advanced attack techniques advanced attack techniques increased by passing techniques against the...

15

Upload: blanche-wright

Post on 14-Jan-2016

229 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus
Page 2: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus
Page 3: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Advanced attack techniquesAdvanced attack techniques

Increased by passing techniques against the existinIncreased by passing techniques against the existin

g detection methods such as IDS and anti-virus softg detection methods such as IDS and anti-virus soft

wareware

A type of worm virus, malicious bot and Trojan comA type of worm virus, malicious bot and Trojan com

binedbined

Recent attacks are targeting specific groups rather tRecent attacks are targeting specific groups rather t

han unspecific multipleshan unspecific multiples

Page 4: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Cyber Attacks without boundaryCyber Attacks without boundary

Spread of high-speed internet networks around thSpread of high-speed internet networks around the worlde world

Disguise of attacker’s location through a stop-over Disguise of attacker’s location through a stop-over at 3rd countryat 3rd country

Heightened threats on critical infrastructuresHeightened threats on critical infrastructures

Concerns on attacks Concerns on attacks remotely controlled DDoS remotely controlled DDoS attacks attacks exploitingexploiting Botnet Botnet

Possibility of instant ripple effects to neighboring aPossibility of instant ripple effects to neighboring areas reas

Page 5: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Sharing cyber threat information with each other during ordinary Sharing cyber threat information with each other during ordinary

times and preventing attack incidentstimes and preventing attack incidents

In the case of a cyber attack incident, real time consultation on In the case of a cyber attack incident, real time consultation on

countermeasures and minimization of damagecountermeasures and minimization of damage

Pinpointing hackers through cooperative investigation among Pinpointing hackers through cooperative investigation among

each country’s law enforcement each country’s law enforcement

Effective response only through international cooperationEffective response only through international cooperationEffective response only through international cooperationEffective response only through international cooperation

Page 6: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Enhanced Enhanced acknowledgement about the seriousness of cyber terror acknowledgement about the seriousness of cyber terror threats threats among among ARF participating countriesARF participating countries

Agreeing upon the necessity of international cooperation for respoAgreeing upon the necessity of international cooperation for responding to cyber terrornding to cyber terror

Building up mutual trust and drawing a variety of cooperation propBuilding up mutual trust and drawing a variety of cooperation proposalsosals

Absence of organization or a system to realize practical cooperationAbsence of organization or a system to realize practical cooperationAbsence of organization or a system to realize practical cooperationAbsence of organization or a system to realize practical cooperation

AccomplishmentsAccomplishmentsAccomplishmentsAccomplishments

LimitsLimitsLimitsLimits

Page 7: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Regular committee composed of working-level experts Regular committee composed of working-level experts

against cyber terroragainst cyber terror

Developing practical measures to enhance cyber Developing practical measures to enhance cyber

security in the regionsecurity in the region

Coordinating legal and systematic policies for a more Coordinating legal and systematic policies for a more

effective response to cyber terrorismeffective response to cyber terrorism

Serve as an official communication channel among Serve as an official communication channel among

countries countries

Page 8: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus
Page 9: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

ARARFF seminar chair country or chair country hopeful seminar chair country or chair country hopeful

Developing a detailed operation plan of the each sub-committeDeveloping a detailed operation plan of the each sub-committe

ee

Managing official contact points of the participatingsManaging official contact points of the participatings

Proposing to hold a meeting among participating countries if nProposing to hold a meeting among participating countries if n

ecessaryecessary

Submitting the results of consultation and meetings to the next Submitting the results of consultation and meetings to the next

ARF cyber terrorism seminar and ISM on CTTCARF cyber terrorism seminar and ISM on CTTC

Page 10: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Promptly sharing information and responding with blocking the IP Promptly sharing information and responding with blocking the IP

involved and other measures involved with cyber attacksinvolved and other measures involved with cyber attacks

Sharing the analyzed information on cases and cyber attack Sharing the analyzed information on cases and cyber attack

techniques and preventing similar cases from occurringtechniques and preventing similar cases from occurring

Searching for legal countermeasures of law enforcement Searching for legal countermeasures of law enforcement

authorities against attackersauthorities against attackers

Developing common response measures for new types of cyber Developing common response measures for new types of cyber

attacksattacks

Page 11: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Searching for ways to give technical support and advice on Searching for ways to give technical support and advice on

establishing a nationwide cyber terror response system establishing a nationwide cyber terror response system

(National CERT) (National CERT)

Providing a training program enhancing response ability Providing a training program enhancing response ability

against cyber terror among ARF participating countriesagainst cyber terror among ARF participating countries

Building a cooperative system with an international cyber Building a cooperative system with an international cyber

security networksecurity network

Page 12: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Promoting joint research on countermeasures against new Promoting joint research on countermeasures against new

types of hacking techniques and technology sharing among types of hacking techniques and technology sharing among

participating countriesparticipating countries

Discussing the plan to construct an early warning system Discussing the plan to construct an early warning system

among ARF participating countriesamong ARF participating countries

Developing a technology development roadmap for medium-Developing a technology development roadmap for medium-

long term cyber terror preventionlong term cyber terror prevention

Page 13: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus
Page 14: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus

Selecting a Key Coordinating countrySelecting a Key Coordinating countryPhase 1Phase 1

Building up a cyber security network among ARF participating countries

Building up a cyber security network among ARF participating countries Phase 3Phase 3

Composing an expert working group and sub-committees and promoting their operations

Composing an expert working group and sub-committees and promoting their operations

Phase 2Phase 2

Making a global community safe from cyber terror Making a global community safe from cyber terror Making a global community safe from cyber terror Making a global community safe from cyber terror

Establishing a cooperative system with other international cyber security networks

Establishing a cooperative system with other international cyber security networksPhase 4Phase 4

Page 15: Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus