Korea ’s Approach Korea’s Approach to to Network Network Security Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1 Contents Contents q Advancement in the Information Society and New Threats q Information Infrastructure Protection Act q Information Infrastructure Protection Framework q Incident Prevention and Response q Other Activities q Future Policy Direction 2 Advancement Advancement in in the the Information Information Society Society and and New New Threats Threats 3 Rapid Rapid Growth Growth in in Information Information Society Society q World’s Best Info-Communication Infrastructure and Dramatic Increase of Internet Users š Connect Every Region of the Country with Info-Super-highway š Approximately 25 Million Internet Users (Dec. 2001) Users (in thousands) Percentage of Users 1999.1 2000.8 2000.12 2001.12 9,433 16,403 19,045 24,380 22.4 38.5 44.7 56.0 š More than 7.8 Million Broadband Subscribers (Dec. 2001) 4 Importance Importanceof ofthe theInformation InformationInfrastructure Infrastructure q Increased Dependency on IT Systems ¡ E-Government ¡ E-Business ¡ E-Education ¡ E-Healthcare, etc. q Increased Interdependency ¡ National Administration Network, Korean Education Network, Online Banking, Electronic Commerce, etc. 5 Challenges Challenges& &Threats Threatsto tothe theInformation InformationSociety Society q Hacking and Computer Virus ¡ Viruses, Trojan Horses, Logic Bombs, Internet worm q Manipulation or Destruction of Operating Systems, Application Software or Data q Manipulation by Insiders q Manipulation of Communication Links q Information Warfare, etc. < Hacking & Computer Virus Incidents in ' 9 9 - ' 0 1 > 65,033 70,000 60,000 50,000 50,124 hacking incidents 39,348 40,000 Computer Viruses incidents 30,000 20,000 10,000 - 572 1999? 1,943 2000? 5,333 2001? 6 Information Information Infrastructure Infrastructure Protection Protection Act Act 7 Legislation Legislation((Background Background II)) q MIC š Director General for Information Security q Cyber Crime Investigation bodies in Public Prosecutors’ office ¡ Internet Crime Investigation Center, SPPO ¡ Computer Crime Investigation Squad in 20 District PPO q KNPA ¡ Cyber Terror Response Center q MoD, NIS, MoGHHA, etc q Korea Information Security Agency, etc 8 Legislation Legislation((Background Background II II)) q Facilities protected by Diverse Laws in each Sectors ¡ Focused on Physical Protection ¡ Insufficient Counter-Measures against Cyber-Attack q Outbreak of Cyber-Attacks on Internet Web-sites ¡ DoS Attack on Yahoo, CNN, e-Bay, etc. (Feb. 2000) q Enormous Econo-Social Damage due to Cyber-Attack Need for Overall Info-Communication Infrastructure Protection Initiatives 9 Information InformationInfrastructure InfrastructureProtection ProtectionAct Act((11)) q Developments ¡ Ministerial Meeting on the Prevention of Cyber-Terrorism (Feb. 2000) – Decided to Legislate a Law covering Comprehensive and Systematic Information Infrastructure Protection and Counter Measures against Cyber-Terrorism ¡ Legislation Committee (Feb. 2000 to Dec. 2000) ¡ Enactment of Information Infrastructure Protection Act (Jan. 2001) ¡ Effective from July 2001 Framework for II Protection 10 Information InformationInfrastructure InfrastructureProtection ProtectionAct Act((22)) q Outlines ¡ Establish Governmental Framework for Information Infrastructure Protection – Committee on Protection of Information Infrastructure – CII Related Ministries – Infrastructure Management Bodies ¡ Protection Measures – Selection and designation of CII – Vulnerability Assessment => Protection Measures & Plans 11 Information InformationInfrastructure InfrastructureProtection ProtectionAct Act((33)) q Outlines (Cont.) ¡ Prevention & Response – Prevention : Security Guideline, Protection Measures – Response : Security Warning, Recovery ¡ Technical Support ¡ Development of Technologies ¡ International Cooperation ¡ Severer Punishment for Cyber Crimes against II 12 Information Information Infrastructure Infrastructure Protection Protection Framework Framework 13 Overall OverallGovernment GovernmentProtection ProtectionFramework Framework((11)) q Committee on the Protection of Information Infrastructure ¡ Chair : Prime Minister ¡ Members : Ministers related to CII ¡ Mission : Deliberation and Coordination of Selection of CII and Security Plans and Policies q Ministers related to CII ¡ Designation of CII, Establishment of Security Plan ¡ Security Guidelines, Demand/Recommendation of Security Measures 14 Overall OverallGovernment GovernmentProtection ProtectionFramework Framework((22)) q CII Management bodies ¡ Vulnerability Assessment, Security Measures ¡ Cyber Incidents Prevention and Response q Technical Supporting bodies ¡ Accredited Vulnerability Assessment bodies − KISA − ETRI − Information Security Consulting Service Providers ¡ Technical support in vulnerability assessment, Security Measures Implementation, Prevention and Response 15 Designation Designationof ofCII CII((11)) q Information Infrastructure ¡ Electronic Control and Management Systems ¡ Information Systems and Communication Networks, etc. q Critical Information Infrastructure ¡ Have Major Impact on National, Economic and Social Security ¡ Designated by Ministers through Committee on the Protection of Information Infrastructure 16 Designation Designationof ofCII CII((22)) q Criteria for Selection ¡ Importance of its Service to the People and Nation ¡ Reliance on CII in Performing its Missions ¡ Interconnection with other Information and Communication Infrastructures ¡ Scope of Impact on the Defense or Economic Security ¡ High Incidence, Difficulties of Efforts Needed for the Restoration 17 Vulnerability VulnerabilityAssessment Assessment q Who ¡ CII Management Body q When ¡ Within 6 Months after the Designation of CII ¡ Re-Assessment in Every Other Year q How ¡ Assessment by Infrastructure Management Body by assistance of Technical Supporting bodies ¡ Technical Supporting bodies − KISA, ETRI, Information Security Consulting Service Provider 18 Plan Plan& &Measures Measuresfor forProtection Protection q Infrastructure Management Body ¡ After the Assessment, Develop Security Measures ¡ Submit Security measures to the Ministry Concerned q Ministries ¡ Combine Individual Infrastructure Protection Measures to form a Security Plan under their Jurisdiction q Committee on the Protection of Information Infrastructure ¡ Review and Coordinate Security Plans Developed by Ministers 19 Support Support((11)) q Korea Information Security Agency(KISA) ¡ Develop and Disseminate Information Security Guideline – Used by Infrastructure Management Bodies and Industries ¡ Vulnerability Assessment ¡ Develop Security Measures, Provide Technical Support for Prevention and Recovery ¡ Develop and Disseminate II Security Technology 20 Support Support((22)) q Information Security Consulting Service Provider(ISCSP) ¡ Authorized by MIC to Provide Consulting Service regarding Vulnerability Assessment and Security Measure on CII ¡ Designation Requirements – More than 15 Qualified Technical Engineers – Capital greater than 2 Billion KRW (USD 1.5 M) – Equipments provided in Presidential Decree 21 Support Support((33)) q Information Sharing and Analysis Center(ISAC) ¡ Prevention and Response to Incidents in Specific Sectors such as Financial or Telecommunication ¡ Mission – Real-Time Warning and Analysis on Incidents – Provide Information on Vulnerabilities and Countermeasures – Vulnerability Assessment if Accredited by MIC ¡ Telecommunication ISAC established, Financial ISAC to be formed soon 22 Incident Incident Prevention Prevention and and Response Response 23 Incident IncidentResponse Responseand andRecovery Recovery((11)) q Incident Response ¡ Self Response by Infrastructure Management Body – Report to Minister, KISA or Investigation Offices ¡ If Necessary, Request for Technical Assistance from Technical Supporting bodies such as KISA, ETRI ¡ For Large Scale Incidents, Establish Temporary Incident Response Headquarters 24 Incident IncidentResponse Responseand andRecovery Recovery((22)) q Recovery ¡ Prompt and Necessary Steps to Restore and Protect CII ¡ If necessary, Request for Technical Assistance from KISA q International Cooperation ¡ Share Information on Vulnerability and Incident Responses (FIRST, APSIRC, etc) ¡ Collaborative Incident Investigation 25 Incident IncidentResponse Responseand andRecovery Recovery((33)) q Incident Response Headquarters ¡ Established Temporarily, When Large Scale Incidents occurs, by the Chairman of the Committee on the Protection of Information Infrastructure ¡ Mission – Emergency Response, Technical Assistance and Recovery ¡ Members – Chief : Appointed by the Chairman(the Prime Minister) – Members : Government Officers from the CII related Ministries, Civil Specialists for IT Security 26 Offences Offencesand andPenalties Penalties q Disrupt, Paralyze and Destroy Critical Information Infrastructure by ¡ Unauthorized Access to CII, or Fabrication, Destruction, etc., in excess of his or her authority. ¡ Installation of Malicious Programs/Code ¡ Denial of Service Attack => Imprisonment for 10 Years or a Fine of 100 Million Won q Incidents against Ordinary Information Systems ¡ Imprisonment for 5 years or a fine of 50 Million Won 27 CII CII Protection Protection related related Activities Activities q Nov. 2001, 9 Companies were Accredited as ISCSPs q Dec. 2001, First Meeting of the Committee on Protection of the Information Infrastructure Meeting ¡ Designated 23 Infrastructures under 4 Ministries as CIIs – MIC, MoGAHA, MoFA, MoHW q First half of 2002 ¡ Vulnerability Assessment and Development of Security Measures for CIIs under way ¡ Develop Security Plans for 2003 ¡ 2nd Designation of CIIs(Financial, Industrial Support Sectors) 28 Other Other Activities Activities 29 Other OtherActivities Activities((11)) q Prevention and Awareness Program(MIC, KISA) ¡ Operation of Anti-Hacking & Virus Consulting Center ¡ Remote Vulnerability Assessment ¡ “Anti-Hacking & Virus Day” (15th of Every Month) ¡ Develop & Disseminate Security and Response Guidelines ¡ Education & Training for Managers(Schools, PC Room, Small & Middle Sized Companies) ¡ Early Warning & Alert System (e-WAS) (being developed) 30 Other OtherActivities Activities((22)) q Develop Cyber-Terror Prevention Technology ¡ E-WAS and Secure Messenger ¡ Real-Time Scan Detector(RTSD) ¡ Develop Vulnerability Assessment and Intrusion Detection Tools => Build Vulnerability DB q Foster Industry ¡ Develop and Disseminate Information Security Technologies ¡ Information Security Industry Support Center(Test-Bed) 31 Other OtherActivities(3) Activities(3) q International Cooperation ¡ Participate in International Meetings including OECD, APEC, ITU – Measures for Enhancing Information and Network Security – Exchange of information with Regard to Policies and Practices – Frameworks for Security Information Sharing – Raise Awareness of Security by Education & Training ¡ Cross-border Information sharing on Incidents and Responses ¡ Promotion of International Cooperation on Cyber-Terror Prevention Technologies ¡ Cooperation on Cyber-Terror Investigation 32 Future Future Policy Policy Direction Direction 33 Future FuturePolicy PolicyDirection Direction q Continue to Improve and Develop Information Security Management Framework for II q R&D on II Security Technologies q Enhance Level of Information Security in Public / Private Sectors q Strengthen International Cooperation Activities Global Leader, e-Korea Global Leader, s-Korea 34 Well begun is half done ! 35