SlideShare a Scribd company logo
1 of 68
Download to read offline
Cyberwar
Is India Ready
Presented At
28th Regional Conference
of
WIRC of ICAI
On
Dec. 07, 2013
At
The Lalit, Mumbai
By
Dinesh O. Bareja
Information Security &
Management Advisor
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Distribution Version
• This presentation has been optimized for distribution which means that animation panes have been deleted
and expanded so that the slides with animation do not appear with unreadable clutter
• The images that have been used are sourced freely from the Internet using multiple search resources. Our
logic is that if your creations are searchable then they are usable for representation AND we never use any
such images in our commercial works
• All our works that are put up as ‘distribution’ versions are published under Creative Commons license and are
non-commercial – these are available for download from common document sites on the internet or from
our website
• If some images are deleted the slide will show the hyperlink to it and you can follow the link to see the image.
This is done if I have received an objection or a take-down notice from the copyright owner
• I/We make every effort to include a link or name to the copyright owner of the image(s) that have been used
in this presentation and please accept our sincere apologies in case any image has not been individually
acknowledged
• Copyright notices or watermarks are not removed from images or text which are not purchased, however,
we may say that practically all text is our own creation
• Inspite of all the above and other declarations, if you have objections to the use (as owner of any of the IP
used in this presentation / paper) you may please send an email to us and we shall remove the same right
away (please do remember to include your communication coordinates and the URL where you spotted this
infringement
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
In The Next Half Hour…
•What is war – then, now, ahead
•Cyberwar (what’s that!), Estonia
and Stuxnet – eye openers or
game changers
•India Under Attack
•India Preparedness Scenario
•Conclusions / The Bottom Line
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
A Brief Introduction
Dinesh O Bareja
• Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd
• Cyber Surveillance Advisor – Cyber Defense Research Centre (Jharkhand Police – Special Branch)
• Member IGRC – Bombay Stock Exchange
• COO – Open Security Alliance
My Primary Work Area
Enterprise & Government Policy
Development; Cyber Security Strategy and
Design Architect; Current State Maturity
Assessment & Optimization; Digital
Forensics, Cloud Forensics and Security
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Now… Lets talk about …
•What is war – then, now, ahead
•Cyberwar (what’s that?) Estonia
and Stuxnet – eye openers or
game changers
•India Under Attack
•India Preparedness Scenario
•Conclusions / The Bottom Line
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar Q1: What Is War
•Country A against Country B
•India / Pakistan
•US / Iraq
•Iraq / Kuwait
•NATO / Germany
•World War 1, 2 … etc…
War
WAS
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
That’s What War…
WAS!
dirty and bloody with a lot of noise, blackouts and mayhem
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
but now…..
•Times have changed and so have
the definition of war
•“modern warfare” is still in the
industrial age
•Remember how the definition of
heroes has changed since 9/11
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar Q1: What Is War
Now
War
IS Pakistani groups mass defacement of Indian websites
26/11 attack
Virus attack on Iran Nuclear
Plant
Israel raid on Entebbe
Virus attack on Aramco, Saudi Arabia
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar Q1: What Is War
Drone Attacks
Laser guidance systems
Night vision
Bullet Proof vests…
Now
War
IS
ESSENTIALLY
MINIMUM CONTACT MAXIMUM DAMAGE
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Moving on… we look at
•What is war – then, now, ahead
•Cyberwar (what’s that!), Estonia
and Stuxnet – eye openers or
game changers
•India Under Attack
•India Preparedness Scenario
•Conclusions / The Bottom Line
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
• Traditional wars are fought on land, air,
sea
• Attack is by a country on a country
• Battlefield is required
• Highly visible damage to life, property
• Lots of flashes, fires and noise
• Involves strict supply chain management
to control logistics of movement and
support to 1000’s of troops, munitions,
food etc.
• Eventually - Someone wins someone
loses
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Now For the Million Dollar
Rupee Question
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Country A
against
<God-knows-who>
Cyber
War
IS
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar - Who is your
adversary
•Country
•Non-state actors
•Hacktivist
•Cracker / Hacker (age 6 to
anything)
•Automation
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
According to WIKIPEDIA
Cyberwarfare refers to
politically motivated hacking to
conduct sabotage and
espionage. It is a form of
information warfare
sometimes seen as analogous
to conventional warfare.
Cyber
War
IS
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
In Cyberwar This is The Stuff
That Should Happen
•DDOS / APT
•Power Shutdown
•Affects Telecom, Banking,
Manufacturing, Transport
•Satellite Malware
•Theft of Data / Information –
patents, designs, information
WhatIsCyberwar
WhatIsCyberwar
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
In Cyberwar This is The Stuff
That Should Happen
•Disrupt Railway network
•Affect Supply Chain - defense,
foodstuff, raw material
•Contaminate Water Supply
•APT attack on defense armaments
WhatIsCyberwar
WhatIsCyberwar
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Three Big Players in the CW
game
USAChina Iran
Pakistan, Myanmar, Bangladesh, Indonesia,
India, Belarus, Ukraine…
Israel Russia
Other Players in the CW game
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Three Big Players in the CW
game
USAChina Iran
They have infiltrated each other, destroyed the Nuclear program,
spy on each other, alleged to have brought down systems with
virus attacks.
What more has been done is anyone’s guess, but the media and
everyone is calling this war
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
BUT
No one is dead yet
Is This War !
WhatIsCyberwar
WhatIsCyberwar
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar an oxymoron
<cyber>
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
The concept of Cyberwar is
flawed and meant to confuse
everyone except the people
who started this subterfuge
WhatIsCyberwar
WhatIsCyberwar
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Search the internet and this is the
type of images you get for
Cyberwar
Tanks, grenades, soldiers clambering
on keyboards and binary roads !
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Is This is also War
•Website Defacements
•Ransomware
•Rumor via Social Media leading to
terror situations
•Micro-finance / crowd sourcing
•ELearning jihadis and terrorists
WhatIsCyberwar
WhatIsCyberwar
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
And This Too…
•Anonymous attacks on banks,
media, government infrastructure
•000’s of attacks per minute on
Asian Games or Olympic Games
WhatIsCyberwar
WhatIsCyberwar
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Not Wanting to Confuse You
Or duck the actual topic.
The last few slides were not put in to
bring any confusion but to highlight
the confusion in the domain and to
question “experts” who have yet to
do their homework
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Actually, Cyberwar will
depend on
who is defining WAR –
defense personnel, hacker
community, mango-people,
government, academics …
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
"We really need to define this word because
words do matter. Cyber war is a turbo metaphor
that does not address the issues we are looking
at like cyber espionage, cyber crime, identity
theft, credit card fraud.
"When you look at the conflict environment -
military to military - command and control is
always part of the thing.
"Don't make it something that it is not," Mr.
Schmidt told reporters.
Howard Schmidt,
ex Cyber Security
Co-coordinator for
the White House.
"What we are seeing is not cyber war but an
increasing use of war-like tactics and that is
what is confusing us. We don't have good
definitions of what cyber war is, what it looks
like and how to fight it,"
Bruce Schneier,
Chief Security
Officer for BT
http://www.bbc.co.uk/news/technology-12473809
No
definitions
for
Cyberwar!
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Defining Cyberwar or Internet
It was six men of
Indostan To learning
much inclined
Who went to see
the Elephant
(Though all of them
were blind),
That each by
observation Might
satisfy his mind
http://www.uen.org/Lessonplan/downloadFile.cgi?file=28910-2-36017-
Blind_Man___elephant.ppt&filename=Blind_Man___elephant.ppt.
WALL
SNAKE
TREE
ROPE
FAN
SPEAR
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Now… Lets talk about …
•What is war – then, now, ahead
•Cyberwar (what’s that!), Estonia
and Stuxnet – eye openers or
game changers
•India Under Attack
•India Preparedness Scenario
•Conclusions / The Bottom Line
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Neither in 2007 nor today are
there any internationally accepted
definitions on the subject of cyber
defense and security
What one nation considers a
"cyber attack" might appear more
like a "cyber war" to another or
even a simple "cyber crime" to a
third.
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
• In 2007 the country faced a large scale attack by about 1 million
botnet
• Almost all government functions are over the internet – voting,
parking, banking, identification
• And this was shutdown for the country
• They are NATO members but no one knew what was
happening and it was termed as a war later
• The country has free Wi-Fi as they consider net access as a basic
human right
• The plan is to make internet as available as electricity
• Euro 384m project “EstWin” to provide 100 megabits / sec for
every citizen by 2015
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Target : Iran Nuclear Facility
Stuxnet’s existence became known in June 2010
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
www.standupamericaus.org/sua/wp-content/uploads/2013/08/StuxnetExplained-e1376938880795.jpg
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
- Mikko Hyppönen, Chief Research Officer, F-Secure
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Budgets
• Pentagon Five-Year Cybersecurity Plan
Seeks $23 Billion
• The Iranian government has reportedly
invested $ 1 billion to develop and build
out its own Cyberwar capabilities
• Estonia is the most cyber-aware nation-
provides free education to students in
Cyber Security undergrad/post-grad
programs + free net….
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Now… Lets talk about …
•What is war – then, now, ahead
•Cyberwar (what’s that!), Estonia
and Stuxnet – eye openers or
game changers
•India Under Attack &
Preparedness Scenario
•Conclusions / The Bottom Line
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
India
•Budget == secret bad word
•Capability == Fragmented
•Capacity == Lots of noise
•Organization == chaotic
•Future Plan == Future! Duh! It’s top
secret
•Core Cyber security Strategy == knee
jerks based on ignorance or
pompousness
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Our Strengths (official stand)
•IT Act and various amendments
•National Cyber Security Policy
•Crisis Management Plan
•CERT, NTRO and 60+ organizations
and agencies
•Oversight thru’ Clause 49, UID,
NPR,
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Reality Check
•IT Act and various amendments
•National Cyber Security Policy
•Crisis Management Plan
•National Critical Infrastructure
Policy
•RBI, SEBI, TRAI/DOT and other
regulations
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Reality Check
•Multiple data breaches at PMO, MEA
among other agencies over the years
•Use of free email services despite
revelations of NSA’s Prism program
•Knee jerk directive against use of
public emails in the absence of ANY
alternative (Brazil Post has set up free
email services)
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Reality Check
•UID weaknesses and NPR
•CCTNS
•Non starter
•CERT, NTRO and 60+ organizations
and agencies – Fragmented,
internal politics, progress is (not)
shared
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
A Small Digression
Prompted by the last point about
60+ organizations / agencies
operating in the country
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Organization
Soup
WESEE
General Weapons and
Electronics Systems
Engineering Establishment
DIARA
Defense Information and
Research Agency
DIA Defence Intelligence Agency
Special Operations Command
Strategic Forces Command
CERT-Navy
CERT-Army
CERT-AirForce
Cyber Operations Centre
(NTRO with Armed Forces)
CERT-In Computer Emergency Response Team
CHCIT Cyber and Hi-Tech Crime Investigation and Training Center
NIC National Informatics Center
NTRO National Technical Research Organization
Cyber Regulation Advisory Committee
NCSC National Cyber Security Commissioner
Cyber Coordination Center
CMS Central Monitoring System
NCSF National Cyber Security Framework
Cyber Security Board
Cyber Security Board - Cyber Security Coordinators
NCCC National Cyber Coordination Centre
NSCS National Security Council Secretariat
NCCC National Cyber Coordination Centre
NSAB National Security Advisory Board
National Information Security Authority
NCIIPC
National Critical Information Infrastructure Protection
Committee
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
What Org Structure
What We Have
What We Need
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Organization
Soup
CDRC Cyber Defence Research Centre, Jharkhand
Cyber Suraksha Cell, Gujarat
Special Operations Group, Gujarat
Cyberdome, Kerala Police
DSCI Data Security Council of India
IISc Indian Institute of Science, Bangalore
ISAC Information Sharing and Analysis Centre
CSI Computer Society of India
Deccan Hackers
Indian Cyber Army
National Security Database
IDRBT
Institute for Development and Research in Banking
Technology
IBA Indian Banks Association
RBI Reserve Bank of India
CBI's Bank Securities and Fraud Cell
National Intelligence Board
SSTCG Strategic Security Technology Coordination Group
MAC Multi Agency Centre
Joint Cipher Bureau
Scientific Advisory Group
Indian Statistical Institute
Cipher Committee
Scientific Advisor to Raksha Mantri
Telecom Security Council of India
NATGRID National Intelligence Grid
CCTNS Crimes and Criminal Tracking Network and System
NCTC
NCTC was to weld together multiple intelligence
databases:
NJDG National Judicial Data Grid
TETC Telecom Testing and Security Certification Centre
TRAI
DOT
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Our Score = 60+
• The country should have been on the top of
the Cyber capability index worldwide
• We would not having this conference..
Rather … the topic would have been different
• Nations and individuals would have to think
twice to face up to us – no website
defacements or data breach
What We Have
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
•To respond to an attack by air the Air
Force is called, on land it is the Army
and the Navy at sea
Who do we call upon for an
attack through the internet
• How do 60+ agencies coordinate with each other
• How can a planned response be launched in the
absence of a central coordinator….
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Worldwide – other
countries are no better
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
OK… We Return to Our
Presentation
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Reality Check
•R&D and PPP are good terms used
in policies and meetings
•Advisories (invariably) speak a
foreign language
•Lack of statistics or authentic
surveys so anyone says anything
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Now… Lets talk about …
•What is war – then, now, ahead
•Cyberwar (what’s that!), Estonia
and Stuxnet – eye openers or
game changers
•India Under Attack & Preparedness
Scenario
•Conclusions / The Bottom Line
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Are we ready for Cyberwar?
CERTAINLY NOT!
THE BOTTOM LINE
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
WHY NOT!
You May Ask
Where are the policies and strategies which will guide our
nation in the event of a Cyberwar?
What is our budget allocation?
Who is spending money wisely?
Where is the money being spent?
Have you seen one (critical) PSU with genuinely good
practices which are adopted by the organization?
THE BOTTOM LINE
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
WHAT CAN WE DO
Speak to the people we know in Government
and get them scared
Kick the people who say they have the best
systems in place (be careful you do not kick the
wrong one)
Understand and accept that risks and threats
from technology are part of life and we have to
change
Contribute our effort strongly to making things
better in our own small way
THE BOTTOM LINE
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Leaving
you with
some
food for
thought
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Leaving
you with
some
food for
thought
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Cyberwar is a chimera, a
figment of imagination
which is yet to be defined
and we have to be
careful of warmongers
and sabre rattlers!
The need is to secure our
infrastructure which is
where all attention must
be focused
Leaving
you with
some
food for
thought
- Dinesh O Bareja
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Head Office:
FB-05, NSIC Software Technology Park Extn,
Okhla Industrial Estate,
New Delhi-110020,
T: +91-9650894671
F: +91-11-26322980
E: contact@pyramidcyber.com
Mumbai Office:
308 Orbitz Premises
Chincholi Bunder Road
Malad West
Mumbai 400064
T: +91.9769890505
E: dinesh.bareja@pyramidcyber.com
www.pyramidcyber.com
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
• Professional Positions
• Pyramid Cyber Security & Forensics (Principal Advisor)
• Open Security Alliance (Principal and CEO)
• Jharkhand Police (Cyber Security Advisor)
• Indian Honeynet Project (Co Founder)
• Professional skills and special interest areas
• Security Consulting and Advisory services for IS Architecture, Analysis,
Optimization..
• Technologies: SOC, DLP, IRM, SIEM…
• Practices: Incident Response, SAM, Forensics, Regulatory guidance..
• Community: mentoring, training, citizen outreach, India research..
• Opinioned Blogger, occasional columnist, wannabe photographer
Dinesh O. Bareja,
CISA, CISM, ITIL, BS7799, Cert IPR, Cert ERM
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
Contact Information
References
http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/
Acknowledgements & Disclaimer
Various resources on the internet have been referred to contribute to the information presented.
Images have been acknowledged (above) where possible. Any company names, brand names,
trade marks are mentioned only to facilitate understanding of the message being communicated -
no claim is made to establish any sort of relation (exclusive or otherwise) by the author(s), unless
otherwise mentioned. Apologies for any infraction, as this would be wholly unintentional, and
objections may please be communicated to us for remediation of the erroneous action(s).
E dinesh@opensecurityalliance.org +91.9769890505
@bizsprite dineshobareja
L: http://in.linkedin.com/in/dineshbareja dineshobareja
Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI

More Related Content

What's hot

Dissertation - Cyber Security
Dissertation - Cyber Security Dissertation - Cyber Security
Dissertation - Cyber Security Alysha Paulsen
 
Cybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfCybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfHamzaAfzal61
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
The ATT&CK Philharmonic
The ATT&CK PhilharmonicThe ATT&CK Philharmonic
The ATT&CK PhilharmonicMITRE ATT&CK
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacksStefan Fodor
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Arnaque et Internet
Arnaque et InternetArnaque et Internet
Arnaque et InternetGerard Haas
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber securityJoey Hernandez
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Dissertation - Cyber Security
Dissertation - Cyber Security Dissertation - Cyber Security
Dissertation - Cyber Security
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfCybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdf
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
The ATT&CK Philharmonic
The ATT&CK PhilharmonicThe ATT&CK Philharmonic
The ATT&CK Philharmonic
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacks
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Arnaque et Internet
Arnaque et InternetArnaque et Internet
Arnaque et Internet
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 

Viewers also liked (16)

ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 

Similar to Cyberwar - Is India Ready

India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and YouCaroline Dunn
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Robin Sedeqi
 
Rahul ict presentation
Rahul ict presentationRahul ict presentation
Rahul ict presentationRahul Gaur
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certificationVskills
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World SessionYasserElsnbary
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziNCCOMMS
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security Pavan Kuls
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourselfjkl0202
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 

Similar to Cyberwar - Is India Ready (20)

India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Bullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdfBullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdf
 
Rahul ict presentation
Rahul ict presentationRahul ict presentation
Rahul ict presentation
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certification
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Session
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

More from Dinesh O Bareja (9)

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cyberwar - Is India Ready

  • 1. Cyberwar Is India Ready Presented At 28th Regional Conference of WIRC of ICAI On Dec. 07, 2013 At The Lalit, Mumbai By Dinesh O. Bareja Information Security & Management Advisor
  • 2. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Distribution Version • This presentation has been optimized for distribution which means that animation panes have been deleted and expanded so that the slides with animation do not appear with unreadable clutter • The images that have been used are sourced freely from the Internet using multiple search resources. Our logic is that if your creations are searchable then they are usable for representation AND we never use any such images in our commercial works • All our works that are put up as ‘distribution’ versions are published under Creative Commons license and are non-commercial – these are available for download from common document sites on the internet or from our website • If some images are deleted the slide will show the hyperlink to it and you can follow the link to see the image. This is done if I have received an objection or a take-down notice from the copyright owner • I/We make every effort to include a link or name to the copyright owner of the image(s) that have been used in this presentation and please accept our sincere apologies in case any image has not been individually acknowledged • Copyright notices or watermarks are not removed from images or text which are not purchased, however, we may say that practically all text is our own creation • Inspite of all the above and other declarations, if you have objections to the use (as owner of any of the IP used in this presentation / paper) you may please send an email to us and we shall remove the same right away (please do remember to include your communication coordinates and the URL where you spotted this infringement
  • 3. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI In The Next Half Hour… •What is war – then, now, ahead •Cyberwar (what’s that!), Estonia and Stuxnet – eye openers or game changers •India Under Attack •India Preparedness Scenario •Conclusions / The Bottom Line
  • 4. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI A Brief Introduction Dinesh O Bareja • Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd • Cyber Surveillance Advisor – Cyber Defense Research Centre (Jharkhand Police – Special Branch) • Member IGRC – Bombay Stock Exchange • COO – Open Security Alliance My Primary Work Area Enterprise & Government Policy Development; Cyber Security Strategy and Design Architect; Current State Maturity Assessment & Optimization; Digital Forensics, Cloud Forensics and Security
  • 5. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Now… Lets talk about … •What is war – then, now, ahead •Cyberwar (what’s that?) Estonia and Stuxnet – eye openers or game changers •India Under Attack •India Preparedness Scenario •Conclusions / The Bottom Line
  • 6. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Cyberwar Q1: What Is War •Country A against Country B •India / Pakistan •US / Iraq •Iraq / Kuwait •NATO / Germany •World War 1, 2 … etc… War WAS
  • 7. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
  • 8. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI That’s What War… WAS! dirty and bloody with a lot of noise, blackouts and mayhem
  • 9. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI but now….. •Times have changed and so have the definition of war •“modern warfare” is still in the industrial age •Remember how the definition of heroes has changed since 9/11
  • 10. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Cyberwar Q1: What Is War Now War IS Pakistani groups mass defacement of Indian websites 26/11 attack Virus attack on Iran Nuclear Plant Israel raid on Entebbe Virus attack on Aramco, Saudi Arabia
  • 11. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Cyberwar Q1: What Is War Drone Attacks Laser guidance systems Night vision Bullet Proof vests… Now War IS ESSENTIALLY MINIMUM CONTACT MAXIMUM DAMAGE
  • 12. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Moving on… we look at •What is war – then, now, ahead •Cyberwar (what’s that!), Estonia and Stuxnet – eye openers or game changers •India Under Attack •India Preparedness Scenario •Conclusions / The Bottom Line
  • 13. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI • Traditional wars are fought on land, air, sea • Attack is by a country on a country • Battlefield is required • Highly visible damage to life, property • Lots of flashes, fires and noise • Involves strict supply chain management to control logistics of movement and support to 1000’s of troops, munitions, food etc. • Eventually - Someone wins someone loses
  • 14. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Now For the Million Dollar Rupee Question
  • 15. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Country A against <God-knows-who> Cyber War IS
  • 16. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Cyberwar - Who is your adversary •Country •Non-state actors •Hacktivist •Cracker / Hacker (age 6 to anything) •Automation
  • 17. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI According to WIKIPEDIA Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare. Cyber War IS
  • 18. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
  • 19. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI In Cyberwar This is The Stuff That Should Happen •DDOS / APT •Power Shutdown •Affects Telecom, Banking, Manufacturing, Transport •Satellite Malware •Theft of Data / Information – patents, designs, information WhatIsCyberwar WhatIsCyberwar
  • 20. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI In Cyberwar This is The Stuff That Should Happen •Disrupt Railway network •Affect Supply Chain - defense, foodstuff, raw material •Contaminate Water Supply •APT attack on defense armaments WhatIsCyberwar WhatIsCyberwar
  • 21. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Three Big Players in the CW game USAChina Iran Pakistan, Myanmar, Bangladesh, Indonesia, India, Belarus, Ukraine… Israel Russia Other Players in the CW game
  • 22. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Three Big Players in the CW game USAChina Iran They have infiltrated each other, destroyed the Nuclear program, spy on each other, alleged to have brought down systems with virus attacks. What more has been done is anyone’s guess, but the media and everyone is calling this war
  • 23. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI BUT No one is dead yet Is This War ! WhatIsCyberwar WhatIsCyberwar
  • 24. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Cyberwar an oxymoron <cyber>
  • 25. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
  • 26. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI The concept of Cyberwar is flawed and meant to confuse everyone except the people who started this subterfuge WhatIsCyberwar WhatIsCyberwar
  • 27. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Search the internet and this is the type of images you get for Cyberwar Tanks, grenades, soldiers clambering on keyboards and binary roads !
  • 28. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Is This is also War •Website Defacements •Ransomware •Rumor via Social Media leading to terror situations •Micro-finance / crowd sourcing •ELearning jihadis and terrorists WhatIsCyberwar WhatIsCyberwar
  • 29. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI And This Too… •Anonymous attacks on banks, media, government infrastructure •000’s of attacks per minute on Asian Games or Olympic Games WhatIsCyberwar WhatIsCyberwar
  • 30. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Not Wanting to Confuse You Or duck the actual topic. The last few slides were not put in to bring any confusion but to highlight the confusion in the domain and to question “experts” who have yet to do their homework
  • 31. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Actually, Cyberwar will depend on who is defining WAR – defense personnel, hacker community, mango-people, government, academics …
  • 32. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI "We really need to define this word because words do matter. Cyber war is a turbo metaphor that does not address the issues we are looking at like cyber espionage, cyber crime, identity theft, credit card fraud. "When you look at the conflict environment - military to military - command and control is always part of the thing. "Don't make it something that it is not," Mr. Schmidt told reporters. Howard Schmidt, ex Cyber Security Co-coordinator for the White House. "What we are seeing is not cyber war but an increasing use of war-like tactics and that is what is confusing us. We don't have good definitions of what cyber war is, what it looks like and how to fight it," Bruce Schneier, Chief Security Officer for BT http://www.bbc.co.uk/news/technology-12473809 No definitions for Cyberwar!
  • 33. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Defining Cyberwar or Internet It was six men of Indostan To learning much inclined Who went to see the Elephant (Though all of them were blind), That each by observation Might satisfy his mind http://www.uen.org/Lessonplan/downloadFile.cgi?file=28910-2-36017- Blind_Man___elephant.ppt&filename=Blind_Man___elephant.ppt. WALL SNAKE TREE ROPE FAN SPEAR
  • 34. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Now… Lets talk about … •What is war – then, now, ahead •Cyberwar (what’s that!), Estonia and Stuxnet – eye openers or game changers •India Under Attack •India Preparedness Scenario •Conclusions / The Bottom Line
  • 35. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Neither in 2007 nor today are there any internationally accepted definitions on the subject of cyber defense and security What one nation considers a "cyber attack" might appear more like a "cyber war" to another or even a simple "cyber crime" to a third.
  • 36. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI • In 2007 the country faced a large scale attack by about 1 million botnet • Almost all government functions are over the internet – voting, parking, banking, identification • And this was shutdown for the country • They are NATO members but no one knew what was happening and it was termed as a war later • The country has free Wi-Fi as they consider net access as a basic human right • The plan is to make internet as available as electricity • Euro 384m project “EstWin” to provide 100 megabits / sec for every citizen by 2015
  • 37. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Target : Iran Nuclear Facility Stuxnet’s existence became known in June 2010
  • 38. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI www.standupamericaus.org/sua/wp-content/uploads/2013/08/StuxnetExplained-e1376938880795.jpg
  • 39. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI - Mikko Hyppönen, Chief Research Officer, F-Secure
  • 40. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
  • 41. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Budgets • Pentagon Five-Year Cybersecurity Plan Seeks $23 Billion • The Iranian government has reportedly invested $ 1 billion to develop and build out its own Cyberwar capabilities • Estonia is the most cyber-aware nation- provides free education to students in Cyber Security undergrad/post-grad programs + free net….
  • 42. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Now… Lets talk about … •What is war – then, now, ahead •Cyberwar (what’s that!), Estonia and Stuxnet – eye openers or game changers •India Under Attack & Preparedness Scenario •Conclusions / The Bottom Line
  • 43. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI India •Budget == secret bad word •Capability == Fragmented •Capacity == Lots of noise •Organization == chaotic •Future Plan == Future! Duh! It’s top secret •Core Cyber security Strategy == knee jerks based on ignorance or pompousness
  • 44. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Our Strengths (official stand) •IT Act and various amendments •National Cyber Security Policy •Crisis Management Plan •CERT, NTRO and 60+ organizations and agencies •Oversight thru’ Clause 49, UID, NPR,
  • 45. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Reality Check •IT Act and various amendments •National Cyber Security Policy •Crisis Management Plan •National Critical Infrastructure Policy •RBI, SEBI, TRAI/DOT and other regulations
  • 46. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Reality Check •Multiple data breaches at PMO, MEA among other agencies over the years •Use of free email services despite revelations of NSA’s Prism program •Knee jerk directive against use of public emails in the absence of ANY alternative (Brazil Post has set up free email services)
  • 47. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Reality Check •UID weaknesses and NPR •CCTNS •Non starter •CERT, NTRO and 60+ organizations and agencies – Fragmented, internal politics, progress is (not) shared
  • 48. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI A Small Digression Prompted by the last point about 60+ organizations / agencies operating in the country
  • 49. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Organization Soup WESEE General Weapons and Electronics Systems Engineering Establishment DIARA Defense Information and Research Agency DIA Defence Intelligence Agency Special Operations Command Strategic Forces Command CERT-Navy CERT-Army CERT-AirForce Cyber Operations Centre (NTRO with Armed Forces) CERT-In Computer Emergency Response Team CHCIT Cyber and Hi-Tech Crime Investigation and Training Center NIC National Informatics Center NTRO National Technical Research Organization Cyber Regulation Advisory Committee NCSC National Cyber Security Commissioner Cyber Coordination Center CMS Central Monitoring System NCSF National Cyber Security Framework Cyber Security Board Cyber Security Board - Cyber Security Coordinators NCCC National Cyber Coordination Centre NSCS National Security Council Secretariat NCCC National Cyber Coordination Centre NSAB National Security Advisory Board National Information Security Authority NCIIPC National Critical Information Infrastructure Protection Committee
  • 50. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI What Org Structure What We Have What We Need
  • 51. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Organization Soup CDRC Cyber Defence Research Centre, Jharkhand Cyber Suraksha Cell, Gujarat Special Operations Group, Gujarat Cyberdome, Kerala Police DSCI Data Security Council of India IISc Indian Institute of Science, Bangalore ISAC Information Sharing and Analysis Centre CSI Computer Society of India Deccan Hackers Indian Cyber Army National Security Database IDRBT Institute for Development and Research in Banking Technology IBA Indian Banks Association RBI Reserve Bank of India CBI's Bank Securities and Fraud Cell National Intelligence Board SSTCG Strategic Security Technology Coordination Group MAC Multi Agency Centre Joint Cipher Bureau Scientific Advisory Group Indian Statistical Institute Cipher Committee Scientific Advisor to Raksha Mantri Telecom Security Council of India NATGRID National Intelligence Grid CCTNS Crimes and Criminal Tracking Network and System NCTC NCTC was to weld together multiple intelligence databases: NJDG National Judicial Data Grid TETC Telecom Testing and Security Certification Centre TRAI DOT
  • 52. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Our Score = 60+ • The country should have been on the top of the Cyber capability index worldwide • We would not having this conference.. Rather … the topic would have been different • Nations and individuals would have to think twice to face up to us – no website defacements or data breach What We Have
  • 53. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI •To respond to an attack by air the Air Force is called, on land it is the Army and the Navy at sea Who do we call upon for an attack through the internet • How do 60+ agencies coordinate with each other • How can a planned response be launched in the absence of a central coordinator….
  • 54. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Worldwide – other countries are no better
  • 55. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI
  • 56. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI OK… We Return to Our Presentation
  • 57. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Reality Check •R&D and PPP are good terms used in policies and meetings •Advisories (invariably) speak a foreign language •Lack of statistics or authentic surveys so anyone says anything
  • 58. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Now… Lets talk about … •What is war – then, now, ahead •Cyberwar (what’s that!), Estonia and Stuxnet – eye openers or game changers •India Under Attack & Preparedness Scenario •Conclusions / The Bottom Line
  • 59. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Are we ready for Cyberwar? CERTAINLY NOT! THE BOTTOM LINE
  • 60. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI WHY NOT! You May Ask Where are the policies and strategies which will guide our nation in the event of a Cyberwar? What is our budget allocation? Who is spending money wisely? Where is the money being spent? Have you seen one (critical) PSU with genuinely good practices which are adopted by the organization? THE BOTTOM LINE
  • 61. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI WHAT CAN WE DO Speak to the people we know in Government and get them scared Kick the people who say they have the best systems in place (be careful you do not kick the wrong one) Understand and accept that risks and threats from technology are part of life and we have to change Contribute our effort strongly to making things better in our own small way THE BOTTOM LINE
  • 62. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Leaving you with some food for thought
  • 63. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Leaving you with some food for thought
  • 64. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Cyberwar is a chimera, a figment of imagination which is yet to be defined and we have to be careful of warmongers and sabre rattlers! The need is to secure our infrastructure which is where all attention must be focused Leaving you with some food for thought - Dinesh O Bareja
  • 65. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Head Office: FB-05, NSIC Software Technology Park Extn, Okhla Industrial Estate, New Delhi-110020, T: +91-9650894671 F: +91-11-26322980 E: contact@pyramidcyber.com Mumbai Office: 308 Orbitz Premises Chincholi Bunder Road Malad West Mumbai 400064 T: +91.9769890505 E: dinesh.bareja@pyramidcyber.com www.pyramidcyber.com
  • 66. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI • Professional Positions • Pyramid Cyber Security & Forensics (Principal Advisor) • Open Security Alliance (Principal and CEO) • Jharkhand Police (Cyber Security Advisor) • Indian Honeynet Project (Co Founder) • Professional skills and special interest areas • Security Consulting and Advisory services for IS Architecture, Analysis, Optimization.. • Technologies: SOC, DLP, IRM, SIEM… • Practices: Incident Response, SAM, Forensics, Regulatory guidance.. • Community: mentoring, training, citizen outreach, India research.. • Opinioned Blogger, occasional columnist, wannabe photographer Dinesh O. Bareja, CISA, CISM, ITIL, BS7799, Cert IPR, Cert ERM
  • 67. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI Contact Information References http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/ Acknowledgements & Disclaimer Various resources on the internet have been referred to contribute to the information presented. Images have been acknowledged (above) where possible. Any company names, brand names, trade marks are mentioned only to facilitate understanding of the message being communicated - no claim is made to establish any sort of relation (exclusive or otherwise) by the author(s), unless otherwise mentioned. Apologies for any infraction, as this would be wholly unintentional, and objections may please be communicated to us for remediation of the erroneous action(s). E dinesh@opensecurityalliance.org +91.9769890505 @bizsprite dineshobareja L: http://in.linkedin.com/in/dineshbareja dineshobareja
  • 68. Cyberwar - Is India Ready 28th Regional Conference of WIRC of ICAI