Cyber Crime & Network Security in India
CIO Focus Security 2008 Presentation by Adam Rice & AJ Vijayakumar
©2008 Tata Communications, Ltd. All Rights Reserved
Explosive Internet Growth and Impacts to Businesses India Internet Usage Stats and Telecommunications Market Report
Internet Usage and Population Statistics:
ITU
1999
2,800,000
1,094,870,677
0.3%
ITU
% 12
2000
5,500,000
1,094,870,677
0.5%
ITU
8
2001
7,000,000
1,094,870,677
0.7%
ITU
Real GDP Growth Rate 10.5 8.3
16,500,000
1,094,870,677
1.6%
ITU
2003
22,500,000
1,094,870,677
2.1%
ITU
0
2004
25,000,000
1,094,870,677
2.28%
IAMAI
2005
38,500,000
1,112,225,812
3.46%
IAMAI
2006
50,600,000
1,112,225,812
4.55%
CIA
2007
60,000,000
1,129,667,528
5.31%
ITU
5.6
C
hi na
2002
4
7.5 5.5
5.3
5.1
4.5
4.0
an
0.1%
Ta iw
1,094,870,677
nd
Usage Source
Th ai la
1,400,000
% Pen.
or ea
1998
Population
K
Users
In di a Si ng ap or e H on g K on g M al ay si a In do ne si a
Year
Internet use has been a key driver to enhance both Domestic & Global Trade in India
Source: Morgan Stanley Research
E-Commerce
Media & Entertainment
Government
Business Process Outsourcing
Education
Online Banking
Defining “Cyber Crime” Webster's New Millennium™ Dictionary of English Entry: Part of Speech: Definition: Example:
Cyber Crime noun A crime committed on a computer network, esp. the Internet Identity theft is a Cyber Crime.
Spamming DDoS Unauthorized access Social Engineering Hacking Phishing Identity Theft Cyber-stalking Information warfare
Espionage Internet Harassment Malware
Virus Worm Trojan Bot Rootkit Spyware Backdoor
Malware (cont.) Downloader Adware Ransomeware
Child Pornography Telecom Fraud Financial Fraud Computer Fraud
News/Media Perspective of Cyber Crime in the India Cybercrime Threatens National Security in India
Date: September 27, 2007 Source: merinews.com By: Fahim Ahmedi
India is now taking steps to fight against the cyber crime, Indian police are now being trained on how the Internet, e-mail, and other computer-based tools can be used by criminals to illegally obtain information stored in databases
Cyber Crime On A Roll In India
Posted by Rushabh Chokshi on November 2nd, 2007 It is The New Age in Cyber Crime, according to latest news cyber criminals are now targeting Enterprises and Consumers based in Tier III cities
Cybercrime: A threat to national security Date: September 17, 2007 Source: merinews.com By: Fahim Ahmedi The ever increasing cyber crime is taking the world by storm. Technology is a boon but it also has dangerous implications if left undetected. Cyberspace is one such area that needs to pull all security strings together before things go out of hand.
News/Media Perspective of Cyber Crime in the India
Ankit Fadia, a 21-year-old computer whizkid and author of ’The Unofficial Guide to Ethical Hacking’ said “I could hack a state-owned bank’s website or a government communications website which shows the vulnerability, thousands of Indian websites are being hacked each day”.
News/Media Perspective of Cyber Crime in the India
Cyber crime in India on the decline: Report Posted online: Monday, January 07, 2008 at 12:00:00 Updated: Monday, January 07, 2008 at 10:37:53
New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the “new age” crime have declined with the most noticeable difference seen in Gujarat. However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in Gujarat. A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually decreased. “This is only a statistics based on the number of cases registered,” he added.
darkREADING Annual CIS Study: Cost of Cybercrime Is Skyrocketing Average annual loss per company has more than doubled since last year, according to bellwether study September 11, 2007 | 5:55 PM By Tim Wilson Site Editor, Dark Reading
Net Neutrality vs. Censorship Clean the Pipes
The Threats are Real Global Activity Maps
Source: Arbor Networks 2008
Internet Service Providers Security Concerns
Top Concern
Source: Arbor Networks 2007
The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs worldwide are bot infected (Source: BBC 2007 interview with Vint Cerf)
52,771 new infected PCs daily (Source: Symantec 2007)
Rapid growth in tools used by Cyber Criminals Victims often do not know that they have been compromised! Easy to use tools with varying levels of anonymity offered to cyber criminals
The most common infection methods detected by S21sec include browser exploits (65%), e-mail attachments (13%), operating system exploits (11%), downloaded Internet files (9%) and other methods (2%), as illustrated in the figure below.
Infection Methods Downloaded Files 9%
Other 2%
OS Exploits 11% Email Attachments 13%
Browser Exploits 65%
Source: S21sec
The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs worldwide are bot infected (Source: BBC 2007 interview with Vint Cerf)
52,771 new infected PCs daily (Source: Symantec 2007)
Malcode Additions 2007 Spyware
308
Rootkit
1,138
Keylogger
1,463
Other
Rapid growth in available tools used by Cyber Criminals! Victims often do not know that they have been compromised! Easy to use tools with varying levels of anonymity offered to cyber criminals!
14,907
Password Stealer
22,982
Dialer
23,449
Backdoor
25,997
Downloader
41,389
Virus
48,889 55,873
Adware Worm
64,173
Trojan
109,246 0
20,000
40,000
60,000
80,000
100,000
120,000
Source: IBM ISS x-Force Trend Report 2007
The Botnet Problem – Devastating Impact to Businesses Common Exploits from Botnets Identity Theft Credit card /Email fraud Theft/Fraud in online banking and auctions Theft storage and distribution of login ID/Password, financial data, etc…
DDoS (Distributed Denial of Service) 50% of Botnets used for DDoS attacks (Source: S21 sec) Each bot generates 40kbps Small botnets command up to 10,000 bots Large botnets command up to 1 million bots 20+ Gbps DDoS attacks witnessed in 2007 (Source: Arbor Networks Inc. 2007)
Spam Each spam bot can send 3 spam emails per second (259,000/day) 94% of all emails is Spam (Google/Postini 2006)
There are Solutions in Sight Solutions Preventing PC compromise
Vulnerability assessment, penetration testing, anti-virus, etc…
Commentary Identity vulnerabilities and enforce a priority based patch management approach to secure PCs from known exploits.
Securing against Botnet attacks Employ a Defense in Depth Strategy when Securing your Enterprise!
Layer your defenses against network security threats to minimize the impact!
Preventing Identity Theft
Content filtering services, antivirus, intrusion detection and prevention systems
Combat a variety of Phishing, Pharming, malware and web/email fraud activities that can result in identity theft
Preventing DDoS
Cloud based and or CPE based anti-DDoS services. Cloud is recommended.
Stopping in the cloud within the provider’s network reduces the chance of a last mile bottleneck, which completes the attacker’s work
Preventing Spam
Cloud-based and or CPE based anti-spam solution
Stopping in the cloud through a proxybased service saves unnecessary bandwidth exhaustion and saves costs
Tata Communications Has Taken a Stance Against Cyber Crime!
What are Your Next Actions to Securing your Enterprise from Cyber Crime? Assess your Current state to define your Next steps Take a custom self-assessment to determine your next steps Web-based module www.tatacommunications.com/security/assessment
Combat Cyber Crime!
Thank You
www.tatacommunications.com
Managed Services Portfolio
Managed Security Services