Chung-Ang University Hospital Case Study

Opened in 1968, Chung-Ang University Hospital is classified as a large hospital with 893 beds and 202 hospital rooms. In the early 2000s, by introducing a full EMR (Electronic Medical Record) system that eliminates paper, charts, and films, at the same time as Konkuk University Hospital and Sinchon Severance Hospital, Chung-Ang University Hospital has been one step ahead in the IT field.

The Personal Information Protection Act came into effect in 2011 and made it compulsory to keep log records (access records) for six months and to install anti-virus programs and firewalls to manage them safely. Because of this, not only general companies and those in the financial sector, but hospitals also had to strengthen their security and management of infrastructure containing personal data.

Amendment to the Personal Information Protection Act came into effect on August 7, 2014. In compliance with this amendment, the hospital is accountable for preventing forgery and storing access history of personal data. The burden of proof is on the hospital, should a personal data breach occur based on the enforcement of the Personal Information Protection Guidelines for medical institutions.

Accordingly, Chung-Ang University Hospital saw the necessity to deploy a log management system to triage and analyze internal data breaches.

Kim Young-gwi, head of the IT at Chung-Ang University Hospital, said, "Not just because of the Personal Information Protection Act, but we also thought consolidation of log events were necessary and started looking into solutions”

To provide more secure protection of personal data, Chung-Ang University Hospital has deployed various security devices. As a result, a unified control system could not be established. The main purpose of the “Log consolidation” project was to make it possible to know the status of all systems and servers at a glance.

Chung-Ang University Hospital runs about 100 servers and network devices with two HP Superdome 2 as its core. The amount of log records generated per day on these devices is about 20 gigabytes.

Chung-Ang University Hospital tested log management platforms that could process large-scale logs, such as Splunk; however, foreign solutions proved improper for real-time support and timely maintenance. “We tested foreign solutions for 4-5 months. However, a domestic engineer could not give us a quick answer about the function we requested. For example, when requesting UI improvement, we had to wait until the head office responded, which was time-consuming and cumbersome.”

Logpresso was the choice of Chung-Ang University Hospital. At that time, Logpresso had been used in many FDS in the financial sector, but it had not been deployed in any hospitals. However, Chung-Ang University Hospital was convinced that Logpresso could provide the function that Chung-Ang University Hospital required and ran a PoC (Proof of Concept) test for a sufficient time to confirm its reliability.

Team leader Kim explained, “It has been inconvenient to manage all the individual servers, network devices through a separate monitor. We needed an integrated monitoring system. We thought it would have been better if we could monitor the server status as well at the same time. Logpresso had all the functions, so we verified its functionality.”

Finally, a log management system was deployed based on Logpresso, and Chung-Ang University Hospital unified the monitoring of cyber security solutions.

Against the recent rash of ransomware attacks from China, Chung-Ang University Hospital is ready to effectively respond. Kim said, “When an abnormal signal is detected through the monitor, a system can identify the cause immediately. We now plan to improve the user interface in the future.”

Meanwhile, Chung-Ang University Hospital is also working on upgrading its log management system. It considers the establishment of a clinical data warehouse (CDW) that applies big data technology based on the log management system. Kim explained that it considers introducing a system that allows professors to easily find research data based on the engine applied in log management. “Future big data technology in hospitals will be evolved to assist doctors’ research,” added Kim.

2401@ddaily.co.kr

Read the original article here: http://m.ddaily.co.kr/m/m_article/?no=141522

See Also

More

NH Investment & Securities Case Study

The winds of change are blowing in the IT field of the securities industry. Introducing cutting-edge IT technologies from big data, artificial intelligence (AI), open banking, and the cloud to blockchain technology, now it is taking a step forward in the financial technology innovation, leaving incomplete security systems and outdated infrastructure behind. Let's meet the IT executives of major securities companies and hear about their new technology introduction plans and recent achievements. The first interviewee is Baek Jong-woo, Chief Information Security Officer (CISO, Managing Director) of NH Investment & Securities, who is hunting for scam bank accounts using big data technology. “By using big data to automatically search for suspicious accounts in real-time, the accuracy of scam accounts detection has been increased. It also significantly saves time.” Jong-woo Baek, chief information security officer (CISO, managing director) of NH Investment & Securities at the NH Nonghyup Foundation office in Yeouido, Seoul, on the 13th, told us the results of the recently built big data-based scam accounts monitoring system. On the 9th of last month, the NH Investment & Securities Information Protection Department, led by Managing Director Baek, built the industry's first big data-based scam accounts monitoring system. With this, 4 scam accounts have been identified and caught in the past month. NH Investment & Securities' scam accounts monitoring system is an upgraded version of the fraud detection system (FDS) built in 2014. Ahead of other securities companies, NH Investment & Securities has focused on integrating big data technology into the existing system. It was certain that there was a limit to practically detecting abnormal trading only with FDS. “Most cases of using scam accounts are such as that a transaction occurs suddenly from an inactive account, or that an automatic online or offline withdrawal is made immediately after deposition at a random ATM. We need to construct the big data platform to analyze scam account networks.” Baek said. "At that time in 2014, with the Financial Investment Association, six securities companies gathered to implement an FDS by purchasing a solution together, but big data technology was not included in the proposed solution," he said. “We were already certain that big data technology would play a larger role in the future and started to build our own solution.” NH’s monitoring system applies 30 to 40 of its own rules and 10 scenarios that reflect the characteristics of scam accounts to the vast amount of collected data. If a suspicious account is identified, it sends a notification message to the operator. The operator checks and transmits the scam account information to the Korea Federation of Banks and related institutes. Then the Korea Federation of Banks requests the associated financial institution for confirmation and then takes measures such as suspension of payment. This big data-based scam account monitoring system has significantly reduced costs of time and manpower. While the existing FDS analyzes 400,000 cases per day, this monitoring system can analyze more than 700,000 cases per day. The scope of data collected has also been broadly expanded from the internet banking transactions to all account transactions at each branch, CDs and ATMs, and suspicious account activity detected by the KFTC (Korea Financial Telecommunications & Clearings Institute), and accounts with temporary withdrawal suspension. The detection method has also been diversified. Not only does this require the 2-factor authentication step before transfer but also checks the main transaction log and history simultaneously. “In the past, 2 personnel had to monitor 300 to 500 suspicious accounts manually. But it was, of course, difficult to see them all day long. Now, thanks to the automated system, it requires only one person to check for an average of 70 cases per day, which takes an hour or two,” he explained. Enterprise-wide support made it possible to introduce such advanced technology before others. One billion won has been invested in the monitoring system. From this month, it also started to develop an integrated monitoring system that can analyze correlations between log data generated by various security solutions together. Director Baek said, “Personal data breach and illegal transactions in the financial sector undermine the public trust in the financial sector. It is a non-negotiable choice that we made a large investment to overcome this situation and improve our reputation.” “By launching our new SIEM system in early December, we are expecting to prove more enhanced security posture.” <Reporter Yoojung Kim> clickyj@dt.co.kr Read the original article here: [http://www.dt.co.kr/contents.html?article_no=2016061402100658759001](http://www.dt.co.kr/contents.html?article_no=2016061402100658759001)

2016-06-13

BNK Busan Bank Case Study

With the goal of “redesigning its security architecture innovatively,” BNK Busan Bank has built a cyber security platform over the past two years. More specifically, it is an cyber security platform based on risk assessment. Last year, the BNK deployed a SIEM (Security Information & Event Management) platform and cyber security portal based on big data technology to achieve efficient security operations. After adopting the risk management system to the platform, it recently launched full-fledged operations of the platform. Jeon Seong-in, the head of the Information Security Department at BNK Busan Bank, said, “This is to create an environment where we can effectively handle cyber risk by conducting a solid risk assessment, rather than just relying on unprioritized alert responses. We took our first step to not only identify potential risks and respond quickly but also to assess our security operations and investments and ultimately prove their effectiveness.” Cyber threats are becoming more diverse, sophisticated, and intelligent. The number of security solutions operated by an enterprise continues to increase. However, qualified security professionals are insufficient. Not only in Korea, but most companies around the world are also facing the same challenge. It is very difficult to analyze logs and events from numerous systems and prioritize important threats and respond quickly. SOC (Security operation center) is often criticized that even running dozens of security solutions only resulted in increasing system complexity and disappointing security effectiveness. BNK was in a similar situation. The information security department at BNK operates about 160 individual systems, from threat response to internal audit, personal and credit information protection, fraud detection and response, security planning, education, and compliance reporting. There are more than 50 types of security products which generate 150 gigabytes (GB) of logs every day. It is never easy for about 10 security professionals to identify, analyze, and handle the threats and risk factors. Director Jeon said, “We can no longer handle the cyber security issues simply by relying on the know-how, skills, or manual work of our personnel. The number of security products and the size of the IT work environment have increased. The more solutions we utilize, the more management points we need to take care of.” He added, “We saw the necessity to build an incident response process by establishing an integrated platform providing standardized indicators to filter threats and refine risk factors.” Busan Bank had long been operating an enterprise security management system (ESM) and expanding the network by operating a comprehensive control system. It associated ESM with other security solutions, threat management system (TMS), system management (SMS) and network management (NMS) systems as well. However, even in this way, there was a limit to analyzing data from the network, application, and user domain levels. After deriving opportunities and risks from SWOT (strengths, weaknesses, opportunities, and threats) analysis, BNK Busan Bank began to work on its innovative security infrastructure. Director Jeon said, “We made an integrated platform by using new technologies such as big data analysis and combining existing system resources. But the important thing here is you can’t have an integrated platform optimized for your needs by only using solutions provided by vendors. In order to create a platform that is optimized for our own organizational environment, it is necessary to understand the company’s information assets, internal security regulations, security awareness among members, and threat landscape. And you have to continuously refine it using other solutions.” To optimize its integrated platform, BNK Busan Bank defined its own threat scenario and independently created a threat management process and configuration management database. The task-based threat model analysis (TMA) method is applied to create threat scenarios. Currently, the Busan Bank cyber security platform collects the entire event log of security devices, and stores and analyzes the logs. In addition, a BI (Business Intelligence) system is applied for correlation analysis and drilldown. Middleware with a context database (DB) and correlation analysis function has been deployed to facilitate communication between the SIEM and the BI system. Middleware also provides alert notifications for threat or system failure. Along with this, the SIEM can perform in-depth investigations by associating with the external threat intelligence service and the network forensic system that can store and analyze all traffic. The risk management system is connected with the BI system and cyber security portal. In the cyber security portal, you can see security posture at a glance on the dashboard screen using multi-dimensional graphs, and inquire about the necessary information with ease. “It filters only threats that need an explanation and notifies the person in charge, who will take action according to an automated process. Key risk indicators are displayed in real-time,” explained Director Jeon. He continued, “Before applying big data technology, it was difficult to analyze a high volume of logs in an intended way. It now refines and integrates context information while maintaining the consistency of raw data, systematizes all processes and visualizes the security posture to ensure that not only security personnel but also management can see them. It means that all members of the organization can now perform security-related roles without exception.” Director Jeon said, "Thanks to the information security risk management system, it can identify risk level and high-priority issues by evaluating the value of assets and threat vulnerability, and provides the timing and measures." This means we can measure and quantify security issues to create a standardized indicator,” he emphasized. BNK’s cyber risk management system operates using an automated risk assessment process for security threats derived from the big data-based SIEM and context awareness technology. It is now possible to evaluate and calculate the level of risk from a business point of view, considering the importance of the information assets currently possessed, threats and vulnerabilities that cause damage, and provide objectives and strategic indicators. This is a KPI (Key Risk Indicator). Director Jeon said, “Based on the level of risk according to the value of the organization’s information assets, we derive measurable indicators and risk assessments. If this process is standardized and optimized, it is expected to present a more accurate ROI for security investment.” Director Jeon explained, “By automating the incident response process, which was often handled manually, it is now possible to implement a standardized process from threat detection, triage, response, and verification. As the level of data analysis has been increased, better threat visibility has been secured, and work efficiency has improved as various threats can now be quickly identified through correlation.” Busan Bank uses Logpresso as its big data-based SIEM platform and RSA Archer as its cyber risk management platform. In addition to these solutions, BNK Busan Bank has also formed independent control and operation rooms to quickly respond to intrusion incidents and is operating efficient security controls. Research is also going on to apply machine learning technology to security control to detect advanced threats and increase its accuracy. The case of a SIEM platform with big data and BI technology won the top prize in the financial security best practice competition held by the Financial Security Institute last year. Woo Seong-hoon, Section manager of the information security department at BNK Busan Bank, and Kim Min-joon, assistant manager and other 3 personnel wrote this project thesis. <Reporter Lee Yoo-ji> yjlee@byline.network Read the original article here: https://byline.network/2019/06/12-51/

2019-06-12

SK Planet Case Study

On the 14th, Answer (CEO Park Jun-Hyung) announced that it had completed a big data platform project for SK planet (CEO Seo Jin-woo). SK planet has now deployed a security incident detection and triage system by using a log management solution and WORM (Write Once, Read Many) storage. It solves compliance issues for the Personal Information Protection Act, the Information and Communications Network Act and the Electronic Financial Transactions Act. Answer deployed Logpresso platforms to five internet data centers operated by SK planet. Logpresso is a solution that stores logs in WORM disks that cannot be forged or tampered with, and supports audits, incident investigations and responses. Numerous event logs collected from heterogeneous systems are analyzed and integrated into a single UI, which ensures the confidentiality and integrity of the original log. It also supports real-time event analysis and forensic log analysis for follow-up. It is possible to detect system log events and to set thresholds such as real-time notification servers, networks, and operating systems. The CEO of Answer said, “Demand for big data security solutions will increase not only in big data platforms but also in the fintech industry, including simple payment. We are focusing on securing new customers in related fields in the second half of this year.” <Reporter Kim In-soon> insoon@etnews.com Read the original article here: [https://www.etnews.com/20150914000221](https://www.etnews.com/20150914000221)

2015-09-14