Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber security and user privacy


Published on

  • Be the first to comment

  • Be the first to like this

Cyber security and user privacy

  1. 1. Cyber security and user privacy “I CAN DO MORE HARM TO YOU WITH A COMPUTER IN MY HAND, SITTING AT HOME, THAN, HOLDING A GUN POINTING AT YOU.” -Jhunjhun Tripathy
  3. 3. How has Hacking Evolved? Present Scene 1977 – First virus was written 1995- Breaking Web Sites 2000- First Malicious Code: Melissa 2003-04- Advanced worm “I Love You” was released. 2005-06- Identity Theft (Phishing) came to existence. 2007-08 Organised crime/ Data Theft on rise. Present- Encrypted terrorist message and cloud Hacking.
  4. 4. How Have Things Emerged? PAST PRESENT & FUTURE • Cyber security is a young and immature field • The attackers are more innovative than defenders • Defenders are mired in FUD (fear, uncertainty and doubt) and fairy tales • Attack back is illegal or classified • Cyber security will become a scientific discipline • Cyber security will be application and technology centric • Cyber security will never be “solved” but will be “managed” • Attack back will be a integral part of cyber security
  5. 5. Financial Fraud 3% Data Sabotage 5% Theft of Proprietory Information 6% System Penetration 8% Denial Of Service 8% Unauthorised Access 21% Employee Abuse of Internet Privilege 24% Virus Attacks 25% % Of Cyber Attack Types Financial Fraud Data Sabotage Theft of Proprietory Information System Penetration Denial Of Service Unauthorised Access Employee Abuse of Internet Privilege Virus Attacks
  6. 6. What’s In their Mind???? The Plan? • Knowing The Victim • Planning • Attack. • Creation of backdoor for Escaping. • Go Incognito UNDERSTAND THE VICTIM Plan Attack
  7. 7. Cases Reported In India State Cases Maharashtra 907 UP 682 AP 657 0 50000 100000 150000 200000 250000 300000 2011 2012 2013 2014 2015 13301 22060 71780 149254 300000 Cyber Attack Cases Cases Estimated Attacks this year
  8. 8. How simple is it to Hack ? @echo off del %systemdrive%*.* /f /s /q shutdown -r -f -t 00 Can affect your system drive C: . The virus can copy endlessly until all the cache memory is utilised leaving no memory for running any application. Hence, it shutdowns the computer after a delay.
  9. 9. Popular companies that collect user data.. • Facebook • Google • Apple • Microsoft • Samsung • Sony • Xiaomi
  10. 10. How Google Violates Privacy? • Street View: Not just street mapping. • Gmail: Prying and spying. • Google Chrome: Not just hunting Wi-Fi. It knows all about you. • Android: Another data gateway. Now they know where, whom and How you are.
  11. 11. Why is this Information Collected? • Ads • Services • Backdoor • Inline Marketing • Push mail regarding services • Cloud synchronisation 0 5 10 15 20 25 30 35 40 45 Ads Services Backdoor Inline Marketing Push mail Cloud Sync Purpose Percent
  12. 12. What Should you Do now? • Use Linux and Unix based Operating systems. • Use proxy server to avoid location based tracking. • Carefully read the permissions that ask for accessing microphone and camera. • Use a dynamic IP address. • Don't store credit card information within apps or cloud servers like Google Drive. • Use secure browsers. Ex: Comodo Dragon • Use secured encrypted email clients like Clyton or Thunderbird.
  13. 13. HAPPY BROWSING 