Hiện trạng, đảm bảo an toàn thông tin

35 429 0
Hiện trạng, đảm bảo an toàn thông tin

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

www.vncert.gov.vn HIỆN TRẠNG VÀ ĐẢM BẢO AN TOÀN THÔNG TIN www.vncert.gov.vn RỦI RO AN TOÀN THÔNG TIN VÀ TỘI PHẠM MẠNG www.vncert.gov.vn THREATS + VULNAREBILITY -> LOSS OF SENSITIVE DATA www.vncert.gov.vn Malicious code “Cyber Crime is one of the fastest growing and lucrative industries of our time” Dave Marcus, director of security research of McAffee Lab Malicious code is the most powerful utilities of cybercrime. www.vncert.gov.vn Malicious code  Malicious activities in cyberspace come from many country.  The amount of new malicious code has been increasing www.vncert.gov.vn Malicious code Exploits detected and blocked by Microsoft antimalware products, 3Q10–2Q11, by targeted platform or technology (Source : Microsoft) www.vncert.gov.vn Malicious code  Number of sites contain virus blocked each day (Source : Synmatec 11/2011) www.vncert.gov.vn Malicious code & cyber crime www.vncert.gov.vn Malicious code & cyber crime  Stuxnet www.vncert.gov.vn [...]... XÂY DỰNG HỆ THỐNG BẢO VỆ AN TOÀN THÔNG TIN TOÀN DiỆN www.vncert.gov.vn Các tiêu chuẩn quản lý trong CNTT  COBIT ITIL ISO27001 Function Mapping IT Process Mapping IT Service Level Management Information Security Framework Area 4 Process and 34 Domain 9 Process 10 Domain Issuer ISACA OGC ISO Board Implementation Information System Audit Manage Service Level Compliance to security standard www.vncert.gov.vn... requirement and target of organization - Establish and implement a comprehensive information security management system (ISMS) which satisfy specified targets and requirement and comply with rigorous information security standard (ISO 27001:2005) - Take precaution against hackers and potential cybercrime - Train and improve the awareness of all staff - Cooperate with information security organization... (Plan – Do – Check Action)  Đảm bảo sự linh hoạt của các tổ chức trong việc áp dụng www.vncert.gov.vn Quy trình quản lý ISO 27001 www.vncert.gov.vn www.vncert.gov.vn Các biện pháp quản lý ATTT ISO 27002 Establish a ISMS system in Organization www.vncert.gov.vn Đảm bảo sự cân đối và phù hợp www.vncert.gov.vn Recommendations  SERIES OF ISO/IEC 27001 FOR ISMS www.vncert.gov.vn Các vấn đề trong đảm bảo. .. vấn đề trong đảm bảo an toàn thông tin 1 Xây dựng và xác định chính xác mục tiêu 2 Xây dựng các chính sách và quy định www.vncert.gov.vn Quy trình cơ bản để quản lý rủi ro 1 Specify and classify resource 2 Specify and classify resource www.vncert.gov.vn 1st Step – Evaluation of Assets Ví dụ: Identify and evaluate information assets from the view points of confidentiality, integrity and availability Asset... assessment Threat evaluation : Identity and evaluate the threat, taking account of the threat frequency and business impact caused Thread : What may cause an unwanted incident and result in harm to a system or organization Vulnerability evaluation : Access how severe the vulnerabilities are, or how easily they may be exploited Vulnerability : a weakness of assets which can be exploited by a threat RISK SCORE... Operational Countermeasures  Contingency planning  Avoid risks  Suspend or abolish vulnerable services and business in order to avoid the risk which may be exploited www.vncert.gov.vn 3rd Step – Risk Treatment  Transfer risks  Transfer the associated business risks to other parties, e.g insurers, suppliers (Out sourcing , insurance )  Accept risks  Knowingly and objectively accept risks, providing... www.vncert.gov.vn Malicious code & cyber crime  Anonymous & Wikileak  Victim (No exception):  Business organization (Paypal, Visa, Master, Bank of America etc )  FBI  US Government www.vncert.gov.vn www.vncert.gov.vn www.vncert.gov.vn www.vncert.gov.vn Malicious code & cyber crime  Cyber crime use malicious code to attack the important system of Vietnam “Life and Death Command” Botnet attacked: - One of the... insurance )  Accept risks  Knowingly and objectively accept risks, providing they clearly satisfy the organization’s policies and the criteria for accepting risks www.vncert.gov.vn Thank You ! Ngo Quang Huy System Techniques Division Vietnam Computer Emergency Response Teams Ministry of Information and Communication of S.R Vietnam Email: huynq@mic.gov.vn www.vncert.gov.vn ... Vietnamnet An information security company of Vietnam - BKAV Unikey the most popular keyboard software for Vietnamese Hva a famous hacker forum in vietnam www.vncert.gov.vn www.vncert.gov.vn Action against cybercrime Source : BBC.Co.uk www.vncert.gov.vn Action against cybercrime Stole visa and Master card’s information Two hackers were arrested in 2010 www.vncert.gov.vn WHAT WE CAN DO TO PROTECT OUR ORGANIZATION... Asset values Low Medium Hight Confidentiality No damage to org if disclosed appreciable impact to the org if disclosed Significant impact to the org if disclosed Integrity No critical to business application Minor impact No critical but noticeable to business application Significant impact Critical to business application Major business impact Availability No critical to business application No critical . www.vncert.gov.vn HIỆN TRẠNG VÀ ĐẢM BẢO AN TOÀN THÔNG TIN www.vncert.gov.vn RỦI RO AN TOÀN THÔNG TIN VÀ TỘI PHẠM MẠNG www.vncert.gov.vn THREATS + VULNAREBILITY. 2010 Stole visa and Master card’s information www.vncert.gov.vn WHAT WE CAN DO TO PROTECT OUR ORGANIZATION ? - Specify requirement and target of organization. - Establish and implement a comprehensive. to attack the important system of Vietnam “Life and Death Command” Botnet attacked: - One of the biggest e-news of Vietnam - Vietnamnet - An information security company of Vietnam - BKAV -

Ngày đăng: 03/07/2014, 14:23

Mục lục

  • Malicious code & cyber crime

  • Malicious code & cyber crime

  • Malicious code & cyber crime

  • Malicious code & cyber crime

  • Malicious code & cyber crime

  • Các tiêu chuẩn quản lý trong CNTT

  • ISO 27001 và một số điểm cơ bản

  • Quy trình quản lý ISO 27001

  • Các biện pháp quản lý ATTT ISO 27002

  • Đảm bảo sự cân đối và phù hợp

  • Các vấn đề trong đảm bảo an toàn thông tin

  • Quy trình cơ bản để quản lý rủi ro

  • 1st Step – Evaluation of Assets

  • 2nd Step – Risk assessment

  • 3rd Step – Risk Treatment

  • 3rd Step – Risk Treatment

Tài liệu cùng người dùng

Tài liệu liên quan