SlideShare a Scribd company logo
1 of 65
New Threat Trends in CII
Contents
◼ Who am I?
◼ What is CII?
◼ What is Industry 4.0?
◼ New Risks of CII in Industry 4.0
◼ Conclusion & Summary
Who am I?
◼ Seungjoo (Gabriel) Kim (金 昇 柱)
◼ 1999. 02 : Ph.D on Cryptography @
Sungkyunkwan Univ.
◼ 1998.12~2004.02 : Team Manager @ KISA
(Korea Internet & Security Agency)
◼ 2004.03~2011.02 : Associate Professor @
Sungkyunkwan Univ.
◼ 2011.03~Now : Full Professor @ Department
of Cyber Defense, Korea Univ.
Who am I?
◼ 2011.03~Now : Co-Founder/Advisory Director
of a hacker group, HARU and an international
security & hacking conference, SECUINSIDE.
Department of Cyber Defense?
◼ Established in 2012
◼ 30 students / year
◼ Joint educational programs with Korea Army
(Cyber Command)
◼ Full Scholarship over Guaranteed Employment
◼ Upon graduation, they are to be commissioned as
second lieutenants and must serve in the military
for 7 years
◼ Accept top 1% of students in the national
college entrance exam (Korean SAT)
Department of Cyber Defense?
◼ In 2015 and 2018, our students from Dept. of
CYDF at Korea University won the TOP prize at
the DEFCON CTF for the first time in Asia!
Hacker Group, HARU?
◼ Founded in 2011
◼ Acronym of “HAckers’ Re-Union” or “HAckers
aRe Us”
◼ One of the biggest association of underground
hacking groups and communities in Korea
◼ 8+ Honorable Members :
◼ BLACK.PERL (www.bpsec.co.kr), CNSECURITY
(www.cnsec.co.kr), FlyHigh, GRAYHASH (BEISTLAB,
www.grayhash.com), Hackerschool
(www.hackerschool.org), iNET COP
(www.inetcop.net), NSHC (www.nshc.net), SEWORKS
(Wowhacker, www.seworks.co), etc.
Critical Information Infra.
◼ CII : Infrastructure that provides an essential
support for economic and social well-being,
for public safety and for the functioning of
key government responsibilities.
◼ However, the definition of critical
infrastructure varies from country to country
and is fluid, as the definition and list of
infrastructures deemed to be critical have
changed or matured over the time.
Critical Information Infra.
(Source: Munish Sharma, "Securing Critical Information Infrastructure: Global Perspectives and Practices", April 2017)
Industry 4.0
Industry 4.0
Mechanization, water power, steam power
Mass production, assembly line, electrical energy
Computer and further automation
Cyber Physical Systems
◼ The 4th industrial revolution (Industry 4.0) is
transforming the next generation of
manufacturing systems by making it smarter,
well-connected, self-organized, decentralized,
and flexible.
◼ To accelerate this transformation, industrial
sectors have planned to commit US$ 907
billion per annum to Industry 4.0.
Industry 4.0
(e.g.) Digital Twin
Digital twin is a S/W representations of assets and processes that are used to understand,
predict, and optimize performance in order to achieve improved business outcomes
(named one of Gartner's Top 10 Strategic Technology Trends for 2017).
(e.g.) Smart Manufacturing
(Source: Michele H.Ahuett-Garza and T.Kurfess, "A Brief Discussion on the Trends of Habilitating Technologies for
Industry 4.0 and Smart Manufacturing", Manufacturing Letters, Feb 17, 2018)
By maximizing SC flexibility, Smart Manufacturing enables mass customization!
CII Security in Industry 4.0
◼ So far, critical infrastructures were isolated and
focused on operational safety.
Drastically ↓Changed!
◼ However, Industry 4.0 increases the digitalization
and connectivity of the industry.
◼ Examples of such inter-connected systems may
include traffic monitoring and control systems
communicating with smart vehicles, energy related
systems communicating with smart homes and smart
meters, monitoring systems connected with
autonomous sensors in nuclear plants, power grids
and body area networks.
CII Security in Industry 4.0
◼ This increasing connectivity and
interdependencies between CII elements
increases the risk of cyber security threats.
CII Security in Industry 4.0
◼ This increasing connectivity and
interdependencies between CII elements
increases the risk of cyber security threats.
◼ Risk 1. No air-gap, everything connected!
◼ Risk 2. Increased complexity
◼ Risk 3. Global outsourcing is essential &
Enterprise processes become more digitized.
◼ Risk 4. How to manage billions connected devices?
◼ Risk 5. You (one team in one company) can not
verify all the products by yourself.
◼ Risk 6. Misconception about blockchain
1st Change in Security Env.
No air-gap,
everything connected!
No Air Gap!
No Air Gap! British American Security Information Council
UK nuclear submarine fleet
No Air Gap!
Recent suggestions that the fleet is vulnerable
have sometimes been met with complacency and
claims that the isolated 'air-gapped' systems
cannot be penetrated. Whilst we recognize that it
is important not to be alarmist, these claims are
false.
No Air Gap!
Malware injection during manufacturing(a.k.a
supply chain), mid-life refurbishment or software
updates and data transmission interception allow
potential adversaries to conduct long-term cyber
operations.
No Air Gap!
No Air Gap!
No Air Gap!
2nd Change in Security Env.
CIIP in Industry 4.0 era.
becomes more and more complex
with increased maintenance costs.
◼ Because of the increasing connectivity and
interdependencies, CIIP in Industry 4.0 era.
becomes more and more complex with
increased maintenance costs.
◼ Increasing new IT services
◼ Increasing usage of common COTS software
◼ Increasing integration and information flows
between systems
◼ Heavily connected to other IT services
◼ Even connected to INTERNET
Security by Design
◼ This in turns decreases the efficacy of security.
Security by Design
First Law of Software Quality
e = mc2
errors = (more code)2 or
(more connected)2
◼ CIIP in Industry 4.0 era. becomes more and
more complex with increased maintenance
costs.
◼ This in turns decreases the efficacy of security.
↓
◼ Need ‘Security by Design’ to cope with
complexity!
Security by Design
◼ Security by Design (in a narrow sense) :
Considering security as early as the design
phase of the software development process.
◼ Security by Design (in a broader sense) :
Systematically organized and methodically
equipped framework that is applied over the
lifecycle of secure software.
Security by Design
(Source: Michael Waidner, Michael Backes, Jörn Müller-Quade, "Development of Secure Software with Security By Design",
Fraunhofer SIT Technical Reports, July 2014)
◼ Security by Design (in a narrow sense) :
Considering security as early as the design
phase of the software development process.
◼ Security by Design (in a broader sense) :
Systematically organized and methodically
equipped framework that is applied over the
lifecycle of secure software.
Security by Design
(Source: Michael Waidner, Michael Backes, Jörn Müller-Quade, "Development of Secure Software with Security By Design",
Fraunhofer SIT Technical Reports, July 2014)
From the design stage,
optimize to reduce attack surface
as minimal as possible!
3rd Change in Security Env.
Nobody builds everything themselves any more.
So (global) outsourcing is essential!
&
In the industry 4.0 era, enterprise processes
become more digitized.
↓
Need (global) supply chain security!
◼ A supply chain is defined as the global
network of organizations and activities
associated with the flow of goods and
information from the raw materials stage to
the end users.
◼ If the vision of Industry 4.0 is to be realized,
most enterprise processes must become more
digitized.
Global Supply Chain Security
◼ However, due to the heavy automation and
monitoring, end-to-end digitization,
distributed and well-connected components,
supply chain security issues are well known
and exploited to great effect by
cybercriminals.
◼ Industry 4.0 gives the cybercriminal more
opportunity to dig into the top of the supply
chain, reaching into the smart factory through
its dependent actors.
Global Supply Chain Security
Global Supply Chain Security
Global Supply Chain Security
The spark that starts World War III is
not a nuclear bomb,
but a supply chain hack!
Global Supply Chain Security
◼ As seen before, in the era of industry 4.0,
global supply chains may have be more
susceptible to attacks at every stage.
◼ So, vendors need to ensure the integrity of
the supply chain by merging traditional
management practices with auditable,
certifiable system security requirements.
◼ Also, with the help of CC(Common Criteria),
we can greatly reduce the risks associated
with the global supply chain.
Global Supply Chain Security
◼ Usually a large, networked and distributed
secure system like CII is built from a number of
component systems. These components may
be independently developed and evaluated.
◼ Additionally, during design of a large and
complex secure system, one would like to
break up the system into modules which are
small enough to be subject to security analysis,
and then to demonstrate security properties
in the overall system by means of those of
the modules.
Secure Composition
◼ If each of its components satisfies the some
security property, then an entire system
satisfies that security property?
Secure Composition
◼ Unfortunately, secure composition of complex
systems to medium-high assurance levels is
not solved today.
◼ The existing monolithic approaches cannot
cope with the complexity of modern CPS.
◼ certMILS develops a security certification
methodology for complex composable safety-
critical systems.
Secure Composition
Secure Composition
◼ certMILS @ Horizon 2020 Project
4th Change in Security Env.
We will have more than 25 billion connected
devices by 2020!
How to manage it?
Security operations
must be significantly more
automated and manageable!
4th Change in Security Env.
Automation
Automation
Fully autonomous system for finding and fixing security vulnerabilities
@ Smithsonian
Automation
Mayhem @ human game, DefCon 2016
Korea University
◼ However, security automation is NOT AI-
security!
◼ Automation is basically making a H/W or S/W that
is capable of doing things automatically — without
human intervention.
◼ AI(Artificial Intelligence) is a science and
engineering of making intelligent machines. AI is
all about trying to make machines or S/W mimic,
and eventually supersede human behavior and
intelligence. Thus AI can respond and make
decisions according to varying environment
parameters which are NOT known at the time of
design (e.g., zero-day).
Automation
5th Change in Security Env.
Despite our great care for security,
weak spots or vulnerabilities of products
can STILL be found.
&
This situation will become WORSE
in the era of the 4th industrial revolution,
when the number of devices
connected to the Internet increases exponentially.
↓
Crowd sourced security protection : Bug Bounty
◼ Bug Bounty : Companies
pay external ethical
hackers for finding and
reporting vulnerabilities.
◼ The first bug bounty
program dates back to
1983 from operating
system company Hunter
& Ready, Inc.
Bug Bounty
◼ A little over a decade later in 1995, Jarrett
Ridlinghafer, a technical support engineer at
Netscape Communications Corporation
coined the phrase 'Bugs Bounty'.
◼ There are now potentially hundreds of bug
bounty programs in operation.
◼ Google, AT&T, Microsoft, Mozilla, General Motors,
Starbucks, United Airlines and many others.
◼ Even US government departments are getting
in on the act.
Bug Bounty
Bug Bounty
Bug Bounty
Bug Bounty
This means that they already knew it
before the start of the competition!
6th Change in Security Env.
Blockchain is becoming
a key element of
the Industry 4.0 transformation.
↓
Blockchain is NOT a panacea!
◼ So far, key elements of the Industry 4.0
transformation include
◼ 3D printing,
◼ robotizing and automation,
◼ smart factory with IoT and machine learning, and
◼ supply chain digitization.
◼ Now, blockchain, the distributed-ledger
technology behind cryptocurrencies including
Bitcoin, is becoming a key technology driving
this digital revolution.
Blockchain Is NOT Panacea!
Blockchain Is NOT Panacea!
Internet
Decentralized Blockchain Platform
Internet Of Things (IOT)
Artificial Intelligence (AI)
Data Analytics
Business
(Smart City, etc)
◼ One misconception that is commonly spread
about blockchain technology is that it's
completely unhackable.
◼ Blockchain just provides :
◼ Decentralization,
◼ Immutability,
◼ Transparency, and
◼ Availability.
Blockchain Is NOT Panacea!
◼ The major problems that blockchains have is
'privacy' and 'low transaction speed’.
◼ Blockchain technology does not offer much
defensive value beyond the protection of data
integrity and availability.
◼ The wrong use of blockchain for time critical
systems may lead the failure of CIIP.
Blockchain Is NOT Panacea!
◼ Industry 4.0 has made many changes to the
security paradigm of the CII (1/5) :
◼ (No Air-Gap) Do not trust the isolated 'air-gapped'
systems any more!
◼ (Security by Design) The increasing connectivity
and interdependencies make CIIP more and more
complex, and this in turns decreases the efficacy
of security. To cope with complexity, we need
‘Security by Design’.
Summary
◼ Industry 4.0 has made many changes to the
security paradigm of the CII (2/5) :
◼ (Global Supply Chain Security) Outsourcing is
essential and the enterprise manufacturing
processes become more susceptible to cyber
attacks. So we need global supply chain security,
and here CC(Common Criteria) can help to ensure
the integrity of the supply chain.
Summary
◼ Industry 4.0 has made many changes to the
security paradigm of the CII (3/5) :
◼ (Secure Composition) Usually a large, networked
and distributed secure system like CII is built from
a number of component systems. These
components may be independently developed
and evaluated. But, secure composition of
complex systems to medium-high assurance levels
is not solved today.
Summary
◼ Industry 4.0 has made many changes to the
security paradigm of the CII (4/5) :
◼ (Automation) We will have more than 25 billion
connected devices by 2020. Thus the security
operations for CIIP must be more automated and
manageable!
◼ (Bug Bounty) Despite our great care for security,
weak spots or vulnerabilities of product can still
be found. This situation will worsen in the era of
the 4th industrial revolution, when the number of
devices connected to the Internet increases
exponentially. So we need crowd sourced security
protection program, a.k.a. 'Bug Bounty’.
Summary
◼ Industry 4.0 has made many changes to the
security paradigm of the CII (5/5) :
◼ (Limitations of Blockchain) Blockchain is
becoming a key technology driving Industry 4.0.
However, one misconception that is commonly
spread about blockchain technology is that it's
completely unhackable. Blockchain Is not a
panacea!
Summary
New Threat Trends in CII

More Related Content

What's hot

Bci italy conf 17 10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17   10 josh zaroor - black berry athoc presentation sdBci italy conf 17   10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17 10 josh zaroor - black berry athoc presentation sdTheBCI
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingITIIIndustries
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information Phil Griffin
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 

What's hot (16)

Bci italy conf 17 10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17   10 josh zaroor - black berry athoc presentation sdBci italy conf 17   10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17 10 josh zaroor - black berry athoc presentation sd
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone Modeling
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Basic security concepts
Basic security conceptsBasic security concepts
Basic security concepts
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
Cyber security
Cyber securityCyber security
Cyber security
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 

Similar to New Threat Trends in CII(Critical Information Infrastructure)

Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Marketing Türkiye
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...United Security Providers AG
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report Steve Fantauzzo
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxSigfox
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Seungjoo Kim
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 

Similar to New Threat Trends in CII(Critical Information Infrastructure) (20)

Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
16231
1623116231
16231
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 

More from Seungjoo Kim

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리Seungjoo Kim
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. SyllabusSeungjoo Kim
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto BlockchainSeungjoo Kim
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart ContractSeungjoo Kim
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and MetaverseSeungjoo Kim
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other AltcoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark CoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...Seungjoo Kim
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Seungjoo Kim
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCSeungjoo Kim
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessSeungjoo Kim
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsSeungjoo Kim
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Seungjoo Kim
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Seungjoo Kim
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
 

More from Seungjoo Kim (20)

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

New Threat Trends in CII(Critical Information Infrastructure)

  • 2. Contents ◼ Who am I? ◼ What is CII? ◼ What is Industry 4.0? ◼ New Risks of CII in Industry 4.0 ◼ Conclusion & Summary
  • 3. Who am I? ◼ Seungjoo (Gabriel) Kim (金 昇 柱) ◼ 1999. 02 : Ph.D on Cryptography @ Sungkyunkwan Univ. ◼ 1998.12~2004.02 : Team Manager @ KISA (Korea Internet & Security Agency) ◼ 2004.03~2011.02 : Associate Professor @ Sungkyunkwan Univ. ◼ 2011.03~Now : Full Professor @ Department of Cyber Defense, Korea Univ.
  • 4. Who am I? ◼ 2011.03~Now : Co-Founder/Advisory Director of a hacker group, HARU and an international security & hacking conference, SECUINSIDE.
  • 5. Department of Cyber Defense? ◼ Established in 2012 ◼ 30 students / year ◼ Joint educational programs with Korea Army (Cyber Command) ◼ Full Scholarship over Guaranteed Employment ◼ Upon graduation, they are to be commissioned as second lieutenants and must serve in the military for 7 years ◼ Accept top 1% of students in the national college entrance exam (Korean SAT)
  • 6. Department of Cyber Defense? ◼ In 2015 and 2018, our students from Dept. of CYDF at Korea University won the TOP prize at the DEFCON CTF for the first time in Asia!
  • 7. Hacker Group, HARU? ◼ Founded in 2011 ◼ Acronym of “HAckers’ Re-Union” or “HAckers aRe Us” ◼ One of the biggest association of underground hacking groups and communities in Korea ◼ 8+ Honorable Members : ◼ BLACK.PERL (www.bpsec.co.kr), CNSECURITY (www.cnsec.co.kr), FlyHigh, GRAYHASH (BEISTLAB, www.grayhash.com), Hackerschool (www.hackerschool.org), iNET COP (www.inetcop.net), NSHC (www.nshc.net), SEWORKS (Wowhacker, www.seworks.co), etc.
  • 8. Critical Information Infra. ◼ CII : Infrastructure that provides an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. ◼ However, the definition of critical infrastructure varies from country to country and is fluid, as the definition and list of infrastructures deemed to be critical have changed or matured over the time.
  • 9. Critical Information Infra. (Source: Munish Sharma, "Securing Critical Information Infrastructure: Global Perspectives and Practices", April 2017)
  • 11. Industry 4.0 Mechanization, water power, steam power Mass production, assembly line, electrical energy Computer and further automation Cyber Physical Systems
  • 12. ◼ The 4th industrial revolution (Industry 4.0) is transforming the next generation of manufacturing systems by making it smarter, well-connected, self-organized, decentralized, and flexible. ◼ To accelerate this transformation, industrial sectors have planned to commit US$ 907 billion per annum to Industry 4.0. Industry 4.0
  • 13. (e.g.) Digital Twin Digital twin is a S/W representations of assets and processes that are used to understand, predict, and optimize performance in order to achieve improved business outcomes (named one of Gartner's Top 10 Strategic Technology Trends for 2017).
  • 14. (e.g.) Smart Manufacturing (Source: Michele H.Ahuett-Garza and T.Kurfess, "A Brief Discussion on the Trends of Habilitating Technologies for Industry 4.0 and Smart Manufacturing", Manufacturing Letters, Feb 17, 2018) By maximizing SC flexibility, Smart Manufacturing enables mass customization!
  • 15. CII Security in Industry 4.0 ◼ So far, critical infrastructures were isolated and focused on operational safety. Drastically ↓Changed! ◼ However, Industry 4.0 increases the digitalization and connectivity of the industry. ◼ Examples of such inter-connected systems may include traffic monitoring and control systems communicating with smart vehicles, energy related systems communicating with smart homes and smart meters, monitoring systems connected with autonomous sensors in nuclear plants, power grids and body area networks.
  • 16. CII Security in Industry 4.0 ◼ This increasing connectivity and interdependencies between CII elements increases the risk of cyber security threats.
  • 17. CII Security in Industry 4.0 ◼ This increasing connectivity and interdependencies between CII elements increases the risk of cyber security threats. ◼ Risk 1. No air-gap, everything connected! ◼ Risk 2. Increased complexity ◼ Risk 3. Global outsourcing is essential & Enterprise processes become more digitized. ◼ Risk 4. How to manage billions connected devices? ◼ Risk 5. You (one team in one company) can not verify all the products by yourself. ◼ Risk 6. Misconception about blockchain
  • 18. 1st Change in Security Env. No air-gap, everything connected!
  • 20. No Air Gap! British American Security Information Council UK nuclear submarine fleet
  • 21. No Air Gap! Recent suggestions that the fleet is vulnerable have sometimes been met with complacency and claims that the isolated 'air-gapped' systems cannot be penetrated. Whilst we recognize that it is important not to be alarmist, these claims are false.
  • 22. No Air Gap! Malware injection during manufacturing(a.k.a supply chain), mid-life refurbishment or software updates and data transmission interception allow potential adversaries to conduct long-term cyber operations.
  • 26. 2nd Change in Security Env. CIIP in Industry 4.0 era. becomes more and more complex with increased maintenance costs.
  • 27. ◼ Because of the increasing connectivity and interdependencies, CIIP in Industry 4.0 era. becomes more and more complex with increased maintenance costs. ◼ Increasing new IT services ◼ Increasing usage of common COTS software ◼ Increasing integration and information flows between systems ◼ Heavily connected to other IT services ◼ Even connected to INTERNET Security by Design
  • 28. ◼ This in turns decreases the efficacy of security. Security by Design First Law of Software Quality e = mc2 errors = (more code)2 or (more connected)2
  • 29. ◼ CIIP in Industry 4.0 era. becomes more and more complex with increased maintenance costs. ◼ This in turns decreases the efficacy of security. ↓ ◼ Need ‘Security by Design’ to cope with complexity! Security by Design
  • 30. ◼ Security by Design (in a narrow sense) : Considering security as early as the design phase of the software development process. ◼ Security by Design (in a broader sense) : Systematically organized and methodically equipped framework that is applied over the lifecycle of secure software. Security by Design (Source: Michael Waidner, Michael Backes, Jörn Müller-Quade, "Development of Secure Software with Security By Design", Fraunhofer SIT Technical Reports, July 2014)
  • 31. ◼ Security by Design (in a narrow sense) : Considering security as early as the design phase of the software development process. ◼ Security by Design (in a broader sense) : Systematically organized and methodically equipped framework that is applied over the lifecycle of secure software. Security by Design (Source: Michael Waidner, Michael Backes, Jörn Müller-Quade, "Development of Secure Software with Security By Design", Fraunhofer SIT Technical Reports, July 2014) From the design stage, optimize to reduce attack surface as minimal as possible!
  • 32. 3rd Change in Security Env. Nobody builds everything themselves any more. So (global) outsourcing is essential! & In the industry 4.0 era, enterprise processes become more digitized. ↓ Need (global) supply chain security!
  • 33. ◼ A supply chain is defined as the global network of organizations and activities associated with the flow of goods and information from the raw materials stage to the end users. ◼ If the vision of Industry 4.0 is to be realized, most enterprise processes must become more digitized. Global Supply Chain Security
  • 34. ◼ However, due to the heavy automation and monitoring, end-to-end digitization, distributed and well-connected components, supply chain security issues are well known and exploited to great effect by cybercriminals. ◼ Industry 4.0 gives the cybercriminal more opportunity to dig into the top of the supply chain, reaching into the smart factory through its dependent actors. Global Supply Chain Security
  • 36. Global Supply Chain Security The spark that starts World War III is not a nuclear bomb, but a supply chain hack!
  • 38. ◼ As seen before, in the era of industry 4.0, global supply chains may have be more susceptible to attacks at every stage. ◼ So, vendors need to ensure the integrity of the supply chain by merging traditional management practices with auditable, certifiable system security requirements. ◼ Also, with the help of CC(Common Criteria), we can greatly reduce the risks associated with the global supply chain. Global Supply Chain Security
  • 39. ◼ Usually a large, networked and distributed secure system like CII is built from a number of component systems. These components may be independently developed and evaluated. ◼ Additionally, during design of a large and complex secure system, one would like to break up the system into modules which are small enough to be subject to security analysis, and then to demonstrate security properties in the overall system by means of those of the modules. Secure Composition
  • 40. ◼ If each of its components satisfies the some security property, then an entire system satisfies that security property? Secure Composition
  • 41. ◼ Unfortunately, secure composition of complex systems to medium-high assurance levels is not solved today. ◼ The existing monolithic approaches cannot cope with the complexity of modern CPS. ◼ certMILS develops a security certification methodology for complex composable safety- critical systems. Secure Composition
  • 42. Secure Composition ◼ certMILS @ Horizon 2020 Project
  • 43. 4th Change in Security Env. We will have more than 25 billion connected devices by 2020! How to manage it?
  • 44. Security operations must be significantly more automated and manageable! 4th Change in Security Env.
  • 46. Automation Fully autonomous system for finding and fixing security vulnerabilities @ Smithsonian
  • 47. Automation Mayhem @ human game, DefCon 2016 Korea University
  • 48. ◼ However, security automation is NOT AI- security! ◼ Automation is basically making a H/W or S/W that is capable of doing things automatically — without human intervention. ◼ AI(Artificial Intelligence) is a science and engineering of making intelligent machines. AI is all about trying to make machines or S/W mimic, and eventually supersede human behavior and intelligence. Thus AI can respond and make decisions according to varying environment parameters which are NOT known at the time of design (e.g., zero-day). Automation
  • 49. 5th Change in Security Env. Despite our great care for security, weak spots or vulnerabilities of products can STILL be found. & This situation will become WORSE in the era of the 4th industrial revolution, when the number of devices connected to the Internet increases exponentially. ↓ Crowd sourced security protection : Bug Bounty
  • 50. ◼ Bug Bounty : Companies pay external ethical hackers for finding and reporting vulnerabilities. ◼ The first bug bounty program dates back to 1983 from operating system company Hunter & Ready, Inc. Bug Bounty
  • 51. ◼ A little over a decade later in 1995, Jarrett Ridlinghafer, a technical support engineer at Netscape Communications Corporation coined the phrase 'Bugs Bounty'. ◼ There are now potentially hundreds of bug bounty programs in operation. ◼ Google, AT&T, Microsoft, Mozilla, General Motors, Starbucks, United Airlines and many others. ◼ Even US government departments are getting in on the act. Bug Bounty
  • 54. Bug Bounty This means that they already knew it before the start of the competition!
  • 55. 6th Change in Security Env. Blockchain is becoming a key element of the Industry 4.0 transformation. ↓ Blockchain is NOT a panacea!
  • 56. ◼ So far, key elements of the Industry 4.0 transformation include ◼ 3D printing, ◼ robotizing and automation, ◼ smart factory with IoT and machine learning, and ◼ supply chain digitization. ◼ Now, blockchain, the distributed-ledger technology behind cryptocurrencies including Bitcoin, is becoming a key technology driving this digital revolution. Blockchain Is NOT Panacea!
  • 57. Blockchain Is NOT Panacea! Internet Decentralized Blockchain Platform Internet Of Things (IOT) Artificial Intelligence (AI) Data Analytics Business (Smart City, etc)
  • 58. ◼ One misconception that is commonly spread about blockchain technology is that it's completely unhackable. ◼ Blockchain just provides : ◼ Decentralization, ◼ Immutability, ◼ Transparency, and ◼ Availability. Blockchain Is NOT Panacea!
  • 59. ◼ The major problems that blockchains have is 'privacy' and 'low transaction speed’. ◼ Blockchain technology does not offer much defensive value beyond the protection of data integrity and availability. ◼ The wrong use of blockchain for time critical systems may lead the failure of CIIP. Blockchain Is NOT Panacea!
  • 60. ◼ Industry 4.0 has made many changes to the security paradigm of the CII (1/5) : ◼ (No Air-Gap) Do not trust the isolated 'air-gapped' systems any more! ◼ (Security by Design) The increasing connectivity and interdependencies make CIIP more and more complex, and this in turns decreases the efficacy of security. To cope with complexity, we need ‘Security by Design’. Summary
  • 61. ◼ Industry 4.0 has made many changes to the security paradigm of the CII (2/5) : ◼ (Global Supply Chain Security) Outsourcing is essential and the enterprise manufacturing processes become more susceptible to cyber attacks. So we need global supply chain security, and here CC(Common Criteria) can help to ensure the integrity of the supply chain. Summary
  • 62. ◼ Industry 4.0 has made many changes to the security paradigm of the CII (3/5) : ◼ (Secure Composition) Usually a large, networked and distributed secure system like CII is built from a number of component systems. These components may be independently developed and evaluated. But, secure composition of complex systems to medium-high assurance levels is not solved today. Summary
  • 63. ◼ Industry 4.0 has made many changes to the security paradigm of the CII (4/5) : ◼ (Automation) We will have more than 25 billion connected devices by 2020. Thus the security operations for CIIP must be more automated and manageable! ◼ (Bug Bounty) Despite our great care for security, weak spots or vulnerabilities of product can still be found. This situation will worsen in the era of the 4th industrial revolution, when the number of devices connected to the Internet increases exponentially. So we need crowd sourced security protection program, a.k.a. 'Bug Bounty’. Summary
  • 64. ◼ Industry 4.0 has made many changes to the security paradigm of the CII (5/5) : ◼ (Limitations of Blockchain) Blockchain is becoming a key technology driving Industry 4.0. However, one misconception that is commonly spread about blockchain technology is that it's completely unhackable. Blockchain Is not a panacea! Summary