SlideShare a Scribd company logo
1 of 14
MONGOLIAN CIRT (CYBER
INCIDENT RESPONSE
TEAM)
Khaltar Togtuun. (PhD, ass professor).
Managing director of MonCIRT
MONGOLIAN SITUATION
 Mongolian Internet Infrastructure vulnerable target
for attack
 In recent years the attack techniques have become
sophisticated
 Rapid proliferation of viruses, Trojans and worms
 Terminals become the zombie computers of Botnets.
 Critical infrastructure can get affected by attacks on
information infrastructure.
 There were some incidents in financial sector.
 It is registered some cyber crimes.
 The information infrastructure and broadband
develops quickly.
 Information Security knowledge of Internet users is
low
MONGOLIAN CIRT
 Mongolian Cyber Incident Response Team established in
2007 for creating national information security system, for
enhancing cyber security and for providing support in the
protection of critical infrastructure
 From end of 2007 started the reactive service
 In 2008 planning to start proactive and security quality
services.
 The purpose of MonCIRT is to become the nation’s most
trusted referral agency of the Mongolian Community for
responding to Computer Security and Cyber Security
incidents as and when they occur.
 In further to become CERTs coordination center
 Will also assist organizations in implementing proactive
measures to reduce the risks of cyber security incidents.
MONCIRT MISSION
To become the warranty of information,
communication technology development
of steppe country.
To enhance the security of Mongolia’s
Communications and Information
Infrastructure through proactive
actions and effective collaboration
Prevent and respond to incidents which
have place in Mongolian segment of
Internet.
MONCIRT PROJECT
For creating MonCIRT we was developed project in 2005. We consider that
for successful implementation of the project, it is necessary to set up the
following purposes.
 To determine the mission and function of the MONCERT, to develop the
operation rules of the MONCERT.
 To determine the structure and internal organization of the MONCERT,
to select its staff members
 To train the selected staff members
 To collect and analyze data on cyber attacks, cyber damages, level of
protection of users and ISP-s, and on their information security
knowledge.
 To find the maecenas and sponsors
 To obtain the equipments, hardware and software
 To start the MONCERT operation
 To offer free service for users and ISP-s, to carry out registration and
keep statistics
 To establish Hotline communication with other CERT-s, APCERT and
FIRST, to cooperate with them and to help mutually.
MONCIRT CREATING STAGES
(PLANNED)
      Step 1: Obtain government support and buy-
in
      Step 2: Determine the MonCIRT strategic
plan
      Step 3: Gather relevant information
      Step 4: Design the MonCIRT vision
      Step 5: Communicate the MonCIRT vision
and operational plan
      Step 6: Start MonCIRT operation
      Step 7: Promotion of MonCIRT
      Step 8: Evaluate MonCIRT effectiveness
Now we are in stage 7
ORGANIZATIONAL MODEL OF
MONCIRT
In first time as Security Team.
From 2009 will work as CERTs
coordination Center
Managing Board
Managing Board
Managing Director
Managing Director
Book
keeper
Book
keeper
Incident handler
/group leader/
Incident handler
/group leader/
Manager
Manager
Vulnerability
handler
/expert/
Vulnerability
handler
/expert/
Technology
Watchers -4
Technology
Watchers -4
Malware
expert
Malware
expert
Botnet
analyst
Botnet
analyst
System
administrator
System
administrator
Artifact
and IDS
analyst
Artifact
and IDS
analyst
Organizational structure of MonCIRT
CONSTITUENCY OF MONCIRT
ДАРХАН-УУЛ
БУЛГАН
SAINSHAND
CHOIR
УЛАНБАТОР
ДОРНОГОБИ
ХУБСУГУЛ
AРХАНГАЙ
УВС
БАЯН-УЛГИЙ
ХОВД ЗАВХАН
ГОБИ-АЛТАЙБАЯНХОНГОР
УБУРХАНГАЙ
УМНУГОБИ
ДУНДГОБИ
ХЭНТИЙ
TOV
ДОРНОД
СУХЭБАТОР
СЭЛЭНГЭ
•Serve all the society
•Best Effort service for
users of ISPs
CURRENT ACTIVITY
 Incident coordination among organizations and
aimaks (province) of Mongolia.
 Distribute documents about security incidents and
vulnerabilities
 Anti-spam, phishing, pharming, Social engineering
scams
 Guidance of construction of other teams in critical
infrastructure organizations.
 Research and development.
 Creating of Honeynet
 Installing IDS-s in main gateways.
 Creating of single point of contact for reporting
incidents
 Developing of handbooks, guidelines on Mongolian
INCIDENTS CATEGORY
HANDLED BY MONCIRT
 Worm, Trojan and viruses (286 times)
 System intrusion / compromise (2 times)
 DoS attack / abnormal (5 times)
 Port scan (63 times)
 Spam, phishing, pharming (184 times)
(from August till December 2007)
MONTHLY INCIDENT REPORT
(DECEMBER. 2007)
I nci dent Cat egor y
0
5
10
15
20
25
30
35
Portscan
worm/virus
abnormal/DoS
Intrusion
Open-Relay
Others
Por t scan r epor t s
6
10
5
2
3 3
Web r pc sshd dns pr i nt ot her
65 times
ONGOING PROJECTS
 IDS based on Autonomous agent
 Cooperative Incident handling system
with Government Communication
Department
 Incident handling, Artifact handling
handbooks on mongolian
 Honeynet
 Incident database
WE NEED
 Share information and lessons learned with other
CERTs
 Incident analysis and response experiences
 Auditing and penetration testing experiences
 Education and trainings, site visiting
 Technical supports in creation of vulnerability
database, Incident Tracking System,
 Infrastructure building
 Forensics tools
 Experiences in botnet analysis

More Related Content

What's hot

National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014vikawotar
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 

What's hot (20)

National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 

Viewers also liked

E government questions last
E government questions lastE government questions last
E government questions lastKhaltar Togtuun
 
Information security17799 khaltar
Information security17799 khaltarInformation security17799 khaltar
Information security17799 khaltarKhaltar Togtuun
 
Copyright of programmers
Copyright of programmersCopyright of programmers
Copyright of programmersKhaltar Togtuun
 
Integrales en la economia
Integrales en la economiaIntegrales en la economia
Integrales en la economiaKaren yepez
 
Moving from Internet 1.0 to Iot: le tecnologie IoT
Moving from Internet 1.0 to Iot: le tecnologie IoTMoving from Internet 1.0 to Iot: le tecnologie IoT
Moving from Internet 1.0 to Iot: le tecnologie IoTFabio Gatti
 
безсполучниковий звязок
безсполучниковий звязокбезсполучниковий звязок
безсполучниковий звязокAndy Levkovich
 
Направо-налево
Направо-налевоНаправо-налево
Направо-налевоUriyK
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirtvngundi
 

Viewers also liked (20)

E government questions last
E government questions lastE government questions last
E government questions last
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
3 s is for c servants
3 s is for c servants3 s is for c servants
3 s is for c servants
 
Mab khotolbor
Mab khotolborMab khotolbor
Mab khotolbor
 
Is law 2009 khaltar
Is law 2009 khaltarIs law 2009 khaltar
Is law 2009 khaltar
 
Information security17799 khaltar
Information security17799 khaltarInformation security17799 khaltar
Information security17799 khaltar
 
Constitution&democracy
Constitution&democracyConstitution&democracy
Constitution&democracy
 
Copyright of programmers
Copyright of programmersCopyright of programmers
Copyright of programmers
 
3 s esig&ecertif
3 s esig&ecertif3 s esig&ecertif
3 s esig&ecertif
 
Ict legal regulation
Ict legal regulationIct legal regulation
Ict legal regulation
 
Distance learning hto
Distance learning htoDistance learning hto
Distance learning hto
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Infosec
InfosecInfosec
Infosec
 
Integrales en la economia
Integrales en la economiaIntegrales en la economia
Integrales en la economia
 
Dresslink
DresslinkDresslink
Dresslink
 
Moving from Internet 1.0 to Iot: le tecnologie IoT
Moving from Internet 1.0 to Iot: le tecnologie IoTMoving from Internet 1.0 to Iot: le tecnologie IoT
Moving from Internet 1.0 to Iot: le tecnologie IoT
 
безсполучниковий звязок
безсполучниковий звязокбезсполучниковий звязок
безсполучниковий звязок
 
Направо-налево
Направо-налевоНаправо-налево
Направо-налево
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 

Similar to Mon cirt khaltar

National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Creating a Culture of Security
Creating a Culture of SecurityCreating a Culture of Security
Creating a Culture of SecurityTechSoup
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Complianceijtsrd
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Ernest Staats
 

Similar to Mon cirt khaltar (20)

National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Creating a Culture of Security
Creating a Culture of SecurityCreating a Culture of Security
Creating a Culture of Security
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 

Recently uploaded

VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...aditipandeya
 
A STUDY ON EMPLOYEE MORALE AT ELGI EQUIPMENT ELIMITED
A STUDY ON EMPLOYEE MORALE AT ELGI  EQUIPMENT ELIMITEDA STUDY ON EMPLOYEE MORALE AT ELGI  EQUIPMENT ELIMITED
A STUDY ON EMPLOYEE MORALE AT ELGI EQUIPMENT ELIMITEDksanjai333
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniturem3resolve
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 GurgaonDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...anilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...aditipandeya
 
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...anilsa9823
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 GurgaonDelhi Call girls
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...Hot Call Girls In Sector 58 (Noida)
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night EnjoyPooja Nehwal
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...gurkirankumar98700
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 GurgaonDelhi Call girls
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Paymentanilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...aditipandeya
 
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...ksanjai333
 

Recently uploaded (20)

VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
 
A STUDY ON EMPLOYEE MORALE AT ELGI EQUIPMENT ELIMITED
A STUDY ON EMPLOYEE MORALE AT ELGI  EQUIPMENT ELIMITEDA STUDY ON EMPLOYEE MORALE AT ELGI  EQUIPMENT ELIMITED
A STUDY ON EMPLOYEE MORALE AT ELGI EQUIPMENT ELIMITED
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniture
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 56 Gurgaon
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
 
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
Pakistani Jumeirah Call Girls # +971559085003 # Pakistani Call Girls In Jumei...
 
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Bawana Delhi reach out to us at 🔝8264348440🔝
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 55 Gurgaon
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
 
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 GurgaonCheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Sector 54 Gurgaon
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
 
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...EMPLOYEES JOB SATISFACTION  ( With special reference to selected Sundaram Ind...
EMPLOYEES JOB SATISFACTION ( With special reference to selected Sundaram Ind...
 

Mon cirt khaltar

  • 1. MONGOLIAN CIRT (CYBER INCIDENT RESPONSE TEAM) Khaltar Togtuun. (PhD, ass professor). Managing director of MonCIRT
  • 2. MONGOLIAN SITUATION  Mongolian Internet Infrastructure vulnerable target for attack  In recent years the attack techniques have become sophisticated  Rapid proliferation of viruses, Trojans and worms  Terminals become the zombie computers of Botnets.  Critical infrastructure can get affected by attacks on information infrastructure.  There were some incidents in financial sector.  It is registered some cyber crimes.  The information infrastructure and broadband develops quickly.  Information Security knowledge of Internet users is low
  • 3. MONGOLIAN CIRT  Mongolian Cyber Incident Response Team established in 2007 for creating national information security system, for enhancing cyber security and for providing support in the protection of critical infrastructure  From end of 2007 started the reactive service  In 2008 planning to start proactive and security quality services.  The purpose of MonCIRT is to become the nation’s most trusted referral agency of the Mongolian Community for responding to Computer Security and Cyber Security incidents as and when they occur.  In further to become CERTs coordination center  Will also assist organizations in implementing proactive measures to reduce the risks of cyber security incidents.
  • 4. MONCIRT MISSION To become the warranty of information, communication technology development of steppe country. To enhance the security of Mongolia’s Communications and Information Infrastructure through proactive actions and effective collaboration Prevent and respond to incidents which have place in Mongolian segment of Internet.
  • 5. MONCIRT PROJECT For creating MonCIRT we was developed project in 2005. We consider that for successful implementation of the project, it is necessary to set up the following purposes.  To determine the mission and function of the MONCERT, to develop the operation rules of the MONCERT.  To determine the structure and internal organization of the MONCERT, to select its staff members  To train the selected staff members  To collect and analyze data on cyber attacks, cyber damages, level of protection of users and ISP-s, and on their information security knowledge.  To find the maecenas and sponsors  To obtain the equipments, hardware and software  To start the MONCERT operation  To offer free service for users and ISP-s, to carry out registration and keep statistics  To establish Hotline communication with other CERT-s, APCERT and FIRST, to cooperate with them and to help mutually.
  • 6. MONCIRT CREATING STAGES (PLANNED)       Step 1: Obtain government support and buy- in       Step 2: Determine the MonCIRT strategic plan       Step 3: Gather relevant information       Step 4: Design the MonCIRT vision       Step 5: Communicate the MonCIRT vision and operational plan       Step 6: Start MonCIRT operation       Step 7: Promotion of MonCIRT       Step 8: Evaluate MonCIRT effectiveness Now we are in stage 7
  • 7. ORGANIZATIONAL MODEL OF MONCIRT In first time as Security Team. From 2009 will work as CERTs coordination Center
  • 8. Managing Board Managing Board Managing Director Managing Director Book keeper Book keeper Incident handler /group leader/ Incident handler /group leader/ Manager Manager Vulnerability handler /expert/ Vulnerability handler /expert/ Technology Watchers -4 Technology Watchers -4 Malware expert Malware expert Botnet analyst Botnet analyst System administrator System administrator Artifact and IDS analyst Artifact and IDS analyst Organizational structure of MonCIRT
  • 9. CONSTITUENCY OF MONCIRT ДАРХАН-УУЛ БУЛГАН SAINSHAND CHOIR УЛАНБАТОР ДОРНОГОБИ ХУБСУГУЛ AРХАНГАЙ УВС БАЯН-УЛГИЙ ХОВД ЗАВХАН ГОБИ-АЛТАЙБАЯНХОНГОР УБУРХАНГАЙ УМНУГОБИ ДУНДГОБИ ХЭНТИЙ TOV ДОРНОД СУХЭБАТОР СЭЛЭНГЭ •Serve all the society •Best Effort service for users of ISPs
  • 10. CURRENT ACTIVITY  Incident coordination among organizations and aimaks (province) of Mongolia.  Distribute documents about security incidents and vulnerabilities  Anti-spam, phishing, pharming, Social engineering scams  Guidance of construction of other teams in critical infrastructure organizations.  Research and development.  Creating of Honeynet  Installing IDS-s in main gateways.  Creating of single point of contact for reporting incidents  Developing of handbooks, guidelines on Mongolian
  • 11. INCIDENTS CATEGORY HANDLED BY MONCIRT  Worm, Trojan and viruses (286 times)  System intrusion / compromise (2 times)  DoS attack / abnormal (5 times)  Port scan (63 times)  Spam, phishing, pharming (184 times) (from August till December 2007)
  • 12. MONTHLY INCIDENT REPORT (DECEMBER. 2007) I nci dent Cat egor y 0 5 10 15 20 25 30 35 Portscan worm/virus abnormal/DoS Intrusion Open-Relay Others Por t scan r epor t s 6 10 5 2 3 3 Web r pc sshd dns pr i nt ot her 65 times
  • 13. ONGOING PROJECTS  IDS based on Autonomous agent  Cooperative Incident handling system with Government Communication Department  Incident handling, Artifact handling handbooks on mongolian  Honeynet  Incident database
  • 14. WE NEED  Share information and lessons learned with other CERTs  Incident analysis and response experiences  Auditing and penetration testing experiences  Education and trainings, site visiting  Technical supports in creation of vulnerability database, Incident Tracking System,  Infrastructure building  Forensics tools  Experiences in botnet analysis