2. About Myself
• Name : Kapil Mehrotra
• Experience : 24Yrs (Time files ☺ )
• Mostly worked in BFSI & Healthcare domain
• Having little learning curve & patience listener.
• Like to buy books a lot.. ☺ slow reader but try to complete one book at least
in a month.
• Like too much adventures in the life. (From where people say “Hum se na ho
payega” from there I start to search for “Hum se ho payega”) (+V)
• Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket
etc.)
• Die hard animal lover.
• Very active in few government communities for drafting Cloud and Cyber
security skill development policies since 2015.
3. Type of cyber threats
• “Phishing Attacks” to steal the User ID and Passwords and to gain
the access of the server, laptop or desktop.
• “Fake Link” Through this hacker gain the remote control of the
victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts,
Images, Videos and documents. (anydesk, teamviewer, logmein,
Ammyy)
• Social media scams (Twitter, Facebook, Instagram)
• SQL injection, Virus, Malware and Ransomware
• Fake websites that steal data.
• DDOS & Network attacks
• Insider attacks
4. What are the consequences of a cyber attack?
Cyber attacks can disrupt and cause considerable
financial and reputational damage to even the most
resilient organization. If you suffer a cyber attack, you
stand to lose Data, reputation and business, and
potentially face regulatory fines and litigation – as well
as the costs of remediation.
5. Why do we need Cyber Security
• In 2020 we must secure 300 billion passwords globally.
• There are 111 billion lines of new software code being produced each year,
• The world’s digital content is expected to grow 96 zettabytes by 2020
• Dark Web is 5000 times larger than the surface web.
• 20 million connected cars will ship with built-in software-based security
technology by 2020
• 1 Cr 80L Daily Images getting uploaded on the internet
• 50 billion devices connected to the Internet by 2020
6. Cybercrime Market FY 2020-2021
• Cybercrime costed businesses over $4 trillion total in
2020.
• Cybercrime will cost the world $6 trillion by 2021.
• The average cost of a data breach in 2020 will exceed
between $4million to $150 million
• Approximately $6 trillion is expected to be spent
globally on cybersecurity by 2021
7. Look at the Hackers Roadmap
• On average 30,000 new websites are getting hacked every day.
• Hackers create 300,000 new pieces of malware daily.
• There is a hacker attack every 39 seconds
• 62% people are experiencing phishing attacks
• 64% of companies have experienced web-based attacks
• Distributed denial-of-service (DDoS) attack grew to more than
1.44TB, increasing in size by 500%.
• 41% ransomware attacks are rising year on year.
Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of
every day
13. Sony Hack costed $15 Million
Reason : North Korea warns Sony before the launch of
move because it was related with “Kim Jong Un”
Interview and assassination conspiracy & making fun for
their president.
Sony has not taken it seriously.
Hacker hacked 47,000 current and formers employee
data, HR Data, User Ids & Passwords, Clinical Information,
SSO No, All emails and 100TB data including (Movies i.e
Aaron and Dave’s - “The Interview”, Brad Pitt’s - “Fury”
14. Dominos
• Customers’ personal data include customers’ names,
email ids, mobile numbers, and locations related to 18
crore orders that are placed with Domino’s India are
made available online.
• “Domino’s India Data Breach includes 13TB employee
files and customer details,” shows the web page with a
query box to fetch the details by Hackers.
• https://slf2rrahypck3bwckpdohsnhpeqrb3nhvwznjmar
mweofwnptowe4mad.onion.ly/
18. Do you know?
Kevin Mitnick is the biggest hacker in the world.
1. Mitnick Security Consulting
2. Security awareness training company “KnowBe4”
3. Board Of Director in “Zimperium”
4. Film : Track Down
5. An Author
19. IT Act & Data Privacy in India
1. Information Technology Act, 2000. (India)
2. IT Amendment Act 2000 to strengthen the cyber security
laws. (Section 43, 65 to 71). i.e. Hacking, fail in data
protection, using image, video or content without
permission etc.)
3. EU General Data Protection Regulation (GDPR)
4. The Personal Data Protection Bill, 2019 (PI & PII data
should be processed and stored)
Note:
Up to three years Imprisonment or/and fine up to 5L
Appointment of DPO (Data Protection Officer
20. WhatsApp Issue
1. WhatsApp took an objection to a traceability clause in the new IT
Rules that requires social media platforms to locate “the first
originator of the information” if required by the government.
2. Indian Rule 4(2) makes it mandatory for social media
intermediaries to trace the originator of a message or post on
their platform if required by a court or a competent authority
under Section 69A of the IT Act.
21. • Do not share your password
• Keep Changing your password frequently
• Do not click on the anonymous link from any laptop or mobile
• Don’t open any emails which comes from strangers. (It may be phishing email).
• Don’t download songs and movies
• Don’t use USB or any external devices from out sides.
• Don’t transfer data from mobile & In Mobile storage.
• “Be Aware” We monitor you through DLP and logs your daily activities.
• Apps should maintain user login and logout status as well.
Do’s & Don'ts
22. Is your email have been compromised ever
• https://haveibeenpwned.com/
• https://www.security.org/how-secure-is-my-password/
Practical
23. How to report a cyber crime in India?
https://cybercrime.gov.in/Default.aspx
For Women and Child :
complaint-mwcd@gov.in
24. Thank you
• Email ID : Kapil.Mehrotra@gmail.com
• Mobile No : 9811779881