SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
SINGAPORE CYBERSECURITY ACT AND
CYBERSECURITY STRATEGY
Benjamin Ang
Head Cyber Homeland Defence
Centre of Excellence for
National Security, RSIS, NTU
Twitter @benjaminang
SINGAPORE’S
CYBERSECURITY STRATEGY
4 PILLARS OF THE STRATEGY
11 SECTORS OF
CRITICAL INFORMATION INFRASTRUCTURE
SERVICES UTILITIES TRANSPORT
Government services
Emergency services
Healthcare
Media
Banking and financial
services
Power
Water
Telecoms
Transport
Airport
Seaport
1
SINGAPORE’S CYBERSECURITY ACT 2018
Critical Information Infrastructure
Designates certain systems /
organizations as CII
Appoints CII Owners
Makes them responsible for
complying with CSA’s standards,
audit, participation in exercises, etc.
Makes it compulsory for CII Owners
to report breaches (still optional for
other organizations)
Other Systems
Gives CSA power to enter and take
over systems (e.g. seize servers) in
serious incidents
Ecosystem
Requires registration of some cyber
professionals e.g. penetration
testers, Security Ops Centres
NCAP TO COMBAT CYBERCRIME
National Cybercrime Action Plan
Educate
the public
Equip the
police
Review
the laws
Partner
industry
and
overseas*
ENHANCE SINGAPORE’S STANDING AS A TRUSTED
HUB
Strengthen Personal Data Protection Act
Consent required to collect, use, and transfer data
Enforcement by Personal Data Protection Commission
Embrace personal data protection as corporate culture
Professionalise Data Protection Officers
Work with foreign Data Protection Authorities
2
PROMOTE COLLECTIVE
RESPONSIBILITY
Make cybersecurity a
business priority
for all organizations,
not just CII
Public education
Tap on government
expertise 2
USE CYBERSECURITY AS AN ADVANTAGE
Attract
advanced
companies
Support start-
ups
Support local
champions
Develop
global market
opportunities
3
NATIONAL CYBERSECURITY R&D PROGRAMME
S$190m
(US$140m)
3
2017 BUDGET: HELP FOR SME’S
S$80m
(US$60m)
3
FUNDING FOR ASEAN
CAPACITY BUILDING
S$10m (US$7m)
ASEAN Cyber
Capacity Programme
S$30m (US$22m)
Singapore–ASEAN
Cyber Security
Centre of Excellence
4
HOSTING AND SUPPORTING INTERNATIONAL &
REGIONAL EXCHANGES
Singapore International Cyber Week events
 2018 AMCC tasked Singapore to develop framework
Co-organizing US-SG TCTP Workshops
 3 years x all ASEAN members
Collaborating on The Hague Process
 International Law Applicable to Cyber Operations
Co-Sponsoring the UN/CSA Cyber Diplomacy training for UNGGE 2019/2020
SINGAPORE’S LEGAL ENVIRONMENT
FOR CYBERSECURITY
TYPES OF LEGAL LIABILITY (IN SINGAPORE) FOR
CYBERSECURITY LAPSES
Negligence Breach of
Personal Data
Protection Act
Breach of other
Laws (OSA,
Cybersecurity
Act)
Breach of MAS
Regulations
Breach of
Contract
Breach of
Directors Duties
to Company
COST OF NEGLIGENCE ACTIONS
Yahoo – sued for ‘gross negligence’ in not securing user
accounts (link)
Home Depot – paid settlements of US$25m to banks and
US$19.5 m to consumers for 2014 breach (link)
Neiman Marcus – paid settlement of US$1.6m to shoppers
for 2013 breach (link)
Target – offers US$10m settlement for breach
PERSONAL DATA PROTECTION COMMISSION
FINES UNDER PDPA
S$10,000 fine on Propnex Realty for failing to make
reasonable security arrangements to prevent unauthorised
access of customers’ personal data
S$10,000 fine on JP Pepperdine
S$10,000 fine on Tech Mahindra for failing to make
reasonable security arrangement to prevent unauthorised
access / modification of mybill.singtel.com,
myaccount.singtel.com
S$3,000 fine on Smiling Orchid
DIRECTORS’ DUTIES (AND SENIOR MANAGEMENT)
3.0.2 … the board of directors
and senior management should
have oversight of technology
risks and ensure that the
organisation’s IT function is
capable of supporting its
business strategies and
objectives.
3.1.2 They should also be fully
responsible for ensuring that
effective internal controls and
risk management practices are
implemented to achieve
security, reliability, resiliency
and recoverability.
EXAMPLE: MAS NOTICE ON CYBER HYGIENE:
FI’S MUST IMPLEMENT 6 CYBER SECURITY MEASURES
1. address system security flaws
in a timely manner;
2. establish and implement
robust security for systems;
3. deploy security devices to
secure system connections;
4. install anti-virus software to
mitigate the risk of malware
infection;
5. restrict the use of system
administrator accounts that can
modify system configurations; and
6. strengthen user authentication
for system administrator accounts
on critical system
THE REAL STATE OF
SECURITY
in June 2018, the attacker used a
dormant local administrative
account with the commonly used
password hash of P@ssw0rd.
The password had not been
changed since 2012.
SINGAPORE’S CYBERSECURITY ACT
SECTION 19 - POWERS TO INVESTIGATE AND
PREVENT CYBERSECURITY INCIDENTS
Require anyone to answer questions
Require anyone to produce records
Interview anyone
SECTION 20 - POWERS TO INVESTIGATE AND
PREVENT SERIOUS INCIDENTS
Criteria
Real risk of harm to CII
Real risk of disruption to essential
service
Real threat to national security,
foreign relations, economy
Severe because of number of
computers or value of information
Powers
Direct anyone to carry out remedial
measures
Require the owner to assist
Enter premises
Access computers
Scan computers
Take copies
Take computers
SECTION 23
EMERGENCY POWERS
SECTION 23 – EMERGENCY CYBERSECURITY
MEASURES
Criteria (Minister decides)
necessary for preventing, detecting
or countering any serious and
imminent threat to —
(a) the provision of any essential
service; or
(b) the national security, defence,
foreign relations, economy,
public health, public safety or public
order of Singapore
Powers
Can direct anyone to “take such
measures or comply with such
requirements as may be
necessary to prevent, detect or
counter any threat”
WHAT WOULD SOME OF THE
CONCERNS BE?
CONCERNS AND RESPONSES
Concerns
Conflict between CSA and
Sector Regulators?
Suppliers of CII affected?
Overseas computers?
How much must CII owners do?
What if CII owners just fail to
comply?
Responses
Make Sector Regulators into Asst
Commissioners
Suppliers not affected
Only Singapore
CII owners must take reasonable
steps
Penalties only for wilful non-
compliance
CONCERNS AND RESPONSES (CONTD)
Concerns
Can CSA seize computers?
How will CSA define
‘emergency’?
What if CSA officers abuse
data?
Responses
CSA can seize with consent, in
emergency
‘Emergency’ decided with
regulator and business
CSA officers are subject to
criminal prosecution
CONCERNS AND RESPONSES (CONTD)
Concerns
Will threat or incident info
shared with CSA be safe?
Will CSA breach data privacy?
Responses
Info shared with CSA is
protected under Act
CSA will only access technical
data
WHAT HAPPENS WHEN BREACH IS DETECTED?
WHAT HAPPENS WHEN BREACH IS DETECTED?
A MANAGEMENT ISSUE
"I thought to myself: 'If I report
the matter, what do I get?' If I
report the matter, I will simply get
more people chasing me for more
updates. If they are chasing me
for more updates, I need to be
able to get more information to
provide them."
CHALLENGES TO IMPLEMENTATION
OF INTERNATIONAL LAW
CHALLENGES TO IMPLEMENTATION
● Is it impossible to monitor / enforce / attribute?
● Is it impossible to define (e.g. what is a cyber weapon?)
● Would it take too long to negotiate / would become obsolete
● Would Norms be more flexible?
● Will some states want to maintain their cyber offensive
capability?
● Will some states object on human rights issues (cyber warfare or
info warfare?)
OPEN QUESTIONS IN INTERNATIONAL LAW
1. Definition: is cyberspace = WWW or
cyberspace = information space?
2. Sovereignty – how much do states have in
cyberspace?
3. Due diligence – what duty do states owe?
4. Responsibility – when are states responsible for
actions of third parties or proxies? Are
countermeasures allowed?
5. Espionage – what about IP theft?
6. Use of force – what is ‘armed attack’ in cyberspace?

Weitere ähnliche Inhalte

Was ist angesagt?

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 

Was ist angesagt? (20)

Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 

Ähnlich wie Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)

Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
briancrawford30935
 

Ähnlich wie Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019) (20)

2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 

Mehr von Benjamin Ang

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
Benjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
Benjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 

Mehr von Benjamin Ang (20)

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 
Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness)
 
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
 

Kürzlich hochgeladen

一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
bd2c5966a56d
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
F La
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
Airst S
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 

Kürzlich hochgeladen (20)

一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 

Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)

  • 1. SINGAPORE CYBERSECURITY ACT AND CYBERSECURITY STRATEGY Benjamin Ang Head Cyber Homeland Defence Centre of Excellence for National Security, RSIS, NTU Twitter @benjaminang
  • 3. 4 PILLARS OF THE STRATEGY
  • 4. 11 SECTORS OF CRITICAL INFORMATION INFRASTRUCTURE SERVICES UTILITIES TRANSPORT Government services Emergency services Healthcare Media Banking and financial services Power Water Telecoms Transport Airport Seaport 1
  • 5. SINGAPORE’S CYBERSECURITY ACT 2018 Critical Information Infrastructure Designates certain systems / organizations as CII Appoints CII Owners Makes them responsible for complying with CSA’s standards, audit, participation in exercises, etc. Makes it compulsory for CII Owners to report breaches (still optional for other organizations) Other Systems Gives CSA power to enter and take over systems (e.g. seize servers) in serious incidents Ecosystem Requires registration of some cyber professionals e.g. penetration testers, Security Ops Centres
  • 6. NCAP TO COMBAT CYBERCRIME National Cybercrime Action Plan Educate the public Equip the police Review the laws Partner industry and overseas*
  • 7. ENHANCE SINGAPORE’S STANDING AS A TRUSTED HUB Strengthen Personal Data Protection Act Consent required to collect, use, and transfer data Enforcement by Personal Data Protection Commission Embrace personal data protection as corporate culture Professionalise Data Protection Officers Work with foreign Data Protection Authorities 2
  • 8. PROMOTE COLLECTIVE RESPONSIBILITY Make cybersecurity a business priority for all organizations, not just CII Public education Tap on government expertise 2
  • 9. USE CYBERSECURITY AS AN ADVANTAGE Attract advanced companies Support start- ups Support local champions Develop global market opportunities 3
  • 10. NATIONAL CYBERSECURITY R&D PROGRAMME S$190m (US$140m) 3
  • 11. 2017 BUDGET: HELP FOR SME’S S$80m (US$60m) 3
  • 12. FUNDING FOR ASEAN CAPACITY BUILDING S$10m (US$7m) ASEAN Cyber Capacity Programme S$30m (US$22m) Singapore–ASEAN Cyber Security Centre of Excellence 4
  • 13. HOSTING AND SUPPORTING INTERNATIONAL & REGIONAL EXCHANGES Singapore International Cyber Week events  2018 AMCC tasked Singapore to develop framework Co-organizing US-SG TCTP Workshops  3 years x all ASEAN members Collaborating on The Hague Process  International Law Applicable to Cyber Operations Co-Sponsoring the UN/CSA Cyber Diplomacy training for UNGGE 2019/2020
  • 15. TYPES OF LEGAL LIABILITY (IN SINGAPORE) FOR CYBERSECURITY LAPSES Negligence Breach of Personal Data Protection Act Breach of other Laws (OSA, Cybersecurity Act) Breach of MAS Regulations Breach of Contract Breach of Directors Duties to Company
  • 16. COST OF NEGLIGENCE ACTIONS Yahoo – sued for ‘gross negligence’ in not securing user accounts (link) Home Depot – paid settlements of US$25m to banks and US$19.5 m to consumers for 2014 breach (link) Neiman Marcus – paid settlement of US$1.6m to shoppers for 2013 breach (link) Target – offers US$10m settlement for breach
  • 17. PERSONAL DATA PROTECTION COMMISSION FINES UNDER PDPA S$10,000 fine on Propnex Realty for failing to make reasonable security arrangements to prevent unauthorised access of customers’ personal data S$10,000 fine on JP Pepperdine S$10,000 fine on Tech Mahindra for failing to make reasonable security arrangement to prevent unauthorised access / modification of mybill.singtel.com, myaccount.singtel.com S$3,000 fine on Smiling Orchid
  • 18. DIRECTORS’ DUTIES (AND SENIOR MANAGEMENT) 3.0.2 … the board of directors and senior management should have oversight of technology risks and ensure that the organisation’s IT function is capable of supporting its business strategies and objectives. 3.1.2 They should also be fully responsible for ensuring that effective internal controls and risk management practices are implemented to achieve security, reliability, resiliency and recoverability.
  • 19. EXAMPLE: MAS NOTICE ON CYBER HYGIENE: FI’S MUST IMPLEMENT 6 CYBER SECURITY MEASURES 1. address system security flaws in a timely manner; 2. establish and implement robust security for systems; 3. deploy security devices to secure system connections; 4. install anti-virus software to mitigate the risk of malware infection; 5. restrict the use of system administrator accounts that can modify system configurations; and 6. strengthen user authentication for system administrator accounts on critical system
  • 20. THE REAL STATE OF SECURITY in June 2018, the attacker used a dormant local administrative account with the commonly used password hash of P@ssw0rd. The password had not been changed since 2012.
  • 22. SECTION 19 - POWERS TO INVESTIGATE AND PREVENT CYBERSECURITY INCIDENTS Require anyone to answer questions Require anyone to produce records Interview anyone
  • 23. SECTION 20 - POWERS TO INVESTIGATE AND PREVENT SERIOUS INCIDENTS Criteria Real risk of harm to CII Real risk of disruption to essential service Real threat to national security, foreign relations, economy Severe because of number of computers or value of information Powers Direct anyone to carry out remedial measures Require the owner to assist Enter premises Access computers Scan computers Take copies Take computers
  • 25. SECTION 23 – EMERGENCY CYBERSECURITY MEASURES Criteria (Minister decides) necessary for preventing, detecting or countering any serious and imminent threat to — (a) the provision of any essential service; or (b) the national security, defence, foreign relations, economy, public health, public safety or public order of Singapore Powers Can direct anyone to “take such measures or comply with such requirements as may be necessary to prevent, detect or counter any threat”
  • 26. WHAT WOULD SOME OF THE CONCERNS BE?
  • 27. CONCERNS AND RESPONSES Concerns Conflict between CSA and Sector Regulators? Suppliers of CII affected? Overseas computers? How much must CII owners do? What if CII owners just fail to comply? Responses Make Sector Regulators into Asst Commissioners Suppliers not affected Only Singapore CII owners must take reasonable steps Penalties only for wilful non- compliance
  • 28. CONCERNS AND RESPONSES (CONTD) Concerns Can CSA seize computers? How will CSA define ‘emergency’? What if CSA officers abuse data? Responses CSA can seize with consent, in emergency ‘Emergency’ decided with regulator and business CSA officers are subject to criminal prosecution
  • 29. CONCERNS AND RESPONSES (CONTD) Concerns Will threat or incident info shared with CSA be safe? Will CSA breach data privacy? Responses Info shared with CSA is protected under Act CSA will only access technical data
  • 30. WHAT HAPPENS WHEN BREACH IS DETECTED?
  • 31. WHAT HAPPENS WHEN BREACH IS DETECTED?
  • 32. A MANAGEMENT ISSUE "I thought to myself: 'If I report the matter, what do I get?' If I report the matter, I will simply get more people chasing me for more updates. If they are chasing me for more updates, I need to be able to get more information to provide them."
  • 33. CHALLENGES TO IMPLEMENTATION OF INTERNATIONAL LAW
  • 34. CHALLENGES TO IMPLEMENTATION ● Is it impossible to monitor / enforce / attribute? ● Is it impossible to define (e.g. what is a cyber weapon?) ● Would it take too long to negotiate / would become obsolete ● Would Norms be more flexible? ● Will some states want to maintain their cyber offensive capability? ● Will some states object on human rights issues (cyber warfare or info warfare?)
  • 35. OPEN QUESTIONS IN INTERNATIONAL LAW 1. Definition: is cyberspace = WWW or cyberspace = information space? 2. Sovereignty – how much do states have in cyberspace? 3. Due diligence – what duty do states owe? 4. Responsibility – when are states responsible for actions of third parties or proxies? Are countermeasures allowed? 5. Espionage – what about IP theft? 6. Use of force – what is ‘armed attack’ in cyberspace?