2. Explosive Internet Growth and Impacts to Businesses
India
Internet Usage Stats and Telecommunications Market Report
Internet Usage and Population Statistics: Internet use has been a key driver to enhance
both Domestic & Global Trade in India
Year Users Population % Pen. Usage Source
1998 1,400,000 1,094,870,677 0.1% ITU % Real GDP Growth Rate
1999 2,800,000 1,094,870,677 0.3% ITU 12 10.5
8.3 7.5
2000 5,500,000 1,094,870,677 0.5% ITU 8 5.6 5.5 5.3 5.1
2001 7,000,000 1,094,870,677 0.7% ITU 4.5 4.0
2002 16,500,000 1,094,870,677 1.6% ITU 4
2003 22,500,000 1,094,870,677 2.1% ITU 0
2004 25,000,000 1,094,870,677 2.28% IAMAI
g
nd
na
a
e
a
ea
an
a
on
di
si
or
si
2005 38,500,000 1,112,225,812 3.46% IAMAI
hi
or
la
iw
ne
In
ay
ap
K
ai
C
K
Ta
do
g
al
ng
Th
2006 50,600,000 1,112,225,812 4.55% CIA
on
M
In
Si
H
2007 60,000,000 1,129,667,528 5.31% ITU
Source: Morgan Stanley Research
E-Commerce Media & Entertainment Government Education Online Banking
Business Process Outsourcing
3. Defining “Cyber Crime”
Webster's New Millennium™ Dictionary of English
Entry: Cyber Crime
Part of Speech: noun
Definition: A crime committed on a computer network, esp. the Internet
Example: Identity theft is a Cyber Crime.
Spamming Espionage Malware (cont.)
DDoS Internet Harassment Downloader
Unauthorized access Malware Adware
Virus Ransomeware
Social Engineering
Worm Child Pornography
Hacking
Trojan Telecom Fraud
Phishing
Bot Financial Fraud
Identity Theft Rootkit Computer Fraud
Cyber-stalking Spyware
Information warfare Backdoor
4. News/Media Perspective of Cyber Crime in the India
Cybercrime Threatens National Security in Cyber Crime On A Roll In India
India
Posted by Rushabh Chokshi on
Date: September 27, 2007 November 2nd, 2007
Source: merinews.com
It is The New Age in Cyber Crime, according
By: Fahim Ahmedi
to latest news cyber criminals are now
targeting Enterprises and Consumers based in
Tier III cities
India is now taking steps to fight against the Cybercrime: A threat to national security
cyber crime, Indian police are now being
Date: September 17, 2007
trained on how the Internet, e-mail, and other
Source: merinews.com
computer-based tools can be used by
By: Fahim Ahmedi
criminals to illegally obtain information stored
in databases The ever increasing cyber crime is taking the
world by storm. Technology is a boon but it also
has dangerous implications if left undetected.
Cyberspace is one such area that needs to pull
all security strings together before things go out
of hand.
5. News/Media Perspective of Cyber Crime in the India
Ankit Fadia, a 21-year-old computer whizkid
and author of ’The Unofficial Guide to Ethical
Hacking’ said “I could hack a state-owned
bank’s website or a government
communications website which shows the
vulnerability, thousands of Indian websites
are being hacked each day”.
6. News/Media Perspective of Cyber Crime in the India
Cyber crime in India on the decline: Report
Posted online: Monday, January 07, 2008 at 12:00:00
Updated: Monday, January 07, 2008 at 10:37:53
New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the
“new age” crime have declined with the most noticeable difference seen in Gujarat.
However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in
Gujarat.
A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually
decreased. “This is only a statistics based on the number of cases registered,” he added.
darkREADING
Annual CIS Study: Cost of Cybercrime Is Skyrocketing
Average annual loss per company has more than doubled since last year, according
to bellwether study
September 11, 2007 | 5:55 PM
By Tim Wilson
Site Editor, Dark Reading
10. The Botnet Problem Starts with Compromised PCs
150 of 600 million online PCs worldwide are The most common infection methods detected by
bot infected S21sec include browser exploits (65%), e-mail
(Source: BBC 2007 interview with Vint Cerf) attachments (13%), operating system exploits
(11%), downloaded Internet files (9%) and other
52,771 new infected PCs daily methods (2%), as illustrated in the figure below.
(Source: Symantec 2007)
Infection Methods
Downloaded Other
Rapid growth in tools used by Cyber Files 2%
Criminals 9%
Victims often do not know that they have OS Exploits
been compromised! 11%
Easy to use tools with varying levels of
Email Browser
anonymity offered to cyber criminals
Attachments Exploits
13% 65%
Source: S21sec
11. The Botnet Problem Starts with Compromised PCs
150 of 600 million online PCs Malcode Additions 2007
worldwide are bot infected
Spyware 308
(Source: BBC 2007 interview with Vint Cerf)
Rootkit 1,138
52,771 new infected PCs daily
Keylogger 1,463
(Source: Symantec 2007)
Other 14,907
Password Stealer 22,982
Rapid growth in available tools used
by Cyber Criminals! Dialer 23,449
Backdoor 25,997
Victims often do not know that they
have been compromised! Downloader 41,389
Virus 48,889
Easy to use tools with varying levels
of anonymity offered to cyber Adware 55,873
criminals! Worm 64,173
Trojan 109,246
0 20,000 40,000 60,000 80,000 100,000 120,000
Source: IBM ISS x-Force Trend Report 2007
12. The Botnet Problem – Devastating Impact to Businesses
Common Exploits from Botnets
Identity Theft
Credit card /Email fraud
Theft/Fraud in online banking and auctions
Theft storage and distribution of login ID/Password, financial
data, etc…
DDoS (Distributed Denial of Service)
50% of Botnets used for DDoS attacks
(Source: S21 sec)
Each bot generates 40kbps
Small botnets command up to 10,000 bots
Large botnets command up to 1 million bots
20+ Gbps DDoS attacks witnessed in 2007
(Source: Arbor Networks Inc. 2007)
Spam
Each spam bot can send 3 spam emails per second
(259,000/day)
94% of all emails is Spam (Google/Postini 2006)
13. There are Solutions in Sight
Solutions Commentary
Preventing PC compromise Vulnerability assessment, Identity vulnerabilities and enforce a
penetration testing, anti-virus, priority based patch management
etc… approach to secure PCs from known
exploits.
Securing against Botnet attacks
Employ a Defense in Depth Strategy when Securing your Enterprise! Layer your defenses against network
security threats to minimize the
impact!
Preventing Identity Theft Content filtering services, anti- Combat a variety of Phishing,
virus, intrusion detection and Pharming, malware and web/email
prevention systems fraud activities that can result in
identity theft
Preventing DDoS Cloud based and or CPE based Stopping in the cloud within the
anti-DDoS services. provider’s network reduces the chance
Cloud is recommended. of a last mile bottleneck, which
completes the attacker’s work
Preventing Spam Cloud-based and or CPE based Stopping in the cloud through a proxy-
anti-spam solution based service saves unnecessary
bandwidth exhaustion and saves costs
15. What are Your Next Actions to Securing your Enterprise from Cyber
Crime?
Assess your Current state to define your Next steps
Take a custom self-assessment to determine your next steps
Web-based module www.tatacommunications.com/security/assessment
Combat
Cyber
Crime!