• Save
Cyber Crime and Network Security in India
Upcoming SlideShare
Loading in...5
×
 

Cyber Crime and Network Security in India

on

  • 10,074 views

 

Statistics

Views

Total Views
10,074
Views on SlideShare
10,061
Embed Views
13

Actions

Likes
8
Downloads
0
Comments
3

2 Embeds 13

http://www.slideshare.net 12
http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial LicenseCC Attribution-NonCommercial License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • I am a victime of Cyber stalking and cyber harassment since 2008 and the cyber crime is part of a bigger crime known as Organized Stalking or Gang Stalking in Chennai, I have filed several complaints with the cybre crime cell , chennai but got no relief. Repeated complaints to the service providers like Airtel, Reliance were of no use at all.
    Are you sure you want to
    Your message goes here
    Processing…
  • pls send me a paper presentation on cyber crime and security in computers
    Are you sure you want to
    Your message goes here
    Processing…
  • Hey can u plz send me the presentation on my email d i.e. prateek_sharma_may@yahoo.com........its urgent so plz send asap....i ll be grateful to u...
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber Crime and Network Security in India Cyber Crime and Network Security in India Presentation Transcript

  • Cyber Crime & Network Security in India CIO Focus Security 2008 Presentation by Adam Rice & AJ Vijayakumar ©2008 Tata Communications, Ltd. All Rights Reserved
  • Explosive Internet Growth and Impacts to Businesses India Internet Usage Stats and Telecommunications Market Report Internet Usage and Population Statistics: Internet use has been a key driver to enhance both Domestic & Global Trade in India Year Users Population % Pen. Usage Source 1998 1,400,000 1,094,870,677 0.1% ITU % Real GDP Growth Rate 1999 2,800,000 1,094,870,677 0.3% ITU 12 10.5 8.3 7.5 2000 5,500,000 1,094,870,677 0.5% ITU 8 5.6 5.5 5.3 5.1 2001 7,000,000 1,094,870,677 0.7% ITU 4.5 4.0 2002 16,500,000 1,094,870,677 1.6% ITU 4 2003 22,500,000 1,094,870,677 2.1% ITU 0 2004 25,000,000 1,094,870,677 2.28% IAMAI g nd na a e a ea an a on di si or si 2005 38,500,000 1,112,225,812 3.46% IAMAI hi or la iw ne In ay ap K ai C K Ta do g al ng Th 2006 50,600,000 1,112,225,812 4.55% CIA on M In Si H 2007 60,000,000 1,129,667,528 5.31% ITU Source: Morgan Stanley Research E-Commerce Media & Entertainment Government Education Online Banking Business Process Outsourcing
  • Defining “Cyber Crime” Webster's New Millennium™ Dictionary of English Entry: Cyber Crime Part of Speech: noun Definition: A crime committed on a computer network, esp. the Internet Example: Identity theft is a Cyber Crime. Spamming Espionage Malware (cont.) DDoS Internet Harassment Downloader Unauthorized access Malware Adware Virus Ransomeware Social Engineering Worm Child Pornography Hacking Trojan Telecom Fraud Phishing Bot Financial Fraud Identity Theft Rootkit Computer Fraud Cyber-stalking Spyware Information warfare Backdoor
  • News/Media Perspective of Cyber Crime in the India Cybercrime Threatens National Security in Cyber Crime On A Roll In India India Posted by Rushabh Chokshi on Date: September 27, 2007 November 2nd, 2007 Source: merinews.com It is The New Age in Cyber Crime, according By: Fahim Ahmedi to latest news cyber criminals are now targeting Enterprises and Consumers based in Tier III cities India is now taking steps to fight against the Cybercrime: A threat to national security cyber crime, Indian police are now being Date: September 17, 2007 trained on how the Internet, e-mail, and other Source: merinews.com computer-based tools can be used by By: Fahim Ahmedi criminals to illegally obtain information stored in databases The ever increasing cyber crime is taking the world by storm. Technology is a boon but it also has dangerous implications if left undetected. Cyberspace is one such area that needs to pull all security strings together before things go out of hand.
  • News/Media Perspective of Cyber Crime in the India Ankit Fadia, a 21-year-old computer whizkid and author of ’The Unofficial Guide to Ethical Hacking’ said “I could hack a state-owned bank’s website or a government communications website which shows the vulnerability, thousands of Indian websites are being hacked each day”.
  • News/Media Perspective of Cyber Crime in the India Cyber crime in India on the decline: Report Posted online: Monday, January 07, 2008 at 12:00:00 Updated: Monday, January 07, 2008 at 10:37:53 New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the “new age” crime have declined with the most noticeable difference seen in Gujarat. However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in Gujarat. A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually decreased. “This is only a statistics based on the number of cases registered,” he added. darkREADING Annual CIS Study: Cost of Cybercrime Is Skyrocketing Average annual loss per company has more than doubled since last year, according to bellwether study September 11, 2007 | 5:55 PM By Tim Wilson Site Editor, Dark Reading
  • Net Neutrality vs. Censorship Clean the Pipes
  • The Threats are Real Global Activity Maps Source: Arbor Networks 2008
  • Internet Service Providers Security Concerns Top Concern Source: Arbor Networks 2007
  • The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs worldwide are The most common infection methods detected by bot infected S21sec include browser exploits (65%), e-mail (Source: BBC 2007 interview with Vint Cerf) attachments (13%), operating system exploits (11%), downloaded Internet files (9%) and other 52,771 new infected PCs daily methods (2%), as illustrated in the figure below. (Source: Symantec 2007) Infection Methods Downloaded Other Rapid growth in tools used by Cyber Files 2% Criminals 9% Victims often do not know that they have OS Exploits been compromised! 11% Easy to use tools with varying levels of Email Browser anonymity offered to cyber criminals Attachments Exploits 13% 65% Source: S21sec
  • The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs Malcode Additions 2007 worldwide are bot infected Spyware 308 (Source: BBC 2007 interview with Vint Cerf) Rootkit 1,138 52,771 new infected PCs daily Keylogger 1,463 (Source: Symantec 2007) Other 14,907 Password Stealer 22,982 Rapid growth in available tools used by Cyber Criminals! Dialer 23,449 Backdoor 25,997 Victims often do not know that they have been compromised! Downloader 41,389 Virus 48,889 Easy to use tools with varying levels of anonymity offered to cyber Adware 55,873 criminals! Worm 64,173 Trojan 109,246 0 20,000 40,000 60,000 80,000 100,000 120,000 Source: IBM ISS x-Force Trend Report 2007
  • The Botnet Problem – Devastating Impact to Businesses Common Exploits from Botnets Identity Theft Credit card /Email fraud Theft/Fraud in online banking and auctions Theft storage and distribution of login ID/Password, financial data, etc… DDoS (Distributed Denial of Service) 50% of Botnets used for DDoS attacks (Source: S21 sec) Each bot generates 40kbps Small botnets command up to 10,000 bots Large botnets command up to 1 million bots 20+ Gbps DDoS attacks witnessed in 2007 (Source: Arbor Networks Inc. 2007) Spam Each spam bot can send 3 spam emails per second (259,000/day) 94% of all emails is Spam (Google/Postini 2006)
  • There are Solutions in Sight Solutions Commentary Preventing PC compromise Vulnerability assessment, Identity vulnerabilities and enforce a penetration testing, anti-virus, priority based patch management etc… approach to secure PCs from known exploits. Securing against Botnet attacks Employ a Defense in Depth Strategy when Securing your Enterprise! Layer your defenses against network security threats to minimize the impact! Preventing Identity Theft Content filtering services, anti- Combat a variety of Phishing, virus, intrusion detection and Pharming, malware and web/email prevention systems fraud activities that can result in identity theft Preventing DDoS Cloud based and or CPE based Stopping in the cloud within the anti-DDoS services. provider’s network reduces the chance Cloud is recommended. of a last mile bottleneck, which completes the attacker’s work Preventing Spam Cloud-based and or CPE based Stopping in the cloud through a proxy- anti-spam solution based service saves unnecessary bandwidth exhaustion and saves costs
  • Tata Communications Has Taken a Stance Against Cyber Crime!
  • What are Your Next Actions to Securing your Enterprise from Cyber Crime? Assess your Current state to define your Next steps Take a custom self-assessment to determine your next steps Web-based module www.tatacommunications.com/security/assessment Combat Cyber Crime!
  • Thank You www.tatacommunications.com
  • Managed Services Portfolio
  • Managed Security Services