SlideShare a Scribd company logo
1 of 24
Presented by:
Amit Arya
Faculty, Dept. of Business Administration
Dhanwate National College, Nagpur
1© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Cyber Security & Hygiene
What is Cybercrime?
• Using the Internet to commit a crime.
– Identity Theft
– Hacking
– Viruses
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography
2© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Cybercrime Components
• Computers
• Cell Phones
• PDA’s
• Game Consoles
3© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
High-Profile Cybercrime-
related Cases
• Akamai Technologies State of the Internet report also showed that
hacker attacks on websites went up 75% in the final quarter of 2013, with
hackers in China responsible for 43% of all attacks.
• eBay went down in a blaze of embarrassment as it suffered this year’s
biggest hack so far. In May, eBay revealed that hackers had managed to
steal personal records of 233 million users. The hack took place between
February and March, with usernames, passwords, phone numbers and
physical addresses compromised.
• Domino’s Pizza-Hacking group Rex Mundi held Domino’s Pizza to ransom
over 600,000 Belgian and French customer records. In exchange for the
personal data, which included names, addresses, emails, phone numbers
and even favourite pizza toppings, Mundi demanded $40,000 from the
fast-food chain
4© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security:
Confidentiality
Only those authorized
to view information
Integrity
Information is correct
and hasn’t been
altered by
unauthorized users or
software
Availability
Data is accessible to
authorized users
5© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
Malware:
Software that has a malicious
purpose:-
•Viruses
•Trojan horse
•Spyware
Intrusions:
Any attempt to gain
unauthorized access to a
system:-
•Cracking
•Hacking
•Social Engineering
6© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
• Denial-of-Service (DOS)
– Prevention of legitimate access to systems
– Different types:
• Ping-of-Death
• Teardrop-attack that involves sending fragmented
packets to a target machine.
• Smurf-attack in which large numbers of Internet
Control Message Protocol (ICMP) packets with the
intended victim's spoofed source IP are broadcast to a
computer network using an IP Broadcast address.
7© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
Figure – DoS and DDoS Models
8© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Terminology
• People
– Hackers
• White Hat – Good guys. Report hacks/vulnerabilities to
appropriate people.
• Black Hat – Only interested in personal goals,
regardless of impact.
• Grey Hat – Somewhere in between.
9© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Terminology
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
10
Firewall: Barrier between network and
the outside world.
Proxy server: Sits between users
and server. Two main functions
are to improve performance and
filter requests.
Cyber Targets
• 99% of the attacks can be
prevented by basic hygiene.
DO
 Think before you click
 Up-to-date anti-virus, firewall and
site advisor
BUT
 Some new attacks may get through.
However, attacker may only use your
machine to attack others and not
attack you per se.
 Will not prevent data loss by
merchants and other servers.
• 1% of the attacks are difficult
and expensive to defend or
detect.
For most individuals
 We are simply not an attractive
enough target.
For the Defense & other sensitive govt.
departments and its contractor.
 A huge target.
 For companies in sensitive businesses
a serious threat to be taken seriously
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
11
Concerns & Cautions
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
12
Needful Transformation
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
13
Cyber security is a
young and immature
field.
Attack back is illegal.
The attackers are
more innovative than
defenders.
Defenders are
mired in FUD (fear,
uncertainty and
doubt)
Cyber security will
become:
•a scientific discipline
•application and
technology centric
Attack back will be a
integral part of cyber
security
Top Cyber Security Companies- Global
14© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Top Cyber Security Companies-
Indian
15© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
16© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Indian Govt.’s Initiative
17© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
contd…
18© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Some of the Cyber Security Offences & Penalties
19© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Certifications
• Entry-level
– Security+
http://www.comptia.org/certifications/listed/security.aspx
– CIW Security Analyst www.ciwcertified.com
• Intermediate
– MSCE Security
http://www.microsoft.com/learning/en/us/certification/mcse.a
• Professional
– CISSP www.isc2.org
– SANS www.sans.org
20© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Education
• 3/4-Year College Degrees:
– Applied
– Network
– Cryptography
– Management
21
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
References
• http://www.itbusinessedge.com/slideshows/top-25-cybersecurity-companies-to-watch-in
• http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-
cyber-attacks-of-2014-so-far/#ff681c721a65
• http://www.ft.com/cms/s/0/5870af72-e298-11e3-a829-
00144feabdc0.html#axzz3z4c1riRi
• https://en.wikipedia.org/wiki/Computer_security
• http://www.digitalindia.gov.in/
• https://www.cisecurity.org/about/CyberCampaign2014.cfm
• http://list.ly/list/Tmw-top-most-promising-cyber-security-companies-in-india
22
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
Disclaimer
Please note that this presentation is for
information purpose only. All the logos,
trademarks and other intellectual properties
are owned by respective entities.
23
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
24
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
Amit Arya
email: mailtoamitarya@gmail.com

More Related Content

What's hot

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 

What's hot (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Web security
Web securityWeb security
Web security
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Network security
Network security Network security
Network security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ppt
PptPpt
Ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 

Viewers also liked

A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygienetechugo
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedJames '​-- Mckinlay
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Search Engines Presentation
Search Engines PresentationSearch Engines Presentation
Search Engines PresentationJSCHO9
 
Search Engine Powerpoint
Search Engine PowerpointSearch Engine Powerpoint
Search Engine Powerpoint201014161
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Viewers also liked (8)

A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygiene
 
Tipología uso y consumo de las redes
Tipología uso y consumo de las redesTipología uso y consumo de las redes
Tipología uso y consumo de las redes
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Search Engines Presentation
Search Engines PresentationSearch Engines Presentation
Search Engines Presentation
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Search Engine Powerpoint
Search Engine PowerpointSearch Engine Powerpoint
Search Engine Powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security & Hygine

Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportStephanie Brannan
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Amanda Morris
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecurityIRJET Journal
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityTigerGraph
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)AvinantaTarigan
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...NECST Lab @ Politecnico di Milano
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...null - The Open Security Community
 

Similar to Cyber Security & Hygine (20)

Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 

More from Amit Arya

Irrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of MaharashtraIrrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of MaharashtraAmit Arya
 
eGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through TechnologyeGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through TechnologyAmit Arya
 
Public internet access
Public internet accessPublic internet access
Public internet accessAmit Arya
 
The framework of political development in the
The framework of political development in theThe framework of political development in the
The framework of political development in theAmit Arya
 
An investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalshipAn investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalshipAmit Arya
 
Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)Amit Arya
 

More from Amit Arya (7)

CV_AmitArya
CV_AmitAryaCV_AmitArya
CV_AmitArya
 
Irrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of MaharashtraIrrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of Maharashtra
 
eGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through TechnologyeGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through Technology
 
Public internet access
Public internet accessPublic internet access
Public internet access
 
The framework of political development in the
The framework of political development in theThe framework of political development in the
The framework of political development in the
 
An investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalshipAn investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalship
 
Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Cyber Security & Hygine

  • 1. Presented by: Amit Arya Faculty, Dept. of Business Administration Dhanwate National College, Nagpur 1© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur Cyber Security & Hygiene
  • 2. What is Cybercrime? • Using the Internet to commit a crime. – Identity Theft – Hacking – Viruses • Facilitation of traditional criminal activity – Stalking – Stealing information – Child Pornography 2© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 3. Cybercrime Components • Computers • Cell Phones • PDA’s • Game Consoles 3© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 4. High-Profile Cybercrime- related Cases • Akamai Technologies State of the Internet report also showed that hacker attacks on websites went up 75% in the final quarter of 2013, with hackers in China responsible for 43% of all attacks. • eBay went down in a blaze of embarrassment as it suffered this year’s biggest hack so far. In May, eBay revealed that hackers had managed to steal personal records of 233 million users. The hack took place between February and March, with usernames, passwords, phone numbers and physical addresses compromised. • Domino’s Pizza-Hacking group Rex Mundi held Domino’s Pizza to ransom over 600,000 Belgian and French customer records. In exchange for the personal data, which included names, addresses, emails, phone numbers and even favourite pizza toppings, Mundi demanded $40,000 from the fast-food chain 4© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 5. Computer Security: Confidentiality Only those authorized to view information Integrity Information is correct and hasn’t been altered by unauthorized users or software Availability Data is accessible to authorized users 5© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 6. Computer Security - Threats Malware: Software that has a malicious purpose:- •Viruses •Trojan horse •Spyware Intrusions: Any attempt to gain unauthorized access to a system:- •Cracking •Hacking •Social Engineering 6© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 7. Computer Security - Threats • Denial-of-Service (DOS) – Prevention of legitimate access to systems – Different types: • Ping-of-Death • Teardrop-attack that involves sending fragmented packets to a target machine. • Smurf-attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address. 7© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 8. Computer Security - Threats Figure – DoS and DDoS Models 8© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 9. Computer Security - Terminology • People – Hackers • White Hat – Good guys. Report hacks/vulnerabilities to appropriate people. • Black Hat – Only interested in personal goals, regardless of impact. • Grey Hat – Somewhere in between. 9© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 10. Computer Security - Terminology © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 10 Firewall: Barrier between network and the outside world. Proxy server: Sits between users and server. Two main functions are to improve performance and filter requests.
  • 11. Cyber Targets • 99% of the attacks can be prevented by basic hygiene. DO  Think before you click  Up-to-date anti-virus, firewall and site advisor BUT  Some new attacks may get through. However, attacker may only use your machine to attack others and not attack you per se.  Will not prevent data loss by merchants and other servers. • 1% of the attacks are difficult and expensive to defend or detect. For most individuals  We are simply not an attractive enough target. For the Defense & other sensitive govt. departments and its contractor.  A huge target.  For companies in sensitive businesses a serious threat to be taken seriously © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 11
  • 12. Concerns & Cautions © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 12
  • 13. Needful Transformation © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 13 Cyber security is a young and immature field. Attack back is illegal. The attackers are more innovative than defenders. Defenders are mired in FUD (fear, uncertainty and doubt) Cyber security will become: •a scientific discipline •application and technology centric Attack back will be a integral part of cyber security
  • 14. Top Cyber Security Companies- Global 14© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 15. Top Cyber Security Companies- Indian 15© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 16. 16© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 17. Indian Govt.’s Initiative 17© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 18. contd… 18© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 19. Some of the Cyber Security Offences & Penalties 19© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 20. Computer Security - Certifications • Entry-level – Security+ http://www.comptia.org/certifications/listed/security.aspx – CIW Security Analyst www.ciwcertified.com • Intermediate – MSCE Security http://www.microsoft.com/learning/en/us/certification/mcse.a • Professional – CISSP www.isc2.org – SANS www.sans.org 20© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 21. Computer Security - Education • 3/4-Year College Degrees: – Applied – Network – Cryptography – Management 21 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 22. References • http://www.itbusinessedge.com/slideshows/top-25-cybersecurity-companies-to-watch-in • http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal- cyber-attacks-of-2014-so-far/#ff681c721a65 • http://www.ft.com/cms/s/0/5870af72-e298-11e3-a829- 00144feabdc0.html#axzz3z4c1riRi • https://en.wikipedia.org/wiki/Computer_security • http://www.digitalindia.gov.in/ • https://www.cisecurity.org/about/CyberCampaign2014.cfm • http://list.ly/list/Tmw-top-most-promising-cyber-security-companies-in-india 22 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 23. Disclaimer Please note that this presentation is for information purpose only. All the logos, trademarks and other intellectual properties are owned by respective entities. 23 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 24. 24 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur Amit Arya email: mailtoamitarya@gmail.com