SlideShare a Scribd company logo
1 of 11
National Security in the
Realm of Cyber Security
Security Quotes
 The only system which is truly secure is one which is switched off
and unplugged, locked in a titanium safe, buried in a concrete
bunker, and is surrounded by nerve gas and very highly paid
armed guards. Even then, I wouldn’t stake my life on it.
(By Professor Gene Spafford)
In security matters,
there is nothing like absolute security”
“We are only trying to build comfort levels, because security costs
money and lack of it costs much more”
“Comfort level is a manifestation of efforts as well as a realization of
their effectiveness & limitations’
Cyber world – Current Scenario
 Advances in information and communications technologies have
revolutionised government scientific , educational and commercial
infrastructures.
 The IT infrastructure has become integral part of the critical infrastructure
which supports national capabilities such as power grids, emergency
communication systems, financial systems , defence systems and air traffic
control networks. The operational stability and security of critical
information infrastructure is vital for economic security of the country.
 It also enables large scale processes through out the economy by facilitating
complex interactions among individuals, organisations and systems across
global networks for trade and economic requirements.
Technology trends
 Increasing complexity of IT systems and networks will mount security
challenges for both providers and consumers.
 The evolving nature of the telecommunications infrastructure, as the
traditional phone systems and IT networks converge into a more
unified architecture.
 The expanding wireless connectivity to individual computers and
networks making it increasingly difficult to determine the physical and
logical boundaries of networks.
 The increasing interconnectivity and accessibility (and consequently
risk) to computer based systems that are critical to country’s economy.
01 Dec 2007
Security trends and challenges beyond 2008
Sophistication of
Hacker
Tools
1990
1980
Packet Forging/ Spoofing
Password Guessing
Self Replicating Code
Password
Cracking
Exploiting Known
Vulnerabilities
Disabling
Audits
Back Doors
Hijacking
Sessions
Sweepers
Sniffers
Stealth Diagnostics
Technical
Knowledge
Required
High
Low
2006
Information Security – General trends
Mischievous activities in cyber space have expanded from novice geeks to
organized criminal gangs that are going Hi-tech
Recent studies reveal three major findings:
 Growing threat to national security - web espionage becomes
increasingly advanced. Well-funded and well-organized operations
aimed at not only financial, but also political or technical gain
 Increasing threat to online services – affecting individuals
and industry because of growth of sophistication of attack
techniques
 Emergence of a sophisticated market for software flaws –
that can be used to carry out espionage and attacks on Govt. and
Critical information infrastructure. Findings indicate a blurred line
between legal and illegal sales of software vulnerabilities
Global Cyber security Trends – The next wave
There are signs that intelligence agencies around the world are constantly
probing others’ networks and developing new ways to gather intelligence
Internet has become an weapon for political, military and economic espionage
 Organized cyber attacks have been witnessed
 Pentagon, US in
 Estonia in April 2007
 Computer systems of German Chancellery and three Ministries
 E-mail accounts at National Informatics Centre, India
 Highly classified Govt. computer networks in New Zealand & Australia
 The software used to carry out these attacks indicate that they were clearly designed & tested with much
greater resources than usual individual hackers.
 Most Govt. agencies and companies around the world use common computing technologies & systems that
are frequently penetrated by criminal hackers and malware.
 Traditional protective measures are not enough to protect against attacks such as those on Estonia, as the
complexity and coordination in using the botnets was totally new. National networks with less
sophistication in monitoring and defense capabilities could face serious problems to National security.
Threats to National security
Given the exponential growth in social networking sites, social engineering may
shortly become the easiest & quickest way to commit ID theft
Online services are becoming prime targets for cyber criminals
 Cyber criminals continue to refine their means of deceit as well as their victims In
summary, the global threats affecting users are:
 New & sophisticated forms of attacks.
 Attacks targeting new technologies, such as VoIP (vishing – phishing via VoIP &
phreaking – hacking tel networks to make free long distance calls) and peer-to-peer
services.
 Attacks targeting online social networks.
 Attacks targeting online services, particularly online banking services.
Threats to Online services
Cyber crime – Most common forms
 Hacking – Unauthorised attempts to bypass the security
mechanism of an information system or network.
 Data theft ( using flash/pen drives, digital cameras).
 Virus or worms, Malware or Trojan horses.
 Identity Theft
 E- mail spoofing
 Botnets and Zombies
 Scareware
Survival
 “It is not the strongest of the species that survive,
nor the most intelligent, but the one most
responsive to change.
Charles Darwin
 Q &A
Thank You

More Related Content

Similar to Cyber Security – Indian Perspective.pptx

Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...online Marketing
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Kevin Fream
 

Similar to Cyber Security – Indian Perspective.pptx (20)

Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
L479096.pdf
L479096.pdfL479096.pdf
L479096.pdf
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
 
Forensics
ForensicsForensics
Forensics
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Cyber Security – Indian Perspective.pptx

  • 1. National Security in the Realm of Cyber Security
  • 2. Security Quotes  The only system which is truly secure is one which is switched off and unplugged, locked in a titanium safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn’t stake my life on it. (By Professor Gene Spafford) In security matters, there is nothing like absolute security” “We are only trying to build comfort levels, because security costs money and lack of it costs much more” “Comfort level is a manifestation of efforts as well as a realization of their effectiveness & limitations’
  • 3. Cyber world – Current Scenario  Advances in information and communications technologies have revolutionised government scientific , educational and commercial infrastructures.  The IT infrastructure has become integral part of the critical infrastructure which supports national capabilities such as power grids, emergency communication systems, financial systems , defence systems and air traffic control networks. The operational stability and security of critical information infrastructure is vital for economic security of the country.  It also enables large scale processes through out the economy by facilitating complex interactions among individuals, organisations and systems across global networks for trade and economic requirements.
  • 4. Technology trends  Increasing complexity of IT systems and networks will mount security challenges for both providers and consumers.  The evolving nature of the telecommunications infrastructure, as the traditional phone systems and IT networks converge into a more unified architecture.  The expanding wireless connectivity to individual computers and networks making it increasingly difficult to determine the physical and logical boundaries of networks.  The increasing interconnectivity and accessibility (and consequently risk) to computer based systems that are critical to country’s economy.
  • 5. 01 Dec 2007 Security trends and challenges beyond 2008 Sophistication of Hacker Tools 1990 1980 Packet Forging/ Spoofing Password Guessing Self Replicating Code Password Cracking Exploiting Known Vulnerabilities Disabling Audits Back Doors Hijacking Sessions Sweepers Sniffers Stealth Diagnostics Technical Knowledge Required High Low 2006 Information Security – General trends
  • 6. Mischievous activities in cyber space have expanded from novice geeks to organized criminal gangs that are going Hi-tech Recent studies reveal three major findings:  Growing threat to national security - web espionage becomes increasingly advanced. Well-funded and well-organized operations aimed at not only financial, but also political or technical gain  Increasing threat to online services – affecting individuals and industry because of growth of sophistication of attack techniques  Emergence of a sophisticated market for software flaws – that can be used to carry out espionage and attacks on Govt. and Critical information infrastructure. Findings indicate a blurred line between legal and illegal sales of software vulnerabilities Global Cyber security Trends – The next wave
  • 7. There are signs that intelligence agencies around the world are constantly probing others’ networks and developing new ways to gather intelligence Internet has become an weapon for political, military and economic espionage  Organized cyber attacks have been witnessed  Pentagon, US in  Estonia in April 2007  Computer systems of German Chancellery and three Ministries  E-mail accounts at National Informatics Centre, India  Highly classified Govt. computer networks in New Zealand & Australia  The software used to carry out these attacks indicate that they were clearly designed & tested with much greater resources than usual individual hackers.  Most Govt. agencies and companies around the world use common computing technologies & systems that are frequently penetrated by criminal hackers and malware.  Traditional protective measures are not enough to protect against attacks such as those on Estonia, as the complexity and coordination in using the botnets was totally new. National networks with less sophistication in monitoring and defense capabilities could face serious problems to National security. Threats to National security
  • 8. Given the exponential growth in social networking sites, social engineering may shortly become the easiest & quickest way to commit ID theft Online services are becoming prime targets for cyber criminals  Cyber criminals continue to refine their means of deceit as well as their victims In summary, the global threats affecting users are:  New & sophisticated forms of attacks.  Attacks targeting new technologies, such as VoIP (vishing – phishing via VoIP & phreaking – hacking tel networks to make free long distance calls) and peer-to-peer services.  Attacks targeting online social networks.  Attacks targeting online services, particularly online banking services. Threats to Online services
  • 9. Cyber crime – Most common forms  Hacking – Unauthorised attempts to bypass the security mechanism of an information system or network.  Data theft ( using flash/pen drives, digital cameras).  Virus or worms, Malware or Trojan horses.  Identity Theft  E- mail spoofing  Botnets and Zombies  Scareware
  • 10. Survival  “It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change. Charles Darwin  Q &A