Top Banner
Presented by: Amit Arya Faculty, Dept. of Business Administration Dhanwate National College, Nagpur 1 © 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur Cyber Security & Hygiene
24

Cyber Security & Hygine

Feb 14, 2017

Download

Technology

Amit Arya
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security & Hygine

Presented by:Amit Arya

Faculty, Dept. of Business AdministrationDhanwate National College, Nagpur

1© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Cyber Security & Hygiene

Page 2: Cyber Security & Hygine

What is Cybercrime?

• Using the Internet to commit a crime.– Identity Theft– Hacking– Viruses

• Facilitation of traditional criminal activity– Stalking– Stealing information– Child Pornography

2© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 3: Cyber Security & Hygine

Cybercrime Components

• Computers

• Cell Phones

• PDA’s

• Game Consoles

3© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 4: Cyber Security & Hygine

High-Profile Cybercrime-related Cases

• Akamai Technologies State of the Internet report also showed that hacker attacks on websites went up 75% in the final quarter of 2013, with hackers in China responsible for 43% of all attacks.

• eBay went down in a blaze of embarrassment as it suffered this year’s biggest hack so far. In May, eBay revealed that hackers had managed to steal personal records of 233 million users. The hack took place between February and March, with usernames, passwords, phone numbers and physical addresses compromised.

• Domino’s Pizza-Hacking group Rex Mundi held Domino’s Pizza to ransom over 600,000 Belgian and French customer records. In exchange for the personal data, which included names, addresses, emails, phone numbers and even favourite pizza toppings, Mundi demanded $40,000 from the fast-food chain

4© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 5: Cyber Security & Hygine

Computer Security:

ConfidentialityOnly those authorized to view information

IntegrityInformation is correct and hasn’t been altered by unauthorized users or software

AvailabilityData is accessible to authorized users

5© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 6: Cyber Security & Hygine

Computer Security - Threats

Malware:

Software that has a malicious purpose:-

•Viruses•Trojan horse•Spyware

Intrusions:

Any attempt to gain unauthorized access to a system:-

•Cracking•Hacking•Social Engineering

6© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 7: Cyber Security & Hygine

Computer Security - Threats

• Denial-of-Service (DOS)– Prevention of legitimate access to systems– Different types:• Ping-of-Death• Teardrop-attack that involves sending fragmented

packets to a target machine.• Smurf-attack in which large numbers of Internet

Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address.

7© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 8: Cyber Security & Hygine

Computer Security - Threats

Figure – DoS and DDoS Models 8© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 9: Cyber Security & Hygine

Computer Security - Terminology

• People– Hackers• White Hat – Good guys. Report hacks/vulnerabilities to

appropriate people.• Black Hat – Only interested in personal goals,

regardless of impact.• Grey Hat – Somewhere in between.

9© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 10: Cyber Security & Hygine

Computer Security - Terminology

© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 10

Firewall: Barrier between network and the outside world.

Proxy server: Sits between users and server. Two main functions are to improve performance and filter requests.

Page 11: Cyber Security & Hygine

Cyber Targets• 99% of the attacks can be

prevented by basic hygiene. DO Think before you click Up-to-date anti-virus, firewall and

site advisorBUT Some new attacks may get through.

However, attacker may only use your machine to attack others and not attack you per se.

Will not prevent data loss by merchants and other servers.

• 1% of the attacks are difficult and expensive to defend or detect.

For most individuals We are simply not an attractive

enough target.For the Defense & other sensitive govt.

departments and its contractor. A huge target. For companies in sensitive businesses

a serious threat to be taken seriously

© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 11

Page 12: Cyber Security & Hygine

Concerns & Cautions

© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 12

Page 13: Cyber Security & Hygine

Needful Transformation

© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur 13

Cyber security is a young and immature field.Attack back is illegal.

The attackers are more innovative than defenders.Defenders are mired in FUD (fear, uncertainty and doubt)

Cyber security will become:•a scientific discipline•application and technology centricAttack back will be a integral part of cyber security

Page 14: Cyber Security & Hygine

Top Cyber Security Companies- Global

14© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 15: Cyber Security & Hygine

Top Cyber Security Companies- Indian

15© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 16: Cyber Security & Hygine

16© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 17: Cyber Security & Hygine

Indian Govt.’s Initiative

17© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 18: Cyber Security & Hygine

contd…

18© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 19: Cyber Security & Hygine

Some of the Cyber Security Offences & Penalties

19© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 20: Cyber Security & Hygine

Computer Security - Certifications• Entry-level– Security+

http://www.comptia.org/certifications/listed/security.aspx– CIW Security Analyst www.ciwcertified.com

• Intermediate– MSCE Security

http://www.microsoft.com/learning/en/us/certification/mcse.aspx#tab3

• Professional– CISSP www.isc2.org– SANS www.sans.org

20© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 21: Cyber Security & Hygine

Computer Security - Education

• 3/4-Year College Degrees:– Applied– Network– Cryptography– Management

21© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 22: Cyber Security & Hygine

References• http://www.itbusinessedge.com/slideshows/top-25-cybersecurity-companies-to-

watch-in-2015-24.html• http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-

cyber-attacks-of-2014-so-far/#ff681c721a65• http://www.ft.com/cms/s/0/5870af72-e298-11e3-a829-

00144feabdc0.html#axzz3z4c1riRi• https://en.wikipedia.org/wiki/Computer_security• http://www.digitalindia.gov.in/• https://www.cisecurity.org/about/CyberCampaign2014.cfm• http://list.ly/list/Tmw-top-most-promising-cyber-security-companies-in-india

22© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 23: Cyber Security & Hygine

Disclaimer

Please note that this presentation is for information purpose only. All the logos, trademarks and other intellectual properties are owned by respective entities.

23© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Page 24: Cyber Security & Hygine

24© 2016 Dhanwate National College, Dept. of Business Administration (UG), Nagpur

Amit Aryaemail: [email protected]