‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

Japan’s Internal Affairs and Communications Ministry has decided to create decoy computer systems to combat cyber-attacks

The decoy systems would resemble actual systems used by the government and well-known companies, and be used to attract computer viruses so the government can observe and analyse their routes of infection and other characteristics.

If a new cyber-attack’s traits can be understood quickly, it could help in the creation of protective measures.

The National Institute of Information and Communications Technology, which the ministry oversees, plans to start building such systems in earnest in fiscal 2018 so they can be operational as soon as possible.

Cyber-attacks often use methods such as email to infect the systems of companies and other entities with a virus. Once inside, the virus can spread, enabling the attacker to steal information or control the system remotely. Yet how viruses function once inside a system and continue to spread is often not well understood.

To prevent a virus from spreading, its method of attack, route of infection and other characteristics need to be identified quickly to come up with countermeasures. However, companies that are damaged by cyber-attacks are often unwilling to share information externally, which means the infection may spread to other entities without countermeasures being taken.

This latest plan would involve creating a cyber-space that closely resembles a corporate system. Once a virus is lured in, its actions would be observed, and this information would be shared among companies involved in fighting cyber-attacks, to create ways of preventing or containing infections.

The ministry is keen to get these decoy systems operating quickly, so it will include ¥200 million for this purpose in its requests for the fiscal 2018 budget. The funds would be used to develop systems and other tools to share the results of the observations and analyses among related companies.

The Japan News

You Might Also Read:

China’s South Sea Cyber War:

WannaCry Returns To Attack Honda:

 

« Police Spy On Their Own: Twitter Accounts Scrutinised
Car Industry In Crisis Over AI and Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.