National Cybersecurity preparation to deal with Cyber Attacks Dr. Chaichana Mitrpant Assistant Executive Director, Electronic Transactions Development Agency (ETDA) 1
“Analog” to “Digital” Era Over all Internet usage in Thailand “Trust on Cybersecurity” - Computers 32 % Challenges - Mobile devices 66.4% e-Transaction - Home use 13.4% 1) e-Payment 4) e-Certificate 2) e-Trading & service 5) e-Medical record - Commercial use 16.6% 3) e-Filing and e-Reporting - Social Network (persons) 14,142,620 (facebook ) (e-Commerce = 56%, e-Auction = 44%) 2
Potential Attacks 1980: Physical Attack 1990: Network Attack Physical attack is normally in the past 20-30 years. Nowadays, it becomes Network attack. 3
Potential Attacks In the past 10 years, the threat is more complicate. The most common is email phishing, unauthorized wireless access and attack via vulnerability of Web Application. 2000s: Wireless 2000s: Application 4
Potential Attacks 2010s: Client-Side Malware is usually transmitted via PDF, Mobile Application and Social Media Software 2010s: Social Networking 2010s: Client-Side (Malware) 5
North Korea behind hacking attack in March, claims Seoul South says computers in North were used for onslaught that wiped hard drives on PCs in TV stations and disrupted banks 6
Current Situation of Thailand In 2012, There were 772,938 IP addresses of all IP numbers 8,559,616 (9%) of computers in Thailand that compromised and malicious used as the tools for DDoS attack. In 2012, There were 534 websites reported as fraudulent financial. From January to March 2013, 707 websites were attacked and change data (Defacement). An approximately 50% of this number was from the Institution. 7
Threats Statistics classified by Type In 2012, ThaiCERT received 792 incidents 8
Importance of National Cybersecurity • No center of command • National agenda • Increasing number of security threats 9
Management approach to Cybersecurity • Prime Minister's statement on 76/2555 on March 19, 2555 was to establish the committee of the National Cyber security having Prime Minister is the Chairman. (Assigned Deputy Prime Minister Chalerm Yubamrung). • Prime Minister assigned ETDA: – To be Secretary of the National Cybersecurity in order to – To Prepare a draft policy framework for National Cybersecurity / Cybersecurity Master Plan for Thailand. 10
Stakeholders in Cyber Security Social Peace Economic Military Stability Stability - National Defense - National Defense National - Regulatory work & Security Council & Security Council Cyber - Justice work - Intelligence Work - Intelligence Work Security - Facilities & Retaliation - Facilities & Retaliation - Ministry of Defence - Ministry of Defence & Army. & Army. Urgent Center of Command Need ThaiCERT & Other CERTs Strengthening Capacity & Raising Public Awareness 11
National Cyberecurity Committee (Prime Minister is Chairman) Thailand Cybersecurity Policy Royal Thai Internal Office of Arm Force & คกก . คดีพิเศษ Security Critical National Security Electronic คกก . นโยบายรักษา คกก . นโยบาย ศูนย์รักษา Operations NBTC Infrastructure ดูแลการดําเนินคดี Council Transactions ความปลอดภัยแห่งชาติ ตํารวจแห่งชาติ Command Group ความปลอดภัย อาญาที่เป็นคดีพิเศษ Commission คอมพิวเตอร์ NIA Policy/Promotion/ Regulator Policy & Defense Law Enforcement Urgent tasks (Prepare and develop framework ) Infrastructure Best Practices & ISO/IEC National BCP Security (Draft) Thailand to encourage. - Sector-based Guidelines 27001:2005 Develop plan to Professional Computer Crime CERTs support the - Use of Smart Phone Driving Law Standard Act - NRCA Compliance. availability of - Use of Social Network Enhance (Second Edition) - Government Develop emergency or - Privacy Policy professional skill / Monitoring Prevention & standard disaster. (Continue - National Increase number suppression. according to Other Messures from NESDB) Archive of Expert / Electronic (e-Authen Compensation Transactions Act tication) 12
Authority duties of National Cybersecurity Committee 7. Other operations as 6. Coordinate assignment with local and 5. Appoint international subcommitte 4. Provide cybersecurity es or working progress, 3. Monitor groups to situation and and evaluate support the 2. Set and risk analysis measures and operations develop of cyber 1. Develop plans guideline for threats report policy and according to measure, plan to the National the guideline and Council of Cybersecurity cybersecurity Ministers Model programs Scheme 13
(Draft) National Cybersecurity Policy Framework 1 Governance and Organizational Structure Primary 2 Cybersecurity Emergency Readiness 3 National Critical Information Strategic Infrastructure Readiness 4 Public-Private Partnership 5 Capacity & Capability Building Secondary 6 Legal Measures 7 Research and Development Strategic 8 International Cooperation 14
2013 Working plan of National Cyberecurity 1 st Quarter 2 nd Quarter 3 rd Quarter 4 th Quarter Develop plan and Collaborate with Build Public Setup Workflow for involved Agencies Awareness CERT as internal unit interoperability for other organization when incidents occur Develop Incidents Drill National Security Practice Assessment Framework FIRST event Capacity Building preparation 15
Recommend
More recommend