‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

Japan’s Internal Affairs and Communications Ministry has decided to create decoy computer systems to combat cyber-attacks

The decoy systems would resemble actual systems used by the government and well-known companies, and be used to attract computer viruses so the government can observe and analyse their routes of infection and other characteristics.

If a new cyber-attack’s traits can be understood quickly, it could help in the creation of protective measures.

The National Institute of Information and Communications Technology, which the ministry oversees, plans to start building such systems in earnest in fiscal 2018 so they can be operational as soon as possible.

Cyber-attacks often use methods such as email to infect the systems of companies and other entities with a virus. Once inside, the virus can spread, enabling the attacker to steal information or control the system remotely. Yet how viruses function once inside a system and continue to spread is often not well understood.

To prevent a virus from spreading, its method of attack, route of infection and other characteristics need to be identified quickly to come up with countermeasures. However, companies that are damaged by cyber-attacks are often unwilling to share information externally, which means the infection may spread to other entities without countermeasures being taken.

This latest plan would involve creating a cyber-space that closely resembles a corporate system. Once a virus is lured in, its actions would be observed, and this information would be shared among companies involved in fighting cyber-attacks, to create ways of preventing or containing infections.

The ministry is keen to get these decoy systems operating quickly, so it will include ¥200 million for this purpose in its requests for the fiscal 2018 budget. The funds would be used to develop systems and other tools to share the results of the observations and analyses among related companies.

The Japan News

You Might Also Read:

China’s South Sea Cyber War:

WannaCry Returns To Attack Honda:

 

« Police Spy On Their Own: Twitter Accounts Scrutinised
Car Industry In Crisis Over AI and Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

National Defense Industry Association (NDIA) - USA

National Defense Industry Association (NDIA) - USA

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.