Information Security in Korea IT839 strategy
Information Security in Korea IT839 strategy
Information Security in Korea IT839 strategy
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Information</strong> <strong>Security</strong><br />
<strong>in</strong> <strong>Korea</strong> <strong>IT839</strong> Strategy<br />
December 8, 2004<br />
Ho-Ick<br />
Suk<br />
Deputy M<strong>in</strong>ister<br />
M<strong>in</strong>istry of <strong>Information</strong> and Communication<br />
Republic of <strong>Korea</strong>
1<br />
Table of Contents<br />
I<br />
Status of IT <strong>Korea</strong><br />
I I<br />
<strong>IT839</strong> Strategy<br />
I I I<br />
<strong>Information</strong> <strong>Security</strong> Environments<br />
IV<br />
<strong>Security</strong> Policy In <strong>IT839</strong> Strategy
2<br />
Table of Contents<br />
I<br />
Status of IT <strong>Korea</strong><br />
I I<br />
<strong>IT839</strong> Strategy<br />
I I I<br />
<strong>Information</strong> <strong>Security</strong> Environments<br />
IV<br />
<strong>Security</strong> Policy In <strong>IT839</strong> Strategy
3<br />
Infrastructure<br />
Broadband Network<br />
Global Broadband Penetration<br />
23.3%<br />
※subscription per 100 persons<br />
서울1<br />
서울2<br />
14.7%<br />
14.0%<br />
9.3%<br />
대전<br />
<strong>Korea</strong> Canada Ireland US<br />
(Source: ITU Internet Report, 2004)<br />
대구<br />
<strong>Korea</strong>’s Broadband Penetration<br />
부산<br />
광주<br />
Households<br />
Penetration : 76.6%(Aug.2004)<br />
- Available to over 97% of population<br />
Schools<br />
All Primary & Secondary Schools<br />
Connected to Broadband (Sept.2000)
Services<br />
Internet Usage<br />
’<br />
<br />
Mobile Penetration<br />
’<br />
<br />
’<br />
2004<br />
Video On Demand (VOD)<br />
R<strong>in</strong>g back tone service<br />
Multimedia Message Service (MMS)<br />
Location Based Service (LBS)<br />
Mobile Game<br />
Short Message Service (SMS)<br />
R<strong>in</strong>g tone download<br />
1998<br />
Graphic image download<br />
4
5<br />
IT Industry<br />
World’s Best Technologies (%, Global Market Share)<br />
Semiconductors (Memory) : 42%<br />
[2001]<br />
Mobile Phones :25%, TFT-LCD : 30% [2002]<br />
Digital TV : 23%, MP3 : 17% [2004]<br />
IT Share <strong>in</strong> National Economy: 13.5% of GDP,<br />
30% of Total Exports
6<br />
Table of Contents<br />
I<br />
Status of IT <strong>Korea</strong><br />
I I<br />
<strong>IT839</strong> Strategy<br />
I I I<br />
<strong>Information</strong> <strong>Security</strong> Environments<br />
IV<br />
<strong>Security</strong> Policy In <strong>IT839</strong> Strategy
7<br />
<strong>IT839</strong> Strategy (Value Cha<strong>in</strong> Mechanism)<br />
8 Services<br />
WiBro Service<br />
DMB Service<br />
Home N/W Service<br />
Telematics Service<br />
RFID-based Service<br />
W-CDMA Service<br />
Terrestrial DTV<br />
Internet Telephony<br />
3 Infrastructures<br />
Broadband<br />
Convergence Network<br />
Ubiquitous Sensor<br />
Network<br />
Next Generation<br />
Internet Protocol[IPv6]<br />
9 Growth Eng<strong>in</strong>es<br />
Next Generation<br />
Mobile Communications<br />
Digital TV<br />
Home Network<br />
System on Chip<br />
Next Generation PC<br />
Embedded S/W<br />
Digital Contents<br />
& S/W Solutions<br />
Telematics<br />
Intelligent Service Robot
8<br />
W-CDMA Service<br />
Current Situation<br />
Deployment<br />
- SKT & KTF : Seoul+8Metropolitan Cities s<strong>in</strong>ce (8. ’04)<br />
- LGT : Service to be launched (6. ’06)<br />
Handset : Allow<strong>in</strong>g subsidies (s<strong>in</strong>ce ’04.4)<br />
DBDM with improved performance and roam<strong>in</strong>g <strong>in</strong> 2004<br />
Market Prospect & Policy<br />
Prospect<br />
- Introduction of Re. 6 at Mid of 2006<br />
- More than 4M subscribers expected <strong>in</strong> 2007<br />
• Policy Direction<br />
- Flexible pric<strong>in</strong>g scheme and Handset subsidies<br />
- Encourag<strong>in</strong>g <strong>in</strong>vestment : 3.2T Won by 2007
9<br />
WiBro (Portable Internet) Service<br />
Service & Market Prospect<br />
Low Rate<br />
$25-28/Month<br />
High Speed<br />
1Mbps<br />
Portability<br />
Over 60km/h<br />
Seamless Access to<br />
Broadband Internet on<br />
the Move<br />
Devices <strong>in</strong> late 2005, Commercial Service <strong>in</strong> 2006<br />
Estimated No. of Subscribers after 6 years : 9.45M<br />
Licens<strong>in</strong>g Plan<br />
Three Operators, 7years of license period<br />
Oct. 2004 : Spectrum Allocation Announcement<br />
Feb. 2005 : Licensee Selection
DMB Service<br />
Satellite<br />
Mobility<br />
CAR A/V<br />
Broadcast<strong>in</strong>g<br />
Center<br />
Audio (CD)<br />
Mov<strong>in</strong>g pictures<br />
(Portable TV)<br />
Terrestrial waves<br />
Portability<br />
Standstill<br />
Audio<br />
Mobile<br />
phone<br />
PDA<br />
PC (Laptop)<br />
Satellite DMB : Nationwide Service<br />
Terrestrial DMB<br />
- Seoul + Metropolitan Area : 2 channels<br />
- Others : By the end of 2006 after completion of channel reallocation<br />
10
11<br />
Telematics Service<br />
Construct<strong>in</strong>g telematics model city by by <strong>in</strong>vest<strong>in</strong>g USD 9M till till 2006 with<br />
a match<strong>in</strong>g fund of of Jeju state government<br />
Travel<br />
Info<br />
Weather<br />
Info<br />
Traffic<br />
Info<br />
Phase1<br />
Telemtics model city(Jeju)<br />
Telematics<br />
Info center<br />
Automotive<br />
Device<br />
Phase2<br />
Telematics service In major cities<br />
Golf<br />
Info<br />
V-Shop<br />
Personal<br />
Device<br />
Phase3<br />
Telematics solutions to export
12<br />
Home Network Service<br />
Future home environment where consumer electronics connected to<br />
each other through networks provide digital services anytime & anywhere<br />
10M Home Networked Houses by 2007<br />
Pilot Service to 1,300 Houses <strong>in</strong> Five Major Cities<br />
Home NW Pilot Services<br />
Convenient<br />
Service<br />
Safety<br />
Service<br />
Remote control of light, gas, power, water<br />
Prevention of crime/disaster, telemedic<strong>in</strong>e<br />
Pleasant<br />
Service<br />
VOD thru Digital TV, On-l<strong>in</strong>e game
13<br />
RFID Service / u-Sensor Network<br />
Pilot Project for Management of Livestock, Logistics and other Areas<br />
Closely Related to Our Daily Lives to Create Market Demand<br />
Logistics Management<br />
System<br />
Public Procurement Service<br />
M<strong>in</strong>istry of National Defense<br />
Defense Ammunition<br />
Management System<br />
Ex-Import Logistics<br />
Management System<br />
M<strong>in</strong>istry of Commerce<br />
Industry & Energy<br />
Process<br />
Pilot Project Tasks (June)<br />
- Five Tasks (3.5B Won)<br />
Sett<strong>in</strong>g Technology Standard for<br />
Pilot Projects (July)<br />
Plan<br />
Imported Beef<br />
Track<strong>in</strong>g System<br />
National Veter<strong>in</strong>ary Research<br />
and Quarant<strong>in</strong>e Service<br />
Air Luggage<br />
Track<strong>in</strong>g System<br />
<strong>Korea</strong> Airports Corporation<br />
Project Support<br />
- Technical Support<br />
- Test & Verification by <strong>Korea</strong> Operators<br />
2 nd Year Project Task (Dec.)
New ICT Growth Eng<strong>in</strong>es<br />
NG Mobile Communication<br />
Digital TV<br />
166<br />
32<br />
Global Market<br />
Global Market<br />
($100M)<br />
Domestic<br />
Production<br />
1,164<br />
291<br />
1,557<br />
358<br />
1,748<br />
’02 ’05 ’07<br />
Global Market<br />
($100M)<br />
Domestic<br />
Production<br />
211<br />
93<br />
384<br />
583<br />
’02 ’05 ’07<br />
14<br />
Strategic Importance<br />
Key product to<br />
lead the global<br />
IT Industry<br />
Evolution toward<br />
broadband wired &<br />
wireless<br />
convergence NW<br />
Rapid growth of<br />
DTV market<br />
Core device <strong>in</strong><br />
convergence era<br />
175 5M DTV subscrib<strong>in</strong>g<br />
home <strong>in</strong> <strong>Korea</strong> (’07)<br />
Plan<br />
4G mobile comm.<br />
prototype by 2007<br />
Low power source<br />
tech/core parts<br />
Portable Internet<br />
by 2005<br />
Global Standardization<br />
Convergent server/<br />
term<strong>in</strong>al (’07)<br />
Nationwide digital<br />
broadcast<strong>in</strong>g NW<br />
(’05)<br />
13.5M DTV (’07)
(Cont’d)<br />
New ICT Growth Eng<strong>in</strong>es (Cont’d)<br />
IT SoC<br />
Global Market<br />
Strategic Importance<br />
Plan<br />
Global Market<br />
($100M)<br />
Domestic<br />
Production<br />
25<br />
925<br />
1,385<br />
83 166<br />
1,732<br />
’02 ’05 ’07<br />
Huge demand led by<br />
digital convergence<br />
SoC technology as<br />
a key factor for<br />
competitiveness of<br />
IT products<br />
Top 3 IT SoC<br />
Country (’07)<br />
Core SoC for each<br />
growth eng<strong>in</strong>e area<br />
Industrial <strong>in</strong>fra. for<br />
low cost SoC<br />
development<br />
DC & SW Solutions<br />
Global Market<br />
Strategic Importance<br />
Plan<br />
Global Market<br />
($100M)<br />
Domestic<br />
Production<br />
23<br />
530<br />
897<br />
68 125<br />
1,267<br />
’02 ’05 ’07<br />
15<br />
Value-added<br />
<strong>in</strong>dustry with low<br />
marg<strong>in</strong>al costs<br />
Strategic <strong>in</strong>dustry<br />
of developed<br />
countries<br />
Top 5 DC Country<br />
(’07)<br />
Core tech. (DC<br />
develop<strong>in</strong>g tech.)<br />
DC cluster <strong>in</strong><br />
“High-tech IT<br />
Complex”
16<br />
Table of Contents<br />
I<br />
Status of IT <strong>Korea</strong><br />
I I<br />
<strong>IT839</strong> Strategy<br />
I I I<br />
<strong>Information</strong> <strong>Security</strong> Environments<br />
IV<br />
<strong>Security</strong> Policy In <strong>IT839</strong> Strategy
17<br />
Cyber attack’s s Trends<br />
Cyberattack leads to economic loss and<br />
national <strong>in</strong>frastructure’s risk<br />
(thousand)<br />
Number of Internet Users<br />
Hack<strong>in</strong>g Incidents
18<br />
Cyber Threats <strong>in</strong> ubiquitous environment<br />
Cyber attack’s targets<br />
<strong>in</strong>clude all devices<br />
connected with networks<br />
AM 12:00<br />
Homenetwork:<br />
<strong>in</strong>telligent facilities<br />
AM 6:00<br />
Health <strong>Information</strong> collected and checked<br />
AM 8:00<br />
Transition from<br />
threats <strong>in</strong><br />
cyberspace <strong>in</strong>to<br />
threats <strong>in</strong> real life<br />
Navigation<br />
PM 9:00<br />
Internet game with<br />
digital TV<br />
Toll Gate: Automatic Approval<br />
system<br />
AM 9:00<br />
Automatic entrance management<br />
Unstablished<br />
authentication<br />
system for diverse<br />
devices<br />
Homenetwork: Analysis<br />
of stocks <strong>in</strong> a refrigator<br />
Authentication<br />
PM 6:00<br />
Delivery<br />
PM 3:00<br />
Cyber<br />
conference<br />
Privacy <strong>in</strong>trusion by<br />
<strong>in</strong>formation leakage<br />
through diverse<br />
communication channels
19<br />
<strong>Security</strong> Policies of Foreign Countries<br />
• DHS (Department of Homeland <strong>Security</strong>) organized<br />
• ‘National Strategy to Secure Cyberspace’(2003)<br />
• <strong>Security</strong> technology developed by NIST and DARPA`<br />
• ENISA(European<br />
European Network <strong>Information</strong> <strong>Security</strong>) founded<br />
• ‘Dependability Roadmap’ developed by IST<br />
• PAMPAS and RAPID projects performed <strong>in</strong> preparation<br />
for ubiquitous age<br />
• ‘<strong>Information</strong> <strong>Security</strong> Master Plan’ developed<br />
by M<strong>in</strong>istry of economics and Industry(2003)<br />
• <strong>Security</strong> policy re<strong>in</strong>forced through e-Japan e<br />
<strong>strategy</strong> II<br />
• u-Japan Plan 』 <strong>in</strong>cludes security <strong>in</strong>itiative
Global <strong>Security</strong> Leader (Video Execution)<br />
20
21<br />
Table of Contents<br />
I<br />
Status of IT <strong>Korea</strong><br />
I I<br />
<strong>IT839</strong> Strategy<br />
I I I<br />
<strong>Information</strong> <strong>Security</strong> Environments<br />
IV<br />
<strong>Security</strong> Policy of <strong>IT839</strong> Strategy
22<br />
Vision<br />
u-Secure <strong>Korea</strong><br />
Enjoy<strong>in</strong>g at Rest <strong>in</strong> a Digital World<br />
Secure & Stable<br />
Infrastructure<br />
<strong>Security</strong> Embedded<br />
Growth Eng<strong>in</strong>es<br />
u-Secure<br />
<strong>Korea</strong> 2007<br />
Trustworthy<br />
Services<br />
Culture of<br />
<strong>Security</strong><br />
Ensur<strong>in</strong>g Stability of 3 Infrastructures<br />
Enhanc<strong>in</strong>g Trustworth<strong>in</strong>ess of 8 Services<br />
Embedd<strong>in</strong>g <strong>Security</strong> <strong>in</strong> 9 Growth Eng<strong>in</strong>es<br />
Promot<strong>in</strong>g Culture of <strong>Security</strong><br />
(Intensify Cyber Response System, Revise <strong>Security</strong> Law, Publish Education/<br />
Awareness Program, Fortify Privacy Protection and Spam detection)
23<br />
Strategies for Achievement<br />
<strong>Security</strong> Plan <strong>in</strong> parallel with other <strong>IT839</strong> Master Plans<br />
Develop<strong>in</strong>g <strong>Security</strong> Plan related with BcN, USN master plans<br />
Increase efficiency and productivity<br />
From Post-Response to Prior Prevention<br />
<strong>Security</strong> Impact Assessment for upcom<strong>in</strong>g threats<br />
Bus<strong>in</strong>ess Cont<strong>in</strong>uity Plann<strong>in</strong>g for seamless service<br />
Partnership with Enterprise <strong>in</strong> Technology Development<br />
Government's support competitive security hi-tech of enterprise<br />
<strong>Information</strong> <strong>Security</strong> Governance<br />
Revise <strong>in</strong>formation security law (government)<br />
Develope hi-end security technology (enterprise)<br />
Practice Culture of <strong>Security</strong> (<strong>in</strong>dividual)
24<br />
Secure & Stable 3 Infrastructures<br />
Service Sector<br />
Wire-Wireless<br />
Convergence<br />
<br />
QoS <strong>Security</strong> IPv6<br />
Voice-Data<br />
Convergence<br />
Telecom-Broadcast<strong>in</strong>g<br />
Convergence<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Lack of BcN <strong>Security</strong> Technology<br />
Diffusion of Threats through<br />
Convergence of Infrastructure<br />
Leakage of <strong>Information</strong> <strong>in</strong> USN<br />
Development of <strong>Security</strong><br />
Enhanced Technology<br />
Development of Network<br />
Separation Mechanism<br />
Design<strong>in</strong>g BcN <strong>Security</strong> Platform
25<br />
Trustworthy 8 Services<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Telematics<br />
Homenetwork<br />
Wibro<br />
RFID Service WCDMA DMB<br />
Digital<br />
Braodcast<br />
VoIP<br />
Lack of security <strong>in</strong> new IT Service<br />
Disaster caused by Service Failures<br />
Un-established Ubiquitous<br />
Authentication Scheme<br />
Plan for <strong>Security</strong> Grad<strong>in</strong>g Scheme<br />
Establishment of<br />
Bus<strong>in</strong>ess Cont<strong>in</strong>uity Plan<br />
Plan for Ubiquitous<br />
Authentication Scheme
26<br />
<strong>Security</strong> Embedded 9 Growth Eng<strong>in</strong>es<br />
Applied Devices<br />
Next-gen<br />
Tele device<br />
Growth eng<strong>in</strong>e<br />
Technologies<br />
Embedded S/W<br />
BCN<br />
Intelligent<br />
Mult<strong>in</strong>edia<br />
Rbots Low Weight Low battery<br />
Trustworthy<br />
Network<br />
IT accessories<br />
Digital Home<br />
Digital<br />
Broadcast<strong>in</strong>g<br />
WCDMA<br />
Lack of security technology for<br />
HomeNetwork & Telematics Device<br />
Privacy <strong>in</strong>trusion through<br />
Vulnerabilities <strong>in</strong> Robot & Next-gen PC<br />
Vulnerabilities of Wireless devices<br />
Access Control applicable to<br />
Homenetwork & Telematics<br />
Privacy Protection Technology<br />
applicable to Robots and Next-gen PC<br />
Lightweight Cryptography Technology<br />
applicable to Wireless devices
27<br />
Fortify <strong>Security</strong> Infrastructures<br />
Enhanc<strong>in</strong>g Response To Internet Incidents<br />
Mangement of <strong>Korea</strong> Internet <strong>Security</strong> Center<br />
- Manegement of Internet Incidents Response & Assistance Center<br />
- Analysis of Internet Incidents & Technology Support<br />
- Establishment of Coord<strong>in</strong>ation System to Respond Internet Incidents<br />
Promot<strong>in</strong>g Culture of <strong>Security</strong><br />
Government<br />
Enterprise<br />
Individual<br />
Revision of <strong>Security</strong> Law<br />
<strong>Security</strong> Awareness Campaign<br />
Develop<strong>in</strong>g <strong>Security</strong> Hi-Technology<br />
Practice of <strong>Security</strong> Guidel<strong>in</strong>e
Thank You!<br />
28