Cyber War Basic
Cyber War Basic
Cyber Cyber
Law Threat
Cyber Cyber
Crime Attack
Cyber
Security
#1 CYBER SPACE 5
$30 bi 500 mi
economy EBANK
100 mi regular
165 mi cellular
45 mi students
600 GB 10 mi
traffic gamers
60 mi
gadget
Critical System 7
Education, Culture,
Public Services,
Art, Creative
Control System,
Industry (IPR) and
Automation
Tourism
“exploitation of vulnerability”
THREAT
CONTROL MILITARY
CRITICAL RESOURCES
National
Interest
#3 CYBER ATTACK 12
Malicious
INTERRUPTION MODIFICATION
Codes, etc.
FABRICATION
Recent Incident 14
EBIZ
MOST
VULNERABLE
Cost and Damage 15
PDCA
Business HR
Continuity Security
Incident
Asset Mgt.
Mgt.
Confidentiality
Integrity
Availability
Supplier Access
Relation Control
ACQN
Develop Crypto
Maintain
Physical
Comm.
Ops. Security
Security
#5 CYBER CRIME 20
Data
Forgery
The Actors 22
• Human, the weakest security link • Weak NDA and retirement program
Latest Trends 24
POLITICS MILITARY
targeted data, cyber terrorism, counterintelligence, weaponry
intrusion, propaganda, counter including bio technology and
espionage, insurgence, any chemical, command and control
popular sentiment system
Situation Awareness 33
ISMS, SOP
AUDIT
BCP, DRP
Deep WEB : Ghost NET 39
SHADOW
CNC
CRIME UNDER
PROVIDER GROUND
ECOSYSTEM ECONOMY
CYBER WARFARE 40
Cyber Cyber
War Terrorism
Strengthen The Assets 48
WE LOST
Weaker Ability
of Independency
Low Level of
Deterrence
Cannot Assure
Safety and Recovery
Conclusions 56
Emergency Operation
Readiness Framework
Compliance Capacity
Enforcement Building
Research
Develop.
Proposed Structure 59
2.
1. 3.
Blue Print
CEWAS Framework Evaluation Military
Road Map
Policy, SOP Pre/Post Audit
Strategy
Sector Security 61
Limited
Rapid Changes
Resources
Inter Dependency
CYBER DEFENSE 64
★
Secretariat and
Resource Center
★ ★ ★
Deputy Deputy Deputy
Operation RND Intelligence
Military Concern 68