2. Who AM I
Viral Parmar aka SkyF!r3
Founder of ComExpo Cyber Security
Ethical Hacker
Cyber Security Consultant
Cyber Security Researcher
Given seminar’s and workshop more then 20+ colleges.
Honourable member of DSCI
Chairperson OWASP Gandhinagar
Always remember: Know hAckiNG, but no HaCKing.
3. Agenda
1. Cyber Crime Stats & Impacts
2. Protect your Identity
3. Trusted Source
4. Secure Communication
4.
5.
6.
7. Major Attacks and their losses
56 million records stolen over all revenue loss $150 Million
85 million records stolen $45 million
56 million records stolen
5 million 145 million user
4.6 million
7.5 million user 10 million user data
BSNL - 30 million
TRAI, OLA, Control of defence, Narendra modi, Ravi Shankar Prasad
8.
9. Cyber Crime Stats
• 1st rank United States
• 2nd rank United Kingdom
• 3rd India on because of online malicious activity and is on top the cyber war
between India-Pakistan
• India became the second most targeted country in the world for social media
scams in 2015.
• 107% CAGR of cyber crime in India with 5lakh cases.
• 90 % mobile apps are vul.
10. Lack of knowledge in cyber security
• 70 % of vulnerabilities exist at the application layer nor the network
• 30000 websites are hacked everyday to distribute malware
• 96 % of tested application have vul.
• 86 % of all website have at least 1 serious vul.
https://cybermap.kaspersky.com/
https://www.fireeye.com/cyber-map/threat-map.html
http://map.norsecorp.com/
11. • Banking Financial Services
and Insurance (BFSI)
• 94% of companies faced
cyber crime as a major threat
• 41 % companies have cyber
crime as a board agenda only
• 72 % companies faced cyber
attack over the past year
• 63 % respondents indicated
that cyber crime amounted to
financial loss while 55 % also
mention theft of sensitive
information
12. Protect Your Identity
1. Don’t talk to Unknown people on Internet .
2. Don't give your Information about yourself like:
I. Full name
II. Parents name
III. Date of birth
IV. Address
V. Phone number
VI. Don’t share photos
to anyone online that you don't trust or know.
Cyber Stalking, Cyber bullying, Cyber harassment
13.
14.
15. IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh
IT act 2008 Section 66A sending Offensive message
IT act 2008 Section 66D cheating by personation
16.
17. Trusted Sources
1. Operating Systems - based on its security and vulnerability
update your operating system with security updates - use
Linux Ubuntu, remove unwanted programs .
2. Web browser- most malware will come through via your web
browser. Google Chrome is more secure and has a sandbox
feature, Don’t save password in web browser remove addons .
3. Downloading software- use a trusted source (Play Store, App
Store, softpedia, sourceforge) or your repository if you are
using Linux.
18. 4. Read carefully-When you sign up for newsletters, install
programs, or agree to anything, read the fine print.
5. Use an anti-virus program, an anti-spyware program, and a
firewall. Surfing the internet without these things is unsafe and
invites spam, hackers, and viruses onto your computer.
6. Always check for secure transaction info.-Secure URLs begin
with https:// instead of http://. This means the transmission is
encrypted to and from the web server