Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Meeting The Cyber Insurgency Threats From Neighbouring Countires01

4,339 views

Published on

This Presentation has been given as a academic seminar at International School of Information Management, university of mysore

Published in: Education, Technology
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Meeting The Cyber Insurgency Threats From Neighbouring Countires01

  1. 1. The AKAA Group Presents…. 12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  2. 2. Presented By: Aditya, Karjan, Alka, & Artmiz MEETING CYBER INSURGENCY THREATS FROM NEIGHBOURING COUNTRIES 12/18/09 IPR & Cyber law Presentation by AKAA Group....
  3. 3. Contents <ul><li>Introduction </li></ul><ul><li>Cyber threats Groups & Actors </li></ul><ul><li>The cyber threats Actors </li></ul><ul><li>Types of Threats and Attacks </li></ul><ul><li>Cyber threats from Neighbor </li></ul><ul><li>India’s stand on dealing Insurgency </li></ul><ul><li>Protection of Corporate network </li></ul><ul><li>Blue print for combating cyber threats </li></ul><ul><li>Conclusion </li></ul><ul><li>References </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  4. 4. Introduction <ul><li>A nuclear war may not be on the immediate horizon, but a cyber war is and it has the potential to bring major cities worldwide to a standstill, affecting everything from banking, traffic networks, hospitals and even electricity grids. These are now the focus of a new security front worldwide. </li></ul><ul><li>It’s pretty clear now there is underway a type of cyber arms race, both to be able to pick up and also to secure data per se, but also, in fact, to be able to target or to defend those countless crucial functions of a contemporary society. </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  5. 5. What is Cyber Threat <ul><li>‘ Cyber threat’ is a threat that percolates or infiltrates through the use of computers , internet or interconnected communication devices and could comprise of information stealth, cyber warfare, virus attacks, cyber terrorism, hacking attempts , phising, sabotage, singly or in combination . </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  6. 6. Cyber threat Groups & Actors <ul><li>Espionage </li></ul><ul><ul><li>State-sponsored or corporate electronic spying </li></ul></ul><ul><ul><li>Typically “open source” data collection </li></ul></ul><ul><li>Terrorist groups </li></ul><ul><ul><li>Covert communications channels </li></ul></ul><ul><li>Criminal actions </li></ul><ul><ul><li>Credit card theft, child pornography, copyright infringement </li></ul></ul><ul><ul><li>Spyware and other unauthorized cyber tracking software </li></ul></ul><ul><ul><li>Phishing emails and fake websites </li></ul></ul><ul><ul><li>Encrypting files followed by extortion to unencrypt. </li></ul></ul><ul><li>Hackers </li></ul><ul><ul><li>Worms, viruses, malicious software, website defacements, and adolescent pranks </li></ul></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  7. 7. Types of Threats and Attacks <ul><li>Malware </li></ul><ul><li>Botnets </li></ul><ul><li>Cyber warfare </li></ul><ul><li>Threats to VOIP & Mobile </li></ul><ul><li>convergence </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  8. 8. 12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  9. 9. Video of Cyber Threat 12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  10. 10. Trends for Cyber threats 12/18/09 IPR & Cyber law Presentaion by AKAA Group.... Malicious attackers will install malware on social networking sites leading to increased phising scams, or stealing data,etc- browser level protection needed. Hackers will install malcode within video content which will affect users accessing video clips. Mash up technology used by web applications to combine data/media from multiple sources, locations and coding styles may lead to increased corporate espionage and other scams Identity thefts will only increase and botnets will be used for corporate espionage and phising scams Polymorphic exploitation- creation of unique exploit with each user request –signature based protection engines at network or host level fail . Growing popularity of VOIP applications-instances of voice spam and voice phising or smishing will increase. Targeted attacks -Attack activity through e-mail, Instant messaging ,P2P networks will increase Denial of service affecting voice infrastructure Cyber terrorist attacks will increase and lead to cyber warfare- threat to nation’s sovereignty MMS scams will be on the rise and raise issues of defamation and invasion of privacy
  11. 11. Striking Facts <ul><li>According to a report compiled by Panda Labs , in 2008, 10 million bot computers were used to distribute spam and malware across the Internet each day. </li></ul><ul><li>Annual take by theft-oriented cyber criminals is estimated to be as high as 100 billion dollars and 97 per cent of these offences go undetected,- CBI's Conference on International Police Cooperation against Cyber Crime, March 2009. </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  12. 12. Cyber Threats From Neighbors <ul><li>Pakistan </li></ul><ul><li>China </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  13. 13. Pakistan & China towards Indian <ul><li>Pakistani cyber criminals are able to deface 50 to 60 Indian websites a day. </li></ul><ul><li>Chinese are constantly scanning and mapping India’s official networks. </li></ul><ul><li>China has mounted almost daily attacks on Indian computer networks, both government and private, showing its intent and capability. </li></ul><ul><li>The big attacks that were sourced to China over the last few months included an attack on NIC (National Informatics Centre), which was aimed at the National Security Council, and on the MEA. </li></ul><ul><li>Three main weapons - BOTS, key loggers and mapping of networks.  </li></ul>12/18/09 IPR & Cyber law Presentation by AKAA Group....
  14. 14. India’s Stands on dealing Insurgency <ul><li>The Information Technology Act 2000 extends to whole of India and also applies to any offence or contraventions committed outside India by any person (s 1(2),IT Act 2000). </li></ul><ul><li>According to s 75 of the Act, the Act applies to any offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India. </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  15. 15. Protection of Corporate network <ul><li>Information security – Securing widespread electronic collaboration while protecting data at rest, in motion, in use, and throughout the lifecycle, </li></ul><ul><li>Threat and vulnerability management - Staying ahead of emerging threats on all system components: network, server, and the strategic endpoint, </li></ul><ul><li>Identity and access management - Assuring that the right people have access to the right information and assets at the right time for the right reason, </li></ul><ul><li>Application security - Ensuring application and business process security across the software application lifecycle, and </li></ul><ul><li>Physical security - Integrating video surveillance and security solutions with industry-standard components. </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  16. 16. Blue print for combating cyber threats <ul><li>To reduce vulnerability of country’s cyberspace </li></ul><ul><li>To protect critical infrastructure and critical information systems and services. </li></ul><ul><li>To improve interdepartmental coordination mechanisms for prevention, rapid response and recovery from attacks. </li></ul><ul><li>To advance legal mechanisms that support the goals of the cyber security strategy-recent changes in IT Act, 2000 and appointment of CERT as official agency of Government . </li></ul><ul><li>To launch awareness programs on cyber security </li></ul><ul><li>To enhance international cooperation , promoting cyber security culture and international agreements. </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  17. 17. Beware of these 14 Cyber threats <ul><li>Anti-virus is not enough </li></ul><ul><li>Social engineering as the primary attack vector </li></ul><ul><li>Rogue security software vendors escalate their efforts </li></ul><ul><li>Social networking third-party applications will be the target of fraud </li></ul><ul><li>Windows 7 will come into the cross-hairs of attackers </li></ul><ul><li>Fast Flux Botnets increase </li></ul><ul><li>URL shortening services become the phisher's best friend </li></ul><ul><li>Mac and mobile malware will increase </li></ul><ul><li>Spam volumes will fluctuate </li></ul><ul><li>Spammers breaking the rules </li></ul><ul><li>Specialised malware </li></ul><ul><li>CAPTCHA Technology will improve </li></ul><ul><li>Instant messaging spam </li></ul><ul><li>Non-English spam will increase </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  18. 18. Conclusion <ul><li>Cyber threats continue to haunt Internet users across the world & cyber-threats are the problems of today and the future. </li></ul><ul><li>Though, India leads in IT services, it is lags behind as far as cyber security is concerned. </li></ul><ul><li>In dealing with cyber threats, a country cannot stand alone. There is a need to have strategic alliances to deal with threats and vulnerabilities in the cyber world. </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  19. 19. Reference <ul><li>PDF on Emerging Cyber Threats Report for 2009- Data, Mobility and Questions of Responsibility will Drive Cyber Threats in 2009 and Beyond by, the Georgia Tech Information Security Centre (GTISC) October 15, 2008 </li></ul><ul><li>Cyber Laws For Every Netizen in India (Version 2004) (With WSIS Declaration of Principles and Action Plan) Naavi- Na.Vijayashankar, MSc.,CAIIB,CIIF,AIMADM. www.naavi.org , www.cyberlawcollege.com </li></ul><ul><li>ICTSD Programme on IPRs and Sustainable Development WIPO- June 2008 </li></ul><ul><li>A Report by the Business Software Alliance October2008 </li></ul><ul><li>http://studentsforafreetibetdelhi.blogspot.com/2008/05/china-mounts-cyber-attacks-on-indian.html </li></ul>12/18/09 IPR & Cyber law Presentaion by AKAA Group....
  20. 20. Thank you!!! 12/18/09 IPR & Cyber law Presentaion by AKAA Group....

×