You are on page 1of 23

Californian based

HISTORY
Thomas Draper
1970
s Kevin Mitnick,
Early 1988 16,USA

Gary McKinnon,
USA
Enter the 1990s
34% in
2013 – up
from last
year’s 15%.

Significant
Increase
43% in
government, and
NOW
up from last
year’s 19% .

deterrence
stability
What IsThreat?
Cyber

Unauthorise Access of Data

Malignant & Destructive Act

Infiltration & Stealing of Data


MAIN
•Business
SOURCES OF Competitors

CYBER
•Hackers &
THREAT •Organised
Crime Groups Hacktivists

•Industrial
•Terrorists Spies
PHISHIN
G
DATA
BREACH
•DENIAL OF SERVICE
•MALWARE
•RANSOMWARE
•PASSWORD ATTACKS
Don’t be
an Easy
Bait
TERRORISM
TARGET

IMPACT
METHOD OF
ACTION

TOOLS OF
ATTACK

DOMAIN
THREAT
SOFTWARE
S

MALWARE

• WORMS • VIRUS • TROJAN


THREAT
SOFTWARE
S
SCAREWARE

CREDITIDENTITY
CARD THEFT
CYBER CRIME

AS A Hacking, Virus
Attack, DOS Attack
TARGET

AS A Cyber Terrorism,
Credit Card Fraud
WEAPON
INFORMATION TECHNOLOGY ACT, 2000

DIGITAL ELECTRONIC
SIGNATURE GOVERNANCE

REGULATION OF SUBSCRIBERS TRIBUNAL


CERTIFYING &
AUTHORITY RECIPIENT

PENALTIES OFFENCES
&
ADJUDICATION
“Prevention is Better
Than Cure”

Install Preventing Running Switching on


Identity Protecting Anti-Virus
OS/Software Personal
Theft: passwords: Software
updates Firewalls:
HOW DO WE
PROTECT!!

SUPERVISION

ENCRYPT
ION
AUTHENTIC
ATION
WHAT is
ENCRYPTION!?
TYPES
ENCRYPTION IN THE
HANDS OF
INTRUDERS!!

Advanced Encryption
Standard (AES)

IDEA (International Data


Encryption Algorithm)

Blowfish and Twofish

Ring Learning With Errors


or Ring-LWE
Thank you!!

GOPALA DALMIA
ERO0236353
SONIA DHAR
ERO0236642
DIMPLE SARAF
ERO0234801
ARATI KUMARI SINGH
ERO0236742
SNEHA MODI

You might also like