Professional Documents
Culture Documents
o Cyber Squatting
Cyber Squatting is the act of
registering a famous Domain Name
and then selling it for a fortune. This
is an issue that has not been tackled
in IT ACT 2000.
Cyber Stacking
VISHING
Vishing is the criminal practice of using social
engineering and Voice over IP (VoIP) to gain
access to private personal and financial
information from the public for the purpose of
financial reward.
The term is a combination of Voice and
phishing.Vishing exploits the publics landline
services.
Vishing is typically used to steal credit card
numbers or other information used in identity theft
schemes from individuals.
India stands 11th in the ranking for Cyber Crime in the World,
constituting 3% of the Global Cyber Crime.
10
We have covered about three instances where highprofile government websites were hacked and
defaced. However, the actual number of Government
Websites that were hacked are quite huge.
A total number of 90, 119, 252 and 219 Government
websites tracked by the Indian Computer Emergency
Response Team (CERT-In) were hacked / defaced by
various hacker groups in the year 2008, 2009, 2010
and JanOct 2011 respectively.
12
Again, this is
growing trend
and it is
surprising that
authorities have
not taken stern
actions to curb
the growth of
these cybercrimes.
The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010)
Indiaregistered only 1,350 cases under the IT Act and IPC in
2010
50% of cybercrimes are not even reported.
13
14
16
17
Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of
the two.
A network firewall typically guards an internal computer network against
malicious access from outside the network.
18
Cryptography:
Cryptography is the science of encrypting and decrypting information.
Encryption is like sending a postal mail to another party with a lock code on the
envelope which is known only to the sender and the recipient.
A number of cryptographic methods have been developed and some of them
are still not cracked.
Smart Buildings
Smart
Smart Cities
Factories
Segmentation
Policy Violations
Operational
Security (OpSec)
Operational Anomalies
Advanced
Security Threats
Advanced Threats
Identify, alert and build case management
tools on advanced security threats,
including port scanning, protocol tunneling
or suspicious protocols, new connections to
SCADA sensors, data exfiltration
20
Monitor
Machine Learn
Anomalytics
Anomalytics
21
Targeted
Firewalls
SIEM
Anti-Virus
IPS
Industry Compliance
PCI-DSS Compliance
22
23
24
SOURCES
https
://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Document
s/KPMG_Cyber_Crime_survey_report_2014.pdf
http://ids.nic.in/art_by_offids/Cyber%20security%20in%20india%20by%2
0Col%20SS%20Raghav.pdf
http://www.icwa.in/pdfs/PB/2014/InsearchofIndiasCyberSecurityDoctrine05
062015PB.pdf
https://www.wipro.com/documents/facing-the-reality-of-cyber-threats-in-the
-power-sector.pdf
https://www.pwc.in/en_IN/in/assets/pdfs/publications/2014/managing-cyberrisks-in-an-interconnected-world.pdf
http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
http://ris.org.in/images/RIS_images/presentation-pdf/Gulshan%20Rai.pdf
http://www.itu.int/ITU-D/cyb/publications/2012/IMPACT/IMPACT-en.pdf
http://www.slideshare.net/search/slideshow?lang=en&page=2&q=cyber+
security+in+moblie+devices&qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5a
a&searchfrom=header&sort=relevance
http://www.slideshare.net/marcosluis2186/50-facts-about-state-of-cybe
rsecurity-in-2015?qid=1b7c9dff-0a91-4463-a2d0-3b8e12ffd5aa&v=default&
b=&from_search=11
Images
http://image.slidesharecdn.com/solarwindsitsecuritysurveyreport2015-fin
al-150123103132-conversion-gate01/95/solarwinds-federal-cybersecurity-s
urvey-2015-13-638.jpg?cb=1422252000\
http://www.itconsultingnj.com/wp-content/uploads/2015/03/cyber-security-i
ncidents-by-country.jpg
http://cloudtweaks.com/wp-content/uploads/2015/05/attempts-security.png
https://www.visiongain.com/blog/wp-content/uploads/2015/04/Middle-Easter
n-Aviation-Cyber-Security-Market-Forecast-2015-2025-2.jpg
http://i0.wp.com/www.itgovernance.co.uk/blog/wp-content/uploads/2015
/06/ibm.png?resize=350%2C200
http://www.agcs.allianz.com/assets/Infographics/Piracy2015_618X593.jpg
http://www.www8-hp.com/us/en/images/01_HeaderCarousel_CyberRiskRe
port_Infographic_451X235_tcm245_1925412_tcm245_1925417_tcm245-192
25
THANK YOU
26