SlideShare a Scribd company logo
0/8
Name Infosec CEO Shin Soojung
Domains
Security Consulting
Security System Integration
Security Monitoring & Management
Professional Service
Period Jun, 2000 ~ Present (13yrs)
Infosec is an affiliate company of SK C&C and a total Security Service Provider,
providing Security Consulting Service, Security System Integration, Security Monitoring and Management
Company Summary
Sales
Organization
CEO
MSS
Biz HQ
Sales HQ
Solution
Biz HQ
Consulting
Biz HQ
Management
Support HQ
Security
Lab.
860 Employee (May. 1st. 2013)
Products
Mobile
Device
Mgmt.
Private
Information
Scanner
Private Information
Transfer Control
(USD)
Years 2012 2011 2010
Consulting 14,575,000 13,048,000 10,792,000
SI 53,190,000 53,449,000 37,631,000
MSS 33,204,000 21,519,000 14,525,000
Total 100,969,000 88,016,000 62,948,000
Growth (%) 14.7 39.8 45.9
2
Windows Linux UNIX CISCO S/W
Prevention
OS Configuration Check
FW ACL Review
Web Application
Vulnerability Check
Juniper Cisco Port Scanning /w NMAP
Scanners (IBM AppScan) Professionals
Management
& Monitoring
Firewall
IPS
Anti-DDoS
WAF
Incident
Analysis
Infected System
Investigation
Malicious Code Review
Security Audit Trail Review
File System Registry / Log Process Memory
Dynamic Analysis Static Analysis
Security Events System/Web Log IE Cache History Registry
24*7
Health
Check
ACL Control
Report24*7
Security
Event
Monitoring
24*7
Incident
Handling
(Alerting &
Access Control)
Dedicated
Professionals
SK Infosec provide full coverage of managed security service in Korea, prevention,
management, monitoring, and incident handling
3
 Organization (CERT Center)  R&R
ITEM R&R
PM • Project Management / Service Delivery
Top-CERT • Cyber Forensic
Site Manager
• Follow up Customer Requirements
• SPOC(Single Point Of Contact)
Dedicated CERT
• Apply security policies
• 1st line support when breaches occurs
• Periodic Report about security situation
CERT
• 2nd line support when dedicated CERT
failed
• Veterans in Analyzing Incidents (at least 7
year experiences)
• Find zero-day exploits and figure out
countermeasures
Monitoring
• 24H*365D Real-time monitoring
• 4 Teams / 2 Teams a day
Penetration
Tester
• White-hat Hackers
• Simulated Hacking and Point out Vulns.
Security Engineer
• Install and Maintain Security Systems
• Technical Review about Network
Architecture in the view point of Security
CERT
MSS Biz Team
Lee Jaewoo
CERT Team / PM
Son Youngwoo
Monitoring
Penetration
Tester
System
Manager
Security
Engineer
Site
Manager
Top-CERT
System
Developer
Dedicated
CERT
MSS Biz HQ
Cho Raehyun
4
Detect incident Customer’s suspicious
Prior attacker IP block
Send incident alerting message to customer
Attacker IP block
- IP address boundary (ex : from China)
- Event list (ex : /etc/passwd scanning)
- Time base (ex : night time / 18:00~next day 09:00)
- No agreement of “block and notice”
- When customer orders to block attacker IP
Send abuse notification to attacker-side ISP
Release blocked IP - Release blocked IP address one month later
- Because we use dynamic IP address, it is no more malicious, it can be
customer
When incident is detected and verified, SK Infosec alerts customer via E-Mail and SMS.
If customer agreed the process “block and notice”, SK Infosec will block attacker IP from
Firewall prior
5
In-house ESM detects incidents from security events according to ISMM, SK Infosec’s own
monitoring methodology, ISMM
Detected Incident with its
event name, count, src IP,
dest IP, and status
Security
Incident
Incident is expanded with
its detail information to
check whether it is true or
false
Detail
Info.
Who deals this incident
and whether he send
alerting to customer and
attackers ISP
Response
ISMM : Infosec Security Monitoring Methodology
6
APT is one of the big trends in security world. SK Infosec bind IPS signature and malware
analyzing tool and provides zero-day exploit detection
Storage
Malicious code
download
(from Event URLs)
Event detected
(IBM Proventia)
URL Collection File transfer
Multi-AV Scan ReportingESM
Block in FW
Malicious code
Storage
Malicious code Analysis & Detection
Collect Malicious Code Store Malicious Code Analyze Malicious Code Report Malicious Code
7
Two types of service will be provided. For IPS monitoring service customer, when attack is
occurred, SK Infosec checks the victim system to investigate extent of damage. For
potential customer, SK Infosec checks whether his system is infected or not.
Step Process Investigation Item
1 Initial Stage
- Environmental Info.
- System process
- Network situation
2
Victim
system
investigation
- Attack scenario
- Time-line analyze
- Investigation tools
- Infected files
3
Log file
analysis
- Event log
- System log
- Web log
- Security equipment log
4
Report and
Feedback
- Incident handling report
- Root cause
- Design countermeasure
- Recommendation
VolatileDataNon-VolatileData
System Info
File System
User
Registry
Weblog
Webshell
Network
Process
Date System Config Environmental
Login info Users User activity
Network connection ARP Interface info
Process List Handle, dll Services
Event log File attribute MACTIME
Registry Dump Autorun Key creation time
Web attack Keyword Webshell execution Keyword
Webshell Keyword Encoding Keyword
Category Item
8
 Availability Check Coverage
- Security Systems
- IT Assets agreed on SOW
 Checking Criteria
- 24H*365D Monitoring
- Basically ICMP Health-Check is provided
- If needed, Infosec provide Service check based on ports
 Tools
- Infosec develops an in-house NMS using Open Source NMS (called Nagios)
Function Comments Notes
. Alive-Check . ICMP and Service Port Check
. Developed in Jun. 2011
. Internal Test on Sept. 2011
. Applied on Customer Site
in Oct. 2011
. Threshold Mgmt.
. Traffic, CPU, Memory check via SNMP provide warning
. Network Equipments
. Log Analyze . Analyze error log from Security Systems
. Customer Report . Monitoring Tool and Automated SMS report
9
Name of Event (Trouble)
Who, When, How, Why
handle the Event
Detail Information of Event
Simple
Trouble Shooting Procedure
10
Web hacking occupies 90% of attacks. In order to get the control of victim, hackers use
web-shells and then insert a script-code in web pages to dispense malware to client.
Web hacking occupies 90% of attacks. In order to get the control of
victims, hackers use web-shells
Monitoring homepage and ad-pages whether malware is inserted or
not
In-house pattern
(Our experience)
Filter
Obfuscation
Appliance
System
At least
1 time per 2 hours
Recursive checking Indicate actual link
W-MDS
11
SK Infosec provides monthly report with automated system to avoid human errors. But
executive summary is written by security experts
Item Content Note
Executive summary
Security expert’s opinion about site
situation and recommendation
Event trend by day Detected event count by day diagram and table
Event trend by severity Detected event count by severity diagram and table
Top 10 event
By event name, attacker’s IP, and
victim’s IP
Including event
description
12
Intelligence Gathering
SK-NET Mobile/Wireless Financial Sector
Industry
Cooperation
BMT
Analyzing and Testing
Information Sharing
(Back-Line Support)
u-CERT Center
ISP / IDC
Malware
Information
Gathering
Sharing
Analyzed
Information
범 례
Consulting HQ CHINA
ISCM
IVHM
IPPM
Site Manager CISO
Security Planning Proactive
Security Trend
Support
Compliance issues
Provide Security Info.
Monitoring by ISMM
Prevention
Detection
Customer
SEOCHO
T-Tower
SUNAE
HR, Finance, Law IT Infra/System, NW
13
China Beijing 安全中心
Japan
Audio Technica
Dwango
TOKAI Communication
Tobu Train
Nexway (Intec Cloud)
Planet (Intec Cloud)
DCJ (Intec Cloud)
 Service on China & Japan  Cloud Service Security
- SKTelecom T-Cloud Service
- Japan Intec Cloud Service
< Intec Center >
 Japan IDC Security Service
- Canon-ITS IDC
< T-Cloud Service >
14
Security
Operation
Security
Consulting
Security
SI

More Related Content

PDF
20 Security Controls for the Cloud
PPTX
Incident Response: Validation, Containment & Forensics
PDF
The Dynamic Nature of Virtualization Security
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PDF
Cheatsheet for your cloud project
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
20 Security Controls for the Cloud
Incident Response: Validation, Containment & Forensics
The Dynamic Nature of Virtualization Security
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
DTS Solution - Building a SOC (Security Operations Center)
Building a Cyber Security Operations Center for SCADA/ICS Environments
Cheatsheet for your cloud project
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...

What's hot (20)

PDF
DTS Solution - Penetration Testing Services v1.0
PPTX
Overview of Google’s BeyondCorp Approach to Security
PPTX
SIEM 101: Get a Clue About IT Security Analysis
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PDF
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
How to Simplify Audit Compliance with Unified Security Management
PDF
Bulding Soc In Changing Threat Landscapefinal
PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
PDF
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
PPTX
Security operation center (SOC)
PPT
Networking and penetration testing
PPTX
Netpluz Managed SOC - MSS Service
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PPTX
Extending the 20 critical security controls to gap assessments and security m...
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Ethical Hacking & Penetration Testing
PDF
FireEye - Breaches are inevitable, but the outcome is not
DTS Solution - Penetration Testing Services v1.0
Overview of Google’s BeyondCorp Approach to Security
SIEM 101: Get a Clue About IT Security Analysis
VAPT - Vulnerability Assessment & Penetration Testing
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
From SIEM to SOC: Crossing the Cybersecurity Chasm
Wfh security risks - Ed Adams, President, Security Innovation
How to Simplify Audit Compliance with Unified Security Management
Bulding Soc In Changing Threat Landscapefinal
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Security operation center (SOC)
Networking and penetration testing
Netpluz Managed SOC - MSS Service
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Extending the 20 critical security controls to gap assessments and security m...
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Malware detection how to spot infections early with alien vault usm
Ethical Hacking & Penetration Testing
FireEye - Breaches are inevitable, but the outcome is not
Ad

Similar to Infosec cert service (20)

PPT
Intrusion detection 2001
PPTX
Managed Security Operations Centre Alternative - Managed Security Service
PDF
Event Presentation: Cyber Security for Industrial Control Systems
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PDF
Demonstrating Information Security Program Effectiveness
PPTX
Managing security threats in today’s enterprise
PPTX
Information Security in a Compliance World
PDF
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PPT
SLVA - Security monitoring and reporting itweb workshop
PDF
Primer for Information Security Programs
PPTX
Security Threat Presentation
PDF
CNIT 121: 2 IR Management Handbook
PPT
Intrusion Detection Presentation
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PPTX
Vulnerability Management
PPTX
17 info sec_ma_imt_27_2_2012
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
Intrusion detection 2001
Managed Security Operations Centre Alternative - Managed Security Service
Event Presentation: Cyber Security for Industrial Control Systems
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Demonstrating Information Security Program Effectiveness
Managing security threats in today’s enterprise
Information Security in a Compliance World
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Information Security - Back to Basics - Own Your Vulnerabilities
SLVA - Security monitoring and reporting itweb workshop
Primer for Information Security Programs
Security Threat Presentation
CNIT 121: 2 IR Management Handbook
Intrusion Detection Presentation
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Vulnerability Management
17 info sec_ma_imt_27_2_2012
Today's Cyber Challenges: Methodology to Secure Your Business
Ad

More from Minh Le (10)

PDF
Blackstone
PPT
Dien toan dam may nguon mo - Ung dung trung tam du lieu Da Nang
PPT
Chia sẻ kinh nghiệm phát triển hạ tầng CNTT Đà Nẵng - Mạng đô thị (MAN) và Tr...
PPTX
Slide nagios
PDF
SK infosec company profile
PDF
Custom defense - Blake final
PDF
Sing Tel - Designing security into datacenter - Gerald Tang
PDF
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
PDF
Cloud computing and OpenStack
PDF
Cloud computing and OpenStack
Blackstone
Dien toan dam may nguon mo - Ung dung trung tam du lieu Da Nang
Chia sẻ kinh nghiệm phát triển hạ tầng CNTT Đà Nẵng - Mạng đô thị (MAN) và Tr...
Slide nagios
SK infosec company profile
Custom defense - Blake final
Sing Tel - Designing security into datacenter - Gerald Tang
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Cloud computing and OpenStack
Cloud computing and OpenStack

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
sap open course for s4hana steps from ECC to s4
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Machine Learning_overview_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4

Infosec cert service

  • 1. 0/8
  • 2. Name Infosec CEO Shin Soojung Domains Security Consulting Security System Integration Security Monitoring & Management Professional Service Period Jun, 2000 ~ Present (13yrs) Infosec is an affiliate company of SK C&C and a total Security Service Provider, providing Security Consulting Service, Security System Integration, Security Monitoring and Management Company Summary Sales Organization CEO MSS Biz HQ Sales HQ Solution Biz HQ Consulting Biz HQ Management Support HQ Security Lab. 860 Employee (May. 1st. 2013) Products Mobile Device Mgmt. Private Information Scanner Private Information Transfer Control (USD) Years 2012 2011 2010 Consulting 14,575,000 13,048,000 10,792,000 SI 53,190,000 53,449,000 37,631,000 MSS 33,204,000 21,519,000 14,525,000 Total 100,969,000 88,016,000 62,948,000 Growth (%) 14.7 39.8 45.9 2
  • 3. Windows Linux UNIX CISCO S/W Prevention OS Configuration Check FW ACL Review Web Application Vulnerability Check Juniper Cisco Port Scanning /w NMAP Scanners (IBM AppScan) Professionals Management & Monitoring Firewall IPS Anti-DDoS WAF Incident Analysis Infected System Investigation Malicious Code Review Security Audit Trail Review File System Registry / Log Process Memory Dynamic Analysis Static Analysis Security Events System/Web Log IE Cache History Registry 24*7 Health Check ACL Control Report24*7 Security Event Monitoring 24*7 Incident Handling (Alerting & Access Control) Dedicated Professionals SK Infosec provide full coverage of managed security service in Korea, prevention, management, monitoring, and incident handling 3
  • 4.  Organization (CERT Center)  R&R ITEM R&R PM • Project Management / Service Delivery Top-CERT • Cyber Forensic Site Manager • Follow up Customer Requirements • SPOC(Single Point Of Contact) Dedicated CERT • Apply security policies • 1st line support when breaches occurs • Periodic Report about security situation CERT • 2nd line support when dedicated CERT failed • Veterans in Analyzing Incidents (at least 7 year experiences) • Find zero-day exploits and figure out countermeasures Monitoring • 24H*365D Real-time monitoring • 4 Teams / 2 Teams a day Penetration Tester • White-hat Hackers • Simulated Hacking and Point out Vulns. Security Engineer • Install and Maintain Security Systems • Technical Review about Network Architecture in the view point of Security CERT MSS Biz Team Lee Jaewoo CERT Team / PM Son Youngwoo Monitoring Penetration Tester System Manager Security Engineer Site Manager Top-CERT System Developer Dedicated CERT MSS Biz HQ Cho Raehyun 4
  • 5. Detect incident Customer’s suspicious Prior attacker IP block Send incident alerting message to customer Attacker IP block - IP address boundary (ex : from China) - Event list (ex : /etc/passwd scanning) - Time base (ex : night time / 18:00~next day 09:00) - No agreement of “block and notice” - When customer orders to block attacker IP Send abuse notification to attacker-side ISP Release blocked IP - Release blocked IP address one month later - Because we use dynamic IP address, it is no more malicious, it can be customer When incident is detected and verified, SK Infosec alerts customer via E-Mail and SMS. If customer agreed the process “block and notice”, SK Infosec will block attacker IP from Firewall prior 5
  • 6. In-house ESM detects incidents from security events according to ISMM, SK Infosec’s own monitoring methodology, ISMM Detected Incident with its event name, count, src IP, dest IP, and status Security Incident Incident is expanded with its detail information to check whether it is true or false Detail Info. Who deals this incident and whether he send alerting to customer and attackers ISP Response ISMM : Infosec Security Monitoring Methodology 6
  • 7. APT is one of the big trends in security world. SK Infosec bind IPS signature and malware analyzing tool and provides zero-day exploit detection Storage Malicious code download (from Event URLs) Event detected (IBM Proventia) URL Collection File transfer Multi-AV Scan ReportingESM Block in FW Malicious code Storage Malicious code Analysis & Detection Collect Malicious Code Store Malicious Code Analyze Malicious Code Report Malicious Code 7
  • 8. Two types of service will be provided. For IPS monitoring service customer, when attack is occurred, SK Infosec checks the victim system to investigate extent of damage. For potential customer, SK Infosec checks whether his system is infected or not. Step Process Investigation Item 1 Initial Stage - Environmental Info. - System process - Network situation 2 Victim system investigation - Attack scenario - Time-line analyze - Investigation tools - Infected files 3 Log file analysis - Event log - System log - Web log - Security equipment log 4 Report and Feedback - Incident handling report - Root cause - Design countermeasure - Recommendation VolatileDataNon-VolatileData System Info File System User Registry Weblog Webshell Network Process Date System Config Environmental Login info Users User activity Network connection ARP Interface info Process List Handle, dll Services Event log File attribute MACTIME Registry Dump Autorun Key creation time Web attack Keyword Webshell execution Keyword Webshell Keyword Encoding Keyword Category Item 8
  • 9.  Availability Check Coverage - Security Systems - IT Assets agreed on SOW  Checking Criteria - 24H*365D Monitoring - Basically ICMP Health-Check is provided - If needed, Infosec provide Service check based on ports  Tools - Infosec develops an in-house NMS using Open Source NMS (called Nagios) Function Comments Notes . Alive-Check . ICMP and Service Port Check . Developed in Jun. 2011 . Internal Test on Sept. 2011 . Applied on Customer Site in Oct. 2011 . Threshold Mgmt. . Traffic, CPU, Memory check via SNMP provide warning . Network Equipments . Log Analyze . Analyze error log from Security Systems . Customer Report . Monitoring Tool and Automated SMS report 9
  • 10. Name of Event (Trouble) Who, When, How, Why handle the Event Detail Information of Event Simple Trouble Shooting Procedure 10
  • 11. Web hacking occupies 90% of attacks. In order to get the control of victim, hackers use web-shells and then insert a script-code in web pages to dispense malware to client. Web hacking occupies 90% of attacks. In order to get the control of victims, hackers use web-shells Monitoring homepage and ad-pages whether malware is inserted or not In-house pattern (Our experience) Filter Obfuscation Appliance System At least 1 time per 2 hours Recursive checking Indicate actual link W-MDS 11
  • 12. SK Infosec provides monthly report with automated system to avoid human errors. But executive summary is written by security experts Item Content Note Executive summary Security expert’s opinion about site situation and recommendation Event trend by day Detected event count by day diagram and table Event trend by severity Detected event count by severity diagram and table Top 10 event By event name, attacker’s IP, and victim’s IP Including event description 12
  • 13. Intelligence Gathering SK-NET Mobile/Wireless Financial Sector Industry Cooperation BMT Analyzing and Testing Information Sharing (Back-Line Support) u-CERT Center ISP / IDC Malware Information Gathering Sharing Analyzed Information 범 례 Consulting HQ CHINA ISCM IVHM IPPM Site Manager CISO Security Planning Proactive Security Trend Support Compliance issues Provide Security Info. Monitoring by ISMM Prevention Detection Customer SEOCHO T-Tower SUNAE HR, Finance, Law IT Infra/System, NW 13
  • 14. China Beijing 安全中心 Japan Audio Technica Dwango TOKAI Communication Tobu Train Nexway (Intec Cloud) Planet (Intec Cloud) DCJ (Intec Cloud)  Service on China & Japan  Cloud Service Security - SKTelecom T-Cloud Service - Japan Intec Cloud Service < Intec Center >  Japan IDC Security Service - Canon-ITS IDC < T-Cloud Service > 14