SlideShare une entreprise Scribd logo
1  sur  24
This document has been created with the joint effort of IndiaWatch
and ClubHack. Released in the public domain under Creative
Commons License (Attribution- Noncommercial 2.5 India)
http://creativecommons.org/licenses/by-nc-sa/2.5/in/
The practices listed in this document are provided as is and as guidance. The author(s) do not
claim these as the only practices to be followed. Readers are urged to make informed decisions
before adopting the guidelines given in the document. In any event, the author(s) may not be
held responsible for any issues arising out of the use of the information and / or guidelines
included in this document.
This document has been prepared for general public distribution. The guidelines provided in it
are based on submissions to the online survey carried out by the authors and can be of use to
peoplewhoarelookingtoinjectintelligence,resilience,securityandmoreintotheirorganizations,
systems, and lives and to thwart someone else’s attempt(s) to inflict damage upon them.
Organizations and individuals wanting to use this document may do so but are urged to respect
professionalism and recognize that mortals need more than love and fresh air to survive.
Readers are welcome to provide feedback to the authors using the contact informationprovided
in this document.
Copyrightand Disclaimer
1India’s Top 5 Information Security Concerns: 2013
It’s time we identified what ails the information security efforts in India. It’s time we used India-centric
information and localized knowledge and intelligence to counter the threats and risks that keep
growing alongside advances in technology.
This report,jointly prepared by IndiaWatch and ClubHack,is about India and is based on submissions
to an online survey of hundreds of information security professionals from India and abroad.
IndiaWatch is an India centric research and knowledge organization in the Information / Data
management and security domain with a mission to seek opportunities to work and contribute to
enhancing the national security posture. ClubHack is the first Indian Hacker’s conference and monthly
magazine. Synonymous with the information security profession in the country today, ClubHack is
largely responsible for popularizing free and open learning in the technical InfoSec domain.
Why a new study?
Numerous annual threat and risk predictions are published globally–some are relevant to India, some
are not. While some of these reports are reliable, many are vendor-driven or influenced by vested
interests. Although these reports help in focusing on security issues, none, surprisingly, help to look
at missing perspectives or perceptions, or at issues arising out of behavior or work culture–the
weaknesses that contribute to the ‘insecurity’ of information security.
We intend to highlight these concerns for India the Nation, the Indian Business, and the Indian Netizen.
This report offers a straightforward presentation of systemic concerns as expressed by our survey’s
respondents. Our respondents want you to look within–engage in an internal debate, light up your
Dimaag Ki Batti 1
and experience your Eureka moment. Rather than worrying about risks and threats,
one should work to address these InfoSec concerns or issues.
We present India’s Top 5 Information Security Concerns: 2013.
1
Dimaag Ki Batti: A Hindi phrase that literally means ‘light a lamp in your mind’.
preamble
2
Executive Summary......................................... 3
National Issues
Awareness......................................................... 4
Obsession with control and power................... 5
Technology........................................................ 6
Ignorance, capability and leadership............... 7
Data obsession.................................................. 8
Corporate Concerns 	
Awareness......................................................... 9
Information security management.................. 10
Weaknesses during implementation............... 11
‘It cannot happen to me’ syndrome................. 12
Underestimation of technology........................ 13
Threats to Individuals 	
Social media...................................................... 14
Lack of support................................................. 15
Unsafe surfing................................................... 16
Awareness......................................................... 17
Innocence, greed, and avarice.......................... 18
Conclusion........................................................ 19
Acknowledgements....................................... 20
Notes.................................................................... 21
contents
3India’s Top 5 Information Security Concerns: 2013
India is recognized as a global leader in the
technologydomain.Theprevalenceoftechnology
in every aspect of life in the country is growing
exponentially, keeping pace with global trends.
Gigantic projects like UIDAI-Aadhaar, CCTNS,
NatGrid, NPR and state/ national eGovernance
initiatives are leveraging technology to reach out
to the remotest parts of India. One by-product of
this spread of technology is the rise in electronic
crimes and frauds.
Much has been done at various levels to deal
with cybercrimes and security incidents, but
something seems to be missing still. To identify
the missing factor, we surveyed a large number
of professionals in IT, IS and other domains,
requesting them to share their top five India-
specific concerns in three segments:
•	 The Nation
•	 The Corporation or Business
•	 The Citizen
Respondents were asked not to list out the risks
and threats usually found in security reports but
to think of the missing strategic, operational,
tactical, behavioral and cultural weakness. This
report presents the views and observations of
theinformedIndianprofessionalswhofacesystemic
shortcomings and a general lack of awareness
of impending threats on a daily basis. Data for
the survey was collected through an online
form: http://goo.gl/VFNqm
The unstructured survey responses were
segregated and thoroughly analyzed to arrive
at the Top 5 concerns in each category. Some
interesting survey highlights are given below:
•	 89% of the total respondents expressed grave
concerns about the lack of awareness and the
need for more security knowledge.
•	 Leadership at the government and corporate
level must step up to learn and understand
technology and lead by example. Although
it has been 13 years since the IT Act was
promulgated, the technological illiteracy
in government and business is appalling.
Trouble will not disappear by ignoring it; we
have to wake up to critical issues such as poor
infrastructure, espionage, counter-productive
policies, and capacity and skill shortages.
•	Government, corporations and people have to
change the way they think and act about issues
related to technology and internet. The virtual
world is a new frontier where the assumptions
of the‘real’world do not always hold true.
44%
22%
16%
14%
4%
West
South
North
East
Overseas
Geographic Distribution of Respondent Sample
Geographic Distribution of Respondent Sample
Percentage
of
respondents
West South North East Overseas
Percentage
of
respondents
22%
18%
12%8%
6%
6%
6%
6%
6%
4%
4%
2%
2%
ISConsultants
ISProfessionals
Ethical Hackers
BFSI
Academics
Government
ITDev & BPO
Students
Telcos
NGO
Trading/Mfg
Hospitality
Training
Respondent Profile
Respondent Profile
IS Consultants IS Professionals Ethical Hackers
BFSI Academics Government IT Dev & BPO
Students Telcos NGO Trading/Mfg
Hospitality Training
Executive Summary
4
Awareness is the most abused word in the
InfoSec lexicon. Every ‘expert’ swears this as
the best and most effective antidote for InfoSec
ill, but a few have walked the talk or done
something constructive. Awareness remains a
pipe dream – to be smoked in public, lamented
in private.
This was the one common area of concern in all
submissions, and it appears in many variations:
lack of training, lack of informed policy makers,
apathy, indifference, ignorance, arrogance, lack
of acceptance of criticism, the perception of a
lack of willingness. Amongst those who cited
Awareness as a concern, close to 32% mention
‘Lack of Training’ as the key concern. ‘Absence
of informed policy makers’ and ‘Perception
of lack of willingness’ (20%) followed as two
other main concerns. A lot of attention is
given to the shortage of information security
professionals in the country – but little is done
to solve the problem. Aging technology assets
are widespread, and planned policies greatly
lacking across the establishment. Compounding
this concern is the indifference to cyber security
risks, technical naiveté, ignorance, and the lack of
willingness to take action. When the government
lacks expertise and knowledge, it should be open
to invite contributions from civil society. High
levels of arrogance in the establishment and the
total lack of acceptance of any form of criticism is
of grave concern on this front. Demonstration of
demonic reactions by government, bureaucrats
and (politically connected) individuals and
the continued lack of empathy provide ample
evidence of this attitude.
India is suffering from internal strife, cross-
border aggression and illegal immigration. It is
critically important to address cyber security
concerns on all fronts at one go. There are too
many wrongs happening. For all we know, there
may be a security tsunami rising quietly.
Awareness remains a
pipe dream to be smoked
in public, lamented in
private
NationalIssues
Awareness
Awareness related concerns
Percentage of
respondents
who cited these
concerns
Lack of training Lack of informed policy makers
Perception of a lack of willingness Ignorance
Indifference Arrogance Apathy Lack of
acceptance of criticism
33%
20%
20%
9%
6%
6%
4% 2%
Awareness related concerns
Lack of training
lack of informed policy makers
perception of a lack of willingness
ignorance
indifference
arrogance
apathy
lack of acceptance of criticism
5India’s Top 5 Information Security Concerns: 2013
Obsession with control and power is the hallmark
of politicians and bureaucrats. Every effort is
made to suppress dissent. In this context, the
national executive must reexamine issues like:
•	 Central control
•	 Inter-department rivalry
•	 Turf wars and jurisdiction issues
•	 Outdated laws and lack of knowledge
	 (or understanding) in the law
	 enforcement agencies
•	 Counter-productive policy measures
•	Delayed response to disclosures
•	 A discouraging attitude
Central control is proven to be good for
cyber security control, but unfortunately, it
is in often in the hands of an officer with no
interest in technology.
Archaic laws and the law making process need
a reality check. While technology and life have
changed over the past decade,we continue to live
under the yoke of century-old laws. Even newer
laws such as the IT Act continue to disappoint
in enforcement. Lawmakers have to understand
the medium (the internet) for which laws are
enacted, and the legislation must include a vision
for the future. Inspiration is not far away if we look
at the Constitution – farsightedness and public
good are enshrined in the document.
A discouraging attitude towards the citizens’
needs and counter-productive policy measures
demonstrate arrogance and should be curbed
with good governance and policies. Technology
risks, threats, and incidents require quick
attention. A solution to this can be a National
Security Organization as an additional
constitutional wing apart from the Legislature,
Executive and Judiciary.
As a nation, we have successfully reinvented
ourselves throughout the centuries under
different rulers, religions, and languages. In
the present day and age, internet technology
demands a change of mindset and this has
to first happen at the national executive level,
setting the tone at the top.
Inspiration is not far
away ifwe look at
the Constitution —
farsightedness and
public good are enshrined
in the document
Obsession with control and power
National Issues
6
Technology,surprisingly,was not a grave concern
area for our respondents! Its blind acceptance
is what troubled them more. If the world is
deploying some new technology, it is quickly and
blindly included in our system without thought
about the need, capability or localization.
The rapid growth of technology itself is
responsible for the rising risks and threats. The
scenario is not pleasant when there are obvious
weaknesses in technical knowhow, availability
of skilled manpower, proliferation of attack
vectors (like DDOS , botnets, malware, etc.),
non-state and state sponsored attacks, and
targeted attacks.
Amongst those who cited technology concerns,
53% expressed ‘Proliferation of attack vectors
like DDOS’ as a major issue. ‘(Absence of)
technical knowhow’ (15%) and ‘CCTV and
other technologies lying unused or inefficient’
(13%) were the other major technology-related
concerns expressed by respondents.
Though India has a vast pool of IT talent, when
we get down to the brass tacks, there seems to
be a lack of technical knowhow. Time and again,
teams have to depend on overseas experts for
specialist skills! The problem is evident when
departments blindly implement technologies
having been sold on the features or just because
some other governments have purchased them
or because the world is talking about them.There
are numerous instances of compromise and
national loss due to unused or defunct systems.
Although the shortfall of skilled InfoSec
professionals has been highlighted at the highest
levels of the government, nobody seems to be
serious. Even though hiring is based on need,
these departments are usually short of funds
or are not given hiring plans. How is anyone
expected to close the capacity gap with a hiring
freeze and lack of executive / budgetary support
is anyone’s guess.
While technology provides tremendous
computing power it also brings new risks to one’s
doorsteps. As a nation, we must wake up to the
realities of the damage that can be wrought by
various threat vectors as mentioned earlier.
Technology
The rapid growth of
technology itself is
responsible for the
rising risks and threats
National Issues
Technology Concerns
ProliferationofattackvectorslikeDDOS Technical
knowhow CCTV and other technologies lying unused
or inefficient Availability of skilled manpower
Non-state and state sponsored attacks Malware
Targeted attacks
53%
15%
13%
9%
6%
2%
2%
Proliferation of attack vectors like
DDOS
Technical knowhow
CCTV and other technologies lying
unused or inefficient
Availability of skilled manpower
Non-state and state sponsored
attacks
Malware,
Targeted attacks
Technology Concerns
Percentage of
respondents
who cited these
concerns
7India’s Top 5 Information Security Concerns: 2013
The speed of change in the world of internet
and technology has to be matched in thought
and action. Else, we will soon see a steep
decline in preparedness and spend a lifetime
playing catch-up.
Espionage is real, played subtly, using tools like
social engineering, APTs, malware and botnets.
There is also the high level of dependency on
foreign equipment and technology knowhow;
so how does one know how safe one is? Cloak-
and-dagger is passé; now is the age of ‘cloak
and keyboard’.
Urgent action needed
International research groups have exposed
espionage networks operating on Indian
national infrastructure on multiple occasions.
Lack of significant reaction demonstrates the
missing large-scale counterattack capability,
infrastructure and leadership weakness.
We are surrounded by hostile neighbors in
cyberspace too. Large-scale destruction from
cyber attacks has been seen all over the Middle
East – there is no way we can say that we are
not vulnerable.
We often see knee jerk statements from
government sources,showing the reactive nature
that governs national security thought leadership.
This has to change to a mature planning process.
In the absence of cyber security capabilities, we
stick our head into the sand wishing the problem
will go away.This is evidently demonstrated in the
slow pace of action (or inaction), the lack of funds
for hiring and capacity creation,and the low levels
of preparedness or urgency.
Ignorance, capability and leadership
Cloak-and-dagger is
passé; now is the age of
cloak and keyboard
National Issues
8
We once lived in a ’license raj’ where we had to
provide data to the government for all types
of things. The more files and papers we had,
the greater our importance. And the more
information we gave, the more the establishment
demanded – it was like the mythical Bakasura 2
– never satiated and not under control till the day
good triumphs over evil.
Our respondents are concerned about the lack of
control over the private data collection entities,
the obsession with data, and multiple data stores
being created by all. The national obsession with
data is well known – we have lived and grown
up with ration cards, voter cards, domicile
certificates, caste certificates, BPL 3
cards, KYC 4
,
UID 5
and NPR 6
. Every scheme requires citizens
to submit new forms filled with the same data.
Extensive data resides in systems at the state and
the national level. This can be merged and mined
to create joint resources at the national level and
be channeled into creating resilient and secure
databases and policies – the resulting resource
savings will be colossal. In developed countries,
a single number is allotted to an individual at
birth and remains valid through the lifetime of the
individual – with safeguards that have matured
over the decades.
The government has demonstrated its lack of
control over citizen data with the absence of a
firm policy statement related to handling of data
and its purpose of use. As an example, Aadhaar
was announced as a voluntary scheme, but
every day there is a new announcement where
Aadhaar is declared to be compulsory for one or
the other basic service, such as bank accounts
and cooking gas connections.
Ironically, a citizen has no choice but to
submit to the establishment when it comes
to their data collection exercises. If a person
does not want to enroll for UID, she / he will
be excluded from the banking system despite
the government’s assurance that UID is not
compulsory for a bank account. On the other
hand, passports are not accepted in courts
where the authorities demand a ration card for
personal identification. Even at this nascent
stage, there are regular reports of fraudulent
registrations and lax handling.
Private data collection entities follow the
example of laxity displayed by the government.
In the absence of privacy legislation, the banks,
telecommunications and insurance companies
show scant respect for personal identifiable
information (PII), and blatantly share or sell it.
Their nuisance value was demonstrated when
even the Commerce Minister received spam
calls during a Cabinet meeting. During our
survey, more than 60% respondents cited fraud,
identity theft, and data security as significant
national concerns.
Data obsession
2
Bakasura: A demon described in the Hindu epic, The Mahabharata. He forced the kings in the vicinity to send
him food and provisions which he devoured along with the men who carried them. Was killed by Bhima in a fight.
3
BPL: Below poverty line
4
KYC: Know your customer
5
UID: Unique Identification
6
National Population Register (NPR) is an initiative of the Government for registration of citizens.
National Issues
data collection entities
follow the example of
laxity displayed bythe
government
9India’s Top 5 Information Security Concerns: 2013
The problem with this area in Information
Security is that everyone knows that it should be
done. Everyone talks about it, but does nothing
about it, except–talk!
Every respondent who participated in the survey
mentioned lack of adequate awareness about
Information Security as a critical issue with
India’s corporations. Close to 7% respondents
attributed lack of awareness to the attitude that:
•	 Information security is more about
compliance than risk containment
•	 Awareness programs are clubbed
	 with training
•	 Awareness is not really built into
	 corporate culture
In corporations, ‘security awareness’ is reduced
to running a program rather than deriving value
from it. A shift in mindset is needed here. This
relates to people, process, technology, continuity,
availability, and confidentiality, and should not be
considered only for compliance.
The organizations’CXOs should delink awareness
from training. It is critical to make the move
towards building a culture of safe computing (safe
information management and security) in the
same manner as executive management works
to build an aggressive culture for growth through
sales, innovation, and customer satisfaction.
Training and awareness have different objectives
and must be treated differently. Metrics for each
has to be different, but it is not so currently.
Awareness as a (soft) control suffers, and
delivers no value.
Awareness
Training and awareness
have different objectives
and must be treated
differently
Corporate Concerns
10
Information security management is of great
concern to respondents. It appears that the
essential tenets of an InfoSec management
system are themselves a source of weakness,
exposing the organization to threats and risks.
The areas of highest concern are poor policies,
weak audits and compliance, L-1 purchasing,
certification for the sake of certification, lack
of monitoring, rogue and privileged accounts,
and more. The general consensus is that
corporations must responsibly ensure strong
processes for IS management.
A number of IS consultants and professionals
wrote about lack of effective policies in
corporations. Shoddy cut-paste jobs provide
poor policy documents and when this is
combined with weak audits, compliance, and
enforcement, we have the ingredients for an IS
disaster in the making.
Throw peanuts, get monkeys
The private sector is inspired by the public
sector and has etched the L-1 mindset into their
procurement processes. The lowest bidder who
walks away with the contract may be the least
capable or the most corrupt. The buyer suffers
because of this L-1 purchase, but lives with the
pain and is even found lobbying for a security
award to cover up the failures. Hiring and
purchase revolve around ‘negotiation skills’, a
politically correct term for bringing in the lowest
bidder without thought about quality.
Along with awards, organizations seek
certificates for the sake of certificates. Many
certifying bodies will oblige too with low fees and
weak audits. The result is a framed certificate
to hang on the wall, having less value than toilet
paper in terms of effectiveness or usefulness.
A cliché in InfoSec conversations is that the
insider is the biggest threat but our respondents
caution readers against privileged users and
senior management. Other vulnerabilities are
the convenience user accounts created by
the tech team(s), and the accounts which are
‘orphan’ or those that remain undeleted even
after the users leave the organization. All these
are easy pathways into the system and very few
companies have a grip on the problem. Logs
are usually not enabled because of additional
hardware investment requirements, but even
when logs are available, no one seems to be
looking at them!
It is easy to set up an information security
management system (ISMS) and get certified
but information security management is hardly
about getting certificates. If one starts from the
bottom and builds up, it will work. Unfortunately,
everyone is looking for shortcuts and often
overlook the essentials.
It is easyto set up an
ISMS and get certified
but information
security management is
hardly about getting
certificates
Information security management
Corporate Concerns
11India’s Top 5 Information Security Concerns: 2013
The implementation of any asset or process
must be a properly planned activity entrusted
to qualified teams. While there is evidence
that procedures are followed for security
implementations, something or the other
is often missing, creating a weakness in the
security ecosystem.
Our respondents identified inefficient security
implementation, weak process for patch
management, piracy, pirated software resulting
in malware, and encryption as major concerns.
The first step must be firm and strong, but when
this step itself is flawed, one can be assured of
mayhem. Inefficient security implementations
result from wrong first steps. Weak controls,
workarounds, privilege mismanagement, lack
of will to enforce policies, me-too technologies,
and a lack of strong hiring practices are
amongst the many wrong practices that result
in weak information security management
system (ISMS).
Patch management should be by habit but the
real habit observed is procrastination. Time
and again, corporations have been victims
of breaches through systems that are not
updated / patched.
It is common knowledge that there is large-scale
acceptance of piracy across the country. Cracks,
keygens, dubious license keys and installers are
exchanged across networks without thought
about IPR violations or the threat of malware
entering corporate networks, or the risk of
penalties arising out of non-compliance.
Weaknesses during implementation
Time and again,
corporations have been
victims of breaches
through systems that are
not updated or patched
Corporate Concerns
12
This is a common affliction across organizations
— the small guy thinks he is too small to be of
interest to a hacker, and the big guy thinks he
is too strong to be attacked. Both fail to realize
that the joke is on them and that a blackhat may
already have them in his crosshairs waiting for
the right time to pwn 7
them.
While we are aware of the dangers lurking
around us, our sense of fatality prevents us
from addressing concerns such as espionage,
commercial rivalry, insider threats, management
apathy, ignorance of the current state, etc.
’It cannot happen to me’ syndrome was opined
to be a significant concern by a whopping 51%
of the total respondents. Within these, 34% cited
‘Insider threats’ as a major concern while 25%
each cited ‘Espionage’ and ‘Commercial rivalry’
as other serious concerns.
Espionage has become easy for the smart and
aggressive operator, and the key threat vectors
to look out for are data theft, phone tapping,
keyloggers and advanced malware. Executive
management must realize that the results of
successful espionage are felt by shareholders and
the nation and that it is not merely a commercial
loss for the company.
Taking care to harden systems and increase
monitoring will help contain loss of IPR,contracts,
and revenue. Survey respondents believe that
little is being done about silent attacks on
management assets in the form of espionage
or downright damage, and this is due to
management apathy – which is a manifestation
of a different type of insider threat.
We have addressed insiders and senior
management in a different context but apathy is
a weakness in thought and leadership that leaves
the organization open to pillage and plunder.
‘It cannot happen to me’ syndrome
The small guy thinks
he is too small to be of
interest to a hacker, and
the big guythinks he is
too strong to be attacked
7
Pwn: In information security, to pwn is to compromise or control another computer / application /
site / gateway device.
Corporate Concerns
‘It Cannot Happen to me’syndrome
Insider threat Espionage Commercial rivalry
Management apathy Ignorance of current state
34%
25%
25%
15%
1%
Insider threat
Espionage
Commercial rivalry
Managementapathy
Ignoranceof currentstate
‘It Cannot Happen to me’syndrome
Percentage of
respondents
who cited these
concerns
13India’s Top 5 Information Security Concerns: 2013
Underestimation of technology is another
problem area driven by ignorance at the top
due to the absence of professional threat / risk
intelligence. Technology risks or benefits are
usually intangible and claims of loss or success
are always regarded with suspicion.
Risks and threats created by technology cannot
be wished away or ignored, especially vectors
of high concern like botnets, virus/APT, no
logs, ransomware, rogue and unauthorized
software installations, slow adoption of new
technologies, etc.. The survey respondents feel
that corporations are not paying attention to the
risks they face and that there may be a heavy
price to pay in the due course.
Incidentally, of the total number of respondents,
12% cited ‘Hacktivism’ as a rising information
security concern whose threat is underestimated
by India’s corporates.
From MMSes and morphed pictures, we are
seeing criminals moving to identity theft and
targeted financial crimes. Botnets, ready-to-
use viruses, 0-days, APTs and such tools can
be easily purchased online along with required
support and help for successful use. This
makes it easy for anyone to launch an attack
against any corporation; unfortunately, most
are unprepared for a technical onslaught.
The issue is with technology being taken for
granted and with managements seeing it in
the form and color that is comfortable to them.
This is the big concern as managements often
underestimate the resultant damage. Users
freely install rogue or unauthorized software
and thus provide backdoors into the corporate
infrastructure. When logs are not collected
and analyzed in real time, malicious network
infiltration goes unidentified.
Survey respondents opine that we shall soon
see ransom demands as it is a simple and easy
vector. Crime gangs will find it a cakewalk to
move from real life kidnappings to diginapping in
the virtual world, which will be more lucrative and
anonymous. Ransomware exists, is the message
for the corporate head in the sand, and it is time
to take immediate measures for protection
against such threats.
Another culprit identified by our respondents is
the slow adoption of new technologies. The pace
of adoption is governed by the principle of denial
– if the new technology is free, adoption is quick,
but if money has to be spent then it is wished
away until the world has adopted it.
Technical threats or risks are not visible and
when the user feels that things are ‘taken care
of’ or ‘okay’ once the machine is powered down!
Managements must stay away from such
delusions and make every effort to learn and
understand the risks built into the operations
fabric of the corporations. It’s time corporations
encouraged technology and security schooling
for professionals who are not related to
technology or InfoSec.
Underestimation of technology
Survey respondents opine
that we shall soon see
ransom demands as it is a
simple and easyvector
Corporate Concerns
14
The great Indian joint family has been
resurrected on the pages of Facebook,
Google+, and others. Cousins far removed can
see each other from birth and exchange their
first words. Kids have accounts before they
are born, forget walking, talking or burping.
With all this good happening in our social lives,
our respondents (who are active on social
media) say this is a huge concern area for
the average Indian citizen – the Indinetizen.
Users have yet to realize that there are risks
to individual privacy arising from government
monitoring, stalking, misinformation through
social media, uninformed children activity,
and much more. ‘Misinformation through
social media’ was seen as the key issue by 14%
of the total respondents.
Social media and online posts must be used
intelligently and with a great deal of thought.
We may guard our personal lives closely, but
that privacy is easily breached when we or our
friends post personal information and pictures.
Social media has brought everyone on
the same platform – the government, the
criminals, the gullible, the greedy, as well
as the naïve and harmless good guys. The
internet is called a level playing field but it is
a virtual toy store for criminals and mischief
mongers who can stalk, steal identities, run
scams and damage reputations.
Our respondents are concerned about the
well-being (financial, mental and physical) of
the innocent user who is being targeted by
criminals or the government machinery for
their own purposes.
Children especially are high risk targets and
a majority of parents are unaware of their
children’s internet activities. Parents take
great pains to oversee their kids’ playground
activities, but overlook the cyberspace where
kids are alone, befriend the strangers, accept
gifts from them and inadvertently put their
lives in danger.
The risk is not only for children who are
snared with gifts, but teens and adults who
post sensitive content (personal, family, or
business related) that may be considered
objectionable and illegal. Claiming ignorance
of law will not help reverse or avoid damage.
Social media
Misinformation through
social media was seen as
the key issue by 14% of the
total respondents
Threatsto Individuals
15India’s Top 5 Information Security Concerns: 2013
Lack of support is pervasive. Governments
and corporations are struggling to understand
and tame the phenomenon called the internet,
and the so called know-it-alls provide quick
fixes and remedies or snake oil. The individual
struggles to make sense of right and wrong in
the virtual world.
It is essential to have correct information
from media, proper guidance from the
infosec professionals, elimination of the lack
of trust and awareness in police by providing
dependable and responsive system to report
any crime or situation.
Support from the media is essential as even
media is all pervasive.This is expected in the form
of responsible reporting and reliable information
about risks and threats. Media houses have to
rise above TRP or circulation considerations
and undertake this as a social cause. Assistance
to this cause can be obtained from infosec
professionals; a majority of whom are always
willing to help.
Law enforcement agencies are a critical
component in the support system and must
work with media and professionals to bridge
perception gaps and provide the necessary skills
and awareness to the police force and build trust
through protection of the individual. Many state
police departments have set up helplines and
support groups for citizens; these activities need
to be expanded. A common national helpline
connected to a state network for local language
services is the way to go.
The common citizen is forgotten in the chase for
profit when ironically,it is the same common citizen
upon whom business and politics are dependent.
Without support, the citizens will be fleeced by
criminalsanditiscriticaltoreachouttothematthis
nascent stage,while the going is good.
Lack of support
Law enforcement agencies must work with media
and professionals to bridge perception gaps and
provide the necessary skills and awareness to
the police force and build trust through protection
of the individual
Threats to Individuals
16
Unsafe surfing is like flying blind. In blissful
ignorance, the individual glides through
hyperlinks; believing every word to be true,
trusting every pop-up that announces a virus
attack, is easily sucked into porn sites, and does
not believe in paying for software because cracks
are easily available for download!
This is a cultural issue and calls for change
from within. It has to do with the way individuals
think, their moral values,level of ignorance, and
awareness about piracy and pirated software,
movies, games and music, software cracks,
moral values, porn sites and about threat vectors
like phishing, spyware, malware, spam, and
insecure online transactions.Duringoursurvey,as
much as 28% of the respondents thought ‘piracy
and pirated software (including pirated movies,
games, music, cracks, and porn sites)’ as major
online threats. Phishing, spyware, malware,
spam, and insecure online transactions were
specified as the other important threats by 3% of
the respondents.
The Indinetizen is her/ his own enemy.
Pornography is as big as piracy on the internet
and is in our face directly and indirectly through
spam, phishing and other means.
Our respondents urge surfers to stay
safe. It is important that the individual
stays away from bootleg stuff or porn
sites because they are the carriers of
dangerous infections or worse.
It will be wrong to blame only the beliefs
or morals of individuals as even the
strong and ethical can be trapped. The
individual has to learn to recognize such
attacks / threats and duck them.
Unsafe surfing
it will be wrong to
blame onlythe beliefs
or morals of individuals
as even the strong and
ethical can be trapped
Threats to Individuals
Threats to Online Surfing
Percentage of respondents
who cited these as security threats
Threats to Online Surfing
0 5 10 15 20 25
Threats to online surfing
Piracy and pirated software (including pirated movies, games, music, cracks, and porn
sites)
Phishing, spyware, malware, spam, and insecure online transactions
Series1
3%
28%
28
Phishing, spyware, malware,
spam, and insecure online
transactions
Piracy and pirated software
(including pirated movies,
games, music, cracks, and
porn sites)
17India’s Top 5 Information Security Concerns: 2013
Lack of awareness is the root cause of the
evils pervasive in the internet and technology
environment. The survey respondents have
highlightedissueslikealackofgeneralawareness,
legal issues, lack of knowledge about technology
and gadgets for first level configuration, as key
areas of concern.
Nearly 21% of respondents mentioned lack of
general awareness as the primary cause behind
security threats in the case of individual IT users.
We can call it lack of general awareness or apathy
or arrogance – and the botnets seem to thrive
on apathetic systems that are mostly individual
owned making India a fairly large contributor to
the global botnet population.
The concern is that individuals seem unwilling
to learn the fundamentals of cyberspace,
considering it beyond their understanding. This
mindset has to change and individuals must
realize that this is not about technology but about
their own safety. On the one hand there is a lack
of awareness and desire to learn and on the other
hand the ignorance about illegal activities as
defined by the IT Act.
Many first timers caught engaging in cybercrime
are surprised to learn that their ‘minor’ actions
could land them in jail! It is essential for everyone
to have basic knowledge about the technologies
they use. Individuals purchase computers and
software and then do not
bother to patch, update
or apply security fixes, as
these are perceived only as
irritants or‘nags’.
One must use the internet
with all faculties on high
alert as there is danger at
every corner in the same
manner as in real life where
danger can be in the form
of speeding cars, potholes,
multistoried fire traps,
falling bridges, and so on.
Awareness
One must use the Internet
with all faculties on high
alert as there is danger
at every corner
Threats to Individuals
Individuals: Lack of Awareness as a Concern
0 5 10 15 20 25
Individuals: Lack of awareness as a concern
Lack of general awareness
Legal issues
Lack of knowledge about technology and gadgets for first level configuration
Series1
6%
1%
21%
Lack of Awareness as a Concern
Percentage of respondents
who cited these concerns
Lack of knowledge about
technology and gadgets for
first level configuration
Legal issues
Lack of general awareness
18
Innocence, greed and avarice are human
weaknesses that are easily exploited, and
schemes and schemers abound on the internet
to exploit them. The individual must exercise
caution in online life, and be alert and quick to
eliminate these weaknesses.
While it is easy to wish away one’s innocence
or greed it is difficult to execute the wish when
faced with a perennial onslaught of attacks such
as social engineering, spear phishing, financial
frauds, hoax generation frauds, lottery, 419
frauds, and transnational crimes.
Social Engineering is a trick as old as the world
itself, from the time Eve was enticed into eating
the Fruit of Knowledge to present-day internet
crimes. Cyber criminals take advantage of the
innocence and naïveté of human beings to
extract information for attacks, and to further
their own nefarious activities. Social engineering
usually leads to the next level of attacks called
spear phishing. In this case, the person who has
been ‘engineered’ may become the recipient
of targeted attacks designed for any particular
objective – infiltrate an office network, steal data,
steal personal information, compromise net
banking credentials, etc. Or their contacts and
friends are spammed for‘assistance’and money.
Greed and avarice are the evils as much in virtual
world as in real life. Lottery fraud, Nigerian 419
scams, transnational crime, and Ponzi/ MLM
schemes are everyday happenings designed to
prey on the gullible and the greedy.
The internet is a powerful medium that makes
it easy to reach out to and mobilize the masses.
Governments have been overthrown by such
movements. The same power can also be
misused by antisocial or anti-national elements
to spread terror and unrest; individuals have to
be careful and proactive in reporting about and
rooting out such elements.
Innocence, Greed, and avarice
Threats to Individuals
The Internet is a powerful
medium THAT makes it
easy to reach out to and
mobilize the masses
19India’s Top 5 Information Security Concerns: 2013
First off, we would like to thank all the people
who helped spread the word about this report
and those who have responded and supported
this initiative. There also are many who
encouraged and helped us in the analysis, and
in crafting this report.
The scientist in you may opine this is qualitative,
but then there is no other way to distill a huge
database of submissions to extract a few lines
or words of wisdom that will guide the Nation,
the Corporation, or the Citizen. This is the
result of hours and days of pouring over the
submissions, extracting the important ones,
fighting over choices or semantics, laughing at
the funny opinions, crying over facts, and finally
arriving at a few lines that pack the Indinetizen’s
potent message.
Through this report, we intend to help you assess
your preparedness (or lack of it) to deal with the
issues mentioned here or to face them. These are
pieces of a whole at the bottom of the pyramid. If
you have built your palace of information security
management system (ISMS) on a foundation with
missing blocks, you only need your child to tell
you about the excitingly dark future that awaits
you. While putting this report together, we did not
want to pick up holes in one system or the other.
Examples are quoted without any such intentions.
This report is about India and is derived from
respondents who are working in the security
domain. The observations, findings and
pronouncements relate to the Indian work and
establishment ecosystem – solutions may
be typically Indian but are universal in their
application. We welcome constructive feedback
and will strive to improve upon our work. We also
welcome volunteers who can help us in our work
on the next report.
We hope that this report will provide you with the
basics that need to be taken care of. Information
Security is increasingly critical to keep us safe and
we must make every effort to safeguard ourselves,
our corporations and the nation.
We also hope that this report will appeal to the
practical CISO who is more concerned about
functional and security effectiveness rather
than crunching percentages and numbers
about events in different companies, verticals
or countries.
The good news is that enabling essential security
practices is not rocket science. All it needs is a
dollop of common sense over ethics and basic
housekeeping practices, all the while taking care
not to overlook small things when working on
the big picture.
Conclusion
InfoSec is criticalto
keep us safe and we
must take efforts to
protect ourselves, our
corporations and
the nation
20
This report would not have been complete without the valuable contribution of the established
professionals in and out of the Information Security domain who reviewed it. We wish to thank these
professionals, friends and associates who have contributed to the effort with advice and effort. A few
people one must mention are Mrs. Sushma Ramchandran, an eminent journalist; Mr. Pavan Duggal,
eminent Cyber Law Advocate; Mr.Vickram Crishna, a well known Privacy advocate and Mr. Hitesh Dixit,
CISA, a Finance Professional employed in the BPO industry. We used resources public and private to
reach out to the information security community through social media and mailing lists, notable among
them were the Sysman-CCC News, Null, ClubHACK Mag, India InfoSec Group and LinkedIn.
Support has been extended for this report by the following organizations / individuals:
acknowledgements
21India’s Top 5 Information Security Concerns: 2013
notes
www.indiawatch.in
Engaged in India centric research, we are a knowledge
organization specializing in Management and Security
of Information / Data and related People, Processes and
Technology. We excel in providing strategic and tactical
thought leadership to governments, public and private
organizations. Our Body of Thought and Solution is the
output of our conclave of cross functional professionals
and industry leaders.We are continually working in areas
to contribute in the interest of national security, public
safety and business resilience.
Email: top5-2013@indiawatch.in
Feedback: www.indiawatch.in/top5-2013-feedback
www.clubhack.com
ClubHack is the first Indian Hacker’s conference, which
is now going international. ClubHack also started
India’s first monthly security journal. It is synonymous
with the information security profession in the country.
ClubHack is motivated by the spirit of community and
is largely responsible for popularizing open learning
in the technical InfoSec domain. Our events, articles,
videos and presentations are popular across all sections
of society and our audience is global. A truly Indian
knowledge hack through the times!
Email: top5-2013@clubhack.com
Feedback: www.clubhack.org/top5-2013-feedback
CONTACTINFORMATION

Contenu connexe

Tendances

The Technology Skills Gap 101_11MAR16v1sd
The Technology Skills Gap 101_11MAR16v1sdThe Technology Skills Gap 101_11MAR16v1sd
The Technology Skills Gap 101_11MAR16v1sdSusan Dineen
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...Kelvin Ross
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...Cory Scott
 
Analysis and Comparative Study of the Development of Technology with Artifici...
Analysis and Comparative Study of the Development of Technology with Artifici...Analysis and Comparative Study of the Development of Technology with Artifici...
Analysis and Comparative Study of the Development of Technology with Artifici...ijtsrd
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and SecurityAriantoMuditomo
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...
Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...
Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...Team Finland Future Watch
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 

Tendances (19)

The Technology Skills Gap 101_11MAR16v1sd
The Technology Skills Gap 101_11MAR16v1sdThe Technology Skills Gap 101_11MAR16v1sd
The Technology Skills Gap 101_11MAR16v1sd
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Ai in government
Ai in government Ai in government
Ai in government
 
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
 
Analysis and Comparative Study of the Development of Technology with Artifici...
Analysis and Comparative Study of the Development of Technology with Artifici...Analysis and Comparative Study of the Development of Technology with Artifici...
Analysis and Comparative Study of the Development of Technology with Artifici...
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...
Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...
Future Watch: China's Digital Landscape and Rising Disruptors - Module 2.6 Ar...
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 

En vedette

Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet ageCliff Landis
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertisingmonchai sopitka
 
Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)LawScienceTech
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 

En vedette (15)

Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet age
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Information Security
Information SecurityInformation Security
Information Security
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
 
Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
E-Business & E-Commerce Basics
E-Business & E-Commerce BasicsE-Business & E-Commerce Basics
E-Business & E-Commerce Basics
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Skimming & Scanning
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 

Similaire à India Top5 Information Security Concerns 2013

Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Saidot
 
Ca overcoming-risks-building-trust-aoda-en
Ca overcoming-risks-building-trust-aoda-enCa overcoming-risks-building-trust-aoda-en
Ca overcoming-risks-building-trust-aoda-enAnge Boris Brika
 
AI Technology Longevity Wealth Planning
AI Technology Longevity Wealth PlanningAI Technology Longevity Wealth Planning
AI Technology Longevity Wealth PlanningJDean8
 
The 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global InformationThe 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global Informationjtfoster
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of ThingsAltimeter, a Prophet Company
 
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...Social Samosa
 
200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-reportdavid19860080
 
ADAM ADLER MIAMI
ADAM ADLER MIAMI ADAM ADLER MIAMI
ADAM ADLER MIAMI AdamAdler10
 
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...IJCI JOURNAL
 
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaEthical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaRinshad Choorappara
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Readnicolleszkyj
 
Kaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engKaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engEmisor Digital
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018Peerasak C.
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruMichele Chubirka
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 

Similaire à India Top5 Information Security Concerns 2013 (20)

Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
 
Ca overcoming-risks-building-trust-aoda-en
Ca overcoming-risks-building-trust-aoda-enCa overcoming-risks-building-trust-aoda-en
Ca overcoming-risks-building-trust-aoda-en
 
AI Technology Longevity Wealth Planning
AI Technology Longevity Wealth PlanningAI Technology Longevity Wealth Planning
AI Technology Longevity Wealth Planning
 
The 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global InformationThe 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global Information
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
 
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
 
200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report
 
ADAM ADLER MIAMI
ADAM ADLER MIAMI ADAM ADLER MIAMI
ADAM ADLER MIAMI
 
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaEthical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
DOC-20221125-WA0004..pdf
DOC-20221125-WA0004..pdfDOC-20221125-WA0004..pdf
DOC-20221125-WA0004..pdf
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Read
 
Kaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engKaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_eng
 
CIPR AI and Big Data Readiness Report
CIPR AI and Big Data Readiness ReportCIPR AI and Big Data Readiness Report
CIPR AI and Big Data Readiness Report
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi Maru
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 

Plus de Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 

Plus de Dinesh O Bareja (20)

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 

Dernier

Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 

Dernier (20)

Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 

India Top5 Information Security Concerns 2013

  • 1.
  • 2. This document has been created with the joint effort of IndiaWatch and ClubHack. Released in the public domain under Creative Commons License (Attribution- Noncommercial 2.5 India) http://creativecommons.org/licenses/by-nc-sa/2.5/in/ The practices listed in this document are provided as is and as guidance. The author(s) do not claim these as the only practices to be followed. Readers are urged to make informed decisions before adopting the guidelines given in the document. In any event, the author(s) may not be held responsible for any issues arising out of the use of the information and / or guidelines included in this document. This document has been prepared for general public distribution. The guidelines provided in it are based on submissions to the online survey carried out by the authors and can be of use to peoplewhoarelookingtoinjectintelligence,resilience,securityandmoreintotheirorganizations, systems, and lives and to thwart someone else’s attempt(s) to inflict damage upon them. Organizations and individuals wanting to use this document may do so but are urged to respect professionalism and recognize that mortals need more than love and fresh air to survive. Readers are welcome to provide feedback to the authors using the contact informationprovided in this document. Copyrightand Disclaimer
  • 3. 1India’s Top 5 Information Security Concerns: 2013 It’s time we identified what ails the information security efforts in India. It’s time we used India-centric information and localized knowledge and intelligence to counter the threats and risks that keep growing alongside advances in technology. This report,jointly prepared by IndiaWatch and ClubHack,is about India and is based on submissions to an online survey of hundreds of information security professionals from India and abroad. IndiaWatch is an India centric research and knowledge organization in the Information / Data management and security domain with a mission to seek opportunities to work and contribute to enhancing the national security posture. ClubHack is the first Indian Hacker’s conference and monthly magazine. Synonymous with the information security profession in the country today, ClubHack is largely responsible for popularizing free and open learning in the technical InfoSec domain. Why a new study? Numerous annual threat and risk predictions are published globally–some are relevant to India, some are not. While some of these reports are reliable, many are vendor-driven or influenced by vested interests. Although these reports help in focusing on security issues, none, surprisingly, help to look at missing perspectives or perceptions, or at issues arising out of behavior or work culture–the weaknesses that contribute to the ‘insecurity’ of information security. We intend to highlight these concerns for India the Nation, the Indian Business, and the Indian Netizen. This report offers a straightforward presentation of systemic concerns as expressed by our survey’s respondents. Our respondents want you to look within–engage in an internal debate, light up your Dimaag Ki Batti 1 and experience your Eureka moment. Rather than worrying about risks and threats, one should work to address these InfoSec concerns or issues. We present India’s Top 5 Information Security Concerns: 2013. 1 Dimaag Ki Batti: A Hindi phrase that literally means ‘light a lamp in your mind’. preamble
  • 4. 2 Executive Summary......................................... 3 National Issues Awareness......................................................... 4 Obsession with control and power................... 5 Technology........................................................ 6 Ignorance, capability and leadership............... 7 Data obsession.................................................. 8 Corporate Concerns Awareness......................................................... 9 Information security management.................. 10 Weaknesses during implementation............... 11 ‘It cannot happen to me’ syndrome................. 12 Underestimation of technology........................ 13 Threats to Individuals Social media...................................................... 14 Lack of support................................................. 15 Unsafe surfing................................................... 16 Awareness......................................................... 17 Innocence, greed, and avarice.......................... 18 Conclusion........................................................ 19 Acknowledgements....................................... 20 Notes.................................................................... 21 contents
  • 5. 3India’s Top 5 Information Security Concerns: 2013 India is recognized as a global leader in the technologydomain.Theprevalenceoftechnology in every aspect of life in the country is growing exponentially, keeping pace with global trends. Gigantic projects like UIDAI-Aadhaar, CCTNS, NatGrid, NPR and state/ national eGovernance initiatives are leveraging technology to reach out to the remotest parts of India. One by-product of this spread of technology is the rise in electronic crimes and frauds. Much has been done at various levels to deal with cybercrimes and security incidents, but something seems to be missing still. To identify the missing factor, we surveyed a large number of professionals in IT, IS and other domains, requesting them to share their top five India- specific concerns in three segments: • The Nation • The Corporation or Business • The Citizen Respondents were asked not to list out the risks and threats usually found in security reports but to think of the missing strategic, operational, tactical, behavioral and cultural weakness. This report presents the views and observations of theinformedIndianprofessionalswhofacesystemic shortcomings and a general lack of awareness of impending threats on a daily basis. Data for the survey was collected through an online form: http://goo.gl/VFNqm The unstructured survey responses were segregated and thoroughly analyzed to arrive at the Top 5 concerns in each category. Some interesting survey highlights are given below: • 89% of the total respondents expressed grave concerns about the lack of awareness and the need for more security knowledge. • Leadership at the government and corporate level must step up to learn and understand technology and lead by example. Although it has been 13 years since the IT Act was promulgated, the technological illiteracy in government and business is appalling. Trouble will not disappear by ignoring it; we have to wake up to critical issues such as poor infrastructure, espionage, counter-productive policies, and capacity and skill shortages. • Government, corporations and people have to change the way they think and act about issues related to technology and internet. The virtual world is a new frontier where the assumptions of the‘real’world do not always hold true. 44% 22% 16% 14% 4% West South North East Overseas Geographic Distribution of Respondent Sample Geographic Distribution of Respondent Sample Percentage of respondents West South North East Overseas Percentage of respondents 22% 18% 12%8% 6% 6% 6% 6% 6% 4% 4% 2% 2% ISConsultants ISProfessionals Ethical Hackers BFSI Academics Government ITDev & BPO Students Telcos NGO Trading/Mfg Hospitality Training Respondent Profile Respondent Profile IS Consultants IS Professionals Ethical Hackers BFSI Academics Government IT Dev & BPO Students Telcos NGO Trading/Mfg Hospitality Training Executive Summary
  • 6. 4 Awareness is the most abused word in the InfoSec lexicon. Every ‘expert’ swears this as the best and most effective antidote for InfoSec ill, but a few have walked the talk or done something constructive. Awareness remains a pipe dream – to be smoked in public, lamented in private. This was the one common area of concern in all submissions, and it appears in many variations: lack of training, lack of informed policy makers, apathy, indifference, ignorance, arrogance, lack of acceptance of criticism, the perception of a lack of willingness. Amongst those who cited Awareness as a concern, close to 32% mention ‘Lack of Training’ as the key concern. ‘Absence of informed policy makers’ and ‘Perception of lack of willingness’ (20%) followed as two other main concerns. A lot of attention is given to the shortage of information security professionals in the country – but little is done to solve the problem. Aging technology assets are widespread, and planned policies greatly lacking across the establishment. Compounding this concern is the indifference to cyber security risks, technical naiveté, ignorance, and the lack of willingness to take action. When the government lacks expertise and knowledge, it should be open to invite contributions from civil society. High levels of arrogance in the establishment and the total lack of acceptance of any form of criticism is of grave concern on this front. Demonstration of demonic reactions by government, bureaucrats and (politically connected) individuals and the continued lack of empathy provide ample evidence of this attitude. India is suffering from internal strife, cross- border aggression and illegal immigration. It is critically important to address cyber security concerns on all fronts at one go. There are too many wrongs happening. For all we know, there may be a security tsunami rising quietly. Awareness remains a pipe dream to be smoked in public, lamented in private NationalIssues Awareness Awareness related concerns Percentage of respondents who cited these concerns Lack of training Lack of informed policy makers Perception of a lack of willingness Ignorance Indifference Arrogance Apathy Lack of acceptance of criticism 33% 20% 20% 9% 6% 6% 4% 2% Awareness related concerns Lack of training lack of informed policy makers perception of a lack of willingness ignorance indifference arrogance apathy lack of acceptance of criticism
  • 7. 5India’s Top 5 Information Security Concerns: 2013 Obsession with control and power is the hallmark of politicians and bureaucrats. Every effort is made to suppress dissent. In this context, the national executive must reexamine issues like: • Central control • Inter-department rivalry • Turf wars and jurisdiction issues • Outdated laws and lack of knowledge (or understanding) in the law enforcement agencies • Counter-productive policy measures • Delayed response to disclosures • A discouraging attitude Central control is proven to be good for cyber security control, but unfortunately, it is in often in the hands of an officer with no interest in technology. Archaic laws and the law making process need a reality check. While technology and life have changed over the past decade,we continue to live under the yoke of century-old laws. Even newer laws such as the IT Act continue to disappoint in enforcement. Lawmakers have to understand the medium (the internet) for which laws are enacted, and the legislation must include a vision for the future. Inspiration is not far away if we look at the Constitution – farsightedness and public good are enshrined in the document. A discouraging attitude towards the citizens’ needs and counter-productive policy measures demonstrate arrogance and should be curbed with good governance and policies. Technology risks, threats, and incidents require quick attention. A solution to this can be a National Security Organization as an additional constitutional wing apart from the Legislature, Executive and Judiciary. As a nation, we have successfully reinvented ourselves throughout the centuries under different rulers, religions, and languages. In the present day and age, internet technology demands a change of mindset and this has to first happen at the national executive level, setting the tone at the top. Inspiration is not far away ifwe look at the Constitution — farsightedness and public good are enshrined in the document Obsession with control and power National Issues
  • 8. 6 Technology,surprisingly,was not a grave concern area for our respondents! Its blind acceptance is what troubled them more. If the world is deploying some new technology, it is quickly and blindly included in our system without thought about the need, capability or localization. The rapid growth of technology itself is responsible for the rising risks and threats. The scenario is not pleasant when there are obvious weaknesses in technical knowhow, availability of skilled manpower, proliferation of attack vectors (like DDOS , botnets, malware, etc.), non-state and state sponsored attacks, and targeted attacks. Amongst those who cited technology concerns, 53% expressed ‘Proliferation of attack vectors like DDOS’ as a major issue. ‘(Absence of) technical knowhow’ (15%) and ‘CCTV and other technologies lying unused or inefficient’ (13%) were the other major technology-related concerns expressed by respondents. Though India has a vast pool of IT talent, when we get down to the brass tacks, there seems to be a lack of technical knowhow. Time and again, teams have to depend on overseas experts for specialist skills! The problem is evident when departments blindly implement technologies having been sold on the features or just because some other governments have purchased them or because the world is talking about them.There are numerous instances of compromise and national loss due to unused or defunct systems. Although the shortfall of skilled InfoSec professionals has been highlighted at the highest levels of the government, nobody seems to be serious. Even though hiring is based on need, these departments are usually short of funds or are not given hiring plans. How is anyone expected to close the capacity gap with a hiring freeze and lack of executive / budgetary support is anyone’s guess. While technology provides tremendous computing power it also brings new risks to one’s doorsteps. As a nation, we must wake up to the realities of the damage that can be wrought by various threat vectors as mentioned earlier. Technology The rapid growth of technology itself is responsible for the rising risks and threats National Issues Technology Concerns ProliferationofattackvectorslikeDDOS Technical knowhow CCTV and other technologies lying unused or inefficient Availability of skilled manpower Non-state and state sponsored attacks Malware Targeted attacks 53% 15% 13% 9% 6% 2% 2% Proliferation of attack vectors like DDOS Technical knowhow CCTV and other technologies lying unused or inefficient Availability of skilled manpower Non-state and state sponsored attacks Malware, Targeted attacks Technology Concerns Percentage of respondents who cited these concerns
  • 9. 7India’s Top 5 Information Security Concerns: 2013 The speed of change in the world of internet and technology has to be matched in thought and action. Else, we will soon see a steep decline in preparedness and spend a lifetime playing catch-up. Espionage is real, played subtly, using tools like social engineering, APTs, malware and botnets. There is also the high level of dependency on foreign equipment and technology knowhow; so how does one know how safe one is? Cloak- and-dagger is passé; now is the age of ‘cloak and keyboard’. Urgent action needed International research groups have exposed espionage networks operating on Indian national infrastructure on multiple occasions. Lack of significant reaction demonstrates the missing large-scale counterattack capability, infrastructure and leadership weakness. We are surrounded by hostile neighbors in cyberspace too. Large-scale destruction from cyber attacks has been seen all over the Middle East – there is no way we can say that we are not vulnerable. We often see knee jerk statements from government sources,showing the reactive nature that governs national security thought leadership. This has to change to a mature planning process. In the absence of cyber security capabilities, we stick our head into the sand wishing the problem will go away.This is evidently demonstrated in the slow pace of action (or inaction), the lack of funds for hiring and capacity creation,and the low levels of preparedness or urgency. Ignorance, capability and leadership Cloak-and-dagger is passé; now is the age of cloak and keyboard National Issues
  • 10. 8 We once lived in a ’license raj’ where we had to provide data to the government for all types of things. The more files and papers we had, the greater our importance. And the more information we gave, the more the establishment demanded – it was like the mythical Bakasura 2 – never satiated and not under control till the day good triumphs over evil. Our respondents are concerned about the lack of control over the private data collection entities, the obsession with data, and multiple data stores being created by all. The national obsession with data is well known – we have lived and grown up with ration cards, voter cards, domicile certificates, caste certificates, BPL 3 cards, KYC 4 , UID 5 and NPR 6 . Every scheme requires citizens to submit new forms filled with the same data. Extensive data resides in systems at the state and the national level. This can be merged and mined to create joint resources at the national level and be channeled into creating resilient and secure databases and policies – the resulting resource savings will be colossal. In developed countries, a single number is allotted to an individual at birth and remains valid through the lifetime of the individual – with safeguards that have matured over the decades. The government has demonstrated its lack of control over citizen data with the absence of a firm policy statement related to handling of data and its purpose of use. As an example, Aadhaar was announced as a voluntary scheme, but every day there is a new announcement where Aadhaar is declared to be compulsory for one or the other basic service, such as bank accounts and cooking gas connections. Ironically, a citizen has no choice but to submit to the establishment when it comes to their data collection exercises. If a person does not want to enroll for UID, she / he will be excluded from the banking system despite the government’s assurance that UID is not compulsory for a bank account. On the other hand, passports are not accepted in courts where the authorities demand a ration card for personal identification. Even at this nascent stage, there are regular reports of fraudulent registrations and lax handling. Private data collection entities follow the example of laxity displayed by the government. In the absence of privacy legislation, the banks, telecommunications and insurance companies show scant respect for personal identifiable information (PII), and blatantly share or sell it. Their nuisance value was demonstrated when even the Commerce Minister received spam calls during a Cabinet meeting. During our survey, more than 60% respondents cited fraud, identity theft, and data security as significant national concerns. Data obsession 2 Bakasura: A demon described in the Hindu epic, The Mahabharata. He forced the kings in the vicinity to send him food and provisions which he devoured along with the men who carried them. Was killed by Bhima in a fight. 3 BPL: Below poverty line 4 KYC: Know your customer 5 UID: Unique Identification 6 National Population Register (NPR) is an initiative of the Government for registration of citizens. National Issues data collection entities follow the example of laxity displayed bythe government
  • 11. 9India’s Top 5 Information Security Concerns: 2013 The problem with this area in Information Security is that everyone knows that it should be done. Everyone talks about it, but does nothing about it, except–talk! Every respondent who participated in the survey mentioned lack of adequate awareness about Information Security as a critical issue with India’s corporations. Close to 7% respondents attributed lack of awareness to the attitude that: • Information security is more about compliance than risk containment • Awareness programs are clubbed with training • Awareness is not really built into corporate culture In corporations, ‘security awareness’ is reduced to running a program rather than deriving value from it. A shift in mindset is needed here. This relates to people, process, technology, continuity, availability, and confidentiality, and should not be considered only for compliance. The organizations’CXOs should delink awareness from training. It is critical to make the move towards building a culture of safe computing (safe information management and security) in the same manner as executive management works to build an aggressive culture for growth through sales, innovation, and customer satisfaction. Training and awareness have different objectives and must be treated differently. Metrics for each has to be different, but it is not so currently. Awareness as a (soft) control suffers, and delivers no value. Awareness Training and awareness have different objectives and must be treated differently Corporate Concerns
  • 12. 10 Information security management is of great concern to respondents. It appears that the essential tenets of an InfoSec management system are themselves a source of weakness, exposing the organization to threats and risks. The areas of highest concern are poor policies, weak audits and compliance, L-1 purchasing, certification for the sake of certification, lack of monitoring, rogue and privileged accounts, and more. The general consensus is that corporations must responsibly ensure strong processes for IS management. A number of IS consultants and professionals wrote about lack of effective policies in corporations. Shoddy cut-paste jobs provide poor policy documents and when this is combined with weak audits, compliance, and enforcement, we have the ingredients for an IS disaster in the making. Throw peanuts, get monkeys The private sector is inspired by the public sector and has etched the L-1 mindset into their procurement processes. The lowest bidder who walks away with the contract may be the least capable or the most corrupt. The buyer suffers because of this L-1 purchase, but lives with the pain and is even found lobbying for a security award to cover up the failures. Hiring and purchase revolve around ‘negotiation skills’, a politically correct term for bringing in the lowest bidder without thought about quality. Along with awards, organizations seek certificates for the sake of certificates. Many certifying bodies will oblige too with low fees and weak audits. The result is a framed certificate to hang on the wall, having less value than toilet paper in terms of effectiveness or usefulness. A cliché in InfoSec conversations is that the insider is the biggest threat but our respondents caution readers against privileged users and senior management. Other vulnerabilities are the convenience user accounts created by the tech team(s), and the accounts which are ‘orphan’ or those that remain undeleted even after the users leave the organization. All these are easy pathways into the system and very few companies have a grip on the problem. Logs are usually not enabled because of additional hardware investment requirements, but even when logs are available, no one seems to be looking at them! It is easy to set up an information security management system (ISMS) and get certified but information security management is hardly about getting certificates. If one starts from the bottom and builds up, it will work. Unfortunately, everyone is looking for shortcuts and often overlook the essentials. It is easyto set up an ISMS and get certified but information security management is hardly about getting certificates Information security management Corporate Concerns
  • 13. 11India’s Top 5 Information Security Concerns: 2013 The implementation of any asset or process must be a properly planned activity entrusted to qualified teams. While there is evidence that procedures are followed for security implementations, something or the other is often missing, creating a weakness in the security ecosystem. Our respondents identified inefficient security implementation, weak process for patch management, piracy, pirated software resulting in malware, and encryption as major concerns. The first step must be firm and strong, but when this step itself is flawed, one can be assured of mayhem. Inefficient security implementations result from wrong first steps. Weak controls, workarounds, privilege mismanagement, lack of will to enforce policies, me-too technologies, and a lack of strong hiring practices are amongst the many wrong practices that result in weak information security management system (ISMS). Patch management should be by habit but the real habit observed is procrastination. Time and again, corporations have been victims of breaches through systems that are not updated / patched. It is common knowledge that there is large-scale acceptance of piracy across the country. Cracks, keygens, dubious license keys and installers are exchanged across networks without thought about IPR violations or the threat of malware entering corporate networks, or the risk of penalties arising out of non-compliance. Weaknesses during implementation Time and again, corporations have been victims of breaches through systems that are not updated or patched Corporate Concerns
  • 14. 12 This is a common affliction across organizations — the small guy thinks he is too small to be of interest to a hacker, and the big guy thinks he is too strong to be attacked. Both fail to realize that the joke is on them and that a blackhat may already have them in his crosshairs waiting for the right time to pwn 7 them. While we are aware of the dangers lurking around us, our sense of fatality prevents us from addressing concerns such as espionage, commercial rivalry, insider threats, management apathy, ignorance of the current state, etc. ’It cannot happen to me’ syndrome was opined to be a significant concern by a whopping 51% of the total respondents. Within these, 34% cited ‘Insider threats’ as a major concern while 25% each cited ‘Espionage’ and ‘Commercial rivalry’ as other serious concerns. Espionage has become easy for the smart and aggressive operator, and the key threat vectors to look out for are data theft, phone tapping, keyloggers and advanced malware. Executive management must realize that the results of successful espionage are felt by shareholders and the nation and that it is not merely a commercial loss for the company. Taking care to harden systems and increase monitoring will help contain loss of IPR,contracts, and revenue. Survey respondents believe that little is being done about silent attacks on management assets in the form of espionage or downright damage, and this is due to management apathy – which is a manifestation of a different type of insider threat. We have addressed insiders and senior management in a different context but apathy is a weakness in thought and leadership that leaves the organization open to pillage and plunder. ‘It cannot happen to me’ syndrome The small guy thinks he is too small to be of interest to a hacker, and the big guythinks he is too strong to be attacked 7 Pwn: In information security, to pwn is to compromise or control another computer / application / site / gateway device. Corporate Concerns ‘It Cannot Happen to me’syndrome Insider threat Espionage Commercial rivalry Management apathy Ignorance of current state 34% 25% 25% 15% 1% Insider threat Espionage Commercial rivalry Managementapathy Ignoranceof currentstate ‘It Cannot Happen to me’syndrome Percentage of respondents who cited these concerns
  • 15. 13India’s Top 5 Information Security Concerns: 2013 Underestimation of technology is another problem area driven by ignorance at the top due to the absence of professional threat / risk intelligence. Technology risks or benefits are usually intangible and claims of loss or success are always regarded with suspicion. Risks and threats created by technology cannot be wished away or ignored, especially vectors of high concern like botnets, virus/APT, no logs, ransomware, rogue and unauthorized software installations, slow adoption of new technologies, etc.. The survey respondents feel that corporations are not paying attention to the risks they face and that there may be a heavy price to pay in the due course. Incidentally, of the total number of respondents, 12% cited ‘Hacktivism’ as a rising information security concern whose threat is underestimated by India’s corporates. From MMSes and morphed pictures, we are seeing criminals moving to identity theft and targeted financial crimes. Botnets, ready-to- use viruses, 0-days, APTs and such tools can be easily purchased online along with required support and help for successful use. This makes it easy for anyone to launch an attack against any corporation; unfortunately, most are unprepared for a technical onslaught. The issue is with technology being taken for granted and with managements seeing it in the form and color that is comfortable to them. This is the big concern as managements often underestimate the resultant damage. Users freely install rogue or unauthorized software and thus provide backdoors into the corporate infrastructure. When logs are not collected and analyzed in real time, malicious network infiltration goes unidentified. Survey respondents opine that we shall soon see ransom demands as it is a simple and easy vector. Crime gangs will find it a cakewalk to move from real life kidnappings to diginapping in the virtual world, which will be more lucrative and anonymous. Ransomware exists, is the message for the corporate head in the sand, and it is time to take immediate measures for protection against such threats. Another culprit identified by our respondents is the slow adoption of new technologies. The pace of adoption is governed by the principle of denial – if the new technology is free, adoption is quick, but if money has to be spent then it is wished away until the world has adopted it. Technical threats or risks are not visible and when the user feels that things are ‘taken care of’ or ‘okay’ once the machine is powered down! Managements must stay away from such delusions and make every effort to learn and understand the risks built into the operations fabric of the corporations. It’s time corporations encouraged technology and security schooling for professionals who are not related to technology or InfoSec. Underestimation of technology Survey respondents opine that we shall soon see ransom demands as it is a simple and easyvector Corporate Concerns
  • 16. 14 The great Indian joint family has been resurrected on the pages of Facebook, Google+, and others. Cousins far removed can see each other from birth and exchange their first words. Kids have accounts before they are born, forget walking, talking or burping. With all this good happening in our social lives, our respondents (who are active on social media) say this is a huge concern area for the average Indian citizen – the Indinetizen. Users have yet to realize that there are risks to individual privacy arising from government monitoring, stalking, misinformation through social media, uninformed children activity, and much more. ‘Misinformation through social media’ was seen as the key issue by 14% of the total respondents. Social media and online posts must be used intelligently and with a great deal of thought. We may guard our personal lives closely, but that privacy is easily breached when we or our friends post personal information and pictures. Social media has brought everyone on the same platform – the government, the criminals, the gullible, the greedy, as well as the naïve and harmless good guys. The internet is called a level playing field but it is a virtual toy store for criminals and mischief mongers who can stalk, steal identities, run scams and damage reputations. Our respondents are concerned about the well-being (financial, mental and physical) of the innocent user who is being targeted by criminals or the government machinery for their own purposes. Children especially are high risk targets and a majority of parents are unaware of their children’s internet activities. Parents take great pains to oversee their kids’ playground activities, but overlook the cyberspace where kids are alone, befriend the strangers, accept gifts from them and inadvertently put their lives in danger. The risk is not only for children who are snared with gifts, but teens and adults who post sensitive content (personal, family, or business related) that may be considered objectionable and illegal. Claiming ignorance of law will not help reverse or avoid damage. Social media Misinformation through social media was seen as the key issue by 14% of the total respondents Threatsto Individuals
  • 17. 15India’s Top 5 Information Security Concerns: 2013 Lack of support is pervasive. Governments and corporations are struggling to understand and tame the phenomenon called the internet, and the so called know-it-alls provide quick fixes and remedies or snake oil. The individual struggles to make sense of right and wrong in the virtual world. It is essential to have correct information from media, proper guidance from the infosec professionals, elimination of the lack of trust and awareness in police by providing dependable and responsive system to report any crime or situation. Support from the media is essential as even media is all pervasive.This is expected in the form of responsible reporting and reliable information about risks and threats. Media houses have to rise above TRP or circulation considerations and undertake this as a social cause. Assistance to this cause can be obtained from infosec professionals; a majority of whom are always willing to help. Law enforcement agencies are a critical component in the support system and must work with media and professionals to bridge perception gaps and provide the necessary skills and awareness to the police force and build trust through protection of the individual. Many state police departments have set up helplines and support groups for citizens; these activities need to be expanded. A common national helpline connected to a state network for local language services is the way to go. The common citizen is forgotten in the chase for profit when ironically,it is the same common citizen upon whom business and politics are dependent. Without support, the citizens will be fleeced by criminalsanditiscriticaltoreachouttothematthis nascent stage,while the going is good. Lack of support Law enforcement agencies must work with media and professionals to bridge perception gaps and provide the necessary skills and awareness to the police force and build trust through protection of the individual Threats to Individuals
  • 18. 16 Unsafe surfing is like flying blind. In blissful ignorance, the individual glides through hyperlinks; believing every word to be true, trusting every pop-up that announces a virus attack, is easily sucked into porn sites, and does not believe in paying for software because cracks are easily available for download! This is a cultural issue and calls for change from within. It has to do with the way individuals think, their moral values,level of ignorance, and awareness about piracy and pirated software, movies, games and music, software cracks, moral values, porn sites and about threat vectors like phishing, spyware, malware, spam, and insecure online transactions.Duringoursurvey,as much as 28% of the respondents thought ‘piracy and pirated software (including pirated movies, games, music, cracks, and porn sites)’ as major online threats. Phishing, spyware, malware, spam, and insecure online transactions were specified as the other important threats by 3% of the respondents. The Indinetizen is her/ his own enemy. Pornography is as big as piracy on the internet and is in our face directly and indirectly through spam, phishing and other means. Our respondents urge surfers to stay safe. It is important that the individual stays away from bootleg stuff or porn sites because they are the carriers of dangerous infections or worse. It will be wrong to blame only the beliefs or morals of individuals as even the strong and ethical can be trapped. The individual has to learn to recognize such attacks / threats and duck them. Unsafe surfing it will be wrong to blame onlythe beliefs or morals of individuals as even the strong and ethical can be trapped Threats to Individuals Threats to Online Surfing Percentage of respondents who cited these as security threats Threats to Online Surfing 0 5 10 15 20 25 Threats to online surfing Piracy and pirated software (including pirated movies, games, music, cracks, and porn sites) Phishing, spyware, malware, spam, and insecure online transactions Series1 3% 28% 28 Phishing, spyware, malware, spam, and insecure online transactions Piracy and pirated software (including pirated movies, games, music, cracks, and porn sites)
  • 19. 17India’s Top 5 Information Security Concerns: 2013 Lack of awareness is the root cause of the evils pervasive in the internet and technology environment. The survey respondents have highlightedissueslikealackofgeneralawareness, legal issues, lack of knowledge about technology and gadgets for first level configuration, as key areas of concern. Nearly 21% of respondents mentioned lack of general awareness as the primary cause behind security threats in the case of individual IT users. We can call it lack of general awareness or apathy or arrogance – and the botnets seem to thrive on apathetic systems that are mostly individual owned making India a fairly large contributor to the global botnet population. The concern is that individuals seem unwilling to learn the fundamentals of cyberspace, considering it beyond their understanding. This mindset has to change and individuals must realize that this is not about technology but about their own safety. On the one hand there is a lack of awareness and desire to learn and on the other hand the ignorance about illegal activities as defined by the IT Act. Many first timers caught engaging in cybercrime are surprised to learn that their ‘minor’ actions could land them in jail! It is essential for everyone to have basic knowledge about the technologies they use. Individuals purchase computers and software and then do not bother to patch, update or apply security fixes, as these are perceived only as irritants or‘nags’. One must use the internet with all faculties on high alert as there is danger at every corner in the same manner as in real life where danger can be in the form of speeding cars, potholes, multistoried fire traps, falling bridges, and so on. Awareness One must use the Internet with all faculties on high alert as there is danger at every corner Threats to Individuals Individuals: Lack of Awareness as a Concern 0 5 10 15 20 25 Individuals: Lack of awareness as a concern Lack of general awareness Legal issues Lack of knowledge about technology and gadgets for first level configuration Series1 6% 1% 21% Lack of Awareness as a Concern Percentage of respondents who cited these concerns Lack of knowledge about technology and gadgets for first level configuration Legal issues Lack of general awareness
  • 20. 18 Innocence, greed and avarice are human weaknesses that are easily exploited, and schemes and schemers abound on the internet to exploit them. The individual must exercise caution in online life, and be alert and quick to eliminate these weaknesses. While it is easy to wish away one’s innocence or greed it is difficult to execute the wish when faced with a perennial onslaught of attacks such as social engineering, spear phishing, financial frauds, hoax generation frauds, lottery, 419 frauds, and transnational crimes. Social Engineering is a trick as old as the world itself, from the time Eve was enticed into eating the Fruit of Knowledge to present-day internet crimes. Cyber criminals take advantage of the innocence and naïveté of human beings to extract information for attacks, and to further their own nefarious activities. Social engineering usually leads to the next level of attacks called spear phishing. In this case, the person who has been ‘engineered’ may become the recipient of targeted attacks designed for any particular objective – infiltrate an office network, steal data, steal personal information, compromise net banking credentials, etc. Or their contacts and friends are spammed for‘assistance’and money. Greed and avarice are the evils as much in virtual world as in real life. Lottery fraud, Nigerian 419 scams, transnational crime, and Ponzi/ MLM schemes are everyday happenings designed to prey on the gullible and the greedy. The internet is a powerful medium that makes it easy to reach out to and mobilize the masses. Governments have been overthrown by such movements. The same power can also be misused by antisocial or anti-national elements to spread terror and unrest; individuals have to be careful and proactive in reporting about and rooting out such elements. Innocence, Greed, and avarice Threats to Individuals The Internet is a powerful medium THAT makes it easy to reach out to and mobilize the masses
  • 21. 19India’s Top 5 Information Security Concerns: 2013 First off, we would like to thank all the people who helped spread the word about this report and those who have responded and supported this initiative. There also are many who encouraged and helped us in the analysis, and in crafting this report. The scientist in you may opine this is qualitative, but then there is no other way to distill a huge database of submissions to extract a few lines or words of wisdom that will guide the Nation, the Corporation, or the Citizen. This is the result of hours and days of pouring over the submissions, extracting the important ones, fighting over choices or semantics, laughing at the funny opinions, crying over facts, and finally arriving at a few lines that pack the Indinetizen’s potent message. Through this report, we intend to help you assess your preparedness (or lack of it) to deal with the issues mentioned here or to face them. These are pieces of a whole at the bottom of the pyramid. If you have built your palace of information security management system (ISMS) on a foundation with missing blocks, you only need your child to tell you about the excitingly dark future that awaits you. While putting this report together, we did not want to pick up holes in one system or the other. Examples are quoted without any such intentions. This report is about India and is derived from respondents who are working in the security domain. The observations, findings and pronouncements relate to the Indian work and establishment ecosystem – solutions may be typically Indian but are universal in their application. We welcome constructive feedback and will strive to improve upon our work. We also welcome volunteers who can help us in our work on the next report. We hope that this report will provide you with the basics that need to be taken care of. Information Security is increasingly critical to keep us safe and we must make every effort to safeguard ourselves, our corporations and the nation. We also hope that this report will appeal to the practical CISO who is more concerned about functional and security effectiveness rather than crunching percentages and numbers about events in different companies, verticals or countries. The good news is that enabling essential security practices is not rocket science. All it needs is a dollop of common sense over ethics and basic housekeeping practices, all the while taking care not to overlook small things when working on the big picture. Conclusion InfoSec is criticalto keep us safe and we must take efforts to protect ourselves, our corporations and the nation
  • 22. 20 This report would not have been complete without the valuable contribution of the established professionals in and out of the Information Security domain who reviewed it. We wish to thank these professionals, friends and associates who have contributed to the effort with advice and effort. A few people one must mention are Mrs. Sushma Ramchandran, an eminent journalist; Mr. Pavan Duggal, eminent Cyber Law Advocate; Mr.Vickram Crishna, a well known Privacy advocate and Mr. Hitesh Dixit, CISA, a Finance Professional employed in the BPO industry. We used resources public and private to reach out to the information security community through social media and mailing lists, notable among them were the Sysman-CCC News, Null, ClubHACK Mag, India InfoSec Group and LinkedIn. Support has been extended for this report by the following organizations / individuals: acknowledgements
  • 23. 21India’s Top 5 Information Security Concerns: 2013 notes
  • 24. www.indiawatch.in Engaged in India centric research, we are a knowledge organization specializing in Management and Security of Information / Data and related People, Processes and Technology. We excel in providing strategic and tactical thought leadership to governments, public and private organizations. Our Body of Thought and Solution is the output of our conclave of cross functional professionals and industry leaders.We are continually working in areas to contribute in the interest of national security, public safety and business resilience. Email: top5-2013@indiawatch.in Feedback: www.indiawatch.in/top5-2013-feedback www.clubhack.com ClubHack is the first Indian Hacker’s conference, which is now going international. ClubHack also started India’s first monthly security journal. It is synonymous with the information security profession in the country. ClubHack is motivated by the spirit of community and is largely responsible for popularizing open learning in the technical InfoSec domain. Our events, articles, videos and presentations are popular across all sections of society and our audience is global. A truly Indian knowledge hack through the times! Email: top5-2013@clubhack.com Feedback: www.clubhack.org/top5-2013-feedback CONTACTINFORMATION