meeting the cyber insurgency threats from neighbouring countires01
DESCRIPTION
This Presentation has been given as a academic seminar at International School of Information Management, university of mysoreTRANSCRIPT
The AKAA Group Presents….
04/11/23IPR & Cyber law Presentaion by AKAA Group....1
Presented By: Aditya, Karjan, Alka, & Artmiz
MEETING CYBER INSURGENCY THREATS FROM NEIGHBOURING
COUNTRIES
04/11/23IPR & Cyber law Presentation by AKAA Group....2
Contents• Introduction• Cyber threats Groups & Actors• The cyber threats Actors• Types of Threats and Attacks• Cyber threats from Neighbor• India’s stand on dealing Insurgency• Protection of Corporate network• Blue print for combating cyber threats• Conclusion• References
04/11/233IPR & Cyber law Presentaion by AKAA Group....
IntroductionA nuclear war may not be on the immediate horizon,
but a cyber war is and it has the potential to bring major cities worldwide to a standstill, affecting everything from banking, traffic networks, hospitals and even electricity grids. These are now the focus of a new security front worldwide.
It’s pretty clear now there is underway a type of cyber arms race, both to be able to pick up and also to secure data per se, but also, in fact, to be able to target or to defend those countless crucial functions of a contemporary society.
04/11/234IPR & Cyber law Presentaion by AKAA Group....
What is Cyber Threat‘Cyber threat’ is a threat that percolates or infiltrates
through the use of computers , internet or interconnected communication devices and could comprise of information stealth, cyber warfare, virus attacks, cyber terrorism, hacking attempts , phising,
sabotage, singly or in combination.
04/11/23IPR & Cyber law Presentaion by AKAA Group....5
Cyber threat Groups & Actors Espionage
State-sponsored or corporate electronic spyingTypically “open source” data collection
Terrorist groupsCovert communications channels
Criminal actionsCredit card theft, child pornography, copyright infringementSpyware and other unauthorized cyber tracking softwarePhishing emails and fake websitesEncrypting files followed by extortion to unencrypt.
HackersWorms, viruses, malicious software, website defacements,
and adolescent pranks
04/11/23IPR & Cyber law Presentaion by AKAA Group....6
Types of Threats and Attacks
MalwareBotnetsCyber warfareThreats to VOIP & Mobile
convergence
04/11/237IPR & Cyber law Presentaion by AKAA Group....
04/11/238IPR & Cyber law Presentaion by AKAA Group....
Video of Cyber Threat
04/11/239IPR & Cyber law Presentaion by AKAA Group....
Trends for Cyber threats
04/11/23IPR & Cyber law Presentaion by AKAA Group....10
Malicious attackers will install malware on social networking sites leading to increased phising scams, or stealing data,etc- browser level protection needed.
Hackers will install malcode within video content which will affect users accessing video clips.
Mash up technology used by web applications to combine data/media from multiple sources, locations and coding styles may lead to increased corporate espionage and other scams
Identity thefts will only increase and botnets will be used for corporate espionage and phising scams
Polymorphic exploitation- creation of unique exploit with each user request –signature based protection engines at network or host level fail .
Growing popularity of VOIP applications-instances of voice spam and voice phising or smishing will increase.
Targeted attacks -Attack activity through e-mail, Instant messaging ,P2P networks will increase
Denial of service affecting voice infrastructure
Cyber terrorist attacks will increase and lead to cyber warfare- threat to nation’s sovereignty
MMS scams will be on the rise and raise issues of defamation and invasion of privacy
Striking Facts
According to a report compiled by Panda Labs, in 2008, 10 million bot computers were used to distribute spam and malware across the Internet each day.
Annual take by theft-oriented cyber criminals is estimated to be as high as 100 billion dollars and 97 per cent of these offences go undetected,-CBI's Conference on International Police Cooperation against Cyber Crime, March 2009.
04/11/23IPR & Cyber law Presentaion by AKAA Group....11
Cyber Threats From NeighborsPakistanChina
04/11/23IPR & Cyber law Presentaion by AKAA Group....12
Pakistan & China towards Indian Pakistani cyber criminals are able to deface 50 to 60
Indian websites a day.Chinese are constantly scanning and mapping India’s
official networks.China has mounted almost daily attacks on Indian
computer networks, both government and private, showing its intent and capability.
The big attacks that were sourced to China over the last few months included an attack on NIC (National Informatics Centre), which was aimed at the National Security Council, and on the MEA.
Three main weapons - BOTS, key loggers and mapping of networks.
04/11/23IPR & Cyber law Presentation by AKAA Group....13
India’s Stands on dealing Insurgency
The Information Technology Act 2000 extends to whole of India and also applies to any offence or contraventions committed outside India by any person (s 1(2),IT Act 2000).
According to s 75 of the Act, the Act applies to any offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India.
04/11/23IPR & Cyber law Presentaion by AKAA Group....14
Protection of Corporate networkInformation security – Securing widespread
electronic collaboration while protecting data at rest, in motion, in use, and throughout the lifecycle,
Threat and vulnerability management - Staying ahead of emerging threats on all system components: network, server, and the strategic endpoint,
Identity and access management - Assuring that the right people have access to the right information and assets at the right time for the right reason,
Application security - Ensuring application and business process security across the software application lifecycle, and
Physical security - Integrating video surveillance and security solutions with industry-standard components.
04/11/23IPR & Cyber law Presentaion by AKAA Group....15
Blue print for combating cyber threatsTo reduce vulnerability of country’s cyberspaceTo protect critical infrastructure and critical
information systems and services.To improve interdepartmental coordination
mechanisms for prevention, rapid response and recovery from attacks.
To advance legal mechanisms that support the goals of the cyber security strategy-recent changes in IT Act, 2000 and appointment of CERT as official agency of Government .
To launch awareness programs on cyber security To enhance international cooperation, promoting
cyber security culture and international agreements.
04/11/23IPR & Cyber law Presentaion by AKAA Group....16
Beware of these 14 Cyber threats Anti-virus is not enough Social engineering as the primary attack vector Rogue security software vendors escalate their efforts Social networking third-party applications will be the target of fraud Windows 7 will come into the cross-hairs of attackers Fast Flux Botnets increase URL shortening services become the phisher's best friend Mac and mobile malware will increase Spam volumes will fluctuate Spammers breaking the rules Specialised malware CAPTCHA Technology will improve Instant messaging spam Non-English spam will increase
04/11/23IPR & Cyber law Presentaion by AKAA Group....17
Conclusion Cyber threats continue to haunt Internet users across
the world & cyber-threats are the problems of today and the future.
Though, India leads in IT services, it is lags behind as far as cyber security is concerned.
In dealing with cyber threats, a country cannot stand alone. There is a need to have strategic alliances to deal with threats and vulnerabilities in the cyber world.
04/11/2318IPR & Cyber law Presentaion by AKAA Group....
Reference• PDF on Emerging Cyber Threats Report for 2009-
Data, Mobility and Questions of Responsibility will Drive Cyber Threats in 2009 and Beyond by, the Georgia Tech Information Security Centre (GTISC) October 15, 2008
• Cyber Laws For Every Netizen in India (Version 2004) (With WSIS Declaration of Principles and Action Plan) Naavi- Na.Vijayashankar, MSc.,CAIIB,CIIF,AIMADM. www.naavi.org , www.cyberlawcollege.com
• ICTSD Programme on IPRs and Sustainable Development WIPO- June 2008
• A Report by the Business Software Alliance October2008
• http://studentsforafreetibetdelhi.blogspot.com/2008/05/china-mounts-cyber-attacks-on-indian.html
04/11/2319IPR & Cyber law Presentaion by AKAA Group....
Thank you!!!
04/11/23IPR & Cyber law Presentaion by AKAA Group....20