Ultimately, we will contribute to the development of the domestic information security
industry by expanding information security investments and markets and strengthening the
competitiveness of information security
companies and products.
Global Activities - Global Business Development & Cooperation
-
KISA is currently running 5 regional offices located in Costa Rica in Latin America, Indonesia in Southeast Asia, Oman in Middle East, Tanzania in Africa including USA, North America whose main role is to facilitate inter-governmental cooperation and to introduce our talented Information Security enterprises to the newly emerging and global market. These regional offices are expected to continue boosting Korea and the cooperation countries' Cyber-security industry by having more partnerships to better understand regional markets, share cyber-security experience and build close networks in cyber security field.
Personal Information and Information Security Management System (ISMS-P) certification
-
The ISMS-P certification is a system in which an independent and objective
certification/examination institution examines whether a company or organization’s
ISMS-P complies with the certification standards and grants certification. Through this,
companies and institutions can improve public trust in the services they provide,
enhance their business’s safety, and effectively respond to cyber intrusion threats,
which are becoming more convergent and advanced.
Applied Cryptography
-
Cryptography uses mathematical functions to transform plaintext data, thereby preventing
unauthorized persons from reading or tampering with data. It is used in almost all
computing and communication devices to ensure the confidentiality and integrity of
transmitted or stored data.
We offers various cryptographic security services. First, we develope and distribute ransomware encryption key recovery tools after analyzing its vulnerabilities. Second, we provides security testing service for cryptographic modules to let them get deployed in a public/government sector. Lastly, we prepares for and help transition from classical to post-quantum cryptography to address threats of possible public-key decryption in the quantum computing era.