Professional Documents
Culture Documents
Cyberspace
Some statistics
2011 - 1791
2010 966
2009 420
2008 288
2007 - 217
Intelligent Quotient System Pvt. Ltd.
Wardriving stats
2011
Case studies
0000
0010
0600
1200
1800
2400
Young System admin meets beautiful woman! Social engineering attack Crores worth of source code stolen Log analysis Interrogation of sys admin Testimony of waiter
Trojan attack
Obscene photos of a lady reporter were published on
24hr live webcam sites Unknown chat friend Trojan through email Webcam Email tracing, Email tracking, Real time investigation
Data Theft
iPods allowed to be carried into sensitive areas of
company
Employee copies files onto iPod and then deleted
them
Recovers them later using forensic software
Step 1
Target is selected from social networking sites
Hello!!!
I liked your profile and would like to get to know you better. I will tell you more about myself below. First of all my name is Larisa I am single and have no any children. I live in city Novocheboksarsk, it is little city in Russia, my city, not so big, but it is very beautiful, it is located in the Volga river bank... ohhh, I know you are surprised, in my profile I wrote your country, I will not write a lot today and if you are still interesting I hope to hear from you soon, tell me more about yourself and send me your picture, here is a picture of me so you can see how I look like.
Have a good day, bye Larisa
Hello my dear!!!
I would like to tell you that your letters bring me much joy and make me happier day by day! You are the dearest man to my heart, I am always looking forward to your letters. When I received your letter today, I was very happy.
Hi honey, I wait for the day of our meeting more and more day by day and can't stop thinking about that. Me, as I told you before it would be not so easy to get a tourist visa for me, but in the travel agency they told me that they will help, but there is a one problem it
Email Frauds
Name
Card number
Expiry date
CVV number
Yes Maam, Im calling from your local utility store. To confirm some information could I have your date of birth, social security number and any credit card or bank accounts please?
31
Cyber Laws
The Information Technology Act, 2000 (amendment of 2008) Indian Penal Code Indian Evidence Act Bankers Books Evidence Act RBI Act
The Information Technology (Electronic Service Delivery) Rules, 2011 The Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 The Information Technology (Guidelines for Cyber Cafe) Rules, 2011 The Information Technology (Intermediaries guidelines) Rules, 2011
Cyber security
Offensive Security
Avenues open
Steps
-Ethical Hacker
-IT Auditing
-Forensics consultant
-Fraud Investigator
-Learn related fields -Cyber Law consultant Good networking -Information Security Consultant
than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb - National Research Council, USA
@ - sagar.rahurkar@iqspl.com # - 09623444448
Course structure
Two semesters ONE BOOK +CD Two hours every week Theory + practicals (wherever necessary)
Periodic assessments
Course structure
Semester I
Introduction to cyber security Physical security Cryptography Steganography Virus attacks & security Email frauds & security Browser safety Security for online banking
Course structure
Semester II
Cyber laws
Information system contingency planning (Risk management) Strategic management of technology
Course structure
Assessment pattern