‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

Japan’s Internal Affairs and Communications Ministry has decided to create decoy computer systems to combat cyber-attacks

The decoy systems would resemble actual systems used by the government and well-known companies, and be used to attract computer viruses so the government can observe and analyse their routes of infection and other characteristics.

If a new cyber-attack’s traits can be understood quickly, it could help in the creation of protective measures.

The National Institute of Information and Communications Technology, which the ministry oversees, plans to start building such systems in earnest in fiscal 2018 so they can be operational as soon as possible.

Cyber-attacks often use methods such as email to infect the systems of companies and other entities with a virus. Once inside, the virus can spread, enabling the attacker to steal information or control the system remotely. Yet how viruses function once inside a system and continue to spread is often not well understood.

To prevent a virus from spreading, its method of attack, route of infection and other characteristics need to be identified quickly to come up with countermeasures. However, companies that are damaged by cyber-attacks are often unwilling to share information externally, which means the infection may spread to other entities without countermeasures being taken.

This latest plan would involve creating a cyber-space that closely resembles a corporate system. Once a virus is lured in, its actions would be observed, and this information would be shared among companies involved in fighting cyber-attacks, to create ways of preventing or containing infections.

The ministry is keen to get these decoy systems operating quickly, so it will include ¥200 million for this purpose in its requests for the fiscal 2018 budget. The funds would be used to develop systems and other tools to share the results of the observations and analyses among related companies.

The Japan News

You Might Also Read:

China’s South Sea Cyber War:

WannaCry Returns To Attack Honda:

 

« Police Spy On Their Own: Twitter Accounts Scrutinised
Car Industry In Crisis Over AI and Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Nuance Communications

Nuance Communications

From revolutionizing the doctor-patient relationship to reinventing the way brands connect with their customers, Nuance technology helps organizations push the boundaries of what’s possible.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

OOKOS

OOKOS

OOKOS was founded in 2023 by a team of cybersecurity veterans who recognized that traditional security models were failing to keep pace with evolving threats.