Date post: | 27-Feb-2018 |
Category: |
Documents |
Upload: | kingston-maria-infant |
View: | 213 times |
Download: | 0 times |
of 26
7/25/2019 Cyber Information and Security
1/26
CYBER SECURITY CHALLENGES ANDTHREATS ALL OVER THE WORLD
NAME - KINGSTON MARIAINFANT.SREG NO - 111012001181CLASS - B.ARCH A SEC PMUSUBECT - CYBER INFORMATION ANDSECURITYBATCH - 2011-201!DATE - "0.0#.201$
CYBERCRIMETHREATS
AND IMPORTANCE
1
7/25/2019 Cyber Information and Security
2/26
2
Cyber Crime is a term used to broadly describe criminalactivity in which computers or computer networks are a tool,a target, or a place of criminal activity and include everythingfrom electronic cracking to denial of service attacks.
Computer crime mainly consists of unauthorized access tocomputer systems data alteration, data destruction, theft ofintellectual property.
Pornography, Threatening Email, ssuming someone!s
"dentity, #e$ual %arassment, #pam and Phishing are somee$amples where computers are used to commit crime,whereas &iruses, 'orms and #oftware Piracy and %ackingare e$amples where computers become target of crime.
WHAT IS CYBERCRIME%%%.&&&
7/25/2019 Cyber Information and Security
3/26
"
Indian Crime Scene
The ma(or Cyber Crimes reported, in"ndia, are )enial of #ervices,
)efacement of 'ebsites, #pam, Computer&irus and 'orms, Pornography, Cyber#*uatting, Cyber #talking and Phishing.
+iven the fact that nearly -/ million worth of0obiles are being lost or stolen in the countryevery year, the users have to protect"nformation, Contact details and Telephonenumbers as these could be misused.
1early 23 per cent of information theft is carried
out by current and e$4employees and 5- percent by hackers. "ndia has to go a long way inprotecting the vital information.
65 The %indu, #aturday, 7ct 8, //89.
7/25/2019 Cyber Information and Security
4/26
'
CyberCrime Variants
o Hacking(H)*+,( ,/ ) *,3 45,*5 6),7/*)*+, //6/ )9 ),,:):65;,
7/25/2019 Cyber Information and Security
5/26
$
Phishing is (ust one of the many frauds on the"nternet, trying to fool people into parting withtheir money. Phishing refers to the receipt ofunsolicited emails by customers of :inancial"nstitutions, re*uesting them to enter their;sername, Password or other personalinformation to access their ccount for somereason.
The fraudster then has access to the customer!sonline bank account and to the funds containedin that account.
7/25/2019 Cyber Information and Security
6/26
!
Cyber #talking is use of the "nternet or other electronicmeans to stalk someone.
This term is used interchangeably with onlineharassment and online abuse.
#talking generally involves harassing or threateningbehaviour that an individual engages in repeatedly,such as following a person, appearing at a person!shome or place of business, making harassing phonecalls, leaving written messages or ob(ects, orvandalizing a person!s property.
CyberStacking
7/25/2019 Cyber Information and Security
7/26
=
VISHING
&ishing is the criminal practice of using socialengineering and &oice over "P
7/25/2019 Cyber Information and Security
8/26
8
India stands 11th in the ranking for Cyber Crime in the World,
constituting 3% of the Global Cyber Crime.
7/25/2019 Cyber Information and Security
9/26
#
W5 I9,) ,/ 6)69 ; C? C,%.&&&
A )>,97 ;4, ;7, :/?)/
121 M,77,; I66 U//
!$ M,77,; A*6, I66U//3 :> ? 28 ; $1,77,; , 2010
$0 M,77,; :// /5;> ;7, ;E*;* )9 O7,S5;>>, S,6/
'! M,77,; S;*,)7 N64;+U//
"'! ,77,; ;?,7 :// 5)9/:?/*,?9 6; D)6) P)*+)/.
7/25/2019 Cyber Information and Security
10/26
10
C? C,, I9,)%.
-. The ma(ority of cybercrimes are centered onforgery, fraud and Phishing,
. "ndia is the third4most targeted country forPhishing attacks after the ;# and the ;A,
5. #ocial networks as well as ecommerce sites
are ma(or targets,
B. 2.3 million bot4infected systems in /-/,
. -B,5BD website defacements in /-/,
2. 2,D/ .in and B,-/ .com domains were
defaced during /--,
8. -,/// sites hacked in /--,
D. "ndia is the number - country in the world forgenerating spam.
7/25/2019 Cyber Information and Security
11/26
11
D; ;: K;4 65 *;/6 ; C? C,,I9,)%&&&
3.3 million people fell victim to
cybercrime,
B billion in direct financial losses,
5.2 billion in time spent resolvingthe crime,
B in online adults
7/25/2019 Cyber Information and Security
12/26
12
'e have covered about three instances where high4profile government websites were hacked anddefaced. %owever, the actual number of +overnment
'ebsites that were hacked are *uite huge.
total number of 3/, --3, and -3 +overnmentwebsites tracked by the "ndian Computer EmergencyGesponse Team
7/25/2019 Cyber Information and Security
13/26
1"
Again, this isgrowing trend
and it issurprising thatauthorities havenot taken sternactions to curbthe growth of
these cyber-crimes.
The police have recorded 3,038 cases but made only 2,700arrests in 3 years (between 200 and 20!0"
#ndia registered only 1,350 cases under the #T Act and #%& in20!0
50% of cybercrimes are not even reported.
7/25/2019 Cyber Information and Security
14/26
1'
C? 7)4/, I9,)
;nder The "nformationTechnology ct, ///
C%PTEG K" J 7::E1CE# J 22. %acking withcomputer system.
7/25/2019 Cyber Information and Security
15/26
1$
'hoever without permission ofthe owner of the computer F #ecures ccess
)ownloads, Copies or e$tracts any data, computer database or any informationM "ntroduce or causes to be introduce any &irus or ContaminantM )isrupts or causes disruptionM )enies or causes denial of access to
any personM Provides any assistance to any person
to facilitate access Charges the services availed of by a
person to the account of anotherperson by Tampering with or0anipulating any Computer, Computer#ystem, or Computer 1etworkM
#hall be liable to pay damages by way ofcompensation not e$ceeding one crorerupees to the person so affected.
7/25/2019 Cyber Information and Security
16/26
1!
"nformation Technology mendment ct, //D
S*6,; '"3
D/6;/3 D76/ ; A76/ ) I;)6,;/,9, , ) *;>:6 /;:* ; 9,,,/5/ ,6/)7: ; :6,7,6 ; )*6/ ,6 ,J:,;:/7 ? ))/
S6)7/3 *;*)7/3 9/6;/ ; )76/ ; *)://) >/; 6; /6)73 *;*)73 9/6; ; )76 )*;>:6 /;:* *;9 :/9 ; ) *;>:6/;:* 4,65 ) ,66,; 6; *):/ 9))
I ) >/;3 9,/5;/673 ; ):9:7673 9;/) )*6 9 6; , /*6,; '"3 5 /5)77 ?>:,/5)?7 4,65 ,>,/;6 ; ) 6 45,*5) 69 6; 64; 65 )/ ; 4,65 45,*5) 69 6; 7)+5 :>/ ; 4,65 ?;65.
7/25/2019 Cyber Information and Security
17/26
1=
Arrests & e!orts "nder I# Act
'nder the #T Act, )) cybercrime cases werefiled in 20!0 ,*20 in 200"
+eographic breakdown of cases reported153 from Karnataka,148 from Kerala142 from Maharashtra105 ndhra !radesh52 "a#asthan52 !$n#ab
2 persons were arrested in 20!0 of the cases registered were related tohacking
'nder the #%&, 35% cybercrimecases were registered in 20!0 (2)
cases in 200"+eographic breakdown of casesreported
104 from Maharashtra ndhra !radesh4 &hhattisgarh
The ma/ority of these crimes wereeither forgery or fraud cases.
ource 1ational &rime ecords3ureau
7/25/2019 Cyber Information and Security
18/26
18
%ow to Tackle #uch ctivitiesNO
n important *uestion arises that how can these crimes be prevented.
number of techni*ues and solutions have been presented but theproblems still e$ists and are increasing day by day.
ntivirus nd nti #pyware #oftwareFntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software.
nti spy wares are used to restrict backdoor program, tro(ans and otherspy wares to be installed on the computer.
:irewallsF firewall protects a computer network from unauthorized access. 1etwork
firewalls may be hardware devices, software programs, or a combination ofthe two.
network firewall typically guards an internal computer network againstmalicious access from outside the network.
7/25/2019 Cyber Information and Security
19/26
1#
CryptographyF Cryptography is the science of encrypting and decrypting information.
Encryption is like sending a postal mail to another party with a lock code on theenvelope which is known only to the sender and the recipient.
number of cryptographic methods have been developed and some of themare still not cracked.
Cyber Ethics and LawsF Cyber ethics and cyber laws are also being formulated to stop cyber crimes.
"t is a responsibility of every individual to follow cyber ethics and cyber laws sothat the increasing cyber crimes shall reduce.
#ecurity #oftware like nti &iruses and nti #py 'ares should be installed on all
computers, in order to remain secure from Cyber Crimes.
"nternet #ervice Providers should also provide high level of security at theirservers in order to keep their clients secure from all types of viruses andmalicious programs.
#ecurity Q The "ndustrial "nternet of Things
7/25/2019 Cyber Information and Security
20/26
#ecurity Q The "ndustrial "nternet of Things
1etwork #ecurity #mart Ruildings #mart
:actories
#mart Cities
Policy &iolations
Continuous Threat Monitoring
#egmentation7perational
#ecurity
7/25/2019 Cyber Information and Security
21/26
nomalytics@
Cyber #ecurity :ramework )esign outline
Continuous )ata 0onitoringQ 0achine Learning vianetwork tap or span port
pply multip le stereoscopic@machine learning algorithms and
policy framework in real time
Provides Continuous, Conte$tualwareness Q nomaly )etection across
all connected "P )evices
0onitor 0achine Learn nomalytics@
21
Targeted
7/25/2019 Cyber Information and Security
22/26
Firewalls S!M Anti"#irus
Target
0aintains it was $CI'' Com!liant at the time of thebreach.
How could this occur?
$S ndustry Compliance
$C"%SS Compliance
Targeted
22
7/25/2019 Cyber Information and Security
23/26
2"
7/25/2019 Cyber Information and Security
24/26
2'
SOURCES
https://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdf7/25/2019 Cyber Information and Security
25/26
SOURCES566>/444.+>.*;INI//:/A9I/,56/A6,*7/P:?7,*)6,;/D;*:6/KPMGQC?QC,Q/:Q>;6Q201'.>9566>,9/.,*.,)6Q?Q;9/C?20/*:,620,20,9,)20?20C;720SS20R)5).>9566>444.,*4).,>9/PB201'I/)*5;I9,)/C?S*:,6D;*6,0$0!201$PB.>9566>/444.4,>;.*;9;*:6/)*,-65-)7,6-;-*?-65)6/-,-65->;4-/*6;.>9566>/444.>4*.,QIN,)//6/>9/>:?7,*)6,;/201')),-*?-,/+/-,-)-,6*;*69-4;79.>9566>9,6.;.,5,9,/,6/:>7;)9Q7/9,65,9,7/*/>Q0!0'11.>9566>,/.;.,,)/RISQ,)/>/6)6,;->9G:7/5)20R),.>9566>444.,6:.,6ITU-D*?>:?7,*)6,;/2012IMPACTIMPACT-.>9566>444./7,9/5).6/)*5/7,9/5;4&7)>)2@*?/*:,6,;?7,9,*/@,91?=*#9-0)#1-''!"-)290-"?8129$)
)/)*5;5)9/;67)*566>444./7,9/5).6)*;/7:,/218!$0-)*6/-)?;:6-/6)6-;-*?/*:,6-,-201$&@,91?=*#9-0)#1-''!"-)290-"?8129$))9):76?;Q/)*511I)/566>,)./7,9/5)*9.*;/;7)4,9/,6/*:,6/:>;6201$-)7-1$012"10"1"2-*;/,;-)601#$/;7)4,9/-9)7-*?/*:,6-/:-201$-1"-!"8.J>&*?1'222$2000566>444.,6*;/:76,J.*;4>-*;66:>7;)9/201$0"*?-/*:,6-,
*,96/-?-*;:6.J>566>*7;:964)+/.*;4>-*;66:>7;)9/201$0$)66>6/-/*:,6.>566>/444.,/,;),.*;?7;4>-*;66:>7;)9/201$0'M,997-E)/6-A,)6,;-C?-S*:,6-M)+6-F;*)/6-201$-202$-2.J>566>,0.4>.*;444.,6;)*.*;.:+?7;4>-*;66:>7;)9/201$0!,?.>&/,566>444.4448-5>.*;:/,)/01QH)9C);:/7QC?R,/+R>;6QI;)>5,*Q'$12"$Q6*2'$Q1#2$'12Q6*2'$Q1#2$'1=Q6*2'$-1#2
2$
https://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttp://ids.nic.in/art_by_offids/Cyber%20security%20in%20india%20by%20Col%20SS%20Raghav.pdfhttp://ids.nic.in/art_by_offids/Cyber%20security%20in%20india%20by%20Col%20SS%20Raghav.pdfhttp://www.icwa.in/pdfs/PB/2014/InsearchofIndiasCyberSecurityDoctrine05062015PB.pdfhttp://www.icwa.in/pdfs/PB/2014/InsearchofIndiasCyberSecurityDoctrine05062015PB.pdfhttps://www.wipro.com/documents/facing-the-reality-of-cyber-threats-in-the-power-sector.pdfhttps://www.wipro.com/documents/facing-the-reality-of-cyber-threats-in-the-power-sector.pdfhttps://www.pwc.in/en_IN/in/assets/pdfs/publications/2014/managing-cyber-risks-in-an-interconnected-world.pdfhttps://www.pwc.in/en_IN/in/assets/pdfs/publications/2014/managing-cyber-risks-in-an-interconnected-world.pdfhttp://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdfhttp://ris.org.in/images/RIS_images/presentation-pdf/Gulshan%20Rai.pdfhttp://www.itu.int/ITU-D/cyb/publications/2012/IMPACT/IMPACT-en.pdfhttp://www.slideshare.net/search/slideshow?lang=en&page=2&q=cyber+security+in+moblie+devices&qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&searchfrom=header&sort=relevancehttp://www.slideshare.net/search/slideshow?lang=en&page=2&q=cyber+security+in+moblie+devices&qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&searchfrom=header&sort=relevancehttp://www.slideshare.net/search/slideshow?lang=en&page=2&q=cyber+security+in+moblie+devices&qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&searchfrom=header&sort=relevancehttp://www.slideshare.net/marcosluis2186/50-facts-about-state-of-cybersecurity-in-2015?qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&v=default&b=&from_search=11http://www.slideshare.net/marcosluis2186/50-facts-about-state-of-cybersecurity-in-2015?qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&v=default&b=&from_search=11http://www.slideshare.net/marcosluis2186/50-facts-about-state-of-cybersecurity-in-2015?qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&v=default&b=&from_search=11http://image.slidesharecdn.com/solarwindsitsecuritysurveyreport2015-final-150123103132-conversion-gate01/95/solarwinds-federal-cybersecurity-survey-2015-13-638.jpg?cb=1422252000/http://image.slidesharecdn.com/solarwindsitsecuritysurveyreport2015-final-150123103132-conversion-gate01/95/solarwinds-federal-cybersecurity-survey-2015-13-638.jpg?cb=1422252000/http://image.slidesharecdn.com/solarwindsitsecuritysurveyreport2015-final-150123103132-conversion-gate01/95/solarwinds-federal-cybersecurity-survey-2015-13-638.jpg?cb=1422252000/http://www.itconsultingnj.com/wp-content/uploads/2015/03/cyber-security-incidents-by-country.jpghttp://www.itconsultingnj.com/wp-content/uploads/2015/03/cyber-security-incidents-by-country.jpghttp://cloudtweaks.com/wp-content/uploads/2015/05/attempts-security.pnghttps://www.visiongain.com/blog/wp-content/uploads/2015/04/Middle-Eastern-Aviation-Cyber-Security-Market-Forecast-2015-2025-2.jpghttps://www.visiongain.com/blog/wp-content/uploads/2015/04/Middle-Eastern-Aviation-Cyber-Security-Market-Forecast-2015-2025-2.jpghttp://i0.wp.com/www.itgovernance.co.uk/blog/wp-content/uploads/2015/06/ibm.png?resize=350,200http://i0.wp.com/www.itgovernance.co.uk/blog/wp-content/uploads/2015/06/ibm.png?resize=350,200http://www.agcs.allianz.com/assets/Infographics/Piracy2015_618X593.jpghttp://www.www8-hp.com/us/en/images/01_HeaderCarousel_CyberRiskReport_Infographic_451X235_tcm245_1925412_tcm245_1925417_tcm245-1925412.jpghttp://www.www8-hp.com/us/en/images/01_HeaderCarousel_CyberRiskReport_Infographic_451X235_tcm245_1925412_tcm245_1925417_tcm245-1925412.jpghttp://www.www8-hp.com/us/en/images/01_HeaderCarousel_CyberRiskReport_Infographic_451X235_tcm245_1925412_tcm245_1925417_tcm245-1925412.jpghttp://www.www8-hp.com/us/en/images/01_HeaderCarousel_CyberRiskReport_Infographic_451X235_tcm245_1925412_tcm245_1925417_tcm245-1925412.jpghttp://www.www8-hp.com/us/en/images/01_HeaderCarousel_CyberRiskReport_Infographic_451X235_tcm245_1925412_tcm245_1925417_tcm245-1925412.jpghttp://www.agcs.allianz.com/assets/Infographics/Piracy2015_618X593.jpghttp://i0.wp.com/www.itgovernance.co.uk/blog/wp-content/uploads/2015/06/ibm.png?resize=350,200http://i0.wp.com/www.itgovernance.co.uk/blog/wp-content/uploads/2015/06/ibm.png?resize=350,200https://www.visiongain.com/blog/wp-content/uploads/2015/04/Middle-Eastern-Aviation-Cyber-Security-Market-Forecast-2015-2025-2.jpghttps://www.visiongain.com/blog/wp-content/uploads/2015/04/Middle-Eastern-Aviation-Cyber-Security-Market-Forecast-2015-2025-2.jpghttp://cloudtweaks.com/wp-content/uploads/2015/05/attempts-security.pnghttp://www.itconsultingnj.com/wp-content/uploads/2015/03/cyber-security-incidents-by-country.jpghttp://www.itconsultingnj.com/wp-content/uploads/2015/03/cyber-security-incidents-by-country.jpghttp://image.slidesharecdn.com/solarwindsitsecuritysurveyreport2015-final-150123103132-conversion-gate01/95/solarwinds-federal-cybersecurity-survey-2015-13-638.jpg?cb=1422252000/http://image.slidesharecdn.com/solarwindsitsecuritysurveyreport2015-final-150123103132-conversion-gate01/95/solarwinds-federal-cybersecurity-survey-2015-13-638.jpg?cb=1422252000/http://image.slidesharecdn.com/solarwindsitsecuritysurveyreport2015-final-150123103132-conversion-gate01/95/solarwinds-federal-cybersecurity-survey-2015-13-638.jpg?cb=1422252000/http://www.slideshare.net/marcosluis2186/50-facts-about-state-of-cybersecurity-in-2015?qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&v=default&b=&from_search=11http://www.slideshare.net/marcosluis2186/50-facts-about-state-of-cybersecurity-in-2015?qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&v=default&b=&from_search=11http://www.slideshare.net/marcosluis2186/50-facts-about-state-of-cybersecurity-in-2015?qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&v=default&b=&from_search=11http://www.slideshare.net/search/slideshow?lang=en&page=2&q=cyber+security+in+moblie+devices&qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&searchfrom=header&sort=relevancehttp://www.slideshare.net/search/slideshow?lang=en&page=2&q=cyber+security+in+moblie+devices&qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&searchfrom=header&sort=relevancehttp://www.slideshare.net/search/slideshow?lang=en&page=2&q=cyber+security+in+moblie+devices&qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&searchfrom=header&sort=relevancehttp://www.itu.int/ITU-D/cyb/publications/2012/IMPACT/IMPACT-en.pdfhttp://ris.org.in/images/RIS_images/presentation-pdf/Gulshan%20Rai.pdfhttp://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdfhttps://www.pwc.in/en_IN/in/assets/pdfs/publications/2014/managing-cyber-risks-in-an-interconnected-world.pdfhttps://www.pwc.in/en_IN/in/assets/pdfs/publications/2014/managing-cyber-risks-in-an-interconnected-world.pdfhttps://www.wipro.com/documents/facing-the-reality-of-cyber-threats-in-the-power-sector.pdfhttps://www.wipro.com/documents/facing-the-reality-of-cyber-threats-in-the-power-sector.pdfhttp://www.icwa.in/pdfs/PB/2014/InsearchofIndiasCyberSecurityDoctrine05062015PB.pdfhttp://www.icwa.in/pdfs/PB/2014/InsearchofIndiasCyberSecurityDoctrine05062015PB.pdfhttp://ids.nic.in/art_by_offids/Cyber%20security%20in%20india%20by%20Col%20SS%20Raghav.pdfhttp://ids.nic.in/art_by_offids/Cyber%20security%20in%20india%20by%20Col%20SS%20Raghav.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdfhttps://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/KPMG_Cyber_Crime_survey_report_2014.pdf7/25/2019 Cyber Information and Security
26/26
THANK YOU
2!