‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

Japan’s Internal Affairs and Communications Ministry has decided to create decoy computer systems to combat cyber-attacks

The decoy systems would resemble actual systems used by the government and well-known companies, and be used to attract computer viruses so the government can observe and analyse their routes of infection and other characteristics.

If a new cyber-attack’s traits can be understood quickly, it could help in the creation of protective measures.

The National Institute of Information and Communications Technology, which the ministry oversees, plans to start building such systems in earnest in fiscal 2018 so they can be operational as soon as possible.

Cyber-attacks often use methods such as email to infect the systems of companies and other entities with a virus. Once inside, the virus can spread, enabling the attacker to steal information or control the system remotely. Yet how viruses function once inside a system and continue to spread is often not well understood.

To prevent a virus from spreading, its method of attack, route of infection and other characteristics need to be identified quickly to come up with countermeasures. However, companies that are damaged by cyber-attacks are often unwilling to share information externally, which means the infection may spread to other entities without countermeasures being taken.

This latest plan would involve creating a cyber-space that closely resembles a corporate system. Once a virus is lured in, its actions would be observed, and this information would be shared among companies involved in fighting cyber-attacks, to create ways of preventing or containing infections.

The ministry is keen to get these decoy systems operating quickly, so it will include ¥200 million for this purpose in its requests for the fiscal 2018 budget. The funds would be used to develop systems and other tools to share the results of the observations and analyses among related companies.

The Japan News

You Might Also Read:

China’s South Sea Cyber War:

WannaCry Returns To Attack Honda:

 

« Police Spy On Their Own: Twitter Accounts Scrutinised
Car Industry In Crisis Over AI and Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

TempoCap

TempoCap

TempoCap is a European growth-stage technology fund with offices in London and Berlin. We invest across a variety of high- growth sectors including cybersecurity.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.