SlideShare a Scribd company logo
【內部使用】
Cyber Security Overview of
Taiwan
Jan-Ming Ho
Consultant to the Executive Yuan (Cabinet)
Taiwan
Information provided by NCCST, III and TIER
1
Defense-in-Depth Deployment Towards
Government-wide Situation Awareness
● Build government-wide situation awareness of cyber security
● Promote Public-private-partnership for better decision making
External
Threat
Existing
Vulnerability
Regulation
Compliance
Incident
Handling
1st Tier
MSSP
2nd Tier
G-SOC
3rd Tier
NICST
Actionable Intelligence
Government-Wide Situation Awareness
National-Level Decision Making Support
Co-defense
Detection Rule
Trend Statistics Classification Data Modeling Prediction
Monitoring
Data
2
Early
Warning
Early
Warning
A Hierarchical Organization
National
CERT
National
ISAC
National
SOC
Domain CERT
Domain
ISAC
Domain SOC
CSIRT A
Enterprise A
CSIRT B
Enterprise B
CSIRT CSOC C
Enterprise C
MSSP
Early warning
Aide/Assistant
持續監控
Domain Situation Awareness
Situation Awareness at
National Level
M
Continuous
Monitoring
Event
Notification
Event
Notification
Continuous
Monitoring
Continuous
Monitoring
3
Cabinet Level Taskforce
National Information and Communication
Security Taskforce
Convener: Vice Premier
Deputy Convener: Minister Without Portfolio
Minister of Ministry of Science and Technology
Co-Deputy-Convener: Senior Advisor to the President
Standard and Norm WG
Ministry of Economic Affairs
Education and HR WG
Ministry of Education
Audit WG
Ministry of Science and
Technology
Government Info &
Communication Security WG
Ministry of Science and
Technology
Cyberspace
Protection System
Ministry of Science and
Technology
Personal Info. Protection & Legal
System WG
Ministry of Justice
Cybercrime Prevention WG
Ministry of Interior
Cyber Environment Security WG
National Communication
Commission
National Center for
Cyber Security
Technology
Sub Working Group
National Defense(Ministry of National Defense)
e-Government(National Development Council)
Telecom(National Communication Commission)
Transportation(Ministry of Transportation)
Finance(Ministry of Finance)
Banking(Financial Supervisory Commission)
Healthcare(Ministry of Health and Welfare )
Cybercrime
Investigative System
Ministry of Justice
Ministry of Interior
NICST Secretariat
Office of Information and
Communication Security, EY
CIP System
Office of
Homeland
Security, EY
Other
System
Effected 2016/01/20
4
Threat Intelligence, Analysis and
Sharing
4
Botnet
APT
Malware
SPAM
ThreatPrecursorAnalysis
ThreatIntelligenceGeneration
InformationSharing
Gov. Agencies
3,039 Agencies
CIIP Authorities
Telecom (NCC)/Banking(FSC)
Utilities & e-Commerce(MOEA)
Internet Service Provider
Gov.(GSN) /Academic
(TANET) /All private ISPs
MSSP
Chunghwa Telecom/Acer
TradeVAN/ISSDU, etc
International Cooperation
FIRST/APCERT/US-CERT
CERT-EU…etc
HoneyBEAR
HoneyNET
Botnet Tracer
G-ISAC
Government Information
Sharing and Analysis Center
G-SOC
Legend
HoneyBEAR: Behavior-based Email Anomaly Reconnaissance
NCC:National Communication Commission
FSC:Financial Supervisory Commission
MOEA:Ministry of Economic Affairs
GSN:Government Service Network
MSSP: Managed Security Service Provider
FIRST: Forum for Incident Response and Security Teams
Indicators
Of
Compromise
5
Law and Regulation in progress,
Focusing on CIIP
ICT Security
Management Act and
Enforcement Rules
CIIP Steering Group
G-ISMS
CI Sector Specific
Guidelines
Common Baseline
Of CIIP
Utility
Water
Transportation
High Tech
Parks
Banking
& Finance
Comm. &
Broadcasting
Medical
CI Cyber Security
Committees
Law Supervise
Helpdefine
Provide
References Provide references
Define
CI Cyber Security Promotion Mechanisms
CI Sectors
Join
Execution
Government
ISMS Framework
• CIIP Steering Group is formed by NICST and MOST
• CI Cyber Security Committees is led by competent authority of that CI sector
Government
6
PPP in Taiwan
I
n
s
t
i
t
u
t
i
o
n
s
G
o
v
GSN Op Team/ CEPD (2010/1)
MOI (2011/8)
DOJ (2012/3)
I
S
A
C
G-ISAC (2009/11)
NCC-ISAC (2010/2)
TWNIC (2010/2)
A-ISAC (2010/4)
F-ISAC (2017/4)
C
E
R
T
EC-CERT (2011/1)
TWCERT/CC (2015/1)
TWCSIRT (2016/1)
G
e
n
I
S
I
n
d
Trend Micro (2013/8)
FORTINET (2014/9)
ISSDU ( 2010/10)
CHT (2010/11)
ACER (2010/11)
TRADEVAN (2010/11)
AKER (2011/11)
2011/1/1 ~ 2016/6/30
60,980
135,527
84,210
107,405
76,757
33,374
79,260
144,079
90,311
112,516
84,027
36,749
0
20000
40000
60000
80000
100000
120000
140000
160000
100 101 102 103 104 105 (Q2)
ANA
EWA
INT
DEF
FBI
Total
Info Sharing
2011 2012 2013 2014 2015 2016
Regional Collaborations
● APEC as the major platform
–APCERT (Asia Pacific Computer Emergency
Response Team)
–APWG (Anti-Phishing Working Group)
–AVAR (Association of anti-Virus Asia Researchers)
–FIRST (Forum of Incident Response and Security
Teams)
● Regular interaction with other countries
–G-ISAC
–TWCERT
–JPCERT/CC, MyCERT KrCERT/CC
CYBERSECURITY ECONOMY IN
TAIWAN
Total
% of IS
Events
Virus
Data
Theft
Malicious
Ware
DDOS
Hack/
Deface
Equip
Damage
Subtotal 22.26% 52.77% 5.58% 32.11% 15.34% 10.52% 7.85%
Industry 12.20% 66.90% 20.50% 41.70% 22.80% 17.30% 17.30%
Gov Inst 21.97% 41.12% 0.93% 13.40% 3.12% 9.66% 8.41%
Schools 32.70% 58.50% 4.40% 46.20% 24.10% 8.80% 3.80%
Information Security Threats
10
Network Attacks on IoT and ICS
● Industrial control systems and IoT has become the
target of network attack
● Honeynet deployed by NCCST
– 28M events detected and 50K malware per year in the last 3
years, mainly from US, Russia, and China
– 180M events detected in 2016 and 110K malware
– Brute-force attack targeted at IoT devices has been increasing
dramatically
11
Online Threats of Botnets
● 2015/10 – 2016/5, NCCST analyzed and identified
40,249 IoT/ICS being hacked
– A botnet distributed across 154 countries
– Informed 18 national CERTs
– More than 6,000 machines, total value US$4M
– 5G devices, heat pump controller, smart meters, IPC, DVR,
Web Camera, Router, Wi-Fi Aps and Set-Top Box, etc
– 160 companies including 10 in Taiwan
5G telco devices Industrial process
controller
Smart meters
Heat pump
controller
Taiwan IS Industry Value Chain in 2013
12
Data Center
Service Provider
New App. (device, forensic, vehicular)
Dealer
.5B
Digital Forensic
Product Makers
Encryption, AIO, content, threat,
system, ID management
.13B
Import
Logististic
.013B
E
G
IS Insurance
E
G
Personal Users
Wholesale
.017B
IS Service Providers
SI, Consultant, Training,
Digital Forensic, etc.
.163B
SI
Enterprise and Government
Telco
CHT, TWM,
FETNET, etc.
Outsourcing
Acer, CHT,
Tradevan,
ISSDU, etc.
Sales Agencies .82B
2014 2015 2016 (e) 2017 (f) 2018 (f)
台灣市場規模 312 353 393 432 469
成長率 12.2% 13.2% 11.4% 9.7% 8.5%
0%
2%
4%
6%
8%
10%
12%
14%
0
50
100
150
200
250
300
350
400
450
500
IS Market in Taiwan
CAGR: 10.7%
Market Size
Growth Rate
1.04B 1.18B 1.31B 1.44B 1.18B
Examples of IS Companies
● Amorize
–Scanning open source vulnerability
–Proofpoint in 2013
● Xecure Lab
–Detecting and defending APT
–Verint in 2014
● Broadweb
–IPS ( Intrusion Prevention ) and DPI ( Deep Packet
Inspection )
–Trend Micro in
Taiwan IS Industry
● Encryption and Digital Forensic
– NST, WatchSoft, Sinpao, ISSDU, iForensic, etc
● Identity and Access Control
– Ecomuniversal, ARES, ChangingTec Foongtong, NST, Esecure, NewImage, etc.
● Cloud Securtiy
– T Cloud Computing (TrendMicro), Abocom, Hgiga, etc.
● Total solutions
– Zyxel, BroadWeb (TrendMicro), Abocom, HGiga, Sinpao, Axtronics, etc.
● System Integrator
– ACER, Stark Tech Inc, Bestcom, SYSCOM, Zero One Tech, SYSAGE, Ringline,
ARES, Fortune, CGS, Tradevan, etc.
● Outsourcing
– CHT, ACER, SYSCOM, Trend Micro, etc
● Insurance
– Fubon, FIRST Bank, AIG, etc

More Related Content

What's hot

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Abbie Barbir
 
State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018
Mediatelecom
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Positive Hack Days
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Benjamin Ang
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
Chinatu Uzuegbu
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Mohamed Jean-Philippe Sangaré
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
John Gilligan
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
NISIInstituut
 

What's hot (9)

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
Virtual and augmented reality speech @Wsis forum 2018 high level track outcom...
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 

Similar to WCIT 2016 Jan Ming Ho

CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
resultsig
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
Felipe Lamus
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
IOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in TaiwanIOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in Taiwan
Agence du Numérique (AdN)
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Adrian Mikeliunas
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
Kyna Tsai
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)
Frank Chee-Da TSAI (蔡其達)
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
ADGP, Public Grivences, Bangalore
 
HLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrowHLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrow
ADGP, Public Grivences, Bangalore
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
James Bryce Clark
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident management
DATA SECURITY SOLUTIONS
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
Neil Dave
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
Danie Schoeman
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
Team Finland Future Watch
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
Richardus Indrajit
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
Antoine Vigneron
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness Profiles
ICT Watch
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
ITU
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf online
Cade Zvavanjanja
 

Similar to WCIT 2016 Jan Ming Ho (20)

CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
IOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in TaiwanIOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in Taiwan
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
 
HLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrowHLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrow
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident management
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness Profiles
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf online
 

More from Roberto C. Mayer

Versa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspectsVersa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspects
Roberto C. Mayer
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introduction
Roberto C. Mayer
 
Versa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitchVersa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitch
Roberto C. Mayer
 
2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidade2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidade
Roberto C. Mayer
 
WCIT 2016 Calls to Action
WCIT 2016 Calls to ActionWCIT 2016 Calls to Action
WCIT 2016 Calls to Action
Roberto C. Mayer
 
2016 WCIT Vint Cerf
2016 WCIT Vint Cerf2016 WCIT Vint Cerf
2016 WCIT Vint Cerf
Roberto C. Mayer
 
WCIT 2016 Soumitra Dutta
WCIT 2016 Soumitra DuttaWCIT 2016 Soumitra Dutta
WCIT 2016 Soumitra Dutta
Roberto C. Mayer
 
WCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo GallindoWCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo Gallindo
Roberto C. Mayer
 
WCIT 2016 Manu Bhardwaj
WCIT 2016 Manu BhardwajWCIT 2016 Manu Bhardwaj
WCIT 2016 Manu Bhardwaj
Roberto C. Mayer
 
WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2 WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2
Roberto C. Mayer
 
WCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar RibeiroWCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar Ribeiro
Roberto C. Mayer
 
WCIT 2016 George Newstrom
WCIT 2016 George NewstromWCIT 2016 George Newstrom
WCIT 2016 George Newstrom
Roberto C. Mayer
 
WCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee JrWCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee Jr
Roberto C. Mayer
 
WCIT 2016 Dr. Ming Ji Wu
WCIT 2016 Dr. Ming Ji WuWCIT 2016 Dr. Ming Ji Wu
WCIT 2016 Dr. Ming Ji Wu
Roberto C. Mayer
 
WCIT Anupan Chander 1
WCIT Anupan Chander 1WCIT Anupan Chander 1
WCIT Anupan Chander 1
Roberto C. Mayer
 
WCIT 2016 Amy Aussieker
WCIT 2016 Amy AussiekerWCIT 2016 Amy Aussieker
WCIT 2016 Amy Aussieker
Roberto C. Mayer
 
WCIT 2016 Aline Sordilli
WCIT 2016 Aline SordilliWCIT 2016 Aline Sordilli
WCIT 2016 Aline Sordilli
Roberto C. Mayer
 
2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-results2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-results
Roberto C. Mayer
 
2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência Química2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência Química
Roberto C. Mayer
 
Cloud iot novos requisitos software
Cloud iot novos requisitos softwareCloud iot novos requisitos software
Cloud iot novos requisitos software
Roberto C. Mayer
 

More from Roberto C. Mayer (20)

Versa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspectsVersa cloud slide-deck-03-security-aspects
Versa cloud slide-deck-03-security-aspects
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introduction
 
Versa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitchVersa cloud slide-deck-01-pitch
Versa cloud slide-deck-01-pitch
 
2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidade2017 11-26-sete-chaves-da-oracao-da-serenidade
2017 11-26-sete-chaves-da-oracao-da-serenidade
 
WCIT 2016 Calls to Action
WCIT 2016 Calls to ActionWCIT 2016 Calls to Action
WCIT 2016 Calls to Action
 
2016 WCIT Vint Cerf
2016 WCIT Vint Cerf2016 WCIT Vint Cerf
2016 WCIT Vint Cerf
 
WCIT 2016 Soumitra Dutta
WCIT 2016 Soumitra DuttaWCIT 2016 Soumitra Dutta
WCIT 2016 Soumitra Dutta
 
WCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo GallindoWCIT 2016 Sérgio Paulo Gallindo
WCIT 2016 Sérgio Paulo Gallindo
 
WCIT 2016 Manu Bhardwaj
WCIT 2016 Manu BhardwajWCIT 2016 Manu Bhardwaj
WCIT 2016 Manu Bhardwaj
 
WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2 WCIT 2016 Manu Bhardwaj 2
WCIT 2016 Manu Bhardwaj 2
 
WCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar RibeiroWCIT 2016 Julio Cesar Ribeiro
WCIT 2016 Julio Cesar Ribeiro
 
WCIT 2016 George Newstrom
WCIT 2016 George NewstromWCIT 2016 George Newstrom
WCIT 2016 George Newstrom
 
WCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee JrWCIT 2016 Dr. William P. Magee Jr
WCIT 2016 Dr. William P. Magee Jr
 
WCIT 2016 Dr. Ming Ji Wu
WCIT 2016 Dr. Ming Ji WuWCIT 2016 Dr. Ming Ji Wu
WCIT 2016 Dr. Ming Ji Wu
 
WCIT Anupan Chander 1
WCIT Anupan Chander 1WCIT Anupan Chander 1
WCIT Anupan Chander 1
 
WCIT 2016 Amy Aussieker
WCIT 2016 Amy AussiekerWCIT 2016 Amy Aussieker
WCIT 2016 Amy Aussieker
 
WCIT 2016 Aline Sordilli
WCIT 2016 Aline SordilliWCIT 2016 Aline Sordilli
WCIT 2016 Aline Sordilli
 
2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-results2016 it-census-2015-edition-main-results
2016 it-census-2015-edition-main-results
 
2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência Química2016-08-31 Comorbidades e a Dependência Química
2016-08-31 Comorbidades e a Dependência Química
 
Cloud iot novos requisitos software
Cloud iot novos requisitos softwareCloud iot novos requisitos software
Cloud iot novos requisitos software
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

WCIT 2016 Jan Ming Ho

  • 1. 【內部使用】 Cyber Security Overview of Taiwan Jan-Ming Ho Consultant to the Executive Yuan (Cabinet) Taiwan Information provided by NCCST, III and TIER
  • 2. 1 Defense-in-Depth Deployment Towards Government-wide Situation Awareness ● Build government-wide situation awareness of cyber security ● Promote Public-private-partnership for better decision making External Threat Existing Vulnerability Regulation Compliance Incident Handling 1st Tier MSSP 2nd Tier G-SOC 3rd Tier NICST Actionable Intelligence Government-Wide Situation Awareness National-Level Decision Making Support Co-defense Detection Rule Trend Statistics Classification Data Modeling Prediction Monitoring Data
  • 3. 2 Early Warning Early Warning A Hierarchical Organization National CERT National ISAC National SOC Domain CERT Domain ISAC Domain SOC CSIRT A Enterprise A CSIRT B Enterprise B CSIRT CSOC C Enterprise C MSSP Early warning Aide/Assistant 持續監控 Domain Situation Awareness Situation Awareness at National Level M Continuous Monitoring Event Notification Event Notification Continuous Monitoring Continuous Monitoring
  • 4. 3 Cabinet Level Taskforce National Information and Communication Security Taskforce Convener: Vice Premier Deputy Convener: Minister Without Portfolio Minister of Ministry of Science and Technology Co-Deputy-Convener: Senior Advisor to the President Standard and Norm WG Ministry of Economic Affairs Education and HR WG Ministry of Education Audit WG Ministry of Science and Technology Government Info & Communication Security WG Ministry of Science and Technology Cyberspace Protection System Ministry of Science and Technology Personal Info. Protection & Legal System WG Ministry of Justice Cybercrime Prevention WG Ministry of Interior Cyber Environment Security WG National Communication Commission National Center for Cyber Security Technology Sub Working Group National Defense(Ministry of National Defense) e-Government(National Development Council) Telecom(National Communication Commission) Transportation(Ministry of Transportation) Finance(Ministry of Finance) Banking(Financial Supervisory Commission) Healthcare(Ministry of Health and Welfare ) Cybercrime Investigative System Ministry of Justice Ministry of Interior NICST Secretariat Office of Information and Communication Security, EY CIP System Office of Homeland Security, EY Other System Effected 2016/01/20
  • 5. 4 Threat Intelligence, Analysis and Sharing 4 Botnet APT Malware SPAM ThreatPrecursorAnalysis ThreatIntelligenceGeneration InformationSharing Gov. Agencies 3,039 Agencies CIIP Authorities Telecom (NCC)/Banking(FSC) Utilities & e-Commerce(MOEA) Internet Service Provider Gov.(GSN) /Academic (TANET) /All private ISPs MSSP Chunghwa Telecom/Acer TradeVAN/ISSDU, etc International Cooperation FIRST/APCERT/US-CERT CERT-EU…etc HoneyBEAR HoneyNET Botnet Tracer G-ISAC Government Information Sharing and Analysis Center G-SOC Legend HoneyBEAR: Behavior-based Email Anomaly Reconnaissance NCC:National Communication Commission FSC:Financial Supervisory Commission MOEA:Ministry of Economic Affairs GSN:Government Service Network MSSP: Managed Security Service Provider FIRST: Forum for Incident Response and Security Teams Indicators Of Compromise
  • 6. 5 Law and Regulation in progress, Focusing on CIIP ICT Security Management Act and Enforcement Rules CIIP Steering Group G-ISMS CI Sector Specific Guidelines Common Baseline Of CIIP Utility Water Transportation High Tech Parks Banking & Finance Comm. & Broadcasting Medical CI Cyber Security Committees Law Supervise Helpdefine Provide References Provide references Define CI Cyber Security Promotion Mechanisms CI Sectors Join Execution Government ISMS Framework • CIIP Steering Group is formed by NICST and MOST • CI Cyber Security Committees is led by competent authority of that CI sector Government
  • 7. 6 PPP in Taiwan I n s t i t u t i o n s G o v GSN Op Team/ CEPD (2010/1) MOI (2011/8) DOJ (2012/3) I S A C G-ISAC (2009/11) NCC-ISAC (2010/2) TWNIC (2010/2) A-ISAC (2010/4) F-ISAC (2017/4) C E R T EC-CERT (2011/1) TWCERT/CC (2015/1) TWCSIRT (2016/1) G e n I S I n d Trend Micro (2013/8) FORTINET (2014/9) ISSDU ( 2010/10) CHT (2010/11) ACER (2010/11) TRADEVAN (2010/11) AKER (2011/11) 2011/1/1 ~ 2016/6/30 60,980 135,527 84,210 107,405 76,757 33,374 79,260 144,079 90,311 112,516 84,027 36,749 0 20000 40000 60000 80000 100000 120000 140000 160000 100 101 102 103 104 105 (Q2) ANA EWA INT DEF FBI Total Info Sharing 2011 2012 2013 2014 2015 2016
  • 8. Regional Collaborations ● APEC as the major platform –APCERT (Asia Pacific Computer Emergency Response Team) –APWG (Anti-Phishing Working Group) –AVAR (Association of anti-Virus Asia Researchers) –FIRST (Forum of Incident Response and Security Teams) ● Regular interaction with other countries –G-ISAC –TWCERT –JPCERT/CC, MyCERT KrCERT/CC
  • 10. Total % of IS Events Virus Data Theft Malicious Ware DDOS Hack/ Deface Equip Damage Subtotal 22.26% 52.77% 5.58% 32.11% 15.34% 10.52% 7.85% Industry 12.20% 66.90% 20.50% 41.70% 22.80% 17.30% 17.30% Gov Inst 21.97% 41.12% 0.93% 13.40% 3.12% 9.66% 8.41% Schools 32.70% 58.50% 4.40% 46.20% 24.10% 8.80% 3.80% Information Security Threats
  • 11. 10 Network Attacks on IoT and ICS ● Industrial control systems and IoT has become the target of network attack ● Honeynet deployed by NCCST – 28M events detected and 50K malware per year in the last 3 years, mainly from US, Russia, and China – 180M events detected in 2016 and 110K malware – Brute-force attack targeted at IoT devices has been increasing dramatically
  • 12. 11 Online Threats of Botnets ● 2015/10 – 2016/5, NCCST analyzed and identified 40,249 IoT/ICS being hacked – A botnet distributed across 154 countries – Informed 18 national CERTs – More than 6,000 machines, total value US$4M – 5G devices, heat pump controller, smart meters, IPC, DVR, Web Camera, Router, Wi-Fi Aps and Set-Top Box, etc – 160 companies including 10 in Taiwan 5G telco devices Industrial process controller Smart meters Heat pump controller
  • 13. Taiwan IS Industry Value Chain in 2013 12 Data Center Service Provider New App. (device, forensic, vehicular) Dealer .5B Digital Forensic Product Makers Encryption, AIO, content, threat, system, ID management .13B Import Logististic .013B E G IS Insurance E G Personal Users Wholesale .017B IS Service Providers SI, Consultant, Training, Digital Forensic, etc. .163B SI Enterprise and Government Telco CHT, TWM, FETNET, etc. Outsourcing Acer, CHT, Tradevan, ISSDU, etc. Sales Agencies .82B
  • 14. 2014 2015 2016 (e) 2017 (f) 2018 (f) 台灣市場規模 312 353 393 432 469 成長率 12.2% 13.2% 11.4% 9.7% 8.5% 0% 2% 4% 6% 8% 10% 12% 14% 0 50 100 150 200 250 300 350 400 450 500 IS Market in Taiwan CAGR: 10.7% Market Size Growth Rate 1.04B 1.18B 1.31B 1.44B 1.18B
  • 15. Examples of IS Companies ● Amorize –Scanning open source vulnerability –Proofpoint in 2013 ● Xecure Lab –Detecting and defending APT –Verint in 2014 ● Broadweb –IPS ( Intrusion Prevention ) and DPI ( Deep Packet Inspection ) –Trend Micro in
  • 16. Taiwan IS Industry ● Encryption and Digital Forensic – NST, WatchSoft, Sinpao, ISSDU, iForensic, etc ● Identity and Access Control – Ecomuniversal, ARES, ChangingTec Foongtong, NST, Esecure, NewImage, etc. ● Cloud Securtiy – T Cloud Computing (TrendMicro), Abocom, Hgiga, etc. ● Total solutions – Zyxel, BroadWeb (TrendMicro), Abocom, HGiga, Sinpao, Axtronics, etc. ● System Integrator – ACER, Stark Tech Inc, Bestcom, SYSCOM, Zero One Tech, SYSAGE, Ringline, ARES, Fortune, CGS, Tradevan, etc. ● Outsourcing – CHT, ACER, SYSCOM, Trend Micro, etc ● Insurance – Fubon, FIRST Bank, AIG, etc

Editor's Notes

  1. NCCST: National Center for Cyber Security Technology CVE - Common Vulnerabilities and Exposures (CVE)
  2. NICST: National Information and Communication Security Taskforce BOST: Board of Science and Technology MSSP:  Managed Security Service Provider
  3. NICST: National Information and Communication Security Taskforce CIP: critical infrastructure protection?
  4. APT: advanced persistent threat CIIP: Critical Information Infrastructure Protection MSSP: Managed Security Service Provider G-SOC: Government Security Operations Center G-ISAC: Government Information Sharing and Analysis Center
  5. 總共 19 名會員 (12 機關,7 一般)
  6. 註:資安中心與國發會、教育部及通傳會合作,將蜜網系統(Honeynet)佈建於GSN、TANET及民間ISP網路,對發生於網際網路之網路攻擊行為進行偵測分析
  7. 在產業鏈方面,資訊安全產品是從製造端透過流通業者,以各種流通管道提供給產品使用者,在國內產品製造商方面,估計2013年國內自行研發產值約有39.5億元,約97.76%委由國內代理商經營,而直接售給客戶的為個人占0.47%、企業占0.87%及政府的0.43%,其餘透過資安服務業及流通業者作加值服務,顯見國內自行研發的資安產品銷售管道由多元轉為集中代理制度,系統整合商擔任供需橋樑的角色也逐漸被取代。在複式代理方面,總國外進口代理規模約有147.6億元新台幣之高,其產業鏈中產品的販賣通道的主軸與本國製造商略有不同,其銷售管道主要集中在直接銷售至企業與政府部門別最高有,分別占59.75%和28.46%,顯見大企業和政府部門對於國外產品的使用比率高於國內產品。而經銷業者占了10.24%。 Encryption: NST 網安科技, WatchSoft 華鉅科技, Sinpao鈊保科技, Digital. Forensic: ISSDU 數聯資安, iForensic 鑒真數位, etc Identity and Access Control: Ecomuniversal 異康科技, ARES 資通電腦, ChangingTec 全景軟體, Foongtong 宏通數碼科技, NST 網安科技, Esecure 欣領航科技, NewImage 影像電腦 Cloud Securtiy: T Cloud Computing 騰雲科技 (TrendMicro), Abocom 友旺科技, HGiga 桓基科技, Integrated Solutions: Zyxel 合勤科技, BroadWeb (威播科技, 黃能富, TrendMicro), Abocom 友旺科技, HGiga 桓基科技, Sinpao鈊保科技, Import: CA, IBM, Success: Amorize/Proofpoint (open source scanning), Xecure/Verint, BroadWeb/TrendMicro
  8. 隨著網際網路行動化及雲端化發展,加上個資法實施及資安事件新聞頻傳,持續推升國內市場在資安產品與服務的需求 受惠於雲端與行動等新興應用資安需求浮現,台灣資安市場規模從2014年312億元新台幣,以年複合成長率約10.7%的速度成長至2018年469億元新台幣 備註:單位為億新台幣 資料來源:MIC,2016年5月