Top Page | English | 简体中文 | 繁體中文 | 한국어 | 日本語
Tuesday, 6 November 2018, 15:26 HKT/SGT
Share:
    

Source: NEC Corporation
NEC Technology Automatically Identifies Cyberattack Risks for ICT Systems and Important Infrastructure

TOKYO, Nov 6, 2018 - (JCN Newswire) - NEC Corporation (TSE: 6701) today announced the development of a technology for automatically identifying the risk of cyberattacks. The new technology uses simulations in order to create a comprehensive evaluation of cyberattack risks for ICT systems and important infrastructure, such as electricity, gas, water, and transport facilities.

This technology collects information about components and complex network settings that are particular to control systems, as well as information on data flow, including information about isolated environments, from actual systems and reproduces a virtual model based on that information. The virtual model is used to run cyberattack simulations that enable the automatic identification of a variety of cyberattack risks.

Cyberattack simulations are created using analysis knowledge based on attacks utilizing e-mail and the Web, data falsification, spoofing, and attacks on isolated networks utilizing a USB and other techniques, in addition to knowledge(1) about software vulnerability and attack techniques that are extremely sophisticated and hard to understand. This makes it possible to create an exhaustive range of realistic attack simulations.

"This technology can identify potential attack paths and the scope of their influence, making it possible to implement the necessary security measures with a minimum of system outages," said Mikiya Tani, General Manager, Security Research Laboratories, NEC Corporation. "Moreover, the technology bolsters the security of social infrastructure and ICT systems for enterprises, while contributing to the safety of communities and the development of economic activity."

NEC aims to provide this technology commercially within the 2019 fiscal year.

Primary features of the new technology include the following:

1. Creation of a virtual model for accurate security risk analysis
NEC developed a technique to create a virtual model by collecting detailed system information necessary for risk analysis, such as the hardware information of components (programmable logic controller [PLC] and others) peculiar to control systems, communications settings, such as packets and protocols, and data flow.

This makes it possible to visualize the entire configuration of complicated systems and data flow, which has conventionally been difficult to understand, even for specialists with extensive experience and advanced skills in status analysis. With this technique, NEC achieves an immediate, accurate understanding of the areas of vulnerability in risk analysis.

2. Analysis of realistic attack scenarios utilizing an attack database
NEC created a database of analysis knowledge that is used to produce simulations with a computer. The database consists of information on software vulnerabilities and attack technique data(1), such as CVE and CAPEC, which are widely disclosed around the world, but can only be understood by specialists. By structuring and creating a database of common characteristics, such as the conditions under which attacks become feasible, the status of attackers, and the change in the status of systems that occurs when attacks succeed, a series of attack simulations, from the starting point to the goal of attacks, can be automatically and accurately created at high speed.

Further, because the database of analysis knowledge encompasses a variety of attack forms, such as attacks utilizing e-mail and the Web, data falsification, spoofing, as well as attacks on an isolated network utilizing a USB or other techniques, it is possible to create more realistic attack scenarios.

With this technology, an attack can be understood visually and automatically. Further, because the effectiveness of security when measures are taken can be repeatedly confirmed, potential security risks can also be found.

NEC will showcase this technology at the "C&C user forum & iEXPO 2018" held by the NEC Group at the Tokyo International Forum on Thursday, November 8 and Friday, November 9.

For more information, please visit: https://www.nec.com/en/event/uf-iexpo/

(1) A worldwide database that discloses information about a variety of software vulnerability and attack techniques collected by US-based companies.


Contact:
NEC
Seiichiro Toda        
s-toda@cj.jp.nec.com
+81-3-3798-6511


Topic: Press release summary
Source: NEC Corporation

Sectors: Cloud & Enterprise, CyberSecurity
http://www.acnnewswire.com
From the Asia Corporate News Network


Copyright © 2024 ACN Newswire. All rights reserved. A division of Asia Corporate News Network.


NEC Corporation Links

http://www.nec.com

https://www.facebook.com/nec.global/

https://twitter.com/NEC_corp

https://www.youtube.com/user/NECglobalOfficial

https://www.linkedin.com/company/nec/

NEC Corporation
Nov 20, 2024 14:30 HKT/SGT
Start of Demonstration Test of Two-Phase Direct-to-Chip Cooling in the Air-Cooled Data Center
Nov 18, 2024 16:29 HKT/SGT
World's First Successful Trial of Quantum Tokens Created Using Quantum Technology
Nov 13, 2024 11:05 HKT/SGT
Predictive Heart Monitoring Startup, GPx, Secures New Investment From NEC X; Joins Elev X! Boost Venture Studio Program
Nov 13, 2024 10:16 HKT/SGT
NEC receives order for next-generation supercomputer system from Japan's National Institutes for Quantum Science and Technology and National Institute for Fusion Science
Nov 12, 2024 18:25 HKT/SGT
NEC participates in COP29 climate change conference
Nov 8, 2024 09:31 HKT/SGT
Transgene and NEC Present New Data Confirming Clinical Proof of Principle for Neoantigen Cancer Vaccine, TG4050, in Head & Neck Cancer at SITC 2024
Nov 7, 2024 10:40 HKT/SGT
NEC and NEC Bio publish foundational work on T Cell Receptor engineering using proprietary generative AI at the Society for Immunotherapy of Cancer annual meeting
Oct 28, 2024 16:05 HKT/SGT
NEC launches new end to end private 5G solution with Cisco
Oct 25, 2024 20:59 HKT/SGT
Joint proposal by NTT, KDDI, Fujitsu, NEC, and Rakuten Mobile adopted as Japan's Ministry of Internal Affairs and Communications/NICT's "Innovative ICT Fund Projects for Beyond 5G/6G" for social implementation and overseas expansion oriented strategic program (common infrastructure technology establishment)
Oct 17, 2024 10:38 HKT/SGT
Regarding the transfer of sales functions related to NEC-brand PCs for commercial customers
More news >>
 News Alerts
Copyright © 2024 ACN Newswire - Asia Corporate News Network
Home | About us | Services | Partners | Events | Login | Contact us | Privacy Policy | Terms of Use | RSS
US: +1 214 890 4418 | China: +86 181 2376 3721 | Hong Kong: +852 8192 4922 | Singapore: +65 6549 7068 | Tokyo: +81 3 6859 8575

Connect With us: