ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

정부조직법 제31조(과학기술정보통신부) ① 과학기술정보통신부장관은 과학기술정책의 수립·총괄·조정·평가, 과학기술의 연구개발·협력·진흥, 과학기술인력 양성, 원자력 연구·개발·생산·이용, 인공지능 정책, 국가정보화 기획·정보보호·정보문화, 방송·통신의 융합, 통신의 진흥 및 전파관리, 정보통신산업, 우편·우편환 및 우편대체에 관한 사무를 관장한다.

Ministry of Science and ICT A.I CyberSecurity Scoring

MSI

Company Details

Linkedin ID:

ministry-of-science-and-ict

Employees number:

41

Number of followers:

0

NAICS:

92

Industry Type:

Government Administration

Homepage:

go.kr

IP Addresses:

0

Company ID:

MIN_1420878

Scan Status:

In-progress

AI scoreMSI Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/ministry-of-science-and-ict.jpeg
MSI Government Administration
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreMSI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ministry-of-science-and-ict.jpeg
MSI Government Administration
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

MSI Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Ministry of Science and ICT: Gov't holds meeting on Coupang's data breachBreach85411/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Bae Kyung-hoon (2nd from R on right row), minister of science and ICT, speaks during an inter-agency government meeting on Coupang's personal data leak at the government complex in Seoul on Nov. 30, 2025. (Pool photo) (Yonhap) (END)

Ministry of Science and ICT: Gov't holds meeting on Coupang's data breach
Breach
Severity: 85
Impact: 4
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Bae Kyung-hoon (2nd from R on right row), minister of science and ICT, speaks during an inter-agency government meeting on Coupang's personal data leak at the government complex in Seoul on Nov. 30, 2025. (Pool photo) (Yonhap) (END)

Ailogo

MSI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for MSI

Incidents vs Government Administration Industry Average (This Year)

Ministry of Science and ICT has 51.52% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Ministry of Science and ICT has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types MSI vs Government Administration Industry Avg (This Year)

Ministry of Science and ICT reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — MSI (X = Date, Y = Severity)

MSI cyber incidents detection timeline including parent company and subsidiaries

MSI Company Subsidiaries

SubsidiaryImage

정부조직법 제31조(과학기술정보통신부) ① 과학기술정보통신부장관은 과학기술정책의 수립·총괄·조정·평가, 과학기술의 연구개발·협력·진흥, 과학기술인력 양성, 원자력 연구·개발·생산·이용, 인공지능 정책, 국가정보화 기획·정보보호·정보문화, 방송·통신의 융합, 통신의 진흥 및 전파관리, 정보통신산업, 우편·우편환 및 우편대체에 관한 사무를 관장한다.

Loading...
similarCompanies

MSI Similar Companies

State of Michigan

Every day the contributions and achievements of State of Michigan employees have a direct impact on over 10 million Michiganders across the state. If you're looking for a fulfilling career in state government that can make a real difference in the lives of others, you can find your place working wit

Swiss Federal Administration

Working for Switzerland Seven departments, the Federal Chancellery and around 70 administrative units make up the Federal Administration. With around 38,000 employees, it is one of the largest employers in Switzerland. People from all regions of the country work in the Federal Administration un

National Park Service

Most people know that the National Park Service cares for national parks, a network of over 420 natural, cultural and recreational sites across the nation. The treasures in this system – the first of its kind in the world – have been set aside by the American people to preserve, protect, and share t

U.S. Department of the Treasury

The Treasury Department is the executive agency responsible for promoting economic prosperity and ensuring the financial security of the United States. The Department is responsible for a wide range of activities such as advising the President on economic and financial issues, encouraging sustainabl

France Travail

France Travail est un acteur majeur du marché de l’emploi en France où il s’investit pour faciliter le retour à l’emploi des demandeurs d’emploi et offrir aux entreprises des réponses adaptées à leurs besoins de recrutement. Les 55 000 collaborateurs de France Travail œuvrent au quotidien pour êtr

I work for NSW

The NSW public sector includes ten departments and many agencies and organisations working together to develop policy and deliver important services such as health, education, housing, transport and infrastructure across NSW. We are over 300,000 dedicated people who share the same values - making a

State of California

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali

City of Toronto

The City of Toronto is committed to fostering a positive and progressive workplace culture, and strives to build a workforce that reflects the citizens it serves. We are committed to building a high performing public service, with strong and effective leaders to enable service excellence, through hi

O Instituto Nacional do Seguro Social (INSS) é uma autarquia do Governo Federal do Brasil que recebe as contribuições para a manutenção do Regime Geral da Previdência Social, sendo responsável pelo pagamento da aposentadoria, pensão por morte, auxílio-doença, auxílio-acidente, entre outros benefício

newsone

MSI CyberSecurity News

November 30, 2025 10:16 AM
North Korean hacking group Lazarus blamed for $30 million crypto exchange Upbit heist

South Korean authorities have pinned responsibility for a 44.5 billion won ($30 million) hack on Upbit, the country's largest cryptocurrency...

November 30, 2025 09:02 AM
Coupang hit by massive data breach exposing 33.7 million users

We offer real-time business news in Korea, including earnings, M&A, IPO and regulatory filings, in English.

November 30, 2025 08:07 AM
Korean retail giant Coupang hit by unprecedented data breach affecting nearly all its users

Coupang Inc., South Korea's largest e-commerce platform, which reshaped the country's retail landscape with its “rocket delivery” model.

November 06, 2025 08:00 AM
Cybersecurity work force remains flat in 2024 despite rise in data breaches

The number of cybersecurity experts in Korea remained nearly unchanged last year from a year earlier, despite a recent rise in data breaches...

October 30, 2025 07:00 AM
Cybersecurity News: LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine

LG Uplus, one of South Korea's largest telecoms, reported a suspected data breach to the country's cybersecurity agency KISA,...

October 24, 2025 07:00 AM
Global Cybersecurity Labelling initiative

​​​As part of the 2023-2030 Australian Cyber Security Strategy, the Australian Government commits to keeping Australians informed about the...

October 23, 2025 07:00 AM
LG Uplus reports possible breach, third major telecom hit this year

LG Uplus has reported suspected signs of a server breach to the Korea Internet & Security Agency, becoming the third of Korea's top three...

October 22, 2025 07:00 AM
South Korea launches major cybersecurity overhaul after wave of hacking incidents

South Korea has announced a cross-government package of cybersecurity measures designed to respond quickly to a recent wave of hacks and...

October 22, 2025 07:00 AM
Government Unveils Comprehensive Cybersecurity Strategy

Government Unveils Comprehensive Cybersecurity Strategy Immediate nationwide inspections and femtocell decommissioning part of four-pronged...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

MSI CyberSecurity History Information

Official Website of Ministry of Science and ICT

The official website of Ministry of Science and ICT is https://www.msit.go.kr/index.do.

Ministry of Science and ICT’s AI-Generated Cybersecurity Score

According to Rankiteo, Ministry of Science and ICT’s AI-generated cybersecurity score is 770, reflecting their Fair security posture.

How many security badges does Ministry of Science and ICT’ have ?

According to Rankiteo, Ministry of Science and ICT currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Ministry of Science and ICT have SOC 2 Type 1 certification ?

According to Rankiteo, Ministry of Science and ICT is not certified under SOC 2 Type 1.

Does Ministry of Science and ICT have SOC 2 Type 2 certification ?

According to Rankiteo, Ministry of Science and ICT does not hold a SOC 2 Type 2 certification.

Does Ministry of Science and ICT comply with GDPR ?

According to Rankiteo, Ministry of Science and ICT is not listed as GDPR compliant.

Does Ministry of Science and ICT have PCI DSS certification ?

According to Rankiteo, Ministry of Science and ICT does not currently maintain PCI DSS compliance.

Does Ministry of Science and ICT comply with HIPAA ?

According to Rankiteo, Ministry of Science and ICT is not compliant with HIPAA regulations.

Does Ministry of Science and ICT have ISO 27001 certification ?

According to Rankiteo,Ministry of Science and ICT is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Ministry of Science and ICT

Ministry of Science and ICT operates primarily in the Government Administration industry.

Number of Employees at Ministry of Science and ICT

Ministry of Science and ICT employs approximately 41 people worldwide.

Subsidiaries Owned by Ministry of Science and ICT

Ministry of Science and ICT presently has no subsidiaries across any sectors.

Ministry of Science and ICT’s LinkedIn Followers

Ministry of Science and ICT’s official LinkedIn profile has approximately 0 followers.

NAICS Classification of Ministry of Science and ICT

Ministry of Science and ICT is classified under the NAICS code 92, which corresponds to Public Administration.

Ministry of Science and ICT’s Presence on Crunchbase

No, Ministry of Science and ICT does not have a profile on Crunchbase.

Ministry of Science and ICT’s Presence on LinkedIn

Yes, Ministry of Science and ICT maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ministry-of-science-and-ict.

Cybersecurity Incidents Involving Ministry of Science and ICT

As of November 30, 2025, Rankiteo reports that Ministry of Science and ICT has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Ministry of Science and ICT has an estimated 11,218 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Ministry of Science and ICT ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 1.2
Severity: HIGH
AV:L/AC:H/Au:N/C:P/I:N/A:N
cvss3
Base: 2.0
Severity: HIGH
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ministry-of-science-and-ict' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge