Alternative banking, as the name suggest, is the NEWER METHOD OF CARRYING ON BANKING OPERATIONS
It includes
1. ATM (AUTOMATIC TELLER MACHINE)
2. POS TERMINAL
3. INTERNET BANKING
4. MOBILE BANKING
5. NEFT
6. RTGS
7. ECS
Alternative banking, as the name suggest, is the NEWER METHOD OF CARRYING ON BANKING OPERATIONS
It includes
1. ATM (AUTOMATIC TELLER MACHINE)
2. POS TERMINAL
3. INTERNET BANKING
4. MOBILE BANKING
5. NEFT
6. RTGS
7. ECS
This presentation gives an overview about how is India progressing into making UN's Vision 2020 goal (of financial inclusion) a reality.
It's a technology breakthrough India has been achieved in combat to score financial data security in 21st century and independence from reliance over other nations to provide multilateral system of payments in India.
Cyber Threat Advisory: Coronavirus Related ScamsCTM360
As COVID-19 trends across media globally, this has given cybercriminals an opportunity to leverage from the hype, in turn, scamming individuals & organizations all over the world. Read our latest Cyber Threat Advisory by Kawthar Al Abdullah - Cyber Threat Analyst at CTM360®
This presentation gives an overview about how is India progressing into making UN's Vision 2020 goal (of financial inclusion) a reality.
It's a technology breakthrough India has been achieved in combat to score financial data security in 21st century and independence from reliance over other nations to provide multilateral system of payments in India.
Cyber Threat Advisory: Coronavirus Related ScamsCTM360
As COVID-19 trends across media globally, this has given cybercriminals an opportunity to leverage from the hype, in turn, scamming individuals & organizations all over the world. Read our latest Cyber Threat Advisory by Kawthar Al Abdullah - Cyber Threat Analyst at CTM360®
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (pp. 79-82)
Sulaiman Al Amro, Computer Science Department, Computer College, Qassim University, Qassim, Saudi Arabia.
Vol. 18 No. 6 JUNE 2020 International Journal of Computer Science and Information Security
https://sites.google.com/site/ijcsis/vol-18-no-6-jun-2020
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
1. Cyber Crime Statistics and
Open Source Tools for
Digital Forensics
1
Dr Umang
Associate Professor
Institute of Technology & Science, Ghaziabad
Email: umangsingh@its.edu.in, dr.umang.singh@ieee.org
Dr Umang@ITS
2. CYBERCRIME
2
Cybercrime, or computer-oriented crime, is a
crime that involves a computer and
a network.
Offences that are committed against
individuals or groups of individuals with a
criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm, or loss, to the victim directly or
indirectly, using modern telecommunication
networks such as Internet (networks including
chat rooms, emails, notice boards and
groups) and mobile phones
(Bluetooth/SMS/MMS).
Dr Umang@ITS
3. Cyber Crime
• “Any unlawful act where computer or communication device or
computer network is used to commit or facilitate the commission of
crime”.
• https://www.cybercrime.gov.in/
CSAM
CYBER BULLYING
CYBER STALKING
CYBER GROOMING
ONLINE JOB FRAUD
ONLINE SEXTORTIONVISHING SEXTING SMSHING SIM SWAP SCAM
IMPERSONATION AND
IDENTITY THEFT
DEBIT/CREDIT CARD FRAUD
PHISHING
SPAMMING RANSOMWARE
VIRUS, WORMS & TROJANS DATA BREACH DENIAL OF SERVICES/DISTRIBUTED DOS
WEBSITE DEFACEMENT CYBER SQUATTING PHARMING CRYPTOJACKING
ONLINE DRUG TRAFFICKING
ESPIONAGE
3Dr Umang@ITS
5. Malware
• Malware is any software intentionally designed to cause damage to a
computer, server, client, or computer network.
Malware
Computer Virus
Worms Trojan Horses
RansomwareSpyware Adware Scareware
5Dr Umang@ITS
6. Malware Vs Viruses
Malware is a catch- all term for any type of malicious
software, regardless of how it works, its intention or
how is distributed
Viruses are designed to damage
its target computer by
corrupting data, reformatting your hard or
completely shutting down your system.
6
Dr Umang@ITS
7. There were 144.91 million new malware
samples in 2019.
Already 38.48 million new samples in 2020
(April 2020)
In 2018, 93.6% of malware observed
polymorphic, meaning it has ability to
constantly change its code to evade
detection .
Malicious Hackers are now attacking
computers and networks at a rate of one
attack every 39 seconds
7Dr Umang@ITS
8. www.isea.gov.in
• Of the endpoints reporting an infection, 62%
were consumer (home user) devices, while 38%
were business systems.
• One thing that is especially interesting to note is
the frequency with which PCs were re-infected.
In 2019•
• 46.3% encountered only one infection
• 35.8% encountered 2-5
• 8.6% encountered 6-10
• 9.2% had more than 10 infections
8Dr Umang@ITS
10. Cyberthreats are constantly evolving in order to take advantage of online behavior
and trends. The COVID-19 outbreak is no exception.
https://www.interpol.int/Crimes/Cybercrime/COVID-19-cyberthreats
Cybercriminals are attacking
the computer networks and
systems of individuals,
businesses and even global
organizations at a time when
cyber defenses might be
lowered due to the shift of focus
to the health crisis.
11Dr Umang@ITS
11. Spammers, scammers, and other threat actors
quick to take advantage of global panic
surrounding coronavirus outbreak
12
Figure 2: Spam timeline in Week 1 and Week 2 of March 2020
Figure 1: Spam timeline in Week 3 and Week 4 of March 2020
Key features of malspam campaigns
Top subject line keywords: “COVID-19”, “corona”,
“coronavirus”, and “masks”
Top malware categories: Generic Trojan, Infostealer,
Backdoor, Downloader
Key features of snowshoe campaigns
Top subject line keywords: “COVID”, “corona”,
“coronavirus”, and “masks”
Top domain names observed: “covid”, “corona”,
“coronavirus” and “wuhan”. These were recently registered
domains, ready to be used in spam campaigns
The most abused gTLDs observed were .biz, .cf, .info,
.online, .xyz
Dr Umang@ITS
13. Fake UPI address found registered under ‘PM Care Fund’, FIR lodged
Online complaint about a UPI address “Pmcare@sbi”. The ID was created to receive donations and the matter
was then raised with State Bank of India which was blocked it immediately. However, correct UPI ID is
“PMCARES@SBI”.
14Dr Umang@ITS
15. 16
Group of hackers that go by the name of SSHacker, that describe themselves as
“dedicated to providing the best hacking services since 2005” and now offering
the service of hacking into Facebook accounts at a discounted rate!
15% off with COVID-19 code
Dr Umang@ITS
16. “True Mac” offers the “most-
loved Mac” model –
MacBook Air – in the
fantastic price of US$390 as
a “corona special offer”.
17
Dr Umang@ITS
21. COVID-19 Email Spam Statistics
• RiskIQ analyzed its spam box feed for the
time period of 05/14/2020-05/15/2020.
• 89,658 spam emails containing either
“corona” or “covid” in the subject line.
• 7,691 unique subject lines observed during
the reporting period.
• The spam emails originated from 5,244
unique sending email domains and 8,940
unique SMTP IP Addresses.
• Analysts identified 147 emails that sent an
executable file for Windows machines.
https://www.riskiq.com/blog/analyst/covid19-cybercrime-update/ 23
Almost 7,000 unique samples out of 41,000 total Corona Phishing
Spam samples reported from Smart Protection Network (SPN)
enabled in Trend Micro Messaging products.
Dr Umang@ITS
22. Blocked COVID-19 related emails during March 2020
24
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/covid-19-outbreak-prompts-opportunistic-wave-malicious-email-campaigns
Dr Umang@ITS
24. How do I spot a coronavirus phishing email?
• Coronavirus-themed phishing emails can
take different forms, including these.
• CDC alerts. Cybercriminals have sent
phishing emails designed to look like
they’re from the U.S. Centers for Disease
Control.
26
Beware of online requests for personal information
Check the email address or link
Watch for spelling and grammatical mistakes
Look for generic greetings
Avoid emails that insist you act now
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/covid-19-outbreak-prompts-opportunistic-wave-malicious-email-campaigns
Domain used in text appears to be “cdcinfo.gov”, hovering the cursor over the link will reveal the
real, malicious URL the link leads to:
When clicked, it routes to:
Dr Umang@ITS
27. 29
Every 2 seconds, the keystrokes are sent to evil.com website to key.php file
Website loaded in frame.
Dr Umang@ITS
28. Coronavirus Pandemic is Proving to be a Boon
for Cyber Criminals
• On a single day of 20 March, more than
3000 domains were registered with the
theme ‘covid’ or ‘corona’.
• In one month, more than 100,000 new web
domain names were registered containing
terms like corona, covid, and virus.
Significant Jump in Coronavirus Related Domain Names
Research Analysis shows that 6.5% of domains are related to malicious activities and are ‘fake
domains’—a fraudulent website that looks similar or identical to the legitimate one.30Dr Umang@ITS
29. Some reasons for the rise in such fake domain
registrations are as follows:
• For abject virus-related sales such as masks, preventative care,
cleaning supplies or services, bogus vaccines among others
• To trick the users into sharing their private information, such as
banking credentials or other account passwords
• To get money transferred by creating identical websites of authority,
government(schemes), banks etc.
• To create confusion and/or spread hatred among a targeted community.
31Dr Umang@ITS
30. As people look for some hope at this time and right
information about the coronavirus pandemic, cyber
criminals are using the occasion to scam web users.
• Cybercriminals and scammers are using coronavirus to scam web users.
• They are targeting vulnerable people claiming to offer Covid-19 vaccine
or treatment.
• The aim of cybercriminals in these cases is to install viruses on people’s
phones and computers.
According to a New York-based cyber intelligence firm, IntSights, such "coronavirus-
themed phishing lures, malware infections, network intrusions, scams, and disinformation
campaigns have become rampant across the clear, deep, and dark web."
32Dr Umang@ITS
31. Dark Web Market of Covid-19
• “Sellers seek to exploit public fear by offering products that could allegedly serve
as virus tests or vaccines.“
• This trend is high in countries like the USA
• From research analysis, it has found that "these products are in no way real, and
buyers would be scammed out of their money.“
FAKE COVID-19 detectors on sale on dark and deep web (Source: IntSights)
33Dr Umang@ITS
32. Dark Web Market of Covid-19
FAKE COVID-19 vaccine on sale on dark and deep web (Source: IntSights) 34Dr Umang@ITS
33. Sponsored threats
• A threat actor called APT36 was recently observed "spreading a
malicious office document spoofed to look like it came from Indian
government websites."
• The program is designed to give an impression of a health advisory in
Microsoft office file related to coronavirus.
• Its victims face the risk of installing a "Crimson RAT payload" into
their system in the process.
• Other suspected state-sponsored targeting campaigns are associated with
China, Russia and North Korea, as observed by researchers.
• Threat actors "MUSTANG PANDA" and "VICIOUS PANDA" were
linked to Chinese campaigns, whereas a malware strain named
"BabyShark" was linked with North Korean campaigns earlier in
February. A suspected Russian state-sponsored hacking group known as
"Hades" also reportedly targeted Ukraine, which used Covid-19 as a
lure.
Crimson RAT include stealing credentials from victims’ browsers, capturing screenshots, collecting anti-virus software
information, and listing the running processes, drives and directories from victim machines.
35Dr Umang@ITS
34. Crimson RAT
36
• The email pretends to be from the
government of India
(email.gov.in.maildrive[.]email/?att
=1579160420) and contains a
“Health Advisory” regarding the
coronavirus pandemic.
• Once victims click on the attached
malicious document and enable
macros, the Crimson RAT is
dropped.
Dr Umang@ITS
35. VMware Carbon Black data already indicates that
27% -- of all cyberattacks target either banks or
the healthcare sector.
• https://www.zdnet.com/article/covid-19-blamed-for-238-
surge-in-cyberattacks-against-banks/
37
https://www.zdnet.com/article/covid-19-blamed-for-238-surge-in-cyberattacks-against-banks/Dr Umang@ITS
36. “Wiper" malware attack launched against a U.S. business
According to MITRE, the typical behaviors demonstrated by
wiper malware are as below:
38
https://www.zdnet.com/article/covid-19-blamed-for-238-surge-in-cyberattacks-against-banks/
Dr Umang@ITS
37. Kristin Judge, “How does COVID-19 impact cyber crime? ” , 8th April, 2020
39Dr Umang@ITS
39. Major Third-party Breaches Revealed in May 2019
Websites using Alpaca Forms
Companies Using Asus’s Webstorage
http://blog.asuswebstorage.com/
2019/05/15/asus-webstorage-
security-incident-update/
Cyber criminals leaked
credit-card data from a
third-party data-management
firm. City Bank, Axis, ICICI,
IndusInd, RBL, and others’
confidential customer data
were exposed.
The money was sent on online
wallets like PayTM and
Mobikwik, which were opened
using fake details and SIM.
A database of a huge number
of Instagram influencers, big
names, and brand records
containing their own data
including contact subtleties was
found openly available on the
web.
Magecart attackers inserted card-
skimming scripts into the subscription
website for the Forbes print magazine.
https://www.normshield.com/major-third-party-breaches-revealed-in-may-2019/
Dr Umang@ITS 41
40. MORE Breaches - July 2019
The credit bureau Equifax will pay
about $650 million — and perhaps
much more — to resolve most claims
stemming from a 2017 data breach
that exposed sensitive information on
more than 147 million consumers and
demonstrated how little control
Americans have over their personal
data.
https://www.nytimes.com/2019/07/22/business/equifax-
settlement.html
5 Million Bulgarians Have Their
Personal Data Stolen in Hack:
Bulgaria has suffered what has been
described as the biggest data leak in
its history. The stolen data, which
hackers emailed to local media on July
15, originates from the country’s tax
reporting service – the National
Revenue Agency (NRA).
https://thenextweb.com/security/2019/07/1
6/bulgaria-tax-agency-data-leak-hack/ Dr Umang@ITS 42
42. Predictions Cybersecurity Statistics For 2020 To 2021
1#
Cybercrime damage costs are predicted to hit $6 trillion annually by
2021.
• Cyber crime damages will cost the world $6 trillion annually by 2021, up
from $3 trillion in 2015.
• This represents the greatest transfer of economic wealth in history, risks the
incentives for innovation and investment, and will be more profitable than
the global trade of all major illegal drugs combined.
Damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal
and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic
investigation, restoration and deletion of hacked data and systems, and reputational harm.
44Dr Umang@ITS
43. Predictions Cybersecurity Statistics For 2020 To 2021
2#
Cybersecurity spending will exceed $1 trillion from 2017
to 2021.
• The cybersecurity market is continuing its stratospheric
growth and hurtling towards the trillion dollar mark that
we originally predicted in 2017.
• In 2004, the global cybersecurity market was worth $3.5
billion — and in 2017 it was expected to be worth more
than $120 billion. The cybersecurity market grew by
roughly 35X over 13 years entering our most recent
prediction cycle.
• Global spending on cybersecurity products and services are
predicted to exceed $1 trillion (cumulatively) over five
years, from 2017 to 2021.
45Dr Umang@ITS
44. Predictions Cybersecurity Statistics For 2020 To 2021
3#
The world will have 3.5 million unfilled cybersecurity jobs by the end of 2021
Every IT position is also a cybersecurity position now. Every IT worker, every
technology worker, needs to be involved with protecting and defending apps, data,
devices, infrastructure and people.
There will be 3.5 million unfilled cybersecurity jobs by 2021 — enough to fill 50 NFL
stadiums — according to Cybersecurity Ventures. This is up from Cisco’s previous
estimation of 1 million cybersecurity openings in 2014.
46Dr Umang@ITS
45. Predictions Cybersecurity Statistics For 2020 To 2021
4#
Ransomware damage costs are predicted to grow
more than 57X from 2015 to 2021.
• Global ransomware damage costs are predicted to
reach $20 billion by 2021, up from $325 million in
2015.
• Ransomware attacks on healthcare organizations
— often called the No. 1 cyber-attacked industry
— will quadruple by 2020.
• Cybersecurity Ventures expects that a business
will fall victim to a ransomware attack every 11
seconds by 2021, up from every 14 seconds in
2019. This makes ransomware the fastest growing
type of cybercrime
47Dr Umang@ITS
46. Predictions Cybersecurity Statistics For 2020 To 2021
5#
70 percent of cryptocurrency transactions will be for illegal activity by 2021
• Crypto crime is an emerging segment of the cybercrime ecosystem, and it’s booming.
• Around $76 billion of illegal activity per year involves bitcoin, which is close to the scale of
the U.S. and European markets for illegal drugs, according to a study published by the
University of Sydney in Australia, ranked as one of the top 100 universities globally.
• Cybersecurity Ventures predicts that by 2021 more than 70 percent of all cryptocurrency
transactions annually will be for illegal activity, up from current estimates ranging anywhere
from 20 percent (of the 5 major cryptocurrencies) to nearly 50 percent (of bitcoin).
• Stay tuned for a year-end update with more cybersecurity market research from the editors at
Cybersecurity Ventures.
48Dr Umang@ITS
47. www.isea.gov.in
Mexico was the hardest country by cyber
attacks in 2019 with 93.9% of all surveyed
companies at least once last year
Naturally, These Facts and figures are just
the /p of the iceberg. The deeper we dive in
to the wealth of informa/on cyber security
reports now offer, the clearer and more
unnerving the picture becomes
49Dr Umang@ITS
48. Ransomware Attack
• The FBI, Microsoft, warned victims to not pay the ransom demands
after a cyberattack for a host a reasons.
• New research from Sophos confirms that ransomware payments can
actually double the amount of recovery costs and don’t ensure an
easier path to recovery.
• As per State of Ransomware 2020 report, Sophos researchers surveyed
5,000 global IT decision makers across a range of sectors. They found
that 51 percent of these organizations faced a ransomware attack
within the last year.
• For the US, 59 percent of respondents reported falling victim to an
attack. Notably, 25 percent of US respondents said they were able to stop
an attack before data was encrypted. But overall, data was encrypted in
73 percent of these successful attacks.
• Faced business downtime, lost orders, operational costs, device costs,
and other expenses.
• While 56 percent of the surveyed IT managers said they were able to
recover the encrypted data from backups without paying the ransom, still
another 27 percent of organizations hit by ransomware admitted to
paying the hackers. 50https://healthitsecurity.com/news/paying-the-ransom-can-double-ransomware-attack-recovery-costsDr Umang@ITS
49. Cyber Crime
(CSAM)
• Child sexually abusive material (CSAM) refers
to material containing sexual image in any
form, of a child who is abused or sexually
exploited. Section 67 (B) of IT Act states that “it
is punishable for publishing or transmitting of
material depicting children in sexually explicit
act, etc. in electronic form.
51Dr Umang@ITS
50. Cyber Crime (CSAM)
Statistics
• As per report April 17, 2020, India’s child
pornography consumption spikes by 95% during
coronavirus lockdown.
• According to the India Child Protection Fund (ICPF),
there has been a steep increase in demand for
searches like “child porn”, “sexy child” and “teen sex
videos”, along with an increase in traffic on Pornhub
from India by 95 percent between March 24 and 26,
2020, as compared to before the lockdown.
52Dr Umang@ITS
52. Cyber Crime
(CSAM) Statistics
• As per report April 17, 2020, India’s child
pornography consumption spikes by 95% during
coronavirus lockdown.
• According to the India Child Protection Fund (ICPF),
there has been a steep along with an increase in
traffic on Pornhub from India by 95 percent
between March 24 and 26, 2020, as compared to
before the lockdown.
54Dr Umang@ITS
53. Cyber Crime
(CSAM) Statistics
• As per report April 17, 2020, India’s child
pornography consumption spikes by 95% during
coronavirus lockdown.
• According to the India Child Protection Fund (ICPF),
there has been a steep along with an increase in
traffic on Pornhub from India by 95 percent
between March 24 and 26, 2020, as compared to
before the lockdown.
‘Jio impact’ on mobile (and porn) traffic Before Jio’s launch in September 2016, the average monthly
consumption of mobile data in India was about 600 MB. By mid-2017, it surged to 3.5 GB, which is nearly a
500 percent increase. In fact, Jio rival Idea Cellular put on record last year that it expects average monthly
mobile data consumption to reach 15 GB in the next few years.
src: https://yourstory.com/2018/11/india-bans-porn-working-means-reliance-jio-telcos 55Dr Umang@ITS
54. Harassment or bullying inflicted
through the use of electronic or
communication devices such as
computer, mobile phone, laptop, etc.
It is unfortunate that there are no special Anti-
Cyber Bullying Laws in India yet.
In cases of sexual offenses against children,
Protection of Children from Sexual Offences
(POCSO) Act, 2012 is applicable.
The Ministry of Women and Child Development has launched a distinct helpline (complaint-mwcd@gov.in)
to report cyberbullying, online harassment, and cyber defamation, particularly against women and children.56Dr Umang@ITS
55. Some quick tips for prevention
Be Polite
Don’t post
personal things
Keep online
communication
limited
Do not meet online
strangers in person
Secure Passwords Always Logout
Do not spend much
time on public
platforms/groups
Block irritants
Make settings
private
Think before you
post. Be careful
about your words
and images
Do not use
technology to vent
your feelings
Be sure about your
friends online
identity
57Dr Umang@ITS
56. ICPF submits its recommendations towards
curbing demand of CSAM in India:
1. Creation of a CSAM Tracker through nationwide scale up of artificial
intelligence tools deployed for this research
2. An aggressive online campaign through strong deterrence messaging on the
public web
3. An ongoing government campaign to educate children and parents on
identifying and reporting online child sexual abuse and child pornography
4. Creation of a CSAM Offenders Registry for individuals found to be consuming,
distributing or selling CSAM
5. Appropriate orders for mandatory reporting and pulling down of CSAM content
and individuals by ISPs and social media platforms
6. India to take the lead to establish a legally binding international convention for
international cooperation to eliminate the creation, hosting and viewership of
CSAM
58Dr Umang@ITS