• No results found

State of RP Cyber Security

N/A
N/A
Protected

Academic year: 2021

Share "State of RP Cyber Security"

Copied!
40
0
0

Loading.... (view fulltext now)

Full text

(1)

1

1

State of RP Cyber Security

State of RP Cyber Security

Office of the

President

of the Philippines

Malacanang

4

th

ARF Seminar on Cyber Terrorism

Busan, South Korea

(2)

Backgrounder

Backgrounder

DEMOGRAPHIC INFORMATION

Size:

300,000 sq km

land:

298,170 sq km

water:

1,830 sq km

7,100 islands

82 million population

13 international gateways

(airports)

30 major seaports

Democratic Form of

Government

Ø

16 Regions

Ø

110 provinces

Ø

60 cities

(3)

3

3

State of RP Cyber Security

State of RP Cyber Security

n

n

Republic of the Philippines: An Overview

Republic of the Philippines: An Overview

n

n

Status of the RP Internet and Cyber

Status of the RP Internet and Cyber

Incidents

Incidents

n

n

Internet Threat Reports on RP

Internet Threat Reports on RP

n

n

Assessment of RP Cyber Defense

Assessment of RP Cyber Defense

n

n

The Role of Cyber Security Coordinator

The Role of Cyber Security Coordinator

n

(4)

Gubat Bariw R.S. San Juan R.S. Naga City Villazar R.S. Bagakay R.S. Sta. Maria Riz al Mayabobo Balagta s Alagao Cabanatuan Kita -Kita R.S.

Dalton Pass R.S Cuyapo R.S. Binalona n Mt. Sto Thomas San Fernando R.S. Bayongbon g Buaya R.S. Santiag o San Mateo Laga n Roma R.S. Tuguegara o Nasiping R.S. Apar ri Ballester os Sanches Mira Pata R.S. Sapat R.S. Paoa R.S. Sinat R.S. Mt. Caniaw R.S. Mt. Pila R.S. Bontoc R.S. Sagada R.S. Mt. Data R.S. Mt. Kawal R.S. Don Mariano R.S. Mt. Sair R.S. Tuban R.S. Mamburao Mt. Makurukuru Panamalaya n L.Naujan R.S. Calapan Mt. Banoy Leme r Catarman L.E. Lipata RS Palason RS Macagtas RS Adga RS Calbayog Catbalogan Borongan L.E. Borongan Passive RS Canceledes RS Naparaan RS Tacloba n San Roque Tulibao R.S. Ormoc Toll Ctr Maasin RS Buscayan RS Camanggay RS Cebu Toll Ctr. Balisong RS Mt. Canlandog RS Jordan L.E. San Miguel Iloilo Toll Cntr. San Jose LE Panulian RS Caniapasan Supo RS Kalibo LE Ibajay LE Surigao LE Surigao Hill RS Salvacion RSSantiago RS Butuan LE Mt. Mayapay New Leyte RS San Andres RS San Vicente RS Asuncion LE Tubura n Nabunturan LE Tagum LE Matina RS Davao City LE Digos Hill Malabakid RS Polonoling Koronada l Tacurong LE Isulan LE Datu Pian RS Cotobato LE Pikit LE Kabakalan LE Carmen RS Pinisikan RS Maramag LE Marawi LE Manticao RS Ilagan LE Jimenez RS Ozamis RS Palpalan RS Musuan Peak Mapayapang RS Guihian RS Cagayan De Oro Mambayan RS Sugbongkogon RS Tibon-tibon RS Medina Gingoog LE Sipaca Pt. PHILIPPINE BACKBONE NETWORK Legend Microwave Fiber Optic TELOF PLDT Bayantel Globe PT&T Digitel Gubat Bariw R.S. San Juan R.S. Naga City Villazar R.S. Bagakay R.S. Sta. Maria Riz al Mayabobo Balagta s Alagao Cabanatuan Kita -Kita R.S.

Dalton Pass R.S Cuyapo R.S. Binalona n Mt. Sto Thomas San Fernando R.S. Bayongbon g Buaya R.S. Santiag o San Mateo Laga n Roma R.S. Tuguegara o Nasiping R.S. Apar ri Ballester os Sanches Mira Pata R.S. Sapat R.S. Paoa R.S. Sinat R.S. Mt. Caniaw R.S. Mt. Pila R.S. Bontoc R.S. Sagada R.S. Mt. Data R.S. Mt. Kawal R.S. Don Mariano R.S. Mt. Sair R.S. Tuban R.S. Mambura o Mt. Makurukuru Panamalaya n L.Naujan R.S. Calapan Mt. Banoy Leme r

Philippine IT Infrastructure per Sector

2005 Computer World Survey

Banking 46% Agriculture, Fishery and Forestry 2% Wholesale and Retail Trade 6% Transportation and Storage 2% Real Estate 0% Manufacturing 26% Insurance 3% Financial Intermediaries 2% Communications 2%

Construction Community, Personal Electricity, Gas, and

Water

RP Dependency on ICT

RP Dependency on ICT

Backgrounder

(5)

5

5 n

n

Number of ISPs are continuously increasing.

Number of ISPs are continuously increasing.

n

n

Status of Internet Service Providers (ISPs) and Internet

Status of Internet Service Providers (ISPs) and Internet

Exchanges (

Exchanges (

IXs

IXs

) in 2004

) in 2004

n

n

Philippine Internet Exchange

Philippine Internet Exchange

(PHIX)

(PHIX)

n

n

Common Routing Exchange

Common Routing Exchange

(CORE)

(CORE)

n

n

Manila Internet Exchange (MIX)

Manila Internet Exchange (MIX)

n

n

Globe Internet Exchange (GIX)

Globe Internet Exchange (GIX)

Major

Major

IXs

IXs

n

n

Infocom

Infocom

Technologies (PLDT)

Technologies (PLDT)

n

n

MosCom

MosCom

n

n

CBCPNet

CBCPNet

n

n

Gnet

Gnet

(Globe Telecom)

(Globe Telecom)

n

n

Pacific Internet

Pacific Internet

Major

Major

ISPs

ISPs

177

177

# of ISPs

# of ISPs

Status

Status

<Source: Paul Budde, 2006>

64 93 121 144 177

2001 2002 2003 2004

2005

NTC-Registered ISPs

Source: National Telecommunications Commission

Status of the Internet

Status of the Internet

(6)

n

n

The number of Internet users and subscribers increases

The number of Internet users and subscribers increases

continuously

continuously

n

n

Average increment of 200,000~300,000 subscribers per year

Average increment of 200,000~300,000 subscribers per year

0

1000000

2000000

3000000

4000000

5000000

6000000

1996

1998

2000

2002

2004

Users

Subscribers

Status of the Internet

Status of the Internet

(7)

7

7

n

n

The number of host PCs increases

The number of host PCs increases

n

n

The number of cyber incidents is proportional to the number of

The number of cyber incidents is proportional to the number of

Internet subscribers, users, and host PCs

Internet subscribers, users, and host PCs

<Source: Paul Budde, 2006>

0

10000

20000

30000

40000

50000

60000

70000

1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004

Number of Host PCs

Status of the Internet

Status of the Internet

(8)

n

n

Number of Internet subscribers is much larger than number of bro

Number of Internet subscribers is much larger than number of bro

adband

adband

subscribers

subscribers

PCs for public use are prevalent, while the portion of individua

PCs for public use are prevalent, while the portion of individua

l PCs is relatively small

l PCs is relatively small

Public PCs are used as attack source, since it is hard to track

Public PCs are used as attack source, since it is hard to track

and guarantees

and guarantees

anonymity

anonymity

Status of the Internet

Status of the Internet

(9)

9

9

n

n

Status of Philippine online game market (USD)

Status of Philippine online game market (USD)

n

n

Continuous expansion of online game market

Continuous expansion of online game market

Possibility of cyber incidents (Online game cheating, identity t

Possibility of cyber incidents (Online game cheating, identity t

heft, item

heft, item

trading, etc.) is increasing

trading, etc.) is increasing

<Source: Korea Game Development Promotion and Institute, 2005>

Market size

Growth rate

Status of the Internet

Status of the Internet

(10)

n

n

US FBI recently estimated that the

US FBI recently estimated that the

LOVEBUG

LOVEBUG

, made by a

, made by a

Philippine student in 2000, has caused a worldwide damage of

Philippine student in 2000, has caused a worldwide damage of

approximately US$ 12Billion.

approximately US$ 12Billion.

n

n

NBI handled 30 various cyber crime cases as of 2005

NBI handled 30 various cyber crime cases as of 2005

Status of Cyber Incidents

Status of Cyber Incidents

NBI CYBERCRIMES STATISTICS

NBI CYBERCRIMES STATISTICS

JAN

JAN --DEC 2005DEC 2005

TYPE OF CASE

NO. OF CASES

1. Computer Fraud

8

2. Internet Pornography

3

3. Hacking

5

4. Computer E-mails

10

5. Violation of the E-Commerce Law

4

6. Verification

0

(11)

11

11

n

n

In 2006, PNP monitored 446 defaced government websites

In 2006, PNP monitored 446 defaced government websites

mostly owned by local governments

mostly owned by local governments

2003 2004 2005 2006 2007 National Govt Local Gov't 11 8 28 390 23 33 21 45 56 11 0 50 100 150 200 250 300 350 400

Defaced Government Websites, 2003 -2007 Source : 2007 PNP-CIDG Re port

National Govt 33 21 45 56 11

Local Gov't 11 8 28 390 23

2003 2004 2005 2006 2007

*

* January to June data only

Status of Cyber Incidents

(12)

n

n

Data from Philippine

Data from Philippine

Honeynet

Honeynet

(

(

www.philippinehoneynet.org

www.philippinehoneynet.org

)

)

US and China are the major attack

sources.

More than 700 events occur by day

when cyber attacks are fierce.

Status of Cyber Incidents

(13)

13

13

§

Threats to nation’s critical infrastructures

Status of Cyber Incidents

(14)

Nueva Ecija - 2 cell sites Bulacan – 1 cell site

Sorsogon – 3 cell sites Bataan – 1 cell site

Tarlac – 1 cell site

Masbate – 1 cell site

Palawan – 1 cell site

Oriental Mindoro – 2 cell sites

Camarines Sur – 3 cell sites

Compostela Valley – 1 cell site Bohol – 1 cell site

Davao Oriental – 1 cell site

Davao del Norte – 1 cell site

Status of Cyber Incidents

(15)

15

15

Basilan – 1 cell site

Masbate – 2 cell sites Camarines Sur – 3 cell sites

Surigao del Sur – 1 cell site Bukidnon – 1 cell site

Sorsogon – 1 cell site

Status of Cyber Incidents

(16)

Case Study:

Case Study:

Oplan

Oplan

Bojinka

Bojinka

n

n

Oplan

Oplan

Bojinka

Bojinka

was a 1995 plan by Al

was a 1995 plan by Al

-

-

Qaeda to

Qaeda to

simultaneously destroy 11 passenger aircraft

simultaneously destroy 11 passenger aircraft

over the Pacific Ocean.

over the Pacific Ocean.

n

n

Reports indicate that

Reports indicate that

Oplan

Oplan

Bojinka

Bojinka

is the earlier

is the earlier

version of 9/11 plot.

version of 9/11 plot.

n

n

If the operation had been successful, Al

If the operation had been successful, Al

-

-

Qaeda

Qaeda

would have murdered thousands of airline

would have murdered thousands of airline

passengers.

passengers.

Status of Cyber Incidents

(17)

17

17 n

n

The plot was discovered after

The plot was discovered after

a fire broke out in the

a fire broke out in the

Philippines apartment of

Philippines apartment of

Ramzi

Ramzi

Yousef

Yousef

, a Kuwaiti of

, a Kuwaiti of

Pakistani extraction and

Pakistani extraction and

member of Al

member of Al

-

-

Qaeda.

Qaeda.

n

n

Yousef

Yousef

was involved in the

was involved in the

first World Trade Center

first World Trade Center

bombing in 1993.

bombing in 1993.

Status of Cyber Incidents

Status of Cyber Incidents

Case Study:

(18)

n

n

Philippines police found

Philippines police found

bomb making material and

bomb making material and

a laptop computer in his

a laptop computer in his

apartment.

apartment.

n

n

The laptop computer

The laptop computer

contained encrypted

contained encrypted

messages that could not

messages that could not

be read by the police or

be read by the police or

intelligence officials.

intelligence officials.

Status of Cyber Incidents

Status of Cyber Incidents

Case Study:

(19)

19

19

n

n

Extensive analysis of the computer by law

Extensive analysis of the computer by law

enforcement and intelligence officials eventually

enforcement and intelligence officials eventually

broke the encryption on the messages.

broke the encryption on the messages.

n

n

The unencrypted messages detailed

The unencrypted messages detailed

Yousef

Yousef

s

s

plans to destroy the airliners and messages to his

plans to destroy the airliners and messages to his

fellow co

fellow co

-

-

conspirators.

conspirators.

n

n

Ramzi

Ramzi

Yousef

Yousef

was sentenced to 240 years in

was sentenced to 240 years in

prison in the United States.

prison in the United States.

Status of Cyber Incidents

Status of Cyber Incidents

Case Study:

(20)

n

n

Plotters of the

Plotters of the

Oplan

Oplan

Bojinka

Bojinka

used the Philippines as a

used the Philippines as a

launching pad

launching pad

for terrorist

for terrorist

acts by providing training

acts by providing training

bomb making and logistical

bomb making and logistical

support the violent local

support the violent local

terrorist group, Abu

terrorist group, Abu

Sayyaf

Sayyaf

(ASO).

(ASO).

n

n

In April 2000, the ASO

In April 2000, the ASO

demanded the release of

demanded the release of

Yousef

Yousef

from jail in the United

from jail in the United

States.

States.

Status of Cyber Incidents

Status of Cyber Incidents

Case Study:

(21)

21

21

Lessons Learned

Lessons Learned

n

n

Computer forensics was critical to this

Computer forensics was critical to this

investigation.

investigation.

n

n

The computer investigation allowed Philippine

The computer investigation allowed Philippine

officials to analyze and decrypt the messages on

officials to analyze and decrypt the messages on

the laptop.

the laptop.

n

n

The information acquired was important in

The information acquired was important in

thwarting a deadly terrorist attack.

thwarting a deadly terrorist attack.

Status of Cyber Incidents

Status of Cyber Incidents

Case Study:

(22)

Conclusion

Conclusion

n

n

The use of the Internet by terrorist organizations

The use of the Internet by terrorist organizations

will increase as these groups acquire the skills to

will increase as these groups acquire the skills to

conduct offensive operations.

conduct offensive operations.

n

n

The interdependence of the critical infrastructure

The interdependence of the critical infrastructure

used by nation

used by nation

-

-

states will allow terrorist groups

states will allow terrorist groups

these facilities with deadly results.

these facilities with deadly results.

Status of Cyber Incidents

Status of Cyber Incidents

Case Study:

(23)

23

23

PH

PH-

-

CERT

CERT

n

n

The first CERT in the Philippines

The first CERT in the Philippines

n

n

Localized assistance

Localized assistance

n

n

Funding from membership fees and sponsorships

Funding from membership fees and sponsorships

n

n

No permanent staff

No permanent staff

purely voluntary

purely voluntary

n

n

Provides

Provides

Email and phone based technical assistance (No on

Email and phone based technical assistance (No on

-

-

site

site

services)

services)

Coordination with law enforcement agencies

Coordination with law enforcement agencies

Technical training

Technical training

n

n

However, the operation of PH

However, the operation of PH

-

-

CERT encountered difficulty due to

CERT encountered difficulty due to

lack of financial support and human resources

lack of financial support and human resources

Assessment:

(24)

National Bureau of Investigation

National Bureau of Investigation -

-Anti Fraud and Cyber Crime Division

Anti Fraud and Cyber Crime Division

§

§

Feb 1997: NBI

Feb 1997: NBI

-

-

AFCCD created, through an Administrative Order, in

AFCCD created, through an Administrative Order, in

order to address all computer related crimes and other offenses

order to address all computer related crimes and other offenses

using technology

using technology

§

§

Supported by the US

Supported by the US

-

-

FBI to set up it Forensic Laboratory

FBI to set up it Forensic Laboratory

§

§

The NBI

The NBI

-

-

AFCCD needs legislation in order to empower it,

AFCCD needs legislation in order to empower it,

organizationally and financially, and make it effective in respo

organizationally and financially, and make it effective in respo

nding

nding

to cyber crime incidents

to cyber crime incidents

Assessment:

(25)

25

25

NBI Anti

NBI Anti-

-Fraud and Computer Crimes

Fraud and Computer Crimes

Division

Division

Assessment:

(26)

PNP

PNP

-

-

CIDG

CIDG

(Government Computer Security Incident Response Team)

(Government Computer Security Incident Response Team)

n

n

GCSIRT was created through TFSCI

GCSIRT was created through TFSCI

n

n

To suppress, detect and investigate computer network

To suppress, detect and investigate computer network

intrusions and other related internet or computer crimes

intrusions and other related internet or computer crimes

n

n

Projected capability: digital analysis, log file analysis,

Projected capability: digital analysis, log file analysis,

forensic media analysis, etc.

forensic media analysis, etc.

n

n

Issues: lack of specific legislation, overlapping roles of IT

Issues: lack of specific legislation, overlapping roles of IT

government bodies, lack of proper training of law

government bodies, lack of proper training of law

enforcers, public awareness, etc.

enforcers, public awareness, etc.

Assessment:

(27)

27

27

The Philippine Honeynet Project

The Philippine Honeynet Project

n

n

It is a non-

It is a non

-

profit, all

profit, all

volunteer group

volunteer group

dedicated to honeynet

dedicated to honeynet

and security research.

and security research.

n

n

It is a part of a larger

It is a part of a larger

global security

global security

initiative called the

initiative called the

Honeynet Research

Honeynet Research

Alliance.

Alliance.

Assessment:

(28)

Honeynet

Honeynet

s

s

Infrastructure

Infrastructure

Assessment:

Assessment:

Organization for RP Cyber Defense

Organization for RP Cyber Defense

Study hackers tools and

Study hackers tools and

techniques to be able to use it

techniques to be able to use it

against them by:

against them by:

Capturing new and existing

Capturing new and existing

attacks for research and

attacks for research and

analysis

analysis

Profiling hackers / attacker

Profiling hackers / attacker

behavior

behavior

Analyzing attack trends and

Analyzing attack trends and

statistics

statistics

Analyzing malware and

Analyzing malware and

hacker tools

hacker tools

Publishing security research

Publishing security research

papers

papers

Coordinating with other

Coordinating with other

security research

security research

organizations

organizations

Sending out security

Sending out security

advisories

advisories

(29)

29

29

Assessment:

(30)

Other Organizations

Other Organizations

n

n

ISSSP (Information Systems Security Specialists of

ISSSP (Information Systems Security Specialists of

the Philippines)

the Philippines)

involved in the effort of creating awareness and raising the lev

involved in the effort of creating awareness and raising the lev

el of

el of

information security practice

information security practice

security management in the Philippines

security management in the Philippines

n

n

PH

PH

-

-

CISSP (Philippine Certified Information Systems

CISSP (Philippine Certified Information Systems

Security Professionals)

Security Professionals)

CISSP certified Filipinos with security professional work experi

CISSP certified Filipinos with security professional work experi

ence

ence

n

n

ISACA (Information Systems and Audit and Control)

ISACA (Information Systems and Audit and Control)

Manila Chapter sponsors local educational seminars and workshops

Manila Chapter sponsors local educational seminars and workshops

,

,

engages in IT research projects, conducts regular chapter meetin

engages in IT research projects, conducts regular chapter meetin

gs, and

gs, and

helps to further promote and elevate the visibility of the IS au

helps to further promote and elevate the visibility of the IS au

dit, control

dit, control

and security professional.

and security professional.

Assessment:

(31)

31

31

n

n

Status of

Status of

CERTs

CERTs

in the Philippines

in the Philippines

Lack of human resource and systems to address cyber

Lack of human resource and systems to address cyber

emergencies.

emergencies.

n

n

Korea: More than 80 major

Korea: More than 80 major

CERTs

CERTs

CONCERT: Consortium of

CONCERT: Consortium of

CERTs

CERTs

in Korea

in Korea

(http://

(http://

concert.or.kr

concert.or.kr

)

)

Requires national management to encourage

Requires national management to encourage

development of

development of

CERTs

CERTs

and production of critical mass

and production of critical mass

of cyber security professionals.

of cyber security professionals.

Assessment:

(32)

n

n

e-

e

-

Commerce law

Commerce law

RA 8792 Philippine E-

RA 8792 Philippine E

-Commerce Law

Commerce Law

-

-

not particular

not particular

about emergency readiness but it does set the legal

about emergency readiness but it does set the legal

framework for recognition of electronic documents and

framework for recognition of electronic documents and

transactions.

transactions.

n

n

Hacking and cracking

Hacking and cracking

n

n

Piracy or the unauthorized copying

Piracy or the unauthorized copying

n

n

Violations of the Consumer Act or Republic Act (No. 7394)

Violations of the Consumer Act or Republic Act (No. 7394)

Bangko

Bangko

Sentral

Sentral

ng

ng

Pilipinas, BSP (Central Bank of the

Pilipinas

, BSP (Central Bank of the

Philippines) Circulars

Philippines) Circulars

that apply to banks and financial

that apply to banks and financial

institutions that dictate:

institutions that dictate:

n

n

Financial systems stability and service levels

Financial systems stability and service levels

n

n

Connectivity security and redundancy requirements

Connectivity security and redundancy requirements

n

n

Presence of disaster recovery site and systems

Presence of disaster recovery site and systems

Assessment:

(33)

33

33 n

n

Pending laws including provisions for cyber security and ICT

Pending laws including provisions for cyber security and ICT

readiness

readiness

n

n

HB 1246 Anti

HB 1246 Anti

-

-

Cyber Crime Act of 2001

Cyber Crime Act of 2001

n

n

HB 2251 Convergence Policy Act of the Philippines of 2004

HB 2251 Convergence Policy Act of the Philippines of 2004

n

n

SB 428

SB 428

The Anti

The Anti

-

-

Telecommunications Fraud Act of 2004

Telecommunications Fraud Act of 2004

n

n

SB 2073 Data Protection Act of 2005

SB 2073 Data Protection Act of 2005

n

n

HB 3777

HB 3777

Cybercrime

Cybercrime

Prevention Act of 2005

Prevention Act of 2005

n

n

A new Cyber

A new Cyber

-

-

Crime Prevention bill is being prepared by an

Crime Prevention bill is being prepared by an

Inter

Inter

-

-

Agency Cyber Law group for submission to the 14

Agency Cyber Law group for submission to the 14

thth

Congress

Congress

Assessment:

(34)

q

Learning from the 2

nd

ARF

Seminar on Cyber Terrorism:

Our country needs a Focal Point

þ

to comprehensively

address the task of

coordinating domestic

and foreign

cyber-terrorism

countermeasures

þ

to spearhead

public-private sector

partnership in protecting

our critical cyber

infrastructures

Role of the Cyber Security Coordinator

Role of the Cyber Security Coordinator

(35)

35

35

q

Task of the National

Cybersecurity Coordinator:

Note

þ

Deal with all domestic

and transnational

programs

þ

Oversee and provide

direction to

government

countermeasures

þ

Coordinate operational

responsibilities

Role of the Cyber Security Coordinator

Role of the Cyber Security Coordinator

(36)

q

Task of the National

Cybersecurity Coordinator:

þ

Integrate public and

private efforts

þ

Organize and provide

leadership to various

CERTs

þ

Enhance national

cybersecurity capability

þ

Spearhead collaboration

with international

organizations

Cyberspace Security Coordination Process

National Coordinator for Cyber Security

Risk Assessment Incident Response Laws & Policy Technical Training Awareness/ Advocacy

PRIVATE/PUBLIC CRITICAL INFORMATION INFRASTRUCTURE OPERATING UNITS TRIP CAMPAIGN AND ADVOCACY PROGRAMS CONSEQUENCE MANAGEMENT ASSISTANCE

INCIDENT POLICIES TRAINING COURSES 3RD PARTY ASSES SORS AUDIT JOB AUDIT REPORT INCIDENT REPORTS PERIODIC RISK AND VULNERABILITY REPORTS INVENTORY OF ASSETS INCIDENT REPORTS INCIDENT REPORTS INCIDENT REPORTS RISK AND VULNERABILITY REPORTS INCIDENT REPORTS POLICIES POLICIES TRAINING COURSES REPORT ON TRIP PROGRAMS LIST OF TRAINING COURSES POLICIES TRAINING COURSES TRAINING COURSES

Role of the Cyber Security Coordinator

Role of the Cyber Security Coordinator

(37)

37

37

Make a TFT (Task Force Team) for establishment of N-CERT

Second Step

Build -up Computer emergency Response system Make a complete goal for N-CERT

Establish official N-CERT organization Set-up the related Law and

system

First step

Technical Support Increase ability of Analyzing and responding to computer emergencies

Domestic and International Cooperation Make a National Cyber Security Framework

Identify vulnerabilities and monitor responses to computer incidents

Manage Information Security Education program

Third step

-Establish organization and it’s function -Define the role of existing organizations -Define the coverage of N-CERT -gathering information on current Computer threats and vulnerabilities

-Analysis and response to security incidents - supporting and consulting for Security technology

(receive /cope with security incidents)

-As a Nation POC for computer incidents responses

-Establish cooperation system with related organizations

- Establish cooperation system with private CERTs

-Collect information by using Honeynet

-Collect information bye the local/domestic sensor -Detect infection of Malicious Code

-Detect a hacked homepage

- Fundamental course for information security administrator

- Advanced course for information security administrator

- Course for Establishment of CERT and Operation

RP Cyber Security Roadmap

RP Cyber Security Roadmap

(38)

IMPLEMENTING AGENCIES

IMPLEMENTING AGENCIES

Military

RP Cyber Security Roadmap

RP Cyber Security Roadmap

(39)

39

39

n

n

Office of the National Cyber Security Coordinator is the point o

Office of the National Cyber Security Coordinator is the point o

f contact

f contact

(

(

PoC

PoC

) in nation and provides support to decrease occurrence of inci

) in nation and provides support to decrease occurrence of inci

dents

dents

in local systems

in local systems

Point of contact in nation

Technical support to cyber incident in nation

Publication of information about prevention, detection, and recovery of vulnerabilities

Construction of system to analyze and respond the cyber incidents

Detecting and patching Vulnerabilities The incident response in internal system and network

The point of contact in the organization

Service protection according to the policy of the organization

National Coordinator

Internal CERT

Training of security specialists and distribution of security guidelines

Analysis of internal cyber incidents and operation of the response system

Role of the Cyber Security Coordinator

Role of the Cyber Security Coordinator

(40)

Thank you

UNDERSECRETARY VIRTUS V. GIL

National Coordinator for Cyber Security

Office of the President, Republic of the Philippines

Telephone numbers: +632 736-1364/72/78 Facsimile number: +632 736-1351

on www.pdffactory.com (

References

Related documents

In addition, when you are building your business based on automated field workers, the downtime from damaged devices or loss of data can quickly have a bigger impact than the cost

On the following pages, you can find further information on our SIVACON power distribution boards and busbar trunking systems, as well as on the ALPHA distribution boards

On the contrary, international humanitarian law’s restrictions on the use of weapons (particularly the requirements that they be directed only against combatants

ryn March’s study on the Solu Khumbu Sherpa almost 40 years ago (1977), community mountain-closure rituals and practices appear to have been defunct at the time of docu-

This special issue seeks to explore the ways in which Hindu nationalism has developed into new forms and spaces in recent years, and sheds light on a

The Buildings &amp; Grounds Committee, Student Affairs Committee, Development Committee, Audit, Business &amp; Finance Committee, and Academic Affairs &amp; Personnel Committee met

There are instances when cleansing could be done post migration, such as when the new environment offers tools that make some kinds of clean-up very easy and robust, or if

We spoke with the doctor who said, “I really like working in this hospital, it’s like a family.” The comment cards we collected mainly had positive responses about staff and the