The Ministry of Defence (MINDEF)’s Defence Cyber Chief, Mr David Koh, has announced the MINDEF Bug Bounty Programme during the sidelines of his visit to the Cyber Defence Test and Evaluation Centre (CyTEC) earlier on Tuesday (12 December).

In a first for a Singapore Government agency, selected white hat hackersfrom around the world will test major MINDEF Internet-facing systems for vulnerabilities (or “bugs”) and will receive rewards (or “bounties”) for doing so.

White hat hackers are computer security specialists who break into protected systems and networks to test and assess their security. These hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.

“Cyber is a new battlefront,” he said.

He then stressed that Singapore is constantly exposed to the increasing risk of cyberattacks, and MINDEF is an attractive target for malicious cyber activity.

“As hackers with malicious intent find new methods to breach networks, MINDEF must constantly evolve and improve its defences against cyber threats,” he noted.

Emphasising the importance of strengthening Singapore’s cyber defences amidst this changing landscape, Mr Koh said that the programme, utilising crowdsourcing, is one such innovative and effective way of doing so.

He said, “This is the first time that MINDEF is launching such a bold programme. White hat hackers participating in this programme will be given the mandate to ‘hack’ MINDEF, to find bugs in our major Internet-facing systems. For each valid and unique bug that the hacker finds, he will receive a bounty.”

On the need for such a programme, Mr Koh said that it is not possible to fully secure modern computer software systems, and new vulnerabilities are discovered every day. He added that due to the fast changing cyber landscape, no agency can keep up by itself. Hence, even large companies use this crowdsourcing approach, which is effective and fast.

MINDEF has engaged HackerOne, a reputable international bug bounty company, to run the programme. The programme will be conducted from 15 January to 4 February 2018, involving eight selected Internet-facing systems.

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

杨莉明称3至7月间 2.4万求职者找到短工、正职就业机会

人力部长杨莉明声称,在三月至7月底,多达2万4千名求职者,在“新心相连”就业计划(SGUnited Jobs and Skills Package)下寻得正职、短期或实习机会。 其中近六成都是短期性质,有者介于一年合约期的工作。 短期PMET(专业人士、经理、执行人员和技师):5千200人 短期非PMET工作:8600人 长期PMET工作:4600人 长期非PMET工作:5千200人 “新心相连”就业计划下,耗资20亿元,政府推出近10万个就业、实习及培训机会,以填补预期流失的工作岗位。 其中近5万就业机会由政府资助,包括在私人企业实习或公共机构的就业机会。

Law and Home Affairs Minister K Shanmugam "worried" for Hong Kong over ongoing protests, criticises international media for "muddied" narrative of events

The ongoing protests against Hong Kong’s extradition Bill are worrying, and that…

53 new cases of COVID-19 infection in S’pore; 49 locally transmitted cases, 19 unlinked

As of Wednesday noon (18 Aug), the Ministry of Health (MOH) has…

《独立》拒绝撤二文章和道歉 富食客恫言采法律行动

职总富食客将对本地时事网站《独立新加坡》(The Independent Singapore)采取法律行动。富食客代表律师致函《独立》要求该网站在本周二下午三点前,撤下指涉富食客导致年迈小贩过劳死的文章,并作出道歉,不过遭到《独立》拒绝。 《独立》在本月20日下午6时23分,才收到富食客代表律师David Lim&Partner的来函,指该网媒刊登的两篇文章含有诽谤成分,导致富食客名誉受损,要求后者撤下。 第一篇文章有关读者爆料,指有年迈小贩被富食客“欺压”,在农历新年期间申请缩短营业遭拒,为避富食客罚款,被迫工作18小时,导致过劳死。 第二篇文章则指,富食客对同样在樟宜机场第四航空楼食阁营生的年迈小贩,罚款3500元,原因是后者脚伤无法开档数日。 富食客认为第一篇文章“含有不实和误导信息”,有关假消息在网络传播将造成不良社会影响。 富食客已在周一在脸书专页刊载文告,澄清上述两篇文章内容。 《独立》:除非能证明造假才删文 富食客针对第一篇文章澄清,富食客并未受到已故年迈小贩方先生,缩短营业时间的申请。富食客分支经理在今年2月19日,有发现方先生身体不适,说服他去接受治疗,并找人顶替他的位置。孰料,下午就传来方先生因心脏衰竭过世的消息。 至于被罚款3500元的小贩,富食客则指出,管理层曾在上述小贩休业一星期后,发出三天内开档便取消罚款的提议,但对方没有这么做。而事件发生时,摊主正在进行摊位转让,因此触犯了提前终止条款。…