1. 1
CYBERSECURITY
犖犖伍牽犖迦犖犖犖 犖о顕犖∇幻犖犖迦
犖犖項犖犢犖迦犖о権犖犖迦牽犖犢犖迦犖園犖犖迦犖犖園犖犖迦犖伍牽犖犖犖犖÷犖迦犖犖巌犖ム犖犖犖犖犖犖巌犖犢 (犖犖犖犢犖犖迦牽犖÷見犖迦犖)
犖犖迦牽犖犖巌犖犢犖迦犖園犖犢犖о犖犖ム顕犖∇犖 61 犖犢犖犢犖犖劇犖犖 犖犖ム顕犖犖犖 62 - 犖犖項犖ム犖迦牽犖犖園犖犖園犖 3 犖犖犖犢犖犖
ETDA - Electronic Transaction Development Agency,
DPA- Data Protection Agency,
NCSA - National Cybersecurity Agency
犖犖項犖 犖犖項犖∇犖犖犖萎肩犖迦犖犖迦 Cybersecurity 犢犖ム鍵 Data Protection Knowledge Center
犖÷険犢犖犖犖 犖犖ム賢犖犖犖園権 犖犖園犖犖伍牽犖犖犖犖÷犖迦犖犖園
Promote e-Commerce
Develop Standard 犖犢犖迦見犖犖園犖犖伍牽犖犖犖犖÷犖迦犖犖犖犢犖ム犢
Minimize Risks-Cybersecurity, ThaiCert, GMS (Government Monitoring System)
2. S E C U R I T Y
2
Strong
Government
Excellence learning
Current
Situation
Uncontrollable
Factors
Recommen
dation
Information
Security
Tips for
Social Media
Why is Security
our shared
responsiblity
3. 3
Paperless&Cashless | Digital ID | Open Data | Data Sharing | Blockchain | Artificial Intelligence (AI)
STRONG
GOVERNMENT
犖犢犖犖犢犖犖犖朽権犖 IT 犢犖犢犖犖犢犖犖
犢犖犖劇犖犖∇犖犖萎犖園犖犖о顕犖÷犖犢犖÷犢犖 犖犖迦 Security
SECURITY
CYBER
4. 4
EXAMPLE: LESSON LEARNED FROM OTHERS
SECURITY
CYBER
犖犢犖迦犖犖萎犖 | 犖犖犖犖÷顕犖 | 犖犢犖∇犖迦権 | 犖犖犢犖о権犖犖迦
!!! DATA BREACH
犖犢犖犖÷弦犖 SingHealth 犖犖迦牽犖犖園犖о犖犖ム犖犖 1.5 犖ム犖迦犖犖
ITU : Global Cybersecurity Index (GCI) 2017
WHY犖犖巌犖犢犖犖犢 犖犖園犖犖園 1
Security 犖犖犖犢犖ム
5. 5
犖∇幻犖犖犖犖迦肩犖犖犢 | 犖犖園犖犖迦犖 | 犖犖園犖犖迦犖犖犖÷顕犖
犖犖犖萎犖迦絹 CII | Incident Handling Flow
SECURITY
CYBER
CURRENT
SITUATION
犖犢犖迦硯犖犖項 TOP 20 犢犖犢犖犖∇犖迦犢犖
犖犖犖萎犖犖犢犖犖 犖犖園犖犖園 22 犖犖迦 194 犖犖犖萎犖犖
ITU : Global Cybersecurity Index (GCI) 2017
7. 7
犖犖朽犖÷顕: SANS
1. Inventory of Authorized and
Unauthorized Devices
2. Inventory of Authorized and
Unauthorized Software
3. Secure Configurations for Hardware
and Software
4. Continuous Vulnerability
Assessment and Remediation
5. Controlled Use of Administrative
Privileges
11. Secure Configurations for Network
Devices
12. Boundary Defense
13. Data Protection
14. Controlled Access Based on the
Need to Know
15.Wireless Access Control
犖犖÷顕犖∇犖犖犖:
HIPAA = Health Insurance Portability and Accountability Act
FFIEC = Federal Financial Institutions Examination Council
NERC CIP = North American Electric Reliability Corporation
Critical Infrastructure Protection
CSA = Cloud Security Alliance
6. Maintenance, Monitoring, and
Analysis of Audit Logs
7. Email and Web Browser
Protections
8. Malware Defenses
9. Limitation and Control of
Network Ports
10. Data Recovery Capability
16.Account Monitoring and Control
17.Security Skills Assessment and
Appropriate Training to Fill Gaps
18. Application Software Security
19. Incident Response and Management
20. Penetration Tests and Red Team
Exercise
20 CRITICAL SECURITY CONTROLS
RECOMMENDATION
SECURITY
CYBER
犖犖迦牽犢犖犢 Cybersecurity Framework (CSF)
犖犖о犖犖項犖犖園犖÷顕犖犖犖犖迦犢犖ム鍵犖犖犖犢犖犖犖ム犢犖迦犖犖о顕犖÷検犖園犖犖犖犖犖ム賢犖犖犖園権
犖÷顕犖犖犖犖迦犖犖園犖о 犢犖
ISO/IEC 27001 犖犖迦牽犖犖園犖犖迦犖о顕犖÷検犖園犖犖犖犖犖ム賢犖犖犖園権犖犖萎犖犖犖迦牽犖犖犢犖犖
HIPAA 犖犖犖犖÷顕犖∇犖伍犖÷犖犖犖犖犢犖犖÷弦犖ム肩犖伍犖犖迦 (犖犖犖犖園犖犢犖÷牽犖巌犖)
FFIEC 犖犖項犖÷厳犖犖犖迦牽犖犖犖о犢犖犖犖朽犖犖犖犖犢犖о権犖犖迦犖犢犖迦犖園犖犖項犖ム犖ム幻犢犖÷犖迦牽犢犖犖巌 (犖犖犖犖園犖犢犖÷牽犖巌犖)
NERC CIP 犖÷顕犖犖犖犖迦犖犖о顕犖÷検犖園犖犖犖犖犖ム賢犖犖犖園権犢犖犖犖ム幻犢犖÷犖項犖犖ム鹸犖犢犖犖犢犖 (犖犢犖÷牽犖巌犖迦犖犖犖劇賢)
犖÷顕犖犖犖犖迦犖犖朽 Specific 犢犖犖犖迦鍵犢犖犢犖ム鍵 Sector
犖犖犖巌犖迦牽 Cloud computing - CSA Star
犖犖ム幻犢犖÷肩犖迦犖迦牽犖犖犖伍 - ISO 27799
犖犖ム幻犢犖÷犖犖巌犖迦牽犖犢犖迦牽犖萎犖犖巌 - PCI DSS (Data Security Standard)
犖犖ム幻犢犖÷犖ム険犖犖犖迦犢犖犖犢犖 NERC CIP
8. 8
1. Security and Privacy by Design
2. Regular Audit
3. Asset Classification
4. Risk Management
5. Website Security Standard /
Website Application Standard
6. Government Monitoring System :
GMS by ThaiCERT
7. Best Practice
SECURITY
CYBER
INFORMATION
SECURITY
9. 9
1. Update Software
2. 犢犖÷犢犖犖犢 Password : 犖犖園犖犢犖犢犖∇顕犖 犖犢犖迦犖犢犢犖犢 犢犖犖ム元犢犖∇犖犢犖犖∇
3. Check 犖犢犖犖 Share
4. 犖犖項犖ム犢犖犖÷弦犖ム肩犢犖о犖犖伍犖犖
5. 犢犖÷犖犖ム犖犖 click link
TIPS FOR
SOCIAL MEDIA
SECURITY
CYBER