SlideShare a Scribd company logo
Cyber Security Awareness Session
Copyright By Kapil Mehrotra
Date : 1/06/2021
About Myself
• Name : Kapil Mehrotra
• Experience : 24Yrs (Time files ☺ )
• Mostly worked in BFSI & Healthcare domain
• Having little learning curve & patience listener.
• Like to buy books a lot.. ☺ slow reader but try to complete one book at least
in a month.
• Like too much adventures in the life. (From where people say “Hum se na ho
payega” from there I start to search for “Hum se ho payega”) (+V)
• Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket
etc.)
• Die hard animal lover.
• Very active in few government communities for drafting Cloud and Cyber
security skill development policies since 2015.
Type of cyber threats
• “Phishing Attacks” to steal the User ID and Passwords and to gain
the access of the server, laptop or desktop.
• “Fake Link” Through this hacker gain the remote control of the
victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts,
Images, Videos and documents. (anydesk, teamviewer, logmein,
Ammyy)
• Social media scams (Twitter, Facebook, Instagram)
• SQL injection, Virus, Malware and Ransomware
• Fake websites that steal data.
• DDOS & Network attacks
• Insider attacks
What are the consequences of a cyber attack?
Cyber attacks can disrupt and cause considerable
financial and reputational damage to even the most
resilient organization. If you suffer a cyber attack, you
stand to lose Data, reputation and business, and
potentially face regulatory fines and litigation – as well
as the costs of remediation.
Why do we need Cyber Security
• In 2020 we must secure 300 billion passwords globally.
• There are 111 billion lines of new software code being produced each year,
• The world’s digital content is expected to grow 96 zettabytes by 2020
• Dark Web is 5000 times larger than the surface web.
• 20 million connected cars will ship with built-in software-based security
technology by 2020
• 1 Cr 80L Daily Images getting uploaded on the internet
• 50 billion devices connected to the Internet by 2020
Cybercrime Market FY 2020-2021
• Cybercrime costed businesses over $4 trillion total in
2020.
• Cybercrime will cost the world $6 trillion by 2021.
• The average cost of a data breach in 2020 will exceed
between $4million to $150 million
• Approximately $6 trillion is expected to be spent
globally on cybersecurity by 2021
Look at the Hackers Roadmap
• On average 30,000 new websites are getting hacked every day.
• Hackers create 300,000 new pieces of malware daily.
• There is a hacker attack every 39 seconds
• 62% people are experiencing phishing attacks
• 64% of companies have experienced web-based attacks
• Distributed denial-of-service (DDoS) attack grew to more than
1.44TB, increasing in size by 500%.
• 41% ransomware attacks are rising year on year.
Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of
every day
Few Use Cases of
Cyber Security
Ashley Madison – Hack (Lawsuit $30 million)
Ashley Madison
37Million (9.8GB data) hacked and dumped on DW(PII)
Sony Hack
Sony Hack costed $15 Million
Reason : North Korea warns Sony before the launch of
move because it was related with “Kim Jong Un”
Interview and assassination conspiracy & making fun for
their president.
Sony has not taken it seriously.
Hacker hacked 47,000 current and formers employee
data, HR Data, User Ids & Passwords, Clinical Information,
SSO No, All emails and 100TB data including (Movies i.e
Aaron and Dave’s - “The Interview”, Brad Pitt’s - “Fury”
Dominos
• Customers’ personal data include customers’ names,
email ids, mobile numbers, and locations related to 18
crore orders that are placed with Domino’s India are
made available online.
• “Domino’s India Data Breach includes 13TB employee
files and customer details,” shows the web page with a
query box to fetch the details by Hackers.
• https://slf2rrahypck3bwckpdohsnhpeqrb3nhvwznjmar
mweofwnptowe4mad.onion.ly/
Dominos
Dominos
Who was the first hacker?
Konrad Zuse
Do you know?
Kevin Mitnick is the biggest hacker in the world.
1. Mitnick Security Consulting
2. Security awareness training company “KnowBe4”
3. Board Of Director in “Zimperium”
4. Film : Track Down
5. An Author
IT Act & Data Privacy in India
1. Information Technology Act, 2000. (India)
2. IT Amendment Act 2000 to strengthen the cyber security
laws. (Section 43, 65 to 71). i.e. Hacking, fail in data
protection, using image, video or content without
permission etc.)
3. EU General Data Protection Regulation (GDPR)
4. The Personal Data Protection Bill, 2019 (PI & PII data
should be processed and stored)
Note:
Up to three years Imprisonment or/and fine up to 5L
Appointment of DPO (Data Protection Officer
WhatsApp Issue
1. WhatsApp took an objection to a traceability clause in the new IT
Rules that requires social media platforms to locate “the first
originator of the information” if required by the government.
2. Indian Rule 4(2) makes it mandatory for social media
intermediaries to trace the originator of a message or post on
their platform if required by a court or a competent authority
under Section 69A of the IT Act.
• Do not share your password
• Keep Changing your password frequently
• Do not click on the anonymous link from any laptop or mobile
• Don’t open any emails which comes from strangers. (It may be phishing email).
• Don’t download songs and movies
• Don’t use USB or any external devices from out sides.
• Don’t transfer data from mobile & In Mobile storage.
• “Be Aware” We monitor you through DLP and logs your daily activities.
• Apps should maintain user login and logout status as well.
Do’s & Don'ts
Is your email have been compromised ever
• https://haveibeenpwned.com/
• https://www.security.org/how-secure-is-my-password/
Practical
How to report a cyber crime in India?
https://cybercrime.gov.in/Default.aspx
For Women and Child :
complaint-mwcd@gov.in
Thank you
• Email ID : Kapil.Mehrotra@gmail.com
• Mobile No : 9811779881

More Related Content

What's hot

Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
Rama Reddy
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
Baltimax
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
James Neo
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
Adarsh
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
Shiva Bissessar
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
Keelan Stewart
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Netpluz Asia Pte Ltd
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
Habib Siddiqui
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
Goutama Bachtiar
 

What's hot (20)

Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 

Similar to Cyber Security work shop by Kapil Mehrotra

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
SABBY GILL
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
ssusere71a07
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Mo Han
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
Mitesh Katira
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
DivithC
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
79850
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
Association for Project Management
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 

Similar to Cyber Security work shop by Kapil Mehrotra (20)

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 

Recently uploaded

Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 

Recently uploaded (20)

Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 

Cyber Security work shop by Kapil Mehrotra

  • 1. Cyber Security Awareness Session Copyright By Kapil Mehrotra Date : 1/06/2021
  • 2. About Myself • Name : Kapil Mehrotra • Experience : 24Yrs (Time files ☺ ) • Mostly worked in BFSI & Healthcare domain • Having little learning curve & patience listener. • Like to buy books a lot.. ☺ slow reader but try to complete one book at least in a month. • Like too much adventures in the life. (From where people say “Hum se na ho payega” from there I start to search for “Hum se ho payega”) (+V) • Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket etc.) • Die hard animal lover. • Very active in few government communities for drafting Cloud and Cyber security skill development policies since 2015.
  • 3. Type of cyber threats • “Phishing Attacks” to steal the User ID and Passwords and to gain the access of the server, laptop or desktop. • “Fake Link” Through this hacker gain the remote control of the victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts, Images, Videos and documents. (anydesk, teamviewer, logmein, Ammyy) • Social media scams (Twitter, Facebook, Instagram) • SQL injection, Virus, Malware and Ransomware • Fake websites that steal data. • DDOS & Network attacks • Insider attacks
  • 4. What are the consequences of a cyber attack? Cyber attacks can disrupt and cause considerable financial and reputational damage to even the most resilient organization. If you suffer a cyber attack, you stand to lose Data, reputation and business, and potentially face regulatory fines and litigation – as well as the costs of remediation.
  • 5. Why do we need Cyber Security • In 2020 we must secure 300 billion passwords globally. • There are 111 billion lines of new software code being produced each year, • The world’s digital content is expected to grow 96 zettabytes by 2020 • Dark Web is 5000 times larger than the surface web. • 20 million connected cars will ship with built-in software-based security technology by 2020 • 1 Cr 80L Daily Images getting uploaded on the internet • 50 billion devices connected to the Internet by 2020
  • 6. Cybercrime Market FY 2020-2021 • Cybercrime costed businesses over $4 trillion total in 2020. • Cybercrime will cost the world $6 trillion by 2021. • The average cost of a data breach in 2020 will exceed between $4million to $150 million • Approximately $6 trillion is expected to be spent globally on cybersecurity by 2021
  • 7. Look at the Hackers Roadmap • On average 30,000 new websites are getting hacked every day. • Hackers create 300,000 new pieces of malware daily. • There is a hacker attack every 39 seconds • 62% people are experiencing phishing attacks • 64% of companies have experienced web-based attacks • Distributed denial-of-service (DDoS) attack grew to more than 1.44TB, increasing in size by 500%. • 41% ransomware attacks are rising year on year. Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of every day
  • 8. Few Use Cases of Cyber Security
  • 9. Ashley Madison – Hack (Lawsuit $30 million)
  • 11. 37Million (9.8GB data) hacked and dumped on DW(PII)
  • 13. Sony Hack costed $15 Million Reason : North Korea warns Sony before the launch of move because it was related with “Kim Jong Un” Interview and assassination conspiracy & making fun for their president. Sony has not taken it seriously. Hacker hacked 47,000 current and formers employee data, HR Data, User Ids & Passwords, Clinical Information, SSO No, All emails and 100TB data including (Movies i.e Aaron and Dave’s - “The Interview”, Brad Pitt’s - “Fury”
  • 14. Dominos • Customers’ personal data include customers’ names, email ids, mobile numbers, and locations related to 18 crore orders that are placed with Domino’s India are made available online. • “Domino’s India Data Breach includes 13TB employee files and customer details,” shows the web page with a query box to fetch the details by Hackers. • https://slf2rrahypck3bwckpdohsnhpeqrb3nhvwznjmar mweofwnptowe4mad.onion.ly/
  • 17. Who was the first hacker? Konrad Zuse
  • 18. Do you know? Kevin Mitnick is the biggest hacker in the world. 1. Mitnick Security Consulting 2. Security awareness training company “KnowBe4” 3. Board Of Director in “Zimperium” 4. Film : Track Down 5. An Author
  • 19. IT Act & Data Privacy in India 1. Information Technology Act, 2000. (India) 2. IT Amendment Act 2000 to strengthen the cyber security laws. (Section 43, 65 to 71). i.e. Hacking, fail in data protection, using image, video or content without permission etc.) 3. EU General Data Protection Regulation (GDPR) 4. The Personal Data Protection Bill, 2019 (PI & PII data should be processed and stored) Note: Up to three years Imprisonment or/and fine up to 5L Appointment of DPO (Data Protection Officer
  • 20. WhatsApp Issue 1. WhatsApp took an objection to a traceability clause in the new IT Rules that requires social media platforms to locate “the first originator of the information” if required by the government. 2. Indian Rule 4(2) makes it mandatory for social media intermediaries to trace the originator of a message or post on their platform if required by a court or a competent authority under Section 69A of the IT Act.
  • 21. • Do not share your password • Keep Changing your password frequently • Do not click on the anonymous link from any laptop or mobile • Don’t open any emails which comes from strangers. (It may be phishing email). • Don’t download songs and movies • Don’t use USB or any external devices from out sides. • Don’t transfer data from mobile & In Mobile storage. • “Be Aware” We monitor you through DLP and logs your daily activities. • Apps should maintain user login and logout status as well. Do’s & Don'ts
  • 22. Is your email have been compromised ever • https://haveibeenpwned.com/ • https://www.security.org/how-secure-is-my-password/ Practical
  • 23. How to report a cyber crime in India? https://cybercrime.gov.in/Default.aspx For Women and Child : complaint-mwcd@gov.in
  • 24. Thank you • Email ID : Kapil.Mehrotra@gmail.com • Mobile No : 9811779881