Subimal bhattarchajee


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Subimal bhattarchajee

  1. 1. Subimal Bhattacharjee Country Head, General Dynamics- India LO, New Delhi
  2. 2. Current status of cyberspace Issues of cyberspace-usage/growth/criminal and terrorist elements Need for cooperation & efforts so far-national/global Indian scenario- Information Technology Act 2000 (IT Act), IT (Amendment) Act 2008 Critical Information Infrastructure Protection Council of Europe draft convention of cybercrime Role of UN Future direction
  3. 3. World total users – 1.97 billion (28.7% of total population) Asia total users – 825.09 million (21.5% of total population) India total users – 81 million (7% of total population) China total users – 420 million (31.6% of total population) Japan total users – 99 million (78.2%of total population) South Korea total users – 39.4 million (81.1%of total population) (Statistics from Dec 2010)
  4. 4. Internet users– 81 million (7% of total population) Mobile phone users – 670.6 million (57% of total population) Broadband users – 10.08 million (Statistics from Dec 2010)
  5. 5. <ul><li>3.2 billion cyber attacks in 2009 </li></ul><ul><li>192% growth in spam from 2009 TO 2010 </li></ul><ul><li>2.9 million signatures for malwares in 2009 documented vulnerabilities of which 80% are exploitable </li></ul><ul><li>200000 active bot infected computers in the world </li></ul><ul><li>90% breaches in 2009 involved organized crime </li></ul><ul><li>84% of such breaches happened due to insider negligence </li></ul><ul><li>IP theft costs $ 2 billion globally in 2009 </li></ul><ul><li>Credit card details account for 32% of all goods advertised in underground economy servers </li></ul>
  6. 6. <ul><li>System Threats </li></ul><ul><li>Information Threats </li></ul><ul><li>Changing Infrastructure </li></ul><ul><li>Regulations and compliance </li></ul>
  7. 7. <ul><li>Web defacement and website intrusion </li></ul><ul><li>Malicious Code </li></ul><ul><li>-Botnets </li></ul><ul><li>-Crime ware </li></ul><ul><li>Data Theft and Data manipulation </li></ul><ul><li>-Identify Theft </li></ul><ul><li>-Financial Frauds </li></ul><ul><li>Scanning and probing </li></ul><ul><li>Distributed Denial of Service </li></ul><ul><li>Social engineering Scams </li></ul><ul><li>Spam </li></ul><ul><li>Targeted attacks </li></ul><ul><li>Offensive contents </li></ul>
  8. 8. London, 10 th Sept 2009
  9. 9. Indian IT Act. 2000 - Section 43 – Tampering of electronic records. - Section 65 – Tampering with computer source code. - Section 66 – Hacking & computer offences. Indian Copyright Act. <ul><li>States any person who knowingly makes use of an illegal </li></ul><ul><li>copy of computer program shall be punishable. </li></ul><ul><li>Computer programs have copyright protection, but no </li></ul><ul><li>Patent protection. </li></ul>Indian Penal Code <ul><li>Section 406 – Punishment for criminal breach of trust. </li></ul><ul><li>Section 420 – Cheating and dishonestly inducing delivery </li></ul><ul><li>Of property </li></ul>Indian Contract Act. 1872 <ul><li>Offers following remedies in case of breach of contract: </li></ul><ul><li>Damages. </li></ul><ul><li>- Specific performance of the contract. </li></ul>
  10. 10. UN Resolution 57 / 239 (2002) on the “creation of a global culture of cyber security” identifies nine elements for creating a global culture of cyber security: Awareness Responsibility Response Ethics Democracy Risk Assessment Security Design and Implementation Security Management Reassessment UN Resolution 58 / 199 (2000) future emphasized “promotion of a global culture of cyber security and protection of critical information infrastructure” • Recognizes the growing importance of information technologies for the promotion of socio-economic development and the provision of essential goods and services. • Notes the increasing links among most countries ‘critical infrastructure and that these are exposed to a growing number and a wider variety of threats and vulnerabilities that raise new security concerns.
  11. 11. [email_address] [email_address]