Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»60 Hours of Cyber Defense: Hong Kong’s Innovative Cybersecurity Drill Begins

    60 Hours of Cyber Defense: Hong Kong’s Innovative Cybersecurity Drill Begins

    November 15, 2024

    Hong Kong Cybersecurity

    Hong Kong has initiated its first-ever cybersecurity drill, set to run for a total of 60 hours. The Hong Kong cybersecurity drill commenced on Friday, with plans to establish it as an annual event moving forward. Innovation minister Sun Dong emphasized the importance of this initiative, stating that maintaining cybersecurity is essential for promoting high-quality economic development and building a smart city. 

    At a launch ceremony for the drill, Sun noted that the Hong Kong cybersecurity plan is a “long-term task” that requires ongoing attention and cannot be considered complete. This proactive approach reflects the government’s commitment to addressing the growing threat landscape, particularly as recent months have seen a notable rise in hacking cases targeting various organizations, including companies and public entities. 

    Hong Kong Cybersecurity Drill 

    This Hong Kong cybersecurity drill, organized by the Digital Policy Office, involves collaboration with multiple stakeholders, including the Hong Kong police force, the Hong Kong Internet Registration Corporation, and the Hong Kong Institute of Information and Technology (HKIIT). This multifaceted approach aims to simulate real-world cyber threats and test the preparedness of government systems against potential attacks. 

    Tony Wong Chi-kwong, Commissioner for Digital Policy, explained that the drill features a “red” team of hackers composed of industry professionals, alongside students and faculty members from HKIIT and the Hong Kong College of Technology. This red team will simulate cyberattacks on government systems using tactics such as phishing emails and impersonation attempts to gain access to sensitive information, including login credentials and passwords, reported South China Morning Post. 

    Countering the red team’s efforts is a “blue” defense team, made up of staff from nine government departments and three public organizations. These defenders will operate from their offices to detect and respond to the simulated attacks in real time. Wong refrained from disclosing the specific departments involved, explaining that maintaining a controlled environment is crucial to the drill’s success. “We need a controllable scenario. We don’t want people with malicious intentions to mess around during this period,” he stated. 

    Throughout the 60-hour drill, the red team will remain stationed in the operation room at HKIIT in Tsing Yi. Wong pointed out the necessity of this realistic simulation: “In the real world, attacks have no time limit. There is no preset that tells you when they will attack you.” By creating an environment that mirrors actual conditions, the drill allows defenders to remain alert and ready to respond to threats as they arise. 

    Key Partners of the Cybersecurity Drills 

    As part of the exercise, normal operations will continue on government systems, providing an opportunity to evaluate whether current precautions and detection capabilities are sufficient. The blue team will earn points for successfully detecting an attack, while the red team will score points for any successful breaches. A panel of nine cybersecurity experts will oversee the scoring process, ensuring fairness and accuracy in the evaluation. 

    The HKIIT principal confirmed that all attack and defense activities will adhere to strict parameters established by the institute. Technical support will also be provided to maintain network stability, preventing disruptions to regular operations during the drill. Results from this cybersecurity drill will be shared at an upcoming cybersecurity forum scheduled for December. 

    Hong Kong has witnessed a significant uptick in cyberattacks in recent years, prompting authorities to take decisive action. In the first half of 2024 alone, the city reported 16,182 cases involving technology crimes, a 3.5% increase from the previous year’s figures. The financial impact of these incidents is staggering, with losses reaching HK$2.66 billion (approximately US$341.8 million). 

    In response to this concerning trend, the Hong Kong government proposed the Protection of Critical Infrastructure (Computer System) Bill, which aims to impose stringent security requirements on operators of essential infrastructure. Under this legislation, non-compliance could result in fines of up to HK$5 million. Currently, the bill is under consultation with the Security Bureau and is anticipated to be enacted by early 2026. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHow AI Is Transforming IAM and Identity Security
    Next Article High-Severity Vulnerability in Cisco ECE Could Lead to Denial of Service, CERT-In Issues Alert

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Accelerating Growth: How Exela Optimized Recruitment for a Leading UK Student Accommodation Service | Exela HR Solutions

    Development

    Windows 10 KB5050081 auto installs new Outlook web, direct download .msu with DAC fix

    Operating Systems

    I tested these new Shokz clip-on earbuds, and they give Bose’s Ultra Open a run for their money

    News & Updates

    Patronus AI Introduces the Industry’s First Multimodal LLM-as-a-Judge (MLLM-as-a-Judge): Designed to Evaluate and Optimize AI Systems that Convert Image Inputs into Text Outputs

    Machine Learning

    Highlights

    Linux

    Diventa un Guru di Linux con la Guida al File System /proc

    February 10, 2025

    In GNU/Linux, /proc è un file system speciale che fornisce un accesso dettagliato e aggiornato…

    CVE-2024-13793 – Walmart | WooCommerce Theme WordPress Shortcode Injection Vulnerability

    May 8, 2025

    Secure Ways to Access DeepSeek( Third-Party Apps)

    February 20, 2025

    Challenges in GMP, GCP & Regulatory Affairs

    June 13, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.