cyber threats from neibhouring countries

20
The Slides………. 06/18/22 IPR & Cyber law Presentaion by AKAA Group.... 1

Upload: karjan

Post on 25-Jun-2015

502 views

Category:

Technology


1 download

DESCRIPTION

Karjan Basumatary has presented this PPT as a class participation at International School of Information Management, University of Mysore

TRANSCRIPT

Page 1: Cyber Threats From Neibhouring Countries

The Slides……….

04/13/23IPR & Cyber law Presentaion by AKAA Group....1

Page 2: Cyber Threats From Neibhouring Countries

Presented By: Karjan Basumatary

04/13/23IPR & Cyber law Presentation by AKAA Group....2

CYBER INSURGENCY THREATS FROM NEIGHBOURING COUNTRIES

Page 3: Cyber Threats From Neibhouring Countries

Contents

04/13/23IPR & Cyber law Presentaion by AKAA Group....3

• Introduction• Cyber threats Groups & Actors• The cyber threats Actors• Types of Threats and Attacks• Cyber threats from Neighbor• India’s stand on dealing Insurgency• Protection of Corporate network• Blue print for combating cyber threats• Conclusion• References

Page 4: Cyber Threats From Neibhouring Countries

Introduction

04/13/23IPR & Cyber law Presentaion by AKAA Group....4

A nuclear war may not be on the immediate horizon, but a cyber war is and it has the potential to bring major cities worldwide to a standstill, affecting everything from banking, traffic networks, hospitals and even electricity grids. These are now the focus of a new security front worldwide.

It’s pretty clear now there is underway a type of cyber arms race, both to be able to pick up and also to secure data per se, but also, in fact, to be able to target or to defend those countless crucial functions of a contemporary society.

Page 5: Cyber Threats From Neibhouring Countries

What is Cyber Threat

04/13/23IPR & Cyber law Presentaion by AKAA Group....5

‘Cyber threat’ is a threat that percolates or infiltrates through the use of computers , internet or interconnected communication devices and could comprise of information stealth, cyber warfare, virus attacks, cyber terrorism, hacking attempts , phising,

sabotage, singly or in combination.

Page 6: Cyber Threats From Neibhouring Countries

Cyber threat Groups & Actors

04/13/23IPR & Cyber law Presentaion by AKAA Group....6

EspionageState-sponsored or corporate electronic spyingTypically “open source” data collection

Terrorist groupsCovert communications channels

Criminal actionsCredit card theft, child pornography, copyright infringementSpyware and other unauthorized cyber tracking softwarePhishing emails and fake websitesEncrypting files followed by extortion to unencrypt.

HackersWorms, viruses, malicious software, website defacements,

and adolescent pranks

Page 7: Cyber Threats From Neibhouring Countries

Types of Threats and Attacks

04/13/23IPR & Cyber law Presentaion by AKAA Group....7

MalwareBotnetsCyber warfareThreats to VOIP & Mobile

convergence

Page 8: Cyber Threats From Neibhouring Countries

04/13/23IPR & Cyber law Presentaion by AKAA Group....8

Page 9: Cyber Threats From Neibhouring Countries

Video of Cyber Threat

04/13/23IPR & Cyber law Presentaion by AKAA Group....9

Page 10: Cyber Threats From Neibhouring Countries

Trends for Cyber threats

04/13/23IPR & Cyber law Presentaion by AKAA Group....10

Malicious attackers will install malware on social networking sites leading to increased phising scams, or stealing data,etc- browser level protection needed.

Hackers will install malcode within video content which will affect users accessing video clips.

Mash up technology used by web applications to combine data/media from multiple sources, locations and coding styles may lead to increased corporate espionage and other scams

Identity thefts will only increase and botnets will be used for corporate espionage and phising scams

Polymorphic exploitation- creation of unique exploit with each user request –signature based protection engines at network or host level fail .

Growing popularity of VOIP applications-instances of voice spam and voice phising or smishing will increase.

Targeted attacks -Attack activity through e-mail, Instant messaging ,P2P networks will increase

Denial of service affecting voice infrastructure

Cyber terrorist attacks will increase and lead to cyber warfare- threat to nation’s sovereignty

MMS scams will be on the rise and raise issues of defamation and invasion of privacy

Page 11: Cyber Threats From Neibhouring Countries

Striking Facts

04/13/23IPR & Cyber law Presentaion by AKAA Group....11

According to a report compiled by Panda Labs, in 2008, 10 million bot computers were used to distribute spam and malware across the Internet each day.

Annual take by theft-oriented cyber criminals is estimated to be as high as 100 billion dollars and 97 per cent of these offences go undetected,-CBI's Conference on International Police Cooperation against Cyber Crime, March 2009.

Page 12: Cyber Threats From Neibhouring Countries

Cyber Threats From Neighbors

04/13/23IPR & Cyber law Presentaion by AKAA Group....12

PakistanChina

Page 13: Cyber Threats From Neibhouring Countries

Pakistan & China towards Indian

04/13/23IPR & Cyber law Presentation by AKAA Group....13

Pakistani cyber criminals are able to deface 50 to 60 Indian websites a day.

Chinese are constantly scanning and mapping India’s official networks.

China has mounted almost daily attacks on Indian computer networks, both government and private, showing its intent and capability.

The big attacks that were sourced to China over the last few months included an attack on NIC (National Informatics Centre), which was aimed at the National Security Council, and on the MEA.

Three main weapons - BOTS, key loggers and mapping of networks. 

Page 14: Cyber Threats From Neibhouring Countries

India’s Stands on dealing Insurgency

04/13/23IPR & Cyber law Presentaion by AKAA Group....14

The Information Technology Act 2000 extends to whole of India and also applies to any offence or contraventions committed outside India by any person (s 1(2),IT Act 2000).

According to s 75 of the Act, the Act applies to any offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India.

Page 15: Cyber Threats From Neibhouring Countries

Protection of Corporate network

04/13/23IPR & Cyber law Presentaion by AKAA Group....15

Information security – Securing widespread electronic collaboration while protecting data at rest, in motion, in use, and throughout the lifecycle,

Threat and vulnerability management - Staying ahead of emerging threats on all system components: network, server, and the strategic endpoint,

Identity and access management - Assuring that the right people have access to the right information and assets at the right time for the right reason,

Application security - Ensuring application and business process security across the software application lifecycle, and

Physical security - Integrating video surveillance and security solutions with industry-standard components.

Page 16: Cyber Threats From Neibhouring Countries

Blue print for combating cyber threats

04/13/23IPR & Cyber law Presentaion by AKAA Group....16

To reduce vulnerability of country’s cyberspaceTo protect critical infrastructure and critical

information systems and services.To improve interdepartmental coordination

mechanisms for prevention, rapid response and recovery from attacks.

To advance legal mechanisms that support the goals of the cyber security strategy-recent changes in IT Act, 2000 and appointment of CERT as official agency of Government .

To launch awareness programs on cyber security To enhance international cooperation, promoting

cyber security culture and international agreements.

Page 17: Cyber Threats From Neibhouring Countries

Beware of these 14 Cyber threats

04/13/23IPR & Cyber law Presentaion by AKAA Group....17

Anti-virus is not enough Social engineering as the primary attack vector Rogue security software vendors escalate their efforts Social networking third-party applications will be the target of fraud Windows 7 will come into the cross-hairs of attackers Fast Flux Botnets increase URL shortening services become the phisher's best friend Mac and mobile malware will increase Spam volumes will fluctuate Spammers breaking the rules Specialised malware CAPTCHA Technology will improve Instant messaging spam Non-English spam will increase

Page 18: Cyber Threats From Neibhouring Countries

Conclusion

04/13/23IPR & Cyber law Presentaion by AKAA Group....18

Cyber threats continue to haunt Internet users across the world & cyber-threats are the problems of today and the future.

Though, India leads in IT services, it is lags behind as far as cyber security is concerned.

In dealing with cyber threats, a country cannot stand alone. There is a need to have strategic alliances to deal with threats and vulnerabilities in the cyber world.

Page 19: Cyber Threats From Neibhouring Countries

Reference

04/13/23IPR & Cyber law Presentaion by AKAA Group....19

• PDF on Emerging Cyber Threats Report for 2009- Data, Mobility and Questions of Responsibility will Drive Cyber Threats in 2009 and Beyond by, the Georgia Tech Information Security Centre (GTISC) October 15, 2008

• Cyber Laws For Every Netizen in India (Version 2004) (With WSIS Declaration of Principles and Action Plan) Naavi- Na.Vijayashankar, MSc.,CAIIB,CIIF,AIMADM. www.naavi.org , www.cyberlawcollege.com

• ICTSD Programme on IPRs and Sustainable Development WIPO- June 2008

• A Report by the Business Software Alliance October2008

• http://studentsforafreetibetdelhi.blogspot.com/2008/05/china-mounts-cyber-attacks-on-indian.html

Page 20: Cyber Threats From Neibhouring Countries

Thank you!!!

04/13/23IPR & Cyber law Presentaion by AKAA Group....20