advanced attack techniques advanced attack techniques increased by passing techniques against the...
TRANSCRIPT
Advanced attack techniquesAdvanced attack techniques
Increased by passing techniques against the existinIncreased by passing techniques against the existin
g detection methods such as IDS and anti-virus softg detection methods such as IDS and anti-virus soft
wareware
A type of worm virus, malicious bot and Trojan comA type of worm virus, malicious bot and Trojan com
binedbined
Recent attacks are targeting specific groups rather tRecent attacks are targeting specific groups rather t
han unspecific multipleshan unspecific multiples
Cyber Attacks without boundaryCyber Attacks without boundary
Spread of high-speed internet networks around thSpread of high-speed internet networks around the worlde world
Disguise of attacker’s location through a stop-over Disguise of attacker’s location through a stop-over at 3rd countryat 3rd country
Heightened threats on critical infrastructuresHeightened threats on critical infrastructures
Concerns on attacks Concerns on attacks remotely controlled DDoS remotely controlled DDoS attacks attacks exploitingexploiting Botnet Botnet
Possibility of instant ripple effects to neighboring aPossibility of instant ripple effects to neighboring areas reas
Sharing cyber threat information with each other during ordinary Sharing cyber threat information with each other during ordinary
times and preventing attack incidentstimes and preventing attack incidents
In the case of a cyber attack incident, real time consultation on In the case of a cyber attack incident, real time consultation on
countermeasures and minimization of damagecountermeasures and minimization of damage
Pinpointing hackers through cooperative investigation among Pinpointing hackers through cooperative investigation among
each country’s law enforcement each country’s law enforcement
Effective response only through international cooperationEffective response only through international cooperationEffective response only through international cooperationEffective response only through international cooperation
Enhanced Enhanced acknowledgement about the seriousness of cyber terror acknowledgement about the seriousness of cyber terror threats threats among among ARF participating countriesARF participating countries
Agreeing upon the necessity of international cooperation for respoAgreeing upon the necessity of international cooperation for responding to cyber terrornding to cyber terror
Building up mutual trust and drawing a variety of cooperation propBuilding up mutual trust and drawing a variety of cooperation proposalsosals
Absence of organization or a system to realize practical cooperationAbsence of organization or a system to realize practical cooperationAbsence of organization or a system to realize practical cooperationAbsence of organization or a system to realize practical cooperation
AccomplishmentsAccomplishmentsAccomplishmentsAccomplishments
LimitsLimitsLimitsLimits
Regular committee composed of working-level experts Regular committee composed of working-level experts
against cyber terroragainst cyber terror
Developing practical measures to enhance cyber Developing practical measures to enhance cyber
security in the regionsecurity in the region
Coordinating legal and systematic policies for a more Coordinating legal and systematic policies for a more
effective response to cyber terrorismeffective response to cyber terrorism
Serve as an official communication channel among Serve as an official communication channel among
countries countries
ARARFF seminar chair country or chair country hopeful seminar chair country or chair country hopeful
Developing a detailed operation plan of the each sub-committeDeveloping a detailed operation plan of the each sub-committe
ee
Managing official contact points of the participatingsManaging official contact points of the participatings
Proposing to hold a meeting among participating countries if nProposing to hold a meeting among participating countries if n
ecessaryecessary
Submitting the results of consultation and meetings to the next Submitting the results of consultation and meetings to the next
ARF cyber terrorism seminar and ISM on CTTCARF cyber terrorism seminar and ISM on CTTC
Promptly sharing information and responding with blocking the IP Promptly sharing information and responding with blocking the IP
involved and other measures involved with cyber attacksinvolved and other measures involved with cyber attacks
Sharing the analyzed information on cases and cyber attack Sharing the analyzed information on cases and cyber attack
techniques and preventing similar cases from occurringtechniques and preventing similar cases from occurring
Searching for legal countermeasures of law enforcement Searching for legal countermeasures of law enforcement
authorities against attackersauthorities against attackers
Developing common response measures for new types of cyber Developing common response measures for new types of cyber
attacksattacks
Searching for ways to give technical support and advice on Searching for ways to give technical support and advice on
establishing a nationwide cyber terror response system establishing a nationwide cyber terror response system
(National CERT) (National CERT)
Providing a training program enhancing response ability Providing a training program enhancing response ability
against cyber terror among ARF participating countriesagainst cyber terror among ARF participating countries
Building a cooperative system with an international cyber Building a cooperative system with an international cyber
security networksecurity network
Promoting joint research on countermeasures against new Promoting joint research on countermeasures against new
types of hacking techniques and technology sharing among types of hacking techniques and technology sharing among
participating countriesparticipating countries
Discussing the plan to construct an early warning system Discussing the plan to construct an early warning system
among ARF participating countriesamong ARF participating countries
Developing a technology development roadmap for medium-Developing a technology development roadmap for medium-
long term cyber terror preventionlong term cyber terror prevention
Selecting a Key Coordinating countrySelecting a Key Coordinating countryPhase 1Phase 1
Building up a cyber security network among ARF participating countries
Building up a cyber security network among ARF participating countries Phase 3Phase 3
Composing an expert working group and sub-committees and promoting their operations
Composing an expert working group and sub-committees and promoting their operations
Phase 2Phase 2
Making a global community safe from cyber terror Making a global community safe from cyber terror Making a global community safe from cyber terror Making a global community safe from cyber terror
Establishing a cooperative system with other international cyber security networks
Establishing a cooperative system with other international cyber security networksPhase 4Phase 4