SlideShare a Scribd company logo
Presented by:
Amit Arya
Faculty, Dept. of Business Administration
Dhanwate National College, Nagpur
1© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Cyber Security & Hygiene
What is Cybercrime?
• Using the Internet to commit a crime.
– Identity Theft
– Hacking
– Viruses
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography
2© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Cybercrime Components
• Computers
• Cell Phones
• PDA’s
• Game Consoles
3© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
High-Profile Cybercrime-
related Cases
• Akamai Technologies State of the Internet report also showed that
hacker attacks on websites went up 75% in the final quarter of 2013, with
hackers in China responsible for 43% of all attacks.
• eBay went down in a blaze of embarrassment as it suffered this year’s
biggest hack so far. In May, eBay revealed that hackers had managed to
steal personal records of 233 million users. The hack took place between
February and March, with usernames, passwords, phone numbers and
physical addresses compromised.
• Domino’s Pizza-Hacking group Rex Mundi held Domino’s Pizza to ransom
over 600,000 Belgian and French customer records. In exchange for the
personal data, which included names, addresses, emails, phone numbers
and even favourite pizza toppings, Mundi demanded $40,000 from the
fast-food chain
4© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security:
Confidentiality
Only those authorized
to view information
Integrity
Information is correct
and hasn’t been
altered by
unauthorized users or
software
Availability
Data is accessible to
authorized users
5© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
Malware:
Software that has a malicious
purpose:-
•Viruses
•Trojan horse
•Spyware
Intrusions:
Any attempt to gain
unauthorized access to a
system:-
•Cracking
•Hacking
•Social Engineering
6© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
• Denial-of-Service (DOS)
– Prevention of legitimate access to systems
– Different types:
• Ping-of-Death
• Teardrop-attack that involves sending fragmented
packets to a target machine.
• Smurf-attack in which large numbers of Internet
Control Message Protocol (ICMP) packets with the
intended victim's spoofed source IP are broadcast to a
computer network using an IP Broadcast address.
7© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
Figure – DoS and DDoS Models
8© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Terminology
• People
– Hackers
• White Hat – Good guys. Report hacks/vulnerabilities to
appropriate people.
• Black Hat – Only interested in personal goals,
regardless of impact.
• Grey Hat – Somewhere in between.
9© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Terminology
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
10
Firewall: Barrier between network and
the outside world.
Proxy server: Sits between users
and server. Two main functions
are to improve performance and
filter requests.
Cyber Targets
• 99% of the attacks can be
prevented by basic hygiene.
DO
 Think before you click
 Up-to-date anti-virus, firewall and
site advisor
BUT
 Some new attacks may get through.
However, attacker may only use your
machine to attack others and not
attack you per se.
 Will not prevent data loss by
merchants and other servers.
• 1% of the attacks are difficult
and expensive to defend or
detect.
For most individuals
 We are simply not an attractive
enough target.
For the Defense & other sensitive govt.
departments and its contractor.
 A huge target.
 For companies in sensitive businesses
a serious threat to be taken seriously
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
11
Concerns & Cautions
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
12
Needful Transformation
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
13
Cyber security is a
young and immature
field.
Attack back is illegal.
The attackers are
more innovative than
defenders.
Defenders are
mired in FUD (fear,
uncertainty and
doubt)
Cyber security will
become:
•a scientific discipline
•application and
technology centric
Attack back will be a
integral part of cyber
security
Top Cyber Security Companies- Global
14© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Top Cyber Security Companies-
Indian
15© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
16© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Indian Govt.’s Initiative
17© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
contd…
18© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Some of the Cyber Security Offences & Penalties
19© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Certifications
• Entry-level
– Security+
http://www.comptia.org/certifications/listed/security.aspx
– CIW Security Analyst www.ciwcertified.com
• Intermediate
– MSCE Security
http://www.microsoft.com/learning/en/us/certification/mcse.a
• Professional
– CISSP www.isc2.org
– SANS www.sans.org
20© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Education
• 3/4-Year College Degrees:
– Applied
– Network
– Cryptography
– Management
21
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
References
• http://www.itbusinessedge.com/slideshows/top-25-cybersecurity-companies-to-watch-in
• http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-
cyber-attacks-of-2014-so-far/#ff681c721a65
• http://www.ft.com/cms/s/0/5870af72-e298-11e3-a829-
00144feabdc0.html#axzz3z4c1riRi
• https://en.wikipedia.org/wiki/Computer_security
• http://www.digitalindia.gov.in/
• https://www.cisecurity.org/about/CyberCampaign2014.cfm
• http://list.ly/list/Tmw-top-most-promising-cyber-security-companies-in-india
22
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
Disclaimer
Please note that this presentation is for
information purpose only. All the logos,
trademarks and other intellectual properties
are owned by respective entities.
23
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
24
© 2016 Dhanwate National College, Dept.
of Business Administration (UG), Nagpur
Amit Arya
email: mailtoamitarya@gmail.com

More Related Content

What's hot

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
sivadnolram
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 

What's hot (20)

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygiene
techugo
 
Tipología uso y consumo de las redes
Tipología uso y consumo de las redesTipología uso y consumo de las redes
Tipología uso y consumo de las redes
citlalli pamela ortiz urtecho
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
James '​-- Mckinlay
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 
Search Engines Presentation
Search Engines PresentationSearch Engines Presentation
Search Engines PresentationJSCHO9
 
Search Engine Powerpoint
Search Engine PowerpointSearch Engine Powerpoint
Search Engine Powerpoint201014161
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 

Viewers also liked (8)

A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygiene
 
Tipología uso y consumo de las redes
Tipología uso y consumo de las redesTipología uso y consumo de las redes
Tipología uso y consumo de las redes
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Search Engines Presentation
Search Engines PresentationSearch Engines Presentation
Search Engines Presentation
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Search Engine Powerpoint
Search Engine PowerpointSearch Engine Powerpoint
Search Engine Powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security & Hygine

Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
NowSecure
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
Stephanie Brannan
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
Jason Hong
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Amanda Morris
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
IRJET Journal
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
Dr. Raghavendra GS
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity
TigerGraph
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Ivan Sang
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
Sudsanguan Ngamsuriyaroj
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
MAXfocus
 
Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)
AvinantaTarigan
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
NECST Lab @ Politecnico di Milano
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
East West University
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
Thomvest Ventures
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
CAS
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
null - The Open Security Community
 

Similar to Cyber Security & Hygine (20)

Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)Cyber Security Challenges in Building Smartcity (Presented in 2016)
Cyber Security Challenges in Building Smartcity (Presented in 2016)
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 

More from Amit Arya

Irrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of MaharashtraIrrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of Maharashtra
Amit Arya
 
eGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through TechnologyeGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through Technology
Amit Arya
 
Public internet access
Public internet accessPublic internet access
Public internet access
Amit Arya
 
The framework of political development in the
The framework of political development in theThe framework of political development in the
The framework of political development in the
Amit Arya
 
An investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalshipAn investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalship
Amit Arya
 
Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)
Amit Arya
 

More from Amit Arya (7)

CV_AmitArya
CV_AmitAryaCV_AmitArya
CV_AmitArya
 
Irrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of MaharashtraIrrigation development- In respect to State of Maharashtra
Irrigation development- In respect to State of Maharashtra
 
eGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through TechnologyeGovernance- Reforming Governance through Technology
eGovernance- Reforming Governance through Technology
 
Public internet access
Public internet accessPublic internet access
Public internet access
 
The framework of political development in the
The framework of political development in theThe framework of political development in the
The framework of political development in the
 
An investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalshipAn investigation on the centrality of e entrepreneur finalship
An investigation on the centrality of e entrepreneur finalship
 
Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)Micro, Small & Medium Enterprises (MSME)
Micro, Small & Medium Enterprises (MSME)
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Cyber Security & Hygine

  • 1. Presented by: Amit Arya Faculty, Dept. of Business Administration Dhanwate National College, Nagpur 1© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur Cyber Security & Hygiene
  • 2. What is Cybercrime? • Using the Internet to commit a crime. – Identity Theft – Hacking – Viruses • Facilitation of traditional criminal activity – Stalking – Stealing information – Child Pornography 2© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 3. Cybercrime Components • Computers • Cell Phones • PDA’s • Game Consoles 3© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 4. High-Profile Cybercrime- related Cases • Akamai Technologies State of the Internet report also showed that hacker attacks on websites went up 75% in the final quarter of 2013, with hackers in China responsible for 43% of all attacks. • eBay went down in a blaze of embarrassment as it suffered this year’s biggest hack so far. In May, eBay revealed that hackers had managed to steal personal records of 233 million users. The hack took place between February and March, with usernames, passwords, phone numbers and physical addresses compromised. • Domino’s Pizza-Hacking group Rex Mundi held Domino’s Pizza to ransom over 600,000 Belgian and French customer records. In exchange for the personal data, which included names, addresses, emails, phone numbers and even favourite pizza toppings, Mundi demanded $40,000 from the fast-food chain 4© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 5. Computer Security: Confidentiality Only those authorized to view information Integrity Information is correct and hasn’t been altered by unauthorized users or software Availability Data is accessible to authorized users 5© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 6. Computer Security - Threats Malware: Software that has a malicious purpose:- •Viruses •Trojan horse •Spyware Intrusions: Any attempt to gain unauthorized access to a system:- •Cracking •Hacking •Social Engineering 6© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 7. Computer Security - Threats • Denial-of-Service (DOS) – Prevention of legitimate access to systems – Different types: • Ping-of-Death • Teardrop-attack that involves sending fragmented packets to a target machine. • Smurf-attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address. 7© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 8. Computer Security - Threats Figure – DoS and DDoS Models 8© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 9. Computer Security - Terminology • People – Hackers • White Hat – Good guys. Report hacks/vulnerabilities to appropriate people. • Black Hat – Only interested in personal goals, regardless of impact. • Grey Hat – Somewhere in between. 9© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 10. Computer Security - Terminology © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 10 Firewall: Barrier between network and the outside world. Proxy server: Sits between users and server. Two main functions are to improve performance and filter requests.
  • 11. Cyber Targets • 99% of the attacks can be prevented by basic hygiene. DO  Think before you click  Up-to-date anti-virus, firewall and site advisor BUT  Some new attacks may get through. However, attacker may only use your machine to attack others and not attack you per se.  Will not prevent data loss by merchants and other servers. • 1% of the attacks are difficult and expensive to defend or detect. For most individuals  We are simply not an attractive enough target. For the Defense & other sensitive govt. departments and its contractor.  A huge target.  For companies in sensitive businesses a serious threat to be taken seriously © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 11
  • 12. Concerns & Cautions © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 12
  • 13. Needful Transformation © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 13 Cyber security is a young and immature field. Attack back is illegal. The attackers are more innovative than defenders. Defenders are mired in FUD (fear, uncertainty and doubt) Cyber security will become: •a scientific discipline •application and technology centric Attack back will be a integral part of cyber security
  • 14. Top Cyber Security Companies- Global 14© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 15. Top Cyber Security Companies- Indian 15© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 16. 16© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 17. Indian Govt.’s Initiative 17© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 18. contd… 18© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 19. Some of the Cyber Security Offences & Penalties 19© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 20. Computer Security - Certifications • Entry-level – Security+ http://www.comptia.org/certifications/listed/security.aspx – CIW Security Analyst www.ciwcertified.com • Intermediate – MSCE Security http://www.microsoft.com/learning/en/us/certification/mcse.a • Professional – CISSP www.isc2.org – SANS www.sans.org 20© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 21. Computer Security - Education • 3/4-Year College Degrees: – Applied – Network – Cryptography – Management 21 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 22. References • http://www.itbusinessedge.com/slideshows/top-25-cybersecurity-companies-to-watch-in • http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal- cyber-attacks-of-2014-so-far/#ff681c721a65 • http://www.ft.com/cms/s/0/5870af72-e298-11e3-a829- 00144feabdc0.html#axzz3z4c1riRi • https://en.wikipedia.org/wiki/Computer_security • http://www.digitalindia.gov.in/ • https://www.cisecurity.org/about/CyberCampaign2014.cfm • http://list.ly/list/Tmw-top-most-promising-cyber-security-companies-in-india 22 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 23. Disclaimer Please note that this presentation is for information purpose only. All the logos, trademarks and other intellectual properties are owned by respective entities. 23 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
  • 24. 24 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur Amit Arya email: mailtoamitarya@gmail.com