SlideShare une entreprise Scribd logo
1  sur  18
Cyber Crime & Network
                                                            Security in India




                                                                   CIO Focus Security 2008
                                                        Presentation by Adam Rice & AJ Vijayakumar




©2008 Tata Communications, Ltd. All Rights Reserved
Explosive Internet Growth and Impacts to Businesses

            India
            Internet Usage Stats and Telecommunications Market Report


  Internet Usage and Population Statistics:                    Internet use has been a key driver to enhance
                                                               both Domestic & Global Trade in India
  Year    Users       Population      % Pen.   Usage Source
  1998    1,400,000   1,094,870,677    0.1%        ITU        %                   Real GDP Growth Rate
  1999    2,800,000   1,094,870,677    0.3%        ITU        12     10.5
                                                                            8.3   7.5
  2000    5,500,000   1,094,870,677    0.5%        ITU         8                        5.6     5.5    5.3       5.1
  2001    7,000,000   1,094,870,677    0.7%        ITU                                                                      4.5      4.0
  2002   16,500,000   1,094,870,677    1.6%        ITU         4
  2003   22,500,000   1,094,870,677    2.1%        ITU         0
  2004   25,000,000   1,094,870,677   2.28%       IAMAI




                                                                                       g




                                                                                                                       nd
                                                                     na


                                                                                      a


                                                                                      e




                                                                                      a

                                                                                                                ea




                                                                                                                                  an
                                                                                     a
                                                                                   on
                                                                                    di




                                                                                    si
                                                                                   or




                                                                                   si
  2005   38,500,000   1,112,225,812   3.46%       IAMAI




                                                                   hi




                                                                                                             or


                                                                                                                       la


                                                                                                                                iw
                                                                                 ne
                                                                                 In




                                                                                ay
                                                                                ap


                                                                                 K




                                                                                                                    ai
                                                               C




                                                                                                         K




                                                                                                                             Ta
                                                                              do
                                                                               g


                                                                              al
                                                                             ng




                                                                                                                 Th
  2006   50,600,000   1,112,225,812   4.55%        CIA




                                                                            on


                                                                            M


                                                                           In
                                                                          Si


                                                                          H
  2007   60,000,000   1,129,667,528   5.31%        ITU
                                                                                              Source: Morgan Stanley Research

     E-Commerce        Media & Entertainment          Government          Education       Online Banking
                              Business Process Outsourcing
Defining “Cyber Crime”

 Webster's New Millennium™ Dictionary of English
 Entry:              Cyber Crime
 Part of Speech:     noun
 Definition:         A crime committed on a computer network, esp. the Internet
 Example:            Identity theft is a Cyber Crime.

    Spamming                      Espionage                    Malware (cont.)
    DDoS                          Internet Harassment             Downloader
    Unauthorized access           Malware                         Adware
                                     Virus                        Ransomeware
    Social Engineering
                                     Worm                      Child Pornography
    Hacking
                                     Trojan                    Telecom Fraud
    Phishing
                                     Bot                       Financial Fraud
    Identity Theft                   Rootkit                   Computer Fraud
    Cyber-stalking                   Spyware
    Information warfare              Backdoor
News/Media Perspective of Cyber Crime in the India
      Cybercrime Threatens National Security in              Cyber Crime On A Roll In India
      India

                                                             Posted by Rushabh Chokshi on
      Date: September 27, 2007                               November 2nd, 2007
      Source: merinews.com
                                                             It is The New Age in Cyber Crime, according
      By: Fahim Ahmedi
                                                             to latest news cyber criminals are now
                                                             targeting Enterprises and Consumers based in
                                                             Tier III cities


         India is now taking steps to fight against the     Cybercrime: A threat to national security
         cyber crime, Indian police are now being
                                                            Date: September 17, 2007
         trained on how the Internet, e-mail, and other
                                                            Source: merinews.com
         computer-based tools can be used by
                                                            By: Fahim Ahmedi
         criminals to illegally obtain information stored
         in databases                                       The ever increasing cyber crime is taking the
                                                            world by storm. Technology is a boon but it also
                                                            has dangerous implications if left undetected.
                                                            Cyberspace is one such area that needs to pull
                                                            all security strings together before things go out
                                                            of hand.
News/Media Perspective of Cyber Crime in the India




                         Ankit Fadia, a 21-year-old computer whizkid
                         and author of ’The Unofficial Guide to Ethical
                         Hacking’ said “I could hack a state-owned
                         bank’s website or a government
                         communications website which shows the
                         vulnerability, thousands of Indian websites
                         are being hacked each day”.
News/Media Perspective of Cyber Crime in the India



 Cyber crime in India on the decline: Report
 Posted online: Monday, January 07, 2008 at 12:00:00
 Updated: Monday, January 07, 2008 at 10:37:53



 New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the
 “new age” crime have declined with the most noticeable difference seen in Gujarat.
 However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in
 Gujarat.
 A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually
 decreased. “This is only a statistics based on the number of cases registered,” he added.


                                     darkREADING
                                     Annual CIS Study: Cost of Cybercrime Is Skyrocketing
                                     Average annual loss per company has more than doubled since last year, according
                                     to bellwether study
                                     September 11, 2007 | 5:55 PM
                                     By Tim Wilson
                                     Site Editor, Dark Reading
Net Neutrality vs. Censorship


           Clean the Pipes
The Threats are Real
Global Activity Maps




                       Source: Arbor Networks 2008
Internet Service Providers Security Concerns




                                                            Top
                                                            Concern




                                               Source: Arbor Networks 2007
The Botnet Problem Starts with Compromised PCs
 150 of 600 million online PCs worldwide are   The most common infection methods detected by
 bot infected                                  S21sec include browser exploits (65%), e-mail
 (Source: BBC 2007 interview with Vint Cerf)   attachments (13%), operating system exploits
                                               (11%), downloaded Internet files (9%) and other
 52,771 new infected PCs daily                 methods (2%), as illustrated in the figure below.
 (Source: Symantec 2007)
                                               Infection Methods
                                                          Downloaded     Other
 Rapid growth in tools used by Cyber                         Files        2%
 Criminals                                                    9%
 Victims often do not know that they have          OS Exploits
 been compromised!                                    11%

 Easy to use tools with varying levels of
                                                    Email                     Browser
 anonymity offered to cyber criminals
                                                Attachments                   Exploits
                                                    13%                         65%


                                                                                   Source: S21sec
The Botnet Problem Starts with Compromised PCs
 150 of 600 million online PCs                 Malcode Additions 2007
 worldwide are bot infected
                                                       Spyware    308
 (Source: BBC 2007 interview with Vint Cerf)
                                                        Rootkit       1,138
 52,771 new infected PCs daily
                                                     Keylogger        1,463
 (Source: Symantec 2007)
                                                         Other                 14,907

                                               Password Stealer                   22,982
 Rapid growth in available tools used
 by Cyber Criminals!                                     Dialer                    23,449

                                                      Backdoor                         25,997
 Victims often do not know that they
 have been compromised!                             Downloader                                  41,389

                                                          Virus                                    48,889
  Easy to use tools with varying levels
 of anonymity offered to cyber                          Adware                                           55,873

 criminals!                                              Worm                                               64,173

                                                         Trojan                                                                      109,246

                                                                  0           20,000     40,000      60,000       80,000   100,000   120,000

                                                                                                    Source: IBM ISS x-Force Trend Report 2007
The Botnet Problem – Devastating Impact to Businesses
Common Exploits from Botnets
   Identity Theft
      Credit card /Email fraud
      Theft/Fraud in online banking and auctions
      Theft storage and distribution of login ID/Password, financial
      data, etc…
   DDoS (Distributed Denial of Service)
      50% of Botnets used for DDoS attacks
      (Source: S21 sec)
      Each bot generates 40kbps
      Small botnets command up to 10,000 bots
      Large botnets command up to 1 million bots
      20+ Gbps DDoS attacks witnessed in 2007
      (Source: Arbor Networks Inc. 2007)
   Spam
      Each spam bot can send 3 spam emails per second
      (259,000/day)
      94% of all emails is Spam (Google/Postini 2006)
There are Solutions in Sight
                                                    Solutions                           Commentary
  Preventing PC compromise               Vulnerability assessment,           Identity vulnerabilities and enforce a
                                         penetration testing, anti-virus,    priority based patch management
                                         etc…                                approach to secure PCs from known
                                                                             exploits.
Securing against Botnet attacks

  Employ a Defense in Depth Strategy when Securing your Enterprise!          Layer your defenses against network
                                                                             security threats to minimize the
                                                                             impact!
  Preventing Identity Theft              Content filtering services, anti-   Combat a variety of Phishing,
                                         virus, intrusion detection and      Pharming, malware and web/email
                                         prevention systems                  fraud activities that can result in
                                                                             identity theft
  Preventing DDoS                        Cloud based and or CPE based        Stopping in the cloud within the
                                         anti-DDoS services.                 provider’s network reduces the chance
                                         Cloud is recommended.               of a last mile bottleneck, which
                                                                             completes the attacker’s work
  Preventing Spam                        Cloud-based and or CPE based        Stopping in the cloud through a proxy-
                                         anti-spam solution                  based service saves unnecessary
                                                                             bandwidth exhaustion and saves costs
Tata Communications Has Taken a Stance Against Cyber Crime!
What are Your Next Actions to Securing your Enterprise from Cyber
Crime?
Assess your Current state to define your Next steps
    Take a custom self-assessment to determine your next steps
    Web-based module www.tatacommunications.com/security/assessment




                                                                      Combat
                                                                       Cyber
                                                                       Crime!
Thank You



      www.tatacommunications.com
Managed Services Portfolio
Managed Security Services

Contenu connexe

En vedette

Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
A Call to Action on Violence Against Women
A Call to Action on Violence Against WomenA Call to Action on Violence Against Women
A Call to Action on Violence Against WomenTheLancetWeb
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 
Science Quiz Malayalam
Science Quiz MalayalamScience Quiz Malayalam
Science Quiz MalayalamSajithkumarvk
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Domestic Violence Against Women And Girls In Powerpoint (Created By Mann Bdr...
Domestic Violence  Against Women And Girls In Powerpoint (Created By Mann Bdr...Domestic Violence  Against Women And Girls In Powerpoint (Created By Mann Bdr...
Domestic Violence Against Women And Girls In Powerpoint (Created By Mann Bdr...Mann Pariyar
 
Domestic Violence Against Women [1].Ppt Dyuti.
Domestic Violence Against Women [1].Ppt Dyuti.Domestic Violence Against Women [1].Ppt Dyuti.
Domestic Violence Against Women [1].Ppt Dyuti.DYUTI
 
Keralaprashnothareeyam (Kerala Quiz)
Keralaprashnothareeyam (Kerala Quiz)Keralaprashnothareeyam (Kerala Quiz)
Keralaprashnothareeyam (Kerala Quiz)Sreejesh P S
 
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)Sreejesh P S
 
Ethical and safety recommendations for research on domestic
Ethical and safety recommendations for research on domesticEthical and safety recommendations for research on domestic
Ethical and safety recommendations for research on domesticDr. Jitendra Chavan
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

En vedette (20)

Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
KERALA QUIZ
KERALA QUIZKERALA QUIZ
KERALA QUIZ
 
GENERAL QUIZ ...IDENTIFY THE PERSONALITY
GENERAL QUIZ ...IDENTIFY THE PERSONALITYGENERAL QUIZ ...IDENTIFY THE PERSONALITY
GENERAL QUIZ ...IDENTIFY THE PERSONALITY
 
My Quiz in Kerala
My Quiz in KeralaMy Quiz in Kerala
My Quiz in Kerala
 
A Call to Action on Violence Against Women
A Call to Action on Violence Against WomenA Call to Action on Violence Against Women
A Call to Action on Violence Against Women
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Science Quiz Malayalam
Science Quiz MalayalamScience Quiz Malayalam
Science Quiz Malayalam
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Domestic Violence Against Women And Girls In Powerpoint (Created By Mann Bdr...
Domestic Violence  Against Women And Girls In Powerpoint (Created By Mann Bdr...Domestic Violence  Against Women And Girls In Powerpoint (Created By Mann Bdr...
Domestic Violence Against Women And Girls In Powerpoint (Created By Mann Bdr...
 
Domestic Violence Against Women [1].Ppt Dyuti.
Domestic Violence Against Women [1].Ppt Dyuti.Domestic Violence Against Women [1].Ppt Dyuti.
Domestic Violence Against Women [1].Ppt Dyuti.
 
Keralaprashnothareeyam (Kerala Quiz)
Keralaprashnothareeyam (Kerala Quiz)Keralaprashnothareeyam (Kerala Quiz)
Keralaprashnothareeyam (Kerala Quiz)
 
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)
 
India quiz Prelims
India quiz PrelimsIndia quiz Prelims
India quiz Prelims
 
Ethical and safety recommendations for research on domestic
Ethical and safety recommendations for research on domesticEthical and safety recommendations for research on domestic
Ethical and safety recommendations for research on domestic
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similaire à Cyber Crime and Network Security in India

Infosec Workforce Development Framework For Thailand
Infosec Workforce Development Framework For ThailandInfosec Workforce Development Framework For Thailand
Infosec Workforce Development Framework For ThailandNarinrit Prem-apiwathanokul
 
U.S. Renewable Energy Market And Growth
U.S. Renewable Energy Market And GrowthU.S. Renewable Energy Market And Growth
U.S. Renewable Energy Market And GrowthBrookeHeaton
 
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...Alex J Mitchell
 
ncr annual reports 2002
ncr annual reports 2002ncr annual reports 2002
ncr annual reports 2002finance46
 
Economics of Green Growth & National Innovation Strategies
Economics of Green Growth & National Innovation StrategiesEconomics of Green Growth & National Innovation Strategies
Economics of Green Growth & National Innovation StrategiesCambridgeIP Ltd
 
SIAT Space
SIAT SpaceSIAT Space
SIAT SpaceNate1066
 
IAPT10 - Detecting depression - an update (June10)
IAPT10 - Detecting depression - an update (June10)IAPT10 - Detecting depression - an update (June10)
IAPT10 - Detecting depression - an update (June10)Alex J Mitchell
 
Valuation of Enterprise Social Media
Valuation of Enterprise Social MediaValuation of Enterprise Social Media
Valuation of Enterprise Social MediaAimee Jacobs
 
Bureau Veritas O&G Services 2011
Bureau Veritas O&G Services 2011Bureau Veritas O&G Services 2011
Bureau Veritas O&G Services 2011horenhop
 
Issues for metabolomics and
Issues for metabolomics and Issues for metabolomics and
Issues for metabolomics and Duncan Hull
 
419 ltw 142
419 ltw 142419 ltw 142
419 ltw 142mkhechen
 
Design4 services HCDI Seminar Sangiorgi
Design4 services HCDI Seminar SangiorgiDesign4 services HCDI Seminar Sangiorgi
Design4 services HCDI Seminar SangiorgiMarco Ajovalasit
 
Using Clickers For Instant Feedback Robin Brekke
Using Clickers For Instant Feedback Robin BrekkeUsing Clickers For Instant Feedback Robin Brekke
Using Clickers For Instant Feedback Robin BrekkeJohn Dorner
 
Social Media Strategies For Business
Social Media Strategies For BusinessSocial Media Strategies For Business
Social Media Strategies For BusinessTWO Social
 
Investhk presentation-100712092329-phpapp01
Investhk presentation-100712092329-phpapp01Investhk presentation-100712092329-phpapp01
Investhk presentation-100712092329-phpapp01AP DealFlow
 
Media in the MENA - Matteo Minchio
Media in the MENA - Matteo MinchioMedia in the MENA - Matteo Minchio
Media in the MENA - Matteo MinchioSocieting
 
5 Ways To Build Asset Centric Applications
5 Ways To Build Asset Centric Applications5 Ways To Build Asset Centric Applications
5 Ways To Build Asset Centric ApplicationsLars Trieloff
 
Ifhp price report2010_comparativepricereport29112010
Ifhp price report2010_comparativepricereport29112010Ifhp price report2010_comparativepricereport29112010
Ifhp price report2010_comparativepricereport29112010Óscar Miranda
 

Similaire à Cyber Crime and Network Security in India (20)

Infosec Workforce Development Framework For Thailand
Infosec Workforce Development Framework For ThailandInfosec Workforce Development Framework For Thailand
Infosec Workforce Development Framework For Thailand
 
U.S. Renewable Energy Market And Growth
U.S. Renewable Energy Market And GrowthU.S. Renewable Energy Market And Growth
U.S. Renewable Energy Market And Growth
 
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...
IPOS10 -t125 - Identification of Patient Reported Distress by Clinical Nurse ...
 
ncr annual reports 2002
ncr annual reports 2002ncr annual reports 2002
ncr annual reports 2002
 
Economics of Green Growth & National Innovation Strategies
Economics of Green Growth & National Innovation StrategiesEconomics of Green Growth & National Innovation Strategies
Economics of Green Growth & National Innovation Strategies
 
SIAT Space
SIAT SpaceSIAT Space
SIAT Space
 
IAPT10 - Detecting depression - an update (June10)
IAPT10 - Detecting depression - an update (June10)IAPT10 - Detecting depression - an update (June10)
IAPT10 - Detecting depression - an update (June10)
 
Valuation of Enterprise Social Media
Valuation of Enterprise Social MediaValuation of Enterprise Social Media
Valuation of Enterprise Social Media
 
Scan0002
Scan0002Scan0002
Scan0002
 
Bureau Veritas O&G Services 2011
Bureau Veritas O&G Services 2011Bureau Veritas O&G Services 2011
Bureau Veritas O&G Services 2011
 
Issues for metabolomics and
Issues for metabolomics and Issues for metabolomics and
Issues for metabolomics and
 
419 ltw 142
419 ltw 142419 ltw 142
419 ltw 142
 
Design4 services HCDI Seminar Sangiorgi
Design4 services HCDI Seminar SangiorgiDesign4 services HCDI Seminar Sangiorgi
Design4 services HCDI Seminar Sangiorgi
 
Kiss the BRD Good-Bye
Kiss the BRD Good-ByeKiss the BRD Good-Bye
Kiss the BRD Good-Bye
 
Using Clickers For Instant Feedback Robin Brekke
Using Clickers For Instant Feedback Robin BrekkeUsing Clickers For Instant Feedback Robin Brekke
Using Clickers For Instant Feedback Robin Brekke
 
Social Media Strategies For Business
Social Media Strategies For BusinessSocial Media Strategies For Business
Social Media Strategies For Business
 
Investhk presentation-100712092329-phpapp01
Investhk presentation-100712092329-phpapp01Investhk presentation-100712092329-phpapp01
Investhk presentation-100712092329-phpapp01
 
Media in the MENA - Matteo Minchio
Media in the MENA - Matteo MinchioMedia in the MENA - Matteo Minchio
Media in the MENA - Matteo Minchio
 
5 Ways To Build Asset Centric Applications
5 Ways To Build Asset Centric Applications5 Ways To Build Asset Centric Applications
5 Ways To Build Asset Centric Applications
 
Ifhp price report2010_comparativepricereport29112010
Ifhp price report2010_comparativepricereport29112010Ifhp price report2010_comparativepricereport29112010
Ifhp price report2010_comparativepricereport29112010
 

Plus de Tata Communications

Tata Unified Communications Services
Tata Unified Communications ServicesTata Unified Communications Services
Tata Unified Communications ServicesTata Communications
 
Connecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian ExperienceConnecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian ExperienceTata Communications
 
Wireless Infrastructure in India
Wireless Infrastructure in IndiaWireless Infrastructure in India
Wireless Infrastructure in IndiaTata Communications
 
Business Transformation and Innovative Business Models
Business Transformation and Innovative Business ModelsBusiness Transformation and Innovative Business Models
Business Transformation and Innovative Business ModelsTata Communications
 
Broadband on WiMAX: Technology Delivery vs. Market Needs
Broadband on WiMAX: Technology Delivery vs. Market NeedsBroadband on WiMAX: Technology Delivery vs. Market Needs
Broadband on WiMAX: Technology Delivery vs. Market NeedsTata Communications
 

Plus de Tata Communications (9)

Tata Unified Communications Services
Tata Unified Communications ServicesTata Unified Communications Services
Tata Unified Communications Services
 
Total Network Solutions
Total Network SolutionsTotal Network Solutions
Total Network Solutions
 
Consider Outsourcing
Consider OutsourcingConsider Outsourcing
Consider Outsourcing
 
Connecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian ExperienceConnecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian Experience
 
Wireless Infrastructure in India
Wireless Infrastructure in IndiaWireless Infrastructure in India
Wireless Infrastructure in India
 
IPv6: Early Mover Advantage?
IPv6: Early Mover Advantage?IPv6: Early Mover Advantage?
IPv6: Early Mover Advantage?
 
IPv6: Forecasts and Trends
IPv6: Forecasts and TrendsIPv6: Forecasts and Trends
IPv6: Forecasts and Trends
 
Business Transformation and Innovative Business Models
Business Transformation and Innovative Business ModelsBusiness Transformation and Innovative Business Models
Business Transformation and Innovative Business Models
 
Broadband on WiMAX: Technology Delivery vs. Market Needs
Broadband on WiMAX: Technology Delivery vs. Market NeedsBroadband on WiMAX: Technology Delivery vs. Market Needs
Broadband on WiMAX: Technology Delivery vs. Market Needs
 

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Cyber Crime and Network Security in India

  • 1. Cyber Crime & Network Security in India CIO Focus Security 2008 Presentation by Adam Rice & AJ Vijayakumar ©2008 Tata Communications, Ltd. All Rights Reserved
  • 2. Explosive Internet Growth and Impacts to Businesses India Internet Usage Stats and Telecommunications Market Report Internet Usage and Population Statistics: Internet use has been a key driver to enhance both Domestic & Global Trade in India Year Users Population % Pen. Usage Source 1998 1,400,000 1,094,870,677 0.1% ITU % Real GDP Growth Rate 1999 2,800,000 1,094,870,677 0.3% ITU 12 10.5 8.3 7.5 2000 5,500,000 1,094,870,677 0.5% ITU 8 5.6 5.5 5.3 5.1 2001 7,000,000 1,094,870,677 0.7% ITU 4.5 4.0 2002 16,500,000 1,094,870,677 1.6% ITU 4 2003 22,500,000 1,094,870,677 2.1% ITU 0 2004 25,000,000 1,094,870,677 2.28% IAMAI g nd na a e a ea an a on di si or si 2005 38,500,000 1,112,225,812 3.46% IAMAI hi or la iw ne In ay ap K ai C K Ta do g al ng Th 2006 50,600,000 1,112,225,812 4.55% CIA on M In Si H 2007 60,000,000 1,129,667,528 5.31% ITU Source: Morgan Stanley Research E-Commerce Media & Entertainment Government Education Online Banking Business Process Outsourcing
  • 3. Defining “Cyber Crime” Webster's New Millennium™ Dictionary of English Entry: Cyber Crime Part of Speech: noun Definition: A crime committed on a computer network, esp. the Internet Example: Identity theft is a Cyber Crime. Spamming Espionage Malware (cont.) DDoS Internet Harassment Downloader Unauthorized access Malware Adware Virus Ransomeware Social Engineering Worm Child Pornography Hacking Trojan Telecom Fraud Phishing Bot Financial Fraud Identity Theft Rootkit Computer Fraud Cyber-stalking Spyware Information warfare Backdoor
  • 4. News/Media Perspective of Cyber Crime in the India Cybercrime Threatens National Security in Cyber Crime On A Roll In India India Posted by Rushabh Chokshi on Date: September 27, 2007 November 2nd, 2007 Source: merinews.com It is The New Age in Cyber Crime, according By: Fahim Ahmedi to latest news cyber criminals are now targeting Enterprises and Consumers based in Tier III cities India is now taking steps to fight against the Cybercrime: A threat to national security cyber crime, Indian police are now being Date: September 17, 2007 trained on how the Internet, e-mail, and other Source: merinews.com computer-based tools can be used by By: Fahim Ahmedi criminals to illegally obtain information stored in databases The ever increasing cyber crime is taking the world by storm. Technology is a boon but it also has dangerous implications if left undetected. Cyberspace is one such area that needs to pull all security strings together before things go out of hand.
  • 5. News/Media Perspective of Cyber Crime in the India Ankit Fadia, a 21-year-old computer whizkid and author of ’The Unofficial Guide to Ethical Hacking’ said “I could hack a state-owned bank’s website or a government communications website which shows the vulnerability, thousands of Indian websites are being hacked each day”.
  • 6. News/Media Perspective of Cyber Crime in the India Cyber crime in India on the decline: Report Posted online: Monday, January 07, 2008 at 12:00:00 Updated: Monday, January 07, 2008 at 10:37:53 New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the “new age” crime have declined with the most noticeable difference seen in Gujarat. However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in Gujarat. A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually decreased. “This is only a statistics based on the number of cases registered,” he added. darkREADING Annual CIS Study: Cost of Cybercrime Is Skyrocketing Average annual loss per company has more than doubled since last year, according to bellwether study September 11, 2007 | 5:55 PM By Tim Wilson Site Editor, Dark Reading
  • 7. Net Neutrality vs. Censorship Clean the Pipes
  • 8. The Threats are Real Global Activity Maps Source: Arbor Networks 2008
  • 9. Internet Service Providers Security Concerns Top Concern Source: Arbor Networks 2007
  • 10. The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs worldwide are The most common infection methods detected by bot infected S21sec include browser exploits (65%), e-mail (Source: BBC 2007 interview with Vint Cerf) attachments (13%), operating system exploits (11%), downloaded Internet files (9%) and other 52,771 new infected PCs daily methods (2%), as illustrated in the figure below. (Source: Symantec 2007) Infection Methods Downloaded Other Rapid growth in tools used by Cyber Files 2% Criminals 9% Victims often do not know that they have OS Exploits been compromised! 11% Easy to use tools with varying levels of Email Browser anonymity offered to cyber criminals Attachments Exploits 13% 65% Source: S21sec
  • 11. The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs Malcode Additions 2007 worldwide are bot infected Spyware 308 (Source: BBC 2007 interview with Vint Cerf) Rootkit 1,138 52,771 new infected PCs daily Keylogger 1,463 (Source: Symantec 2007) Other 14,907 Password Stealer 22,982 Rapid growth in available tools used by Cyber Criminals! Dialer 23,449 Backdoor 25,997 Victims often do not know that they have been compromised! Downloader 41,389 Virus 48,889 Easy to use tools with varying levels of anonymity offered to cyber Adware 55,873 criminals! Worm 64,173 Trojan 109,246 0 20,000 40,000 60,000 80,000 100,000 120,000 Source: IBM ISS x-Force Trend Report 2007
  • 12. The Botnet Problem – Devastating Impact to Businesses Common Exploits from Botnets Identity Theft Credit card /Email fraud Theft/Fraud in online banking and auctions Theft storage and distribution of login ID/Password, financial data, etc… DDoS (Distributed Denial of Service) 50% of Botnets used for DDoS attacks (Source: S21 sec) Each bot generates 40kbps Small botnets command up to 10,000 bots Large botnets command up to 1 million bots 20+ Gbps DDoS attacks witnessed in 2007 (Source: Arbor Networks Inc. 2007) Spam Each spam bot can send 3 spam emails per second (259,000/day) 94% of all emails is Spam (Google/Postini 2006)
  • 13. There are Solutions in Sight Solutions Commentary Preventing PC compromise Vulnerability assessment, Identity vulnerabilities and enforce a penetration testing, anti-virus, priority based patch management etc… approach to secure PCs from known exploits. Securing against Botnet attacks Employ a Defense in Depth Strategy when Securing your Enterprise! Layer your defenses against network security threats to minimize the impact! Preventing Identity Theft Content filtering services, anti- Combat a variety of Phishing, virus, intrusion detection and Pharming, malware and web/email prevention systems fraud activities that can result in identity theft Preventing DDoS Cloud based and or CPE based Stopping in the cloud within the anti-DDoS services. provider’s network reduces the chance Cloud is recommended. of a last mile bottleneck, which completes the attacker’s work Preventing Spam Cloud-based and or CPE based Stopping in the cloud through a proxy- anti-spam solution based service saves unnecessary bandwidth exhaustion and saves costs
  • 14. Tata Communications Has Taken a Stance Against Cyber Crime!
  • 15. What are Your Next Actions to Securing your Enterprise from Cyber Crime? Assess your Current state to define your Next steps Take a custom self-assessment to determine your next steps Web-based module www.tatacommunications.com/security/assessment Combat Cyber Crime!
  • 16. Thank You www.tatacommunications.com