The Ministry of Defence (MINDEF)’s Defence Cyber Chief, Mr David Koh, has announced the MINDEF Bug Bounty Programme during the sidelines of his visit to the Cyber Defence Test and Evaluation Centre (CyTEC) earlier on Tuesday (12 December).

In a first for a Singapore Government agency, selected white hat hackersfrom around the world will test major MINDEF Internet-facing systems for vulnerabilities (or “bugs”) and will receive rewards (or “bounties”) for doing so.

White hat hackers are computer security specialists who break into protected systems and networks to test and assess their security. These hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.

“Cyber is a new battlefront,” he said.

He then stressed that Singapore is constantly exposed to the increasing risk of cyberattacks, and MINDEF is an attractive target for malicious cyber activity.

“As hackers with malicious intent find new methods to breach networks, MINDEF must constantly evolve and improve its defences against cyber threats,” he noted.

Emphasising the importance of strengthening Singapore’s cyber defences amidst this changing landscape, Mr Koh said that the programme, utilising crowdsourcing, is one such innovative and effective way of doing so.

He said, “This is the first time that MINDEF is launching such a bold programme. White hat hackers participating in this programme will be given the mandate to ‘hack’ MINDEF, to find bugs in our major Internet-facing systems. For each valid and unique bug that the hacker finds, he will receive a bounty.”

On the need for such a programme, Mr Koh said that it is not possible to fully secure modern computer software systems, and new vulnerabilities are discovered every day. He added that due to the fast changing cyber landscape, no agency can keep up by itself. Hence, even large companies use this crowdsourcing approach, which is effective and fast.

MINDEF has engaged HackerOne, a reputable international bug bounty company, to run the programme. The programme will be conducted from 15 January to 4 February 2018, involving eight selected Internet-facing systems.

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

武吉巴督火患一月后传噩耗 73岁女灾黎不治离世

上月武吉巴督火灾,73岁妇女在被救出时严重烧伤,经过一个多月的治疗后,最终仍不幸离世。 武吉巴督火灾于上月1日凌晨发生。本社此前报导,民防部队赶往现场时屋内已燃起熊熊大火,民防人员进入屋内后发现三名受害者,两男一女,分别倒卧在厕所以及厨房窗户外的窗台上。 据民防部队文告指出,当时由于厨房当时堆积大量物品,增加民防队员救援难度,因此民防队无法及时将他们救出。 民防人员先从单位内以绳索保护两人,灾难拯救队(Disaster Assistance and Rescue Team)则从楼上单位降下,把两人安置在云梯车的救援笼中,才降到地面上由护理人员抢救。 而当时单位内的73岁吴姓妇女则受困在单位的厕所内,穿戴防护面罩的民防部队人员破门而入,将她救出,并送入新加坡中央医院接受治疗。 消息指出,妇女在被救出后全身严重烧伤,在中央医院加护病房接受治疗一个多月,但仍因伤势太重而不治。 其余两名41岁与27岁男幸存者也在被救援后送入加护病房,一人在住院数天后已出院,另一名则伤势较重,直至11月15日才出院。 民防部队斥火灾当下水管无法使用,穆仁里致歉…

MPA hangs whistle-blower out to dry?

The Maritime and Port Authority of Singapore (MPA) is being sued by…

AGO: MOM purchases 432k computer system and left it unused

In its audit report for Financial Year 2015/2016 published on 26 July,…