunteers.

Collaboration Framework National level Ministerial Level 14 ministries Operational Level BOGOC ( organizing committee) MIIT Beijing Olympic Games Security Coordination Leading Team The Information Security Headquarter 50+ Tech teams MPS Tech Supporting Team Consultation Group 20 ministries Others. 20 outstanding experts Others.

Main Actions Classified Protection According to the classified protection regulation, the competition system, online ticketing system, office network, official Website have been strictly classified into necessary levels. Security countermeasures applied on those systems were even stronger than the requirements by the regulation. Risk Assessment Many national professional teams were invited to evaluated and test the security of above systems. 13 vulnerability checks 6 formal risk assessment Tens of penetration tests Instant Study Newly disclosed vulnerabilities (such as DNS vul), incidents. Grasp the situation and get professional advice at the first time.

Main Actions Network Monitoring Official Website Provider ( Sohu.com) Tech departments, BOGOC ( organizing committee) China NetCom -- Internet Provider CNCERT Cross network, national wide Response Preparedness Multilevel and special ER plans Drills: for example, 7 times Anti-DDOS Drills. Each Online Environment Cleaning Botnet and trojans sudden elimination 2 times before and in the middle of the games. Closed numbers of illegal websites (porn, violence, ) Strikes on cyber crimes

CNCERT s Activities Help to learn experience Since 2006, invited experts who have joined the safeguarding of World Football Cup, Sydney Olympics etc, to share their experience with BOGOC. Held meetings, forums to discuss what & how on Beijing Olympics protection Give professional suggestion on Olympic information system building, especially on security protection systems. Help handle many incidents : DDoS to online ticketing system Give risk assessment and remote penetration tests. Established collaboration agreements with BOGOC, ISPs, main medias, Critical Information System, CNCERT s supporting teams, and International partners

CNCERT s Activities Upgraded network monitoring systems Carried out 7*24 monitoring on 555 websites and more than 60 thousands IP addresses. Distributed more than 400 monitoring reports to relevant departments Organized 2 times sudden strikes on Botnet and Trojans, to mitigate the risk of large scale DDoS.

Results During the games, all the information systems successfully endured the challenges of huge traffic and attacks. No network broke, no system crashed, no serious network incidents happened The competition systems ran smoothly for 3480 games The official websites accepted accessed over 97 million per day 2.4 million tickets were sold by the online ticketing system CCTV live system accepted more than 7 billion access and blocked thousands of small DDoS. Other media system all ran well. The internet infrastructures and all critical information systems were all safe and sound. The whole public online environment improved dramatically.

Memories