HOME >> About IPA >> Business Outline >> Creating a Secure and Reliable IT-based Society >> Protecting Society against IT Threats

Creating a Secure and Reliable IT-based Society

Protecting Society against IT Threats

 An IT-based society inevitably has IT “enemies” such as computer viruses which threaten security. IPA responds to such threats to help make IT-based society safer.

■Eliminating Security Weakness

 Security vulnerabilities in IT systems ordinarily go undetected, but problems occur when third parties exploit these vulnerabilities. Therefore, eliminating vulnerabilities is important to ensuring system security. IPA has a formidable capacity to collect information on vulnerabilities; we operate a website in cooperation with developers and other engineers to make information on vulnerability countermeasures freely available.

Figure 1. Number of Vulnerability Reports Received

Figure 2. System for Collecting Information:
Information Security Early Warning Partnership

Figure 3. IPA Efforts Against Vulnerabilities

■Preventing Computer Virus Infection and Unauthorized Access

 Computer viruses are malicious programs working without authorization inside IT systems; they leak important data and destroy systems. Unauthorized access refers to the external infiltration of IT systems without permission, and may involve overwriting websites (tampering) and stealing data.

 These malicious acts not only cause serious damage to IT systems, but also cause major social and fi nancial damage to system users. To protect users from these threats, IPA collects, studies and analyzes information on information security issues, and disseminates the latest alerts and information. IPA strives, through these activities, to realize a society where everyone can use IT systems, worry-free and in comfort.

Figure 4. Information Security Enquiries

Figure 5. Unauthorized Access Reports in 2010

Security Help Desk

http://www.ipa.go.jp/security/anshin/

 IPA established the Security Help Desk to field general enquiries regarding malware - including computer viruses - and unauthorized access, and give technical advice, so all citizens can use IT, worry-free. IPA’s help desks provide information through the website FAQ page to alleviate user concerns and offers further assistance to telephone, e-mail, fax, or postal enquiries.

Telephone +81-3-5978-7509
E-mail e-mail address image of Security Help Desk
FAX +81-3-5978-7518
Post Security Help Desk, IPA Security Center Bunkyo Green Court Center Offi ce, 16th Floor, 2-28-8 Hon-Komagome, Bunkyo-ku, Tokyo, Japan 113-6591

Figure 6. Web page image of the security Help Desk

■Improving e-Government Security and Reliability

 The government pursues an ongoing e-Government policy through the computerization of administrative work, which was until now paper-based, and is using IT for various procedures and information dissemination. Given the nature of the data handled, e-Government requires the strictest security and reliability to protect valuable information on citizens.

 As such, IPA jointly operates a project with the Ministry of Internal Affairs and Communications, the Ministry of Economy, Trade and Industry and other institutions to examine and evaluate encryption technology, and has published the e-Government Recommended Ciphers List, a list of usable encryption technology for e-Government.

 The encryption technology on this list-the security of which is constantly monitored by the project-can also be used by corporate and other users as information security measures for their IT systems.

■Increasing Security Awareness

 IPA publishes reports on the development and research results into security technology and releases them on its website. These reports are aimed at disseminating accurate information to general users for them to use IT systems with an appropriate knowledge of security issues.

Information Security White Paper & 10 Major Security Threats

 This annual white paper analyzes information security trends and future prospects in Japan and the world. The paper has various uses as reference material for IT system users and administrators to learn about information security and as a text on future countermeasures for people working with information security.

 The second part of the white paper identifies the 10 Major Security Threats, based on vulnerability reports received by IPA and general news reports. This list compiled by the 10 Major Security Threats Authors' Committee, which comprises researchers and practitioners in the information security field, is a good resource on what risks threaten the IT world, today, and the latest trends.

Figure 7. Information Security White Paper Figure 8. 10 Major Security Threats

10 Major Information Security Threats in 2012
No.1 Targeted Attack (APT)
No.2 Stopping business from natural disaster
No.3 Attacks conducted by Hactivist
No.4 Attacks to aim Client software's vulnerabilities
No.5 Attacks to aim Web Site
No.6 Attacks to aim Smart device
No.7 Certifi cate Authority (CA) was hacked
No.8 Inside threats
No.9 Account and Password were theft
No.10 Privacy problems

■Protecting the Future of Our IT-based Societ

 Advances in IT bring an increased risk of new, hitherto unimaginable dangers, so IPA established the Threat and Countermeasure Committee for experts across disciplines to gather and share their knowledge and expertise. The committee will investigate and analyze the new types of dangers threatening IT systems, consider countermeasures, and publish the results for users.

 The aim of the committee is to protect the security of our IT-based society long into the future.