Presented by: Amit Arya Faculty, Dept. of Business Administration Dhanwate National College, Nagpur 1 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur Cyber Security & Hygiene
Presented by:Amit Arya
Faculty, Dept. of Business AdministrationDhanwate National College, Nagpur
1© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Cyber Security & Hygiene
What is Cybercrime?
• Using the Internet to commit a crime.– Identity Theft– Hacking– Viruses
• Facilitation of traditional criminal activity– Stalking– Stealing information– Child Pornography
2© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Cybercrime Components
• Computers
• Cell Phones
• PDA’s
• Game Consoles
3© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
High-Profile Cybercrime-related Cases
• Akamai Technologies State of the Internet report also showed that hacker attacks on websites went up 75% in the final quarter of 2013, with hackers in China responsible for 43% of all attacks.
• eBay went down in a blaze of embarrassment as it suffered this year’s biggest hack so far. In May, eBay revealed that hackers had managed to steal personal records of 233 million users. The hack took place between February and March, with usernames, passwords, phone numbers and physical addresses compromised.
• Domino’s Pizza-Hacking group Rex Mundi held Domino’s Pizza to ransom over 600,000 Belgian and French customer records. In exchange for the personal data, which included names, addresses, emails, phone numbers and even favourite pizza toppings, Mundi demanded $40,000 from the fast-food chain
4© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security:
ConfidentialityOnly those authorized to view information
IntegrityInformation is correct and hasn’t been altered by unauthorized users or software
AvailabilityData is accessible to authorized users
5© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
Malware:
Software that has a malicious purpose:-
•Viruses•Trojan horse•Spyware
Intrusions:
Any attempt to gain unauthorized access to a system:-
•Cracking•Hacking•Social Engineering
6© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
• Denial-of-Service (DOS)– Prevention of legitimate access to systems– Different types:• Ping-of-Death• Teardrop-attack that involves sending fragmented
packets to a target machine.• Smurf-attack in which large numbers of Internet
Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address.
7© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Threats
Figure – DoS and DDoS Models 8© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Terminology
• People– Hackers• White Hat – Good guys. Report hacks/vulnerabilities to
appropriate people.• Black Hat – Only interested in personal goals,
regardless of impact.• Grey Hat – Somewhere in between.
9© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Terminology
© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 10
Firewall: Barrier between network and the outside world.
Proxy server: Sits between users and server. Two main functions are to improve performance and filter requests.
Cyber Targets• 99% of the attacks can be
prevented by basic hygiene. DO Think before you click Up-to-date anti-virus, firewall and
site advisorBUT Some new attacks may get through.
However, attacker may only use your machine to attack others and not attack you per se.
Will not prevent data loss by merchants and other servers.
• 1% of the attacks are difficult and expensive to defend or detect.
For most individuals We are simply not an attractive
enough target.For the Defense & other sensitive govt.
departments and its contractor. A huge target. For companies in sensitive businesses
a serious threat to be taken seriously
© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 11
Concerns & Cautions
© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 12
Needful Transformation
© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 13
Cyber security is a young and immature field.Attack back is illegal.
The attackers are more innovative than defenders.Defenders are mired in FUD (fear, uncertainty and doubt)
Cyber security will become:•a scientific discipline•application and technology centricAttack back will be a integral part of cyber security
Top Cyber Security Companies- Global
14© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Top Cyber Security Companies- Indian
15© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
16© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Indian Govt.’s Initiative
17© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
contd…
18© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Some of the Cyber Security Offences & Penalties
19© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Certifications• Entry-level– Security+
http://www.comptia.org/certifications/listed/security.aspx– CIW Security Analyst www.ciwcertified.com
• Intermediate– MSCE Security
http://www.microsoft.com/learning/en/us/certification/mcse.aspx#tab3
• Professional– CISSP www.isc2.org– SANS www.sans.org
20© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Computer Security - Education
• 3/4-Year College Degrees:– Applied– Network– Cryptography– Management
21© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
References• http://www.itbusinessedge.com/slideshows/top-25-cybersecurity-companies-to-
watch-in-2015-24.html• http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-
cyber-attacks-of-2014-so-far/#ff681c721a65• http://www.ft.com/cms/s/0/5870af72-e298-11e3-a829-
00144feabdc0.html#axzz3z4c1riRi• https://en.wikipedia.org/wiki/Computer_security• http://www.digitalindia.gov.in/• https://www.cisecurity.org/about/CyberCampaign2014.cfm• http://list.ly/list/Tmw-top-most-promising-cyber-security-companies-in-india
22© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Disclaimer
Please note that this presentation is for information purpose only. All the logos, trademarks and other intellectual properties are owned by respective entities.
23© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
24© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur
Amit Aryaemail: [email protected]