‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

Japan’s Internal Affairs and Communications Ministry has decided to create decoy computer systems to combat cyber-attacks

The decoy systems would resemble actual systems used by the government and well-known companies, and be used to attract computer viruses so the government can observe and analyse their routes of infection and other characteristics.

If a new cyber-attack’s traits can be understood quickly, it could help in the creation of protective measures.

The National Institute of Information and Communications Technology, which the ministry oversees, plans to start building such systems in earnest in fiscal 2018 so they can be operational as soon as possible.

Cyber-attacks often use methods such as email to infect the systems of companies and other entities with a virus. Once inside, the virus can spread, enabling the attacker to steal information or control the system remotely. Yet how viruses function once inside a system and continue to spread is often not well understood.

To prevent a virus from spreading, its method of attack, route of infection and other characteristics need to be identified quickly to come up with countermeasures. However, companies that are damaged by cyber-attacks are often unwilling to share information externally, which means the infection may spread to other entities without countermeasures being taken.

This latest plan would involve creating a cyber-space that closely resembles a corporate system. Once a virus is lured in, its actions would be observed, and this information would be shared among companies involved in fighting cyber-attacks, to create ways of preventing or containing infections.

The ministry is keen to get these decoy systems operating quickly, so it will include ¥200 million for this purpose in its requests for the fiscal 2018 budget. The funds would be used to develop systems and other tools to share the results of the observations and analyses among related companies.

The Japan News

You Might Also Read:

China’s South Sea Cyber War:

WannaCry Returns To Attack Honda:

 

« Police Spy On Their Own: Twitter Accounts Scrutinised
Car Industry In Crisis Over AI and Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.