Cyber Security: Indian Perspective
Cyber Security: Indian Perspective
perspective
2010 Survey: Study Highlights
5
Innovation fostering the Growth of
NGNs
Smart devices
Television
Computers
PDA
Mobile Phone
(Single device to provide an end-to-end, seamlessly secure
access)
Application Simplicity
Preference of single, simple and secure interface to
access
applications or content
Ubiquitous interface - web browser
Flexible Infrastructure
Because of these areas of evolution, today’s NGNs are
defined
more by the services they support than by traditional
demarcation of Physical Infrastructure.
The Emergence of
NGNs
The communication network operating two years
ago are father’s telecommunication Network.
NGNs are teenager’s Network.
No longer consumer and business accept the
limitation of single-use device or network.
Both individuals and Business want the ability to
communicate, work and be entertained over any
device, any time, anywhere.
The demand of these services coupled with
innovation in technology is advancing traditional
telecommunication far outside its original purpose.
The Complexity of Today’s Network
Changes Brought in IT Perimeter
Network
Intranet
• Large network as backbone for
connectivity across the country
• Multiple Service providers for
Laptops
providing links – BSNL, MTNL, Extranet Servers
DSL Router
• Multiple Applications InternetNetwork
Infrastructure
Desktops
Branch
Branch Offices
Servers
future Router
Router
8
Challenges for Network
Operator
Business challenges include new Pricing Structure,
new relationship and new competitors.
Service Layer
Web Tier
Backbone Network
Growing Concern
Computing Technology has turned against us
12
Cyber Threat
Evolution
Malicious
Code Identity Theft
Virus (Phishing)
(Melissa)
Virus
Bots
Data Theft and Data Manipulation
Identity Theft
Financial Frauds
Social engineering Scams
Security Incidents reported during 2008
15
Trends of Incidents
Sophisticated attacks
Attackers are refining their methods and consolidating
assets to create global networks that support coordinated
criminal activity
Crimeware
Targeting personal information for financial frauds
Source: Websense
Top originating countries – Malicious code
19
Three faces of cyber
crime
Organised Crime
Terrorist Groups
Nation States
20
Security of Information Assets
Security of information & information assets is
becoming a major area of concern
INFORMATION SECURITY
Security Policy
People Regulatory Compliance
User Awareness Program
Access Control
Security Audit
Process Incident Response
Encryption, PKI
Firewall, IPS/IDS
Antivirus
Technology
24
Cyber Security Strategy – India
• Security Policy, Compliance and Assurance – Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes
– Best Practice ISO 27001
– Security Assurance Framework- IT/ITES/BPO Companies
• Capacity building
– Skill & Competence development
– Training of law enforcement agencies and judicial officials in the collection and analysis of digital
evidence
– Training in the area of implementing information security in collaboration with Specialised
Organisations in US
• International Collaboration
Status of security and quality compliance
in
India
Quality and Security
Large number of companies in India have aligned
their internal process and practices to international
standards such as
ISO 9000
CMM
Six Sigma
Total Quality Management
Department of
Information ISP Hot Liners
Technology
Major ISPs
Private Sectors
Foreign Ptns
Home Users
Analysis
Disseminati
on
Detect
Press & TV /
Radio
Recovery
Distributed Honeypot Deployment
PC & End User Security: Auto Security Patch
Update
Windows Security Patch Auto Update
Internet
ActiveX DL Server
Internet
PSTN
A botnet operator sends out viruses or worms, infecting ordinary users' computers,
whose payload is a malicious application—the bot.
The bot on the infected PC logs into a particular C&C server (often an IRC server, but, in
some cases a web server).
The spammer sends instructions via the IRC server to the infected PCs, causing them to
send out spam messages to mail servers
Related Websites
http://www.cyberforensics.in
http://pcquest.ciol.com
http://cert.in
http://isaca.org
http://www.youtube.com/watch?v=NZYi1iJsXRc&featur
e=related
http://www.cyberforensics.in/Default.aspx