SlideShare une entreprise Scribd logo
1  sur  11
A R Mankodi
Faculty- NIIT IFBI
JAIIB-CAIIB (SSBF)
URICM -HDCM
EX Faculty- GLS University
IPPB
IBPS
Ex Director- Karnavati Coop Bank
Ex CEO- Guj State Coop Union
Ex DGM- A D C Bank
AMCO Bank
Secretary- Ahmadabad Bankers’ Club
Cyber Security & IT Policy
What it is Security?
• Cyber security is the protection of internet-connected systems,
including hardware, software and data, from cyber attacks
• In a computing context, security comprises cyber security and
physical security
• Both are used by enterprises to protect against unauthorized
access to data centres and other computerized systems.
• Information security, (IT) which is designed to maintain the
confidentiality, integrity and availability of data to only
authorised owner. Mean Identity, Login and password, PIN and
MPIN
Stealing or getting through unauthorized means somebody's physical or intellectual asset
without one’s knowledge or approval and use it for benefit
What is Cyber Security ?
Understand the importance
Hackers managed to siphon off over Rs 94 crore through a malware
attack on the server of Pune based cosmos bank
Transactions were carried out on August 11 and August 13 in 2018
In two days – 79 crore from various ATMs in 28 countries and
another 2.5 crore were taken out within India
Security breaches at Indian banks have happened in the past, too. In
2016, in one of the biggest ever breaches of financial data in India,
credit and debit cards of 3.2 million banking customers were
compromised. This was caused by a malware in the systems
Of Payments Services, which runs and manages ATM networks. Ninety
of Yes Bank ATMs that were affected and data from cards used at these
ATMs were stolen.
Between 2015 and 2017, digital payment transactions have grown at an
average annual pace of more than 50%, and instances of data thefts like
these can be a huge deterrent
What is Cyber Crime
• Cyber crime encompasses any criminal act dealing with
computers and networks (called hacking).
• Additionally, cyber crime also includes traditional crimes
conducted through the Internet
• For example; hate crimes, telemarketing and Internet
fraud, identity theft, and credit card account thefts etc.
when the illegal activities are committed
through the use of a computer and the
Internet they are Known as Cyber Crime
Types Of Cyber Crime
• Hacking – Compromise Identity
• Virus dissemination
• Logic bomb Set of commands harmful on execution
• Denial-of-Service attack
• Email bombing and spamming
• Web Jacking-Control web of some other
• Identity theft and Credit Card Fraud
• Ransom ware Data hostage for Ransom(Money)
• Phishing –Sending E mails of some others mail, stealing
Identity and password
Major Cyber security Threats in
Banking Sector
• Unencrypted Data
• New automation technology without Security
• Unprotected Third Party Services
• Unsecured Mobile banking
• A constantly changing threat landscape
• False Positives
• The Big Breach
Types of Cyber Securities
• Information security
• Disaster recovery
• Network security
Banks need to be on their guard more than most
businesses.
That's the cost of holding onto the kind of
valuable personal data that banks do.
Your data with the bank can be breached if not
protected from cybercrime threats
The Key to Fast Remediation
• Here’s the bottom line:
• Breaches are unavoidable.
• While preventing attacks will always be critical, the goal
has shifted to locating and terminating breaches as quickly
as possible to mitigate damage. This hinges upon achieving
fully contextualized visibility across the security footprint.
Simplify: Threat Nexus ingests all data from all tools across
the SOC, allowing analysts to quickly understand the
context behind events in order to build a true end-to-end
perspective.
Security Tools
• Cyber Security Policy to be distinct from the IT policy
• The Cyber Security Policy should be distinct from the
IT/IS policy so that it highlights the risks from cyber
threats and the measures to address/reduce these
risks. Rate each of these risks as Low, Medium, High
and Very High.
1 Technologies: Security incident event management (SIEM), Privilege
Identity Management (PIM), database activity
monitoring, etc.
2 Delivery Channel: ATM, PoS, IMPS, etc.
3 Digital products: m-Banking, UPI, e-Wallet, etc.
4 Internal threats: Critical & sensitive data compromise, password
theft, internal source code review, etc.
5 External threat: DDoS, Ransom ware, etc.
Cyber Security Requirement
• Network Management and Security
• Secure Configuration
• Application Security Life Cycle (ASLC)
• Change Management
• Periodic Testing –Web, Mobile and Net(VA/PT)
• Vulnerability Assessment/ Penetration Testing
• VA six monthly/PT Yearly
• Control / Management
• Authentication Framework for Customers
• Anti-Phishing
• Data Leak Prevention Strategy
• Audit Logs
• Incident Response and Management
• Anti Virus Software and updating
• Inventory Management
Cyber security

Contenu connexe

Tendances

E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 

Tendances (20)

Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Where You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareWhere You'll Find Today's Top Malware
Where You'll Find Today's Top Malware
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
E secuity
E secuityE secuity
E secuity
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An Overview
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 

Similaire à Cyber security

Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Graeme Wood
 

Similaire à Cyber security (20)

Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
Cyber security
Cyber securityCyber security
Cyber security
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
Cyber
CyberCyber
Cyber
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 

Plus de Ashok Mankodi (9)

Nano technology
Nano technologyNano technology
Nano technology
 
Msme
MsmeMsme
Msme
 
Market management
Market managementMarket management
Market management
 
International banking
International bankingInternational banking
International banking
 
2 uses of funds
2 uses of funds2 uses of funds
2 uses of funds
 
1 souces of funds
1 souces of funds1 souces of funds
1 souces of funds
 
Fund management
Fund managementFund management
Fund management
 
Appraisal
AppraisalAppraisal
Appraisal
 
Ratio analysis
Ratio analysisRatio analysis
Ratio analysis
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 

Dernier (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Cyber security

  • 1. A R Mankodi Faculty- NIIT IFBI JAIIB-CAIIB (SSBF) URICM -HDCM EX Faculty- GLS University IPPB IBPS Ex Director- Karnavati Coop Bank Ex CEO- Guj State Coop Union Ex DGM- A D C Bank AMCO Bank Secretary- Ahmadabad Bankers’ Club Cyber Security & IT Policy
  • 2. What it is Security? • Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks • In a computing context, security comprises cyber security and physical security • Both are used by enterprises to protect against unauthorized access to data centres and other computerized systems. • Information security, (IT) which is designed to maintain the confidentiality, integrity and availability of data to only authorised owner. Mean Identity, Login and password, PIN and MPIN Stealing or getting through unauthorized means somebody's physical or intellectual asset without one’s knowledge or approval and use it for benefit What is Cyber Security ?
  • 3. Understand the importance Hackers managed to siphon off over Rs 94 crore through a malware attack on the server of Pune based cosmos bank Transactions were carried out on August 11 and August 13 in 2018 In two days – 79 crore from various ATMs in 28 countries and another 2.5 crore were taken out within India Security breaches at Indian banks have happened in the past, too. In 2016, in one of the biggest ever breaches of financial data in India, credit and debit cards of 3.2 million banking customers were compromised. This was caused by a malware in the systems Of Payments Services, which runs and manages ATM networks. Ninety of Yes Bank ATMs that were affected and data from cards used at these ATMs were stolen. Between 2015 and 2017, digital payment transactions have grown at an average annual pace of more than 50%, and instances of data thefts like these can be a huge deterrent
  • 4. What is Cyber Crime • Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). • Additionally, cyber crime also includes traditional crimes conducted through the Internet • For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts etc. when the illegal activities are committed through the use of a computer and the Internet they are Known as Cyber Crime
  • 5. Types Of Cyber Crime • Hacking – Compromise Identity • Virus dissemination • Logic bomb Set of commands harmful on execution • Denial-of-Service attack • Email bombing and spamming • Web Jacking-Control web of some other • Identity theft and Credit Card Fraud • Ransom ware Data hostage for Ransom(Money) • Phishing –Sending E mails of some others mail, stealing Identity and password
  • 6. Major Cyber security Threats in Banking Sector • Unencrypted Data • New automation technology without Security • Unprotected Third Party Services • Unsecured Mobile banking • A constantly changing threat landscape • False Positives • The Big Breach
  • 7. Types of Cyber Securities • Information security • Disaster recovery • Network security Banks need to be on their guard more than most businesses. That's the cost of holding onto the kind of valuable personal data that banks do. Your data with the bank can be breached if not protected from cybercrime threats
  • 8. The Key to Fast Remediation • Here’s the bottom line: • Breaches are unavoidable. • While preventing attacks will always be critical, the goal has shifted to locating and terminating breaches as quickly as possible to mitigate damage. This hinges upon achieving fully contextualized visibility across the security footprint. Simplify: Threat Nexus ingests all data from all tools across the SOC, allowing analysts to quickly understand the context behind events in order to build a true end-to-end perspective.
  • 9. Security Tools • Cyber Security Policy to be distinct from the IT policy • The Cyber Security Policy should be distinct from the IT/IS policy so that it highlights the risks from cyber threats and the measures to address/reduce these risks. Rate each of these risks as Low, Medium, High and Very High. 1 Technologies: Security incident event management (SIEM), Privilege Identity Management (PIM), database activity monitoring, etc. 2 Delivery Channel: ATM, PoS, IMPS, etc. 3 Digital products: m-Banking, UPI, e-Wallet, etc. 4 Internal threats: Critical & sensitive data compromise, password theft, internal source code review, etc. 5 External threat: DDoS, Ransom ware, etc.
  • 10. Cyber Security Requirement • Network Management and Security • Secure Configuration • Application Security Life Cycle (ASLC) • Change Management • Periodic Testing –Web, Mobile and Net(VA/PT) • Vulnerability Assessment/ Penetration Testing • VA six monthly/PT Yearly • Control / Management • Authentication Framework for Customers • Anti-Phishing • Data Leak Prevention Strategy • Audit Logs • Incident Response and Management • Anti Virus Software and updating • Inventory Management