Cyber Crime Security Software

11/17/2017
79 Comments
Cyber Crime Security Software Rating: 3,2/5 1909reviews

PPT Cyber Crime Power. Point presentation free to view. Cyber Crime Security Software' title='Cyber Crime Security Software' />Title Cyber Crime 1. Cyber Crime Current Threats and Trends. A presentation by Muktesh Chander IPS BE, LLB, MACr., DCL, DHRM, Cert. Torrent Nuance Pdf Converter Professional 8 on this page. SQC OR FIETE,MCSI Addl. Commissioner of Police Traffic, Delhi Police 2. Global Scenario. Global cyber crime is 1. Economic meltdown and recession Under employmentunemployment in IT sector Cut down on IT security budget likely 3. Cyber Crime Security Software' title='Cyber Crime Security Software' />Cyber Crime Security SoftwareIndian Scenario. Booming software and BPO Industry IT Revolution Digital Dependence National E Governance program Very few organisations in India have CISO and IT Security budget No law for privacy No compliance laws and breach disclosure No law against spamming Limitations of IT Act 2. Weak and delayed criminal Justice System 4. Indian Scenario. Very few organisations in India have CISO and IT Security budget 5. Threats from. Individuals Organised cyber criminals Rival organisations Non state actors Hostile states Insidersex employees Hactivists Terrorist Muktesh Chander 6. Cyber Crime in India. Under IT Act. Crime in India 2. Subscribe Stay current on your favorite topics We live in an increasingly networked world, from personal banking to government infrastructure. Protecting those. The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists. The threat is incredibly seriousand growing. Current Threats in India. Source Cert in 8. Global. 20. 08 CSI Computer crime survey 9. Malicious activity by country. Source Symantec Corporation 1. Current threats Malware. Virus attacks account for more than 5. CSI Survey 2. 00. In the last six months of 2. Symantec detected 4. Symantec as of the end of 2. Two thirds of all malicious code threats currently detected were created during 2. Any kind of file can be infected Flash, Adobe Pdf are the latest 1. Malware. Malware toolkits, rootkits easily available Malware writing and outsourcing for profit Malware for sale Blended threats Mobile virus cabir, commw. Flash worm Scareware 1. Phishing. PhisingPharmingVishingSmishing Every month more than 2. Spearphishing attacks emerging 1. Phishing. Phishing scams showed sharp increase of 1. Symantec observes more than 7 million phishing attempts each day. TOP BRANDS AFFECTED BY PHISHING ATTACKSE bay Amazon Paypal ICICI Bank UTI Bank 1. Electronic Fund Transfer. Tim Berners Lee the father of WWW was a victim of online fraud Computer world In Nov 2. ATMs in 4. 9 cities across the world in 3. Netherlands St. Petersburg London. Finland. New York San Francisco Germany. Israel. 10 million Vladimir Levin a ,Russian ,stole 1. Citibank by computer fraud. Online grooming ,sexual exploitation and abuse of children. Sec 6. 7 B B,C inserted in IT Act Amendment 1. Cyber Vandalism graffiti. Indian TLD websites defaced during 2. Source. Cert in 1. Spam. Accounts for more than to 23 of all e mails or even 9. Responsible for phishing, 4. India is in the top 1. Spam 2. 1Cyber Pornography. Cyber pornography accounts for 4. IT Act Crime in India 2. Every second 2. Internet users are viewing pornography The pornography industry is larger than the revenues of the top technology companies combined Microsoft, Google, Amazon, e. Bay, Yahoo, Apple, Netflix and Earth. Link Source httpwww. Cyber Pornographyis one of the easiest way of installing malware. Botnets. Collection of compromised computers Centralized control 2. DDOS Attack using BOTS 2. Botnets. Source Symantec Corporation 5 million distinct bots 2. Botnet tracked in India. June 2. 00. 7 to Dec 2. Botnet. In Aug 2. Dutch police apprehended Leni De with help from FBI and Brazilian police for running a botnet of 1. Use of Encryption by criminalsterrorists. Strong encryption tools easily available many for free PGP Steganography Digital signatures no key escrow in India Sec 6. IT Act is of no use 2. Underground market servers. Source Adapted from Symantec 2. Industrial Espionage. Several countries and companies are indulging in Industrial espionage clandestinely Employees reveal a lot in their personal E mails and social networking sites s 3. Theft of Mobile Devices. CSI Survey 2. 00. Separate offence created under IT Act Amendment 3. Threat to Embedded Systems. Complex and unknown Becoming common Involve third party 3. Identity Theft. Estimated more than 9 million incidents each year NIJ ,US Report Separate offence created under IT Act Amendment 3. Insider Abuse. By disgruntled present of Ex employees 4. CSI Survey 2. 00. Other cyber crimes. Hacking Denial of service attacks Data diddling Cyber stalking Cyber squatting IPR Violations Mobile cloning Both GSM and CDMA 3. Cyber skirmishes 3. Hackers holy war between Israel and Palestine 2. There was a war between Chinese and American hackers 3. No Transcript 3. No Transcript 4. No Transcript 4. Cyber terrorism 4. Critical Information Infrastructure. CII Means Information Communication Systems connected with National Security Public Safety Public Health Critical Sectors of Economy Muktesh Chander. Likely targets of cyber terrorism Power grids nuclear power stations Banking and Financial systems Stock Exchanges Transportation Control systems MRTS, ATC, RailAirlines reservations Tele Communications Gas Oil Water Pipelines control systems Internet Backbones HealthFood Emergency services MilitaryDefense Installations Attack on C4 I 4. Estonia Attack. Estonia a Baltic nation with population of only 1. One of the most wired nations Pioneer in E Governance Almost 1. Every citizen has PKI enabled I card with embedded chip Online elections 4. Estonia Attack. Contd. Govt. relocated 2nd world war Red Army memorial a Bronze statue On April 2. Estonian Parliament, banks, ministries, newspapers and broadcasters, political parties etc. DDOs, spam botnets etc. Attack continued for three weeks Cyberterrorists defenders both acted in adhoc manner 4. Estonia Attack. Contd. An Estonian court has convicted the first individual in the 2. Estonia. Dmitri Galushkevich an ethnic Russian used his home PC to launch a denial of service attack that knocked down the Web site for the political party of Estonias prime minister for several days. He was fined 1. US 1,6. Estonia Attack. Contd. Konstantin Goloskokov2. Russias Nashi youth group and aide to a pro Kremlin member of parliament has admitted having organised the attack as an act of civil disobedience. Sergeiei Markov, a Russian State Duma Deputy has corroborated the facts Mar. SC Magazine 4. 8Trends. Prediction in a fast changing and evolving field is difficult Law of exponential return of technological changes 4. Current Trends in cyber crime. Following trends are clearly visible The time to exploit vulnerability is decreasing. Cyber crimes are being committed with financial gains in mind The attack sophistication is increasing and more automation can be seen in attacks. The speed of spread of an attacks is increasing. Current Trends in cyber crime. The attacks are more targetted than before. Phishing is increasing on SMS, Telephone other platforms. Coordinated automatic attacks by remotely controlled Bots for DDo. S, for sending SPAM and other such malicious purposes are showing increasing trend and will pose biggest threat to Information Security. Current Trends in cyber crime. Mobile connectivity using Wi. Fi technology and convegence of mobile phones with PDAs and other wireless devices will add another dimension to cyber crime. There is growing evidence of organized crime and cyber crime are beginning to overlap with activities of drug mafia, pedophiles, international money laundering people who use Internet to coordinate their activities. Current Trends in cyber crime. Industrial espionage increasing Political ideologists have started using hactivism to propagate their ideas through Internet and the electronic civil disobedience activities are surfacing.