SlideShare a Scribd company logo
1 of 16
【內部使用】
Cyber Security Overview of
Taiwan
Jan-Ming Ho
Consultant to the Executive Yuan (Cabinet)
Taiwan
Information provided by NCCST, III and TIER
1
Defense-in-Depth Deployment Towards
Government-wide Situation Awareness
● Build government-wide situation awareness of cyber security
● Promote Public-private-partnership for better decision making
External
Threat
Existing
Vulnerability
Regulation
Compliance
Incident
Handling
1st Tier
MSSP
2nd Tier
G-SOC
3rd Tier
NICST
Actionable Intelligence
Government-Wide Situation Awareness
National-Level Decision Making Support
Co-defense
Detection Rule
Trend Statistics Classification Data Modeling Prediction
Monitoring
Data
2
Early
Warning
Early
Warning
A Hierarchical Organization
National
CERT
National
ISAC
National
SOC
Domain CERT
Domain
ISAC
Domain SOC
CSIRT A
Enterprise A
CSIRT B
Enterprise B
CSIRT CSOC C
Enterprise C
MSSP
Early warning
Aide/Assistant
持續監控
Domain Situation Awareness
Situation Awareness at
National Level
M
Continuous
Monitoring
Event
Notification
Event
Notification
Continuous
Monitoring
Continuous
Monitoring
3
Cabinet Level Taskforce
National Information and Communication
Security Taskforce
Convener: Vice Premier
Deputy Convener: Minister Without Portfolio
Minister of Ministry of Science and Technology
Co-Deputy-Convener: Senior Advisor to the President
Standard and Norm WG
Ministry of Economic Affairs
Education and HR WG
Ministry of Education
Audit WG
Ministry of Science and
Technology
Government Info &
Communication Security WG
Ministry of Science and
Technology
Cyberspace
Protection System
Ministry of Science and
Technology
Personal Info. Protection & Legal
System WG
Ministry of Justice
Cybercrime Prevention WG
Ministry of Interior
Cyber Environment Security WG
National Communication
Commission
National Center for
Cyber Security
Technology
Sub Working Group
National Defense(Ministry of National Defense)
e-Government(National Development Council)
Telecom(National Communication Commission)
Transportation(Ministry of Transportation)
Finance(Ministry of Finance)
Banking(Financial Supervisory Commission)
Healthcare(Ministry of Health and Welfare )
Cybercrime
Investigative System
Ministry of Justice
Ministry of Interior
NICST Secretariat
Office of Information and
Communication Security, EY
CIP System
Office of
Homeland
Security, EY
Other
System
Effected 2016/01/20
4
Threat Intelligence, Analysis and
Sharing
4
Botnet
APT
Malware
SPAM
ThreatPrecursorAnalysis
ThreatIntelligenceGeneration
InformationSharing
Gov. Agencies
3,039 Agencies
CIIP Authorities
Telecom (NCC)/Banking(FSC)
Utilities & e-Commerce(MOEA)
Internet Service Provider
Gov.(GSN) /Academic
(TANET) /All private ISPs
MSSP
Chunghwa Telecom/Acer
TradeVAN/ISSDU, etc
International Cooperation
FIRST/APCERT/US-CERT
CERT-EU…etc
HoneyBEAR
HoneyNET
Botnet Tracer
G-ISAC
Government Information
Sharing and Analysis Center
G-SOC
Legend
HoneyBEAR: Behavior-based Email Anomaly Reconnaissance
NCC:National Communication Commission
FSC:Financial Supervisory Commission
MOEA:Ministry of Economic Affairs
GSN:Government Service Network
MSSP: Managed Security Service Provider
FIRST: Forum for Incident Response and Security Teams
Indicators
Of
Compromise
5
Law and Regulation in progress,
Focusing on CIIP
ICT Security
Management Act and
Enforcement Rules
CIIP Steering Group
G-ISMS
CI Sector Specific
Guidelines
Common Baseline
Of CIIP
Utility
Water
Transportation
High Tech
Parks
Banking
& Finance
Comm. &
Broadcasting
Medical
CI Cyber Security
Committees
Law Supervise
Helpdefine
Provide
References Provide references
Define
CI Cyber Security Promotion Mechanisms
CI Sectors
Join
Execution
Government
ISMS Framework
• CIIP Steering Group is formed by NICST and MOST
• CI Cyber Security Committees is led by competent authority of that CI sector
Government
6
PPP in Taiwan
I
n
s
t
i
t
u
t
i
o
n
s
G
o
v
GSN Op Team/ CEPD (2010/1)
MOI (2011/8)
DOJ (2012/3)
I
S
A
C
G-ISAC (2009/11)
NCC-ISAC (2010/2)
TWNIC (2010/2)
A-ISAC (2010/4)
F-ISAC (2017/4)
C
E
R
T
EC-CERT (2011/1)
TWCERT/CC (2015/1)
TWCSIRT (2016/1)
G
e
n
I
S
I
n
d
Trend Micro (2013/8)
FORTINET (2014/9)
ISSDU ( 2010/10)
CHT (2010/11)
ACER (2010/11)
TRADEVAN (2010/11)
AKER (2011/11)
2011/1/1 ~ 2016/6/30
60,980
135,527
84,210
107,405
76,757
33,374
79,260
144,079
90,311
112,516
84,027
36,749
0
20000
40000
60000
80000
100000
120000
140000
160000
100 101 102 103 104 105 (Q2)
ANA
EWA
INT
DEF
FBI
Total
Info Sharing
2011 2012 2013 2014 2015 2016
Regional Collaborations
● APEC as the major platform
–APCERT (Asia Pacific Computer Emergency
Response Team)
–APWG (Anti-Phishing Working Group)
–AVAR (Association of anti-Virus Asia Researchers)
–FIRST (Forum of Incident Response and Security
Teams)
● Regular interaction with other countries
–G-ISAC
–TWCERT
–JPCERT/CC, MyCERT KrCERT/CC
CYBERSECURITY ECONOMY IN
TAIWAN
Total
% of IS
Events
Virus
Data
Theft
Malicious
Ware
DDOS
Hack/
Deface
Equip
Damage
Subtotal 22.26% 52.77% 5.58% 32.11% 15.34% 10.52% 7.85%
Industry 12.20% 66.90% 20.50% 41.70% 22.80% 17.30% 17.30%
Gov Inst 21.97% 41.12% 0.93% 13.40% 3.12% 9.66% 8.41%
Schools 32.70% 58.50% 4.40% 46.20% 24.10% 8.80% 3.80%
Information Security Threats
10
Network Attacks on IoT and ICS
● Industrial control systems and IoT has become the
target of network attack
● Honeynet deployed by NCCST
– 28M events detected and 50K malware per year in the last 3
years, mainly from US, Russia, and China
– 180M events detected in 2016 and 110K malware
– Brute-force attack targeted at IoT devices has been increasing
dramatically
11
Online Threats of Botnets
● 2015/10 – 2016/5, NCCST analyzed and identified
40,249 IoT/ICS being hacked
– A botnet distributed across 154 countries
– Informed 18 national CERTs
– More than 6,000 machines, total value US$4M
– 5G devices, heat pump controller, smart meters, IPC, DVR,
Web Camera, Router, Wi-Fi Aps and Set-Top Box, etc
– 160 companies including 10 in Taiwan
5G telco devices Industrial process
controller
Smart meters
Heat pump
controller
Taiwan IS Industry Value Chain in 2013
12
Data Center
Service Provider
New App. (device, forensic, vehicular)
Dealer
.5B
Digital Forensic
Product Makers
Encryption, AIO, content, threat,
system, ID management
.13B
Import
Logististic
.013B
E
G
IS Insurance
E
G
Personal Users
Wholesale
.017B
IS Service Providers
SI, Consultant, Training,
Digital Forensic, etc.
.163B
SI
Enterprise and Government
Telco
CHT, TWM,
FETNET, etc.
Outsourcing
Acer, CHT,
Tradevan,
ISSDU, etc.
Sales Agencies .82B
2014 2015 2016 (e) 2017 (f) 2018 (f)
台灣市場規模 312 353 393 432 469
成長率 12.2% 13.2% 11.4% 9.7% 8.5%
0%
2%
4%
6%
8%
10%
12%
14%
0
50
100
150
200
250
300
350
400
450
500
IS Market in Taiwan
CAGR: 10.7%
Market Size
Growth Rate
1.04B 1.18B 1.31B 1.44B 1.18B
Examples of IS Companies
● Amorize
–Scanning open source vulnerability
–Proofpoint in 2013
● Xecure Lab
–Detecting and defending APT
–Verint in 2014
● Broadweb
–IPS ( Intrusion Prevention ) and DPI ( Deep Packet
Inspection )
–Trend Micro in
Taiwan IS Industry
● Encryption and Digital Forensic
– NST, WatchSoft, Sinpao, ISSDU, iForensic, etc
● Identity and Access Control
– Ecomuniversal, ARES, ChangingTec Foongtong, NST, Esecure, NewImage, etc.
● Cloud Securtiy
– T Cloud Computing (TrendMicro), Abocom, Hgiga, etc.
● Total solutions
– Zyxel, BroadWeb (TrendMicro), Abocom, HGiga, Sinpao, Axtronics, etc.
● System Integrator
– ACER, Stark Tech Inc, Bestcom, SYSCOM, Zero One Tech, SYSAGE, Ringline,
ARES, Fortune, CGS, Tradevan, etc.
● Outsourcing
– CHT, ACER, SYSCOM, Trend Micro, etc
● Insurance
– Fubon, FIRST Bank, AIG, etc

More Related Content

What's hot

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)Abbie Barbir
 
State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018Mediatelecom
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Benjamin Ang
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...Mohamed Jean-Philippe Sangaré
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 

What's hot (9)

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 

Similar to Taiwan's Cyber Security Overview and PPP Model

CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Reviewresultsig
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014Felipe Lamus
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localAdrian Mikeliunas
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustryKyna Tsai
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)Frank Chee-Da TSAI (蔡其達)
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementDATA SECURITY SOLUTIONS
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityNeil Dave
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 linDanie Schoeman
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesICT Watch
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade Zvavanjanja
 

Similar to Taiwan's Cyber Security Overview and PPP Model (20)

CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
IOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in TaiwanIOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in Taiwan
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)
 
HLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrowHLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrow
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident management
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness Profiles
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf online
 

More from Roberto C. Mayer

Versa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspectsVersa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspectsRoberto C. Mayer
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionRoberto C. Mayer
 
Versa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitchVersa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitchRoberto C. Mayer
 
2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidade2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidadeRoberto C. Mayer
 
WCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo GallindoWCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo GallindoRoberto C. Mayer
 
WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2 WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2 Roberto C. Mayer
 
WCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar RibeiroWCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar RibeiroRoberto C. Mayer
 
WCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee JrWCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee JrRoberto C. Mayer
 
2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-results2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-resultsRoberto C. Mayer
 
2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência Química2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência QuímicaRoberto C. Mayer
 
Cloud iot novos requisitos software
Cloud iot novos requisitos softwareCloud iot novos requisitos software
Cloud iot novos requisitos softwareRoberto C. Mayer
 

More from Roberto C. Mayer (20)

Versa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspectsVersa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspects
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introduction
 
Versa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitchVersa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitch
 
2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidade2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidade
 
WCIT 2016 Calls to Action
WCIT 2016 Calls to ActionWCIT 2016 Calls to Action
WCIT 2016 Calls to Action
 
2016 WCIT Vint Cerf
2016 WCIT Vint Cerf2016 WCIT Vint Cerf
2016 WCIT Vint Cerf
 
WCIT 2016 Soumitra Dutta
WCIT 2016 Soumitra DuttaWCIT 2016 Soumitra Dutta
WCIT 2016 Soumitra Dutta
 
WCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo GallindoWCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo Gallindo
 
WCIT 2016 Manu Bhardwaj
WCIT 2016 Manu BhardwajWCIT 2016 Manu Bhardwaj
WCIT 2016 Manu Bhardwaj
 
WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2 WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2
 
WCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar RibeiroWCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar Ribeiro
 
WCIT 2016 George Newstrom
WCIT 2016 George NewstromWCIT 2016 George Newstrom
WCIT 2016 George Newstrom
 
WCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee JrWCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee Jr
 
WCIT 2016 Dr. Ming Ji Wu
WCIT 2016 Dr. Ming Ji WuWCIT 2016 Dr. Ming Ji Wu
WCIT 2016 Dr. Ming Ji Wu
 
WCIT Anupan Chander 1
WCIT Anupan Chander 1WCIT Anupan Chander 1
WCIT Anupan Chander 1
 
WCIT 2016 Amy Aussieker
WCIT 2016 Amy AussiekerWCIT 2016 Amy Aussieker
WCIT 2016 Amy Aussieker
 
WCIT 2016 Aline Sordilli
WCIT 2016 Aline SordilliWCIT 2016 Aline Sordilli
WCIT 2016 Aline Sordilli
 
2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-results2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-results
 
2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência Química2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência Química
 
Cloud iot novos requisitos software
Cloud iot novos requisitos softwareCloud iot novos requisitos software
Cloud iot novos requisitos software
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Taiwan's Cyber Security Overview and PPP Model

  • 1. 【內部使用】 Cyber Security Overview of Taiwan Jan-Ming Ho Consultant to the Executive Yuan (Cabinet) Taiwan Information provided by NCCST, III and TIER
  • 2. 1 Defense-in-Depth Deployment Towards Government-wide Situation Awareness ● Build government-wide situation awareness of cyber security ● Promote Public-private-partnership for better decision making External Threat Existing Vulnerability Regulation Compliance Incident Handling 1st Tier MSSP 2nd Tier G-SOC 3rd Tier NICST Actionable Intelligence Government-Wide Situation Awareness National-Level Decision Making Support Co-defense Detection Rule Trend Statistics Classification Data Modeling Prediction Monitoring Data
  • 3. 2 Early Warning Early Warning A Hierarchical Organization National CERT National ISAC National SOC Domain CERT Domain ISAC Domain SOC CSIRT A Enterprise A CSIRT B Enterprise B CSIRT CSOC C Enterprise C MSSP Early warning Aide/Assistant 持續監控 Domain Situation Awareness Situation Awareness at National Level M Continuous Monitoring Event Notification Event Notification Continuous Monitoring Continuous Monitoring
  • 4. 3 Cabinet Level Taskforce National Information and Communication Security Taskforce Convener: Vice Premier Deputy Convener: Minister Without Portfolio Minister of Ministry of Science and Technology Co-Deputy-Convener: Senior Advisor to the President Standard and Norm WG Ministry of Economic Affairs Education and HR WG Ministry of Education Audit WG Ministry of Science and Technology Government Info & Communication Security WG Ministry of Science and Technology Cyberspace Protection System Ministry of Science and Technology Personal Info. Protection & Legal System WG Ministry of Justice Cybercrime Prevention WG Ministry of Interior Cyber Environment Security WG National Communication Commission National Center for Cyber Security Technology Sub Working Group National Defense(Ministry of National Defense) e-Government(National Development Council) Telecom(National Communication Commission) Transportation(Ministry of Transportation) Finance(Ministry of Finance) Banking(Financial Supervisory Commission) Healthcare(Ministry of Health and Welfare ) Cybercrime Investigative System Ministry of Justice Ministry of Interior NICST Secretariat Office of Information and Communication Security, EY CIP System Office of Homeland Security, EY Other System Effected 2016/01/20
  • 5. 4 Threat Intelligence, Analysis and Sharing 4 Botnet APT Malware SPAM ThreatPrecursorAnalysis ThreatIntelligenceGeneration InformationSharing Gov. Agencies 3,039 Agencies CIIP Authorities Telecom (NCC)/Banking(FSC) Utilities & e-Commerce(MOEA) Internet Service Provider Gov.(GSN) /Academic (TANET) /All private ISPs MSSP Chunghwa Telecom/Acer TradeVAN/ISSDU, etc International Cooperation FIRST/APCERT/US-CERT CERT-EU…etc HoneyBEAR HoneyNET Botnet Tracer G-ISAC Government Information Sharing and Analysis Center G-SOC Legend HoneyBEAR: Behavior-based Email Anomaly Reconnaissance NCC:National Communication Commission FSC:Financial Supervisory Commission MOEA:Ministry of Economic Affairs GSN:Government Service Network MSSP: Managed Security Service Provider FIRST: Forum for Incident Response and Security Teams Indicators Of Compromise
  • 6. 5 Law and Regulation in progress, Focusing on CIIP ICT Security Management Act and Enforcement Rules CIIP Steering Group G-ISMS CI Sector Specific Guidelines Common Baseline Of CIIP Utility Water Transportation High Tech Parks Banking & Finance Comm. & Broadcasting Medical CI Cyber Security Committees Law Supervise Helpdefine Provide References Provide references Define CI Cyber Security Promotion Mechanisms CI Sectors Join Execution Government ISMS Framework • CIIP Steering Group is formed by NICST and MOST • CI Cyber Security Committees is led by competent authority of that CI sector Government
  • 7. 6 PPP in Taiwan I n s t i t u t i o n s G o v GSN Op Team/ CEPD (2010/1) MOI (2011/8) DOJ (2012/3) I S A C G-ISAC (2009/11) NCC-ISAC (2010/2) TWNIC (2010/2) A-ISAC (2010/4) F-ISAC (2017/4) C E R T EC-CERT (2011/1) TWCERT/CC (2015/1) TWCSIRT (2016/1) G e n I S I n d Trend Micro (2013/8) FORTINET (2014/9) ISSDU ( 2010/10) CHT (2010/11) ACER (2010/11) TRADEVAN (2010/11) AKER (2011/11) 2011/1/1 ~ 2016/6/30 60,980 135,527 84,210 107,405 76,757 33,374 79,260 144,079 90,311 112,516 84,027 36,749 0 20000 40000 60000 80000 100000 120000 140000 160000 100 101 102 103 104 105 (Q2) ANA EWA INT DEF FBI Total Info Sharing 2011 2012 2013 2014 2015 2016
  • 8. Regional Collaborations ● APEC as the major platform –APCERT (Asia Pacific Computer Emergency Response Team) –APWG (Anti-Phishing Working Group) –AVAR (Association of anti-Virus Asia Researchers) –FIRST (Forum of Incident Response and Security Teams) ● Regular interaction with other countries –G-ISAC –TWCERT –JPCERT/CC, MyCERT KrCERT/CC
  • 10. Total % of IS Events Virus Data Theft Malicious Ware DDOS Hack/ Deface Equip Damage Subtotal 22.26% 52.77% 5.58% 32.11% 15.34% 10.52% 7.85% Industry 12.20% 66.90% 20.50% 41.70% 22.80% 17.30% 17.30% Gov Inst 21.97% 41.12% 0.93% 13.40% 3.12% 9.66% 8.41% Schools 32.70% 58.50% 4.40% 46.20% 24.10% 8.80% 3.80% Information Security Threats
  • 11. 10 Network Attacks on IoT and ICS ● Industrial control systems and IoT has become the target of network attack ● Honeynet deployed by NCCST – 28M events detected and 50K malware per year in the last 3 years, mainly from US, Russia, and China – 180M events detected in 2016 and 110K malware – Brute-force attack targeted at IoT devices has been increasing dramatically
  • 12. 11 Online Threats of Botnets ● 2015/10 – 2016/5, NCCST analyzed and identified 40,249 IoT/ICS being hacked – A botnet distributed across 154 countries – Informed 18 national CERTs – More than 6,000 machines, total value US$4M – 5G devices, heat pump controller, smart meters, IPC, DVR, Web Camera, Router, Wi-Fi Aps and Set-Top Box, etc – 160 companies including 10 in Taiwan 5G telco devices Industrial process controller Smart meters Heat pump controller
  • 13. Taiwan IS Industry Value Chain in 2013 12 Data Center Service Provider New App. (device, forensic, vehicular) Dealer .5B Digital Forensic Product Makers Encryption, AIO, content, threat, system, ID management .13B Import Logististic .013B E G IS Insurance E G Personal Users Wholesale .017B IS Service Providers SI, Consultant, Training, Digital Forensic, etc. .163B SI Enterprise and Government Telco CHT, TWM, FETNET, etc. Outsourcing Acer, CHT, Tradevan, ISSDU, etc. Sales Agencies .82B
  • 14. 2014 2015 2016 (e) 2017 (f) 2018 (f) 台灣市場規模 312 353 393 432 469 成長率 12.2% 13.2% 11.4% 9.7% 8.5% 0% 2% 4% 6% 8% 10% 12% 14% 0 50 100 150 200 250 300 350 400 450 500 IS Market in Taiwan CAGR: 10.7% Market Size Growth Rate 1.04B 1.18B 1.31B 1.44B 1.18B
  • 15. Examples of IS Companies ● Amorize –Scanning open source vulnerability –Proofpoint in 2013 ● Xecure Lab –Detecting and defending APT –Verint in 2014 ● Broadweb –IPS ( Intrusion Prevention ) and DPI ( Deep Packet Inspection ) –Trend Micro in
  • 16. Taiwan IS Industry ● Encryption and Digital Forensic – NST, WatchSoft, Sinpao, ISSDU, iForensic, etc ● Identity and Access Control – Ecomuniversal, ARES, ChangingTec Foongtong, NST, Esecure, NewImage, etc. ● Cloud Securtiy – T Cloud Computing (TrendMicro), Abocom, Hgiga, etc. ● Total solutions – Zyxel, BroadWeb (TrendMicro), Abocom, HGiga, Sinpao, Axtronics, etc. ● System Integrator – ACER, Stark Tech Inc, Bestcom, SYSCOM, Zero One Tech, SYSAGE, Ringline, ARES, Fortune, CGS, Tradevan, etc. ● Outsourcing – CHT, ACER, SYSCOM, Trend Micro, etc ● Insurance – Fubon, FIRST Bank, AIG, etc

Editor's Notes

  1. NCCST: National Center for Cyber Security Technology CVE - Common Vulnerabilities and Exposures (CVE)
  2. NICST: National Information and Communication Security Taskforce BOST: Board of Science and Technology MSSP:  Managed Security Service Provider
  3. NICST: National Information and Communication Security Taskforce CIP: critical infrastructure protection?
  4. APT: advanced persistent threat CIIP: Critical Information Infrastructure Protection MSSP: Managed Security Service Provider G-SOC: Government Security Operations Center G-ISAC: Government Information Sharing and Analysis Center
  5. 總共 19 名會員 (12 機關,7 一般)
  6. 註:資安中心與國發會、教育部及通傳會合作,將蜜網系統(Honeynet)佈建於GSN、TANET及民間ISP網路,對發生於網際網路之網路攻擊行為進行偵測分析
  7. 在產業鏈方面,資訊安全產品是從製造端透過流通業者,以各種流通管道提供給產品使用者,在國內產品製造商方面,估計2013年國內自行研發產值約有39.5億元,約97.76%委由國內代理商經營,而直接售給客戶的為個人占0.47%、企業占0.87%及政府的0.43%,其餘透過資安服務業及流通業者作加值服務,顯見國內自行研發的資安產品銷售管道由多元轉為集中代理制度,系統整合商擔任供需橋樑的角色也逐漸被取代。在複式代理方面,總國外進口代理規模約有147.6億元新台幣之高,其產業鏈中產品的販賣通道的主軸與本國製造商略有不同,其銷售管道主要集中在直接銷售至企業與政府部門別最高有,分別占59.75%和28.46%,顯見大企業和政府部門對於國外產品的使用比率高於國內產品。而經銷業者占了10.24%。 Encryption: NST 網安科技, WatchSoft 華鉅科技, Sinpao鈊保科技, Digital. Forensic: ISSDU 數聯資安, iForensic 鑒真數位, etc Identity and Access Control: Ecomuniversal 異康科技, ARES 資通電腦, ChangingTec 全景軟體, Foongtong 宏通數碼科技, NST 網安科技, Esecure 欣領航科技, NewImage 影像電腦 Cloud Securtiy: T Cloud Computing 騰雲科技 (TrendMicro), Abocom 友旺科技, HGiga 桓基科技, Integrated Solutions: Zyxel 合勤科技, BroadWeb (威播科技, 黃能富, TrendMicro), Abocom 友旺科技, HGiga 桓基科技, Sinpao鈊保科技, Import: CA, IBM, Success: Amorize/Proofpoint (open source scanning), Xecure/Verint, BroadWeb/TrendMicro
  8. 隨著網際網路行動化及雲端化發展,加上個資法實施及資安事件新聞頻傳,持續推升國內市場在資安產品與服務的需求 受惠於雲端與行動等新興應用資安需求浮現,台灣資安市場規模從2014年312億元新台幣,以年複合成長率約10.7%的速度成長至2018年469億元新台幣 備註:單位為億新台幣 資料來源:MIC,2016年5月