Concerns about cyber-security are widely held. In its 2012 survey of senior decisionmakers in the public and private sector the World Economic Forum (WEF), found that cyber-security was ranked especially high by respondents as a technological risk being of global importance.1 In 2011, Norton, part of the Symantec multinational cyber-security firm, estimated the total cost of cyber-crime to be worth US$338bn per year.2 Outages in the submarine infrastructure off the coast of Egypt resulted in a severe degradation of internet speeds across many countries in the Middle East and parts of Asia.3
In this issue brief 4 the results of three research projects gathering empirical evidence regarding information sharing 5 are discussed, drawing lessons relevant to the situation in the Republic of Korea.
Policy Mechanisms in the Republic of Korea
Perhaps understandably, the approach taken by the Republic of Korea is of a top down nature with the Blue House taking the lead in efforts since the attacks earlier in 2013. The Blue House has responsibility for response whilst he NIS (National Intelligence Service) co-ordinates the actual response.6 The 2008 Korean Defence White Paper id...
... middle of paper ...
...n of information with an expectation of reciprocity.
Such transactions may include different types of information. Examples include:
Technical information such as IP addresses, security telemetry, network traffic or Indicators of Compromise (IoC) describing technical aspects about an incident;
Threat relevant data: involving either a possibility of the type of attacker (nation state; criminal enterprise) or the type of attack vector used;12
Vulnerabilities can cover: either a specific product or service or an organisation’s policies and procedures;
Experience of attacks; incidents and mitigations: anecdotal evidence from examples suggested that in a trusted forum, organisations may be willing to inform each other of security incidents affecting their operations; the impacts and what was done to resolve it (for example specific technical or procedural steps taken).
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Twelve million views on YouTube. “You’re gay”. “Ugliest boy alive”. “Go kill yourself and finish what they started”. Words that were imprudently wrote on Facebook. A video of a little boy beaten half to death with a bat, and his “friends” on probation for committing the abuse, and videotaping it for the public to witness; yet bullying online keeps increasing. Words and phrases that spill all over the internet from people who don’t even know him, but believe he should die, make him question who he really is.... [tags: social media, cyber victim, facebook]
1360 words (3.9 pages)
- Many cybersecurity professionals believe that there are only three types of organizations: those that know that they have been breached, those that have yet to be breached and those that do not know that they have already been breached. Hackers have become increasingly successful in their efforts, and they are targeting large and small organizations across virtually every sector. The consensus of security professionals is that it is only a matter of time before every organization will suffer a breach.... [tags: Computer security, Security, Information security]
750 words (2.1 pages)
- The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2).... [tags: technology, phones, internet]
1732 words (4.9 pages)
- For Airports, There is No Silver Bullet for Cybersecurity Cyber security has become the most pressing, yet most misunderstood, segments in IT. While advances in technology have allowed organizations to reduce the number of threats that get through, the damage caused by cyber attacks continues to increase. Further, complicating this, the amount of devices and systems that connect to networks is expected to increase by 200% by 2020 (Moor Insights & Strategy). Within an airport’s infrastructure “Cyber” typically covers various solutions from IT networks, computers, servers, industrial control systems (ICS), HVAC metering & monitoring, lighting, access control, passenger screening, closed circ... [tags: Security, Computer security, National security]
787 words (2.2 pages)
- Networking is a norm in many corporate based institutions in modern society. Computerized applications, software and communication has been greatly deployed to foster service delivery in the organizations. Despite the many merits tied to networking, it poses some threats that can proof costly if not handled professionally. Good news is that there are measures that can be adopted to form a robust computer network system that will ensure minimal or no intrusion by any assailants. This paper seeks to explore a number of factors indicative of weak computer networking system, and various measures to plan and enable stern security.... [tags: cyber crime, cyber security]
2848 words (8.1 pages)
- While the Federal Trade Commission has data security guidelines there is some significant room for improved regulations. The one regulation that is relevant to all companies is that they must meet cyber security compliance requirements. The FTC has the ability to charge companies for poor security practices, especially those that put consumers in danger. In order for Zara to prevent a FTC cyber security action lawsuit they must enact this incident response plan. The components of this plan include all of the compliance measures, which can avoid lawsuits similar to those faced by Zara’s competition.... [tags: Security, Information security]
701 words (2 pages)
- Despite the widespread media attention given to an ever-increasing number of breaches, many companies have no workable plan to respond to these incidents. With the rise of mobile devices and the Internet of Things, the threat surface for every organization has expanded. Regardless of how data is collected or used, every organization shoulders the burden of protecting the data from unauthorized access. When a breach occurs, the organization must also be prepared to respond to the incident in an effective manner.... [tags: Security guard, Security, Computer security]
943 words (2.7 pages)
- Operation Eligible Receiver The Air Force Computer Emergency Response Team (CERT) discovered something different while on shift, a series of anomalies, which shook the core of our nation’s defense. In February 1998, two teenagers successfully burrowed their way into many electrical networks all over the U.S. Since cyber-attacks were thought to be years away, this incident left the Pentagon and other agencies in an uproar. Cyber threat warnings were given and ignored by the Pentagon and other agencies before.... [tags: President of the United States, Bill Clinton]
1035 words (3 pages)
- 3. IDENTIFY THE STATE AND NON-STATE ACTORS THAT POSE THE GREATEST CYBER THREAT TO THE UNITED STATES External global threats are on the rise. Cyber-attacks against the U.S. government are notably targeted for intrusions focusing on exfiltration information some of which are attributed to the Chinese government military (Kirk, 2013). Stolen information by China may be valuable for defense and technology, U.S. policy makers in China, and military planners. (Kirk, 2013). It’s noted that Cyber warfare abilities may intercept military response operations by limiting the communication and commercial activities of an adversary.... [tags: homeland security, terrorism, ]
1669 words (4.8 pages)
- Introduction When it comes to protecting an infrastructure, careful planning and coordination needs to take place. Protecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security. Examine three areas of the Department of Homeland Security: mission, operations and responsibilities The first area is the Department of Homeland Security’s mission. The Department of Homeland Security (DHS) was created in 2002 by the Homeland Security Act.... [tags: planning, homeland security, cyber systems]
1122 words (3.2 pages)