Cyber Crime And Network Security In India

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cyber Crime And Network Security In India as PDF for free.

More details

  • Words: 1,241
  • Pages: 18
Cyber Crime & Network Security in India

CIO Focus Security 2008 Presentation by Adam Rice & AJ Vijayakumar

©2008 Tata Communications, Ltd. All Rights Reserved

Explosive Internet Growth and Impacts to Businesses India Internet Usage Stats and Telecommunications Market Report

Internet Usage and Population Statistics:

ITU

1999

2,800,000

1,094,870,677

0.3%

ITU

% 12

2000

5,500,000

1,094,870,677

0.5%

ITU

8

2001

7,000,000

1,094,870,677

0.7%

ITU

Real GDP Growth Rate 10.5 8.3

16,500,000

1,094,870,677

1.6%

ITU

2003

22,500,000

1,094,870,677

2.1%

ITU

0

2004

25,000,000

1,094,870,677

2.28%

IAMAI

2005

38,500,000

1,112,225,812

3.46%

IAMAI

2006

50,600,000

1,112,225,812

4.55%

CIA

2007

60,000,000

1,129,667,528

5.31%

ITU

5.6

C

hi na

2002

4

7.5 5.5

5.3

5.1

4.5

4.0

an

0.1%

Ta iw

1,094,870,677

nd

Usage Source

Th ai la

1,400,000

% Pen.

or ea

1998

Population

K

Users

In di a Si ng ap or e H on g K on g M al ay si a In do ne si a

Year

Internet use has been a key driver to enhance both Domestic & Global Trade in India

Source: Morgan Stanley Research

E-Commerce

Media & Entertainment

Government

Business Process Outsourcing

Education

Online Banking

Defining “Cyber Crime” Webster's New Millennium™ Dictionary of English Entry: Part of Speech: Definition: Example: ƒ ƒ ƒ ƒ ƒ ƒ ƒ ƒ ƒ

Cyber Crime noun A crime committed on a computer network, esp. the Internet Identity theft is a Cyber Crime.

Spamming DDoS Unauthorized access Social Engineering Hacking Phishing Identity Theft Cyber-stalking Information warfare

ƒ Espionage ƒ Internet Harassment ƒ Malware ƒ ƒ ƒ ƒ ƒ ƒ ƒ

Virus Worm Trojan Bot Rootkit Spyware Backdoor

ƒ Malware (cont.) ƒ Downloader ƒ Adware ƒ Ransomeware

ƒ ƒ ƒ ƒ

Child Pornography Telecom Fraud Financial Fraud Computer Fraud

News/Media Perspective of Cyber Crime in the India Cybercrime Threatens National Security in India

Date: September 27, 2007 Source: merinews.com By: Fahim Ahmedi

India is now taking steps to fight against the cyber crime, Indian police are now being trained on how the Internet, e-mail, and other computer-based tools can be used by criminals to illegally obtain information stored in databases

Cyber Crime On A Roll In India

Posted by Rushabh Chokshi on November 2nd, 2007 It is The New Age in Cyber Crime, according to latest news cyber criminals are now targeting Enterprises and Consumers based in Tier III cities

Cybercrime: A threat to national security Date: September 17, 2007 Source: merinews.com By: Fahim Ahmedi The ever increasing cyber crime is taking the world by storm. Technology is a boon but it also has dangerous implications if left undetected. Cyberspace is one such area that needs to pull all security strings together before things go out of hand.

News/Media Perspective of Cyber Crime in the India

Ankit Fadia, a 21-year-old computer whizkid and author of ’The Unofficial Guide to Ethical Hacking’ said “I could hack a state-owned bank’s website or a government communications website which shows the vulnerability, thousands of Indian websites are being hacked each day”.

News/Media Perspective of Cyber Crime in the India

Cyber crime in India on the decline: Report Posted online: Monday, January 07, 2008 at 12:00:00 Updated: Monday, January 07, 2008 at 10:37:53

New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the “new age” crime have declined with the most noticeable difference seen in Gujarat. However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in Gujarat. A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually decreased. “This is only a statistics based on the number of cases registered,” he added.

darkREADING Annual CIS Study: Cost of Cybercrime Is Skyrocketing Average annual loss per company has more than doubled since last year, according to bellwether study September 11, 2007 | 5:55 PM By Tim Wilson Site Editor, Dark Reading

Net Neutrality vs. Censorship Clean the Pipes

The Threats are Real Global Activity Maps

Source: Arbor Networks 2008

Internet Service Providers Security Concerns

Top Concern

Source: Arbor Networks 2007

The Botnet Problem Starts with Compromised PCs ƒ 150 of 600 million online PCs worldwide are bot infected (Source: BBC 2007 interview with Vint Cerf)

ƒ 52,771 new infected PCs daily (Source: Symantec 2007)

ƒ Rapid growth in tools used by Cyber Criminals ƒ Victims often do not know that they have been compromised! ƒ Easy to use tools with varying levels of anonymity offered to cyber criminals

The most common infection methods detected by S21sec include browser exploits (65%), e-mail attachments (13%), operating system exploits (11%), downloaded Internet files (9%) and other methods (2%), as illustrated in the figure below.

Infection Methods Downloaded Files 9%

Other 2%

OS Exploits 11% Email Attachments 13%

Browser Exploits 65%

Source: S21sec

The Botnet Problem Starts with Compromised PCs ƒ 150 of 600 million online PCs worldwide are bot infected (Source: BBC 2007 interview with Vint Cerf)

ƒ 52,771 new infected PCs daily (Source: Symantec 2007)

Malcode Additions 2007 Spyware

308

Rootkit

1,138

Keylogger

1,463

Other

ƒ Rapid growth in available tools used by Cyber Criminals! ƒ Victims often do not know that they have been compromised! ƒ Easy to use tools with varying levels of anonymity offered to cyber criminals!

14,907

Password Stealer

22,982

Dialer

23,449

Backdoor

25,997

Downloader

41,389

Virus

48,889 55,873

Adware Worm

64,173

Trojan

109,246 0

20,000

40,000

60,000

80,000

100,000

120,000

Source: IBM ISS x-Force Trend Report 2007

The Botnet Problem – Devastating Impact to Businesses Common Exploits from Botnets ƒ Identity Theft ƒ Credit card /Email fraud ƒ Theft/Fraud in online banking and auctions ƒ Theft storage and distribution of login ID/Password, financial data, etc…

ƒ DDoS (Distributed Denial of Service) ƒ 50% of Botnets used for DDoS attacks (Source: S21 sec) ƒ Each bot generates 40kbps ƒ Small botnets command up to 10,000 bots ƒ Large botnets command up to 1 million bots ƒ 20+ Gbps DDoS attacks witnessed in 2007 (Source: Arbor Networks Inc. 2007)

ƒ Spam ƒ Each spam bot can send 3 spam emails per second (259,000/day) ƒ 94% of all emails is Spam (Google/Postini 2006)

There are Solutions in Sight Solutions ƒ Preventing PC compromise

ƒ Vulnerability assessment, penetration testing, anti-virus, etc…

Commentary ƒ Identity vulnerabilities and enforce a priority based patch management approach to secure PCs from known exploits.

Securing against Botnet attacks ƒ Employ a Defense in Depth Strategy when Securing your Enterprise!

ƒ Layer your defenses against network security threats to minimize the impact!

ƒ Preventing Identity Theft

ƒ Content filtering services, antivirus, intrusion detection and prevention systems

ƒ Combat a variety of Phishing, Pharming, malware and web/email fraud activities that can result in identity theft

ƒ Preventing DDoS

ƒ Cloud based and or CPE based anti-DDoS services. ƒ Cloud is recommended.

ƒ Stopping in the cloud within the provider’s network reduces the chance of a last mile bottleneck, which completes the attacker’s work

ƒ Preventing Spam

ƒ Cloud-based and or CPE based anti-spam solution

ƒ Stopping in the cloud through a proxybased service saves unnecessary bandwidth exhaustion and saves costs

Tata Communications Has Taken a Stance Against Cyber Crime!

What are Your Next Actions to Securing your Enterprise from Cyber Crime? Assess your Current state to define your Next steps ƒ Take a custom self-assessment to determine your next steps ƒ Web-based module www.tatacommunications.com/security/assessment

Combat Cyber Crime!

Thank You

www.tatacommunications.com

Managed Services Portfolio

Managed Security Services

Related Documents

Cyber Crime In India
December 2019 26
Cyber Crime
June 2020 22
Cyber Crime
May 2020 24
Cyber Crime
December 2019 33
Cyber Crime
July 2020 25