0% found this document useful (0 votes)
59 views23 pages

Cyber-Security-Threats and Challenges

The document presents a comprehensive overview of cyber security threats and challenges, highlighting the importance of a healthy security posture and the CIA triad (Confidentiality, Integrity, Availability). It discusses various cyber threats, including data breaches, social engineering, malware infections, and advanced persistent threats, along with statistics on cyber attacks and their impacts. Additionally, it emphasizes the need for security measures, such as multi-factor authentication, secure coding practices, and regular software updates to mitigate risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views23 pages

Cyber-Security-Threats and Challenges

The document presents a comprehensive overview of cyber security threats and challenges, highlighting the importance of a healthy security posture and the CIA triad (Confidentiality, Integrity, Availability). It discusses various cyber threats, including data breaches, social engineering, malware infections, and advanced persistent threats, along with statistics on cyber attacks and their impacts. Additionally, it emphasizes the need for security measures, such as multi-factor authentication, secure coding practices, and regular software updates to mitigate risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

23-12-2024

Cyber Security: Threats & Challenges

Presented at:
Indian Institute of Remote Sensing (IIRS), Dehradun
Speaker:
Yogesh Verma
Scientist/ Engineer, Space Applications Centre, ISRO, Ahmedabad
1
December 13, 2024

Overview
 Cyber Security

 Threat Vectors

 Attack Modus Operandi

 Challenges

 Security Measures

 Q&A

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 2

1
23-12-2024

Cyber Security
 What we need? - Healthy Security Posture for organisation and user’s assets

against relevant security risks in the cyber environment.

Physical Security System Security Cyber Security


IIRS Training Course on ‘Geodata sharing and Cyber Security’ 3

CIA Triad
Baseline standard for evaluating & implementing information security.

Confidentiality – restrict access to unauthorised users


 Encryption, IDs and passwords, MFA and additional
defensive strategies.

Integrity – data or information not altered during its


transmission or at rest in an unauthorised manner

Availability – information can be accessed and


Availability modified by authorised users in an appropriate
timeframe

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 4

2
23-12-2024

Cyber Security Impact

• 6000 complaints reported daily


• Rs. 60 Crore reported loss by
Indian Victims daily
Source: Cert-In, NCRP, I4C Portal
• 35% of reported amount more
than 50 Lakhs
• 60,000 daily calls on 1930
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 5

Facebook Outrage in Digital Era


» Why?
Due to faulty Configuration
Change in Routers and
was restored back after 7
hours (Oct.5, 2021)

» India users:
14 crore FB, 53 crore
WhatsApp, 21 crore
Instagram users

» Loss:$3.3 million (ad


revenue)
Source: Fortune Inc.

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 6

3
23-12-2024

Cyber Security Facts


Every 39 seconds there is a cyber attack. ~2200 attacks every day.
3 Lakh new malware is created every day.
New Phishing website emerges every 20 seconds.
Trojans account for 58% of all computer malware.
74% of the breaches confirmed were due to human factor or error.
94% of malware is delivered via Phishing Email.
667% increase of targeted phishing attempts during COVID pandemic.
32% of all information breaches involve Phishing

74% of phishing websites are HTTPS


Sources: Statista, Techcircle, Electric.ai, Getstra.com, jumpcloud, DataProt, Cert-In
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 7

Evolution In Technology & Cyber Threats

» Dwell time control


» Lateral Movement

IIRS Training Course on ‘Geodata sharing and Cyber Security’ Source: SANS Institute 8

4
23-12-2024

Top Cyber Security Threats-2024

IIRS Training Course on ‘Geodata sharing and Cyber Security’ Source: sprintzeal.com 9

Major Cyber Threat Pathways


Major Cyber Threats Majorly exploited by threat actors

IIRS Training Course on ‘Geodata sharing and Cyber Security’ Source – DSCI Survey 2023 10

5
23-12-2024

Threat Agents and Impact


• Threat: Any malicious act that attempts to gain access to a end-point,
network without authorisation or permission from the owners.

Risk = Likelihood x Impact


IIRS Training Course on ‘Geodata sharing and Cyber Security’ 11

Sources of Cyber Threats

Source – DSCI Survey 2023

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 12

6
23-12-2024

Cyber Security Challenges

Data Breaches
Unauthorised access or exposure 01
of sensitive information.
Social Engineering
Attacks
02 Social Engineering deceptive
tactics to trick individuals into
sharing confidential data.
Malware Infections
Malicious software that 03
compromises system integrity.
Insider Threats
04 Risks posed by authorised
individuals with malicious
intent.

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 13

Cyber Threats & Attacks

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 14

7
23-12-2024

Cyber Security Attacks


Deep fake technology
Using AI/ML to create fake
audio, video or image content.

01
Ransomware
attacks evolution
Encrypting data and
Zero day attacks
Vulnerability or attack vector is
02 03 demanding payment.

known only to attackers, so


that it work without intervention
from defenders.
Advance Persistent
04 Threat (APT)
Sophisticated targeted attacks.

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 15

Social Engineering Attack Techniques

False sense of
trust (Call by
CEO to give
some info)
Steal info on
click of a link

False promise
to lure a victim
into trap to steal
info

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 16

8
23-12-2024

Is it a Phishing Email?

Spoofed Login page

https://email-gov-in.web.app/.
Genuine Login page

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 17

Phishing Attack Numbers

Source: CERT-In

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 18

9
23-12-2024

Advanced Persistent Threats


» APT:
» Nation or state-sponsored group.
» Dwell time, 204 days. (APAC)
» Advanced: Full spectrum of intelligence
gathering techniques
» Persistent: Continuous monitoring and
interaction
» Threat: Specific objectives and well funded

» Approach:
» Self-destructing malware and sniffers
» File size is small and file names don’t raise red
flags

» Targets: .mil, .gov sites, defense, CEOs, etc.


IIRS Training Course on ‘Geodata sharing and Cyber Security’ 19

Ransomware Attack?
• Encrypts a victim’s files or locks the
system's screen.
• Attack Vectors:
 Improperly secured RDP
 Phishing emails
 Software flaws
 Malicious websites or SMS
• In exchange for releasing the data,
cybercriminals seek ransom money from
their victims.
• Offline backup is the protection solution.
Source: checkpoint.com

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 20

10
23-12-2024

What is Zero Day Attack?


Vulnerability or attack vector
is known only to attackers,
so that it work without
intervention from defenders.
No patch available.
At least 66 zero-days have
been found to be in use in
2021, which is almost double
the number of such attacks
recorded last year.
Source: MIT Technology Review Report, 2021

97 exploited as zero-days
in 2023. - Source: Mandiant report, 2023

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 21

 Deepfake Scam It is AI-based technology used to produce or alter video content so that it presents
something that didn't, in fact, occur.
 Deep learning neural networks are used to manipulate video (faces) & audio (voice) by morphing & merging.
Voice is overlaid and lips are synced.
 AI Voice Cloning to Scam even a few seconds of the person’s voice is enough to capture the
"essence of that person’s voice & then create entirely original statements & conversations with the
same frequency, intensity, harmonic structure, tone & inflection"
 Conclusion: Deepfaking is becoming a serious cyber crime !! Make sure you understand the difference
between the real and fake ones!

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 22

11
23-12-2024

Cyber Attacks : Modus Operandi

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 23

How We Protect Information?


 People
 Training, education, awareness, repetition

 Process
 Governance, oversight, policy, reporting

 Technology
 Firewalls, IDS/IPS, SIEM, Anti-malware
 Strong passwords, Logging/monitoring

 Which is the weakest link?


HUMANS
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 24

12
23-12-2024

Can You Read This?

 HUMANS are product of evolution.


 Majority of the human brains will REACT similarly under a given situation.
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 25

Root Cause of The Problem?


 Human reaction?
 [CRITICAL VULNERABILITIES EXPOLITED BY
SCAMSTERS]

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 26

13
23-12-2024

Crime Hotspots in India

Jamtara, JH
Mewat, HR
Bharatpur &
Alwar, RJ
Noida, Delhi
Motohari, Bihar

10 Districts account for 80% of cyber crime cases in the country


IIRS Training Course on ‘Geodata sharing and Cyber Security’ 27

Security Measures
Defense in depth is the Best line of control that
Uses multiple layers of defense to address technical, personnel and
operational issues.

Attack

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 28

14
23-12-2024

Attack Surface

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 29

Secure Coding Practices


» Design as per security policies
» Default deny
» Adhere least privilege policy
» Sanitise data
» Practice defense in depth
» Static/dynamic code analysis
to eliminate security flaws
» Adopt a secure coding
guidelines
» Threat modeling
» Risk Management
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 30

15
23-12-2024

Guess the Story?


» MORAL OF THE STORY

» ALI BABA 40 CHOR

» DON’T SHARE your password

» DON’T SHARE In Public

» UPDATE Password regularly

» KEEP Strong Password

» AUTO-LOCK Your System


» KEEP IDENTITY Safe

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 31

Enable MFA

Enabling MFA makes you significantly less likely to get hacked.

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 32

16
23-12-2024

And That is Why…


You should enable Multi-Factor Authentication. This will help to protect your
account if your password was stolen or leaked in a data breach.

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 33

Update Software

• Update Operating
System on your devices.
• Update your
applications- especially
web browsers.

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 34

17
23-12-2024

Use Official USBs

USB Drives may contain malware- Report to IT team.


Use Official drives in systems.
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 35

Google Search Scam Search Result Shows


Brand
Some of the top search results in Title displays correct brand
Google are phishing links. name

Scammers also invest in search engine URL Mismatch


optimization techniques & work hard to Title says Venmo but URL
rank their scam sites in the top search is a generic
results. sites.google.com

Fraudulent Medicare or health 2nd Result for Organic


Search
insurance websites. Criminals may
Even top search results can
also target your healthcare information be manipulated for fake
by creating fake websites that ask you sites
to “verify” your Medicare number.
Fake customer support websites, Scammers pretend to be from technical
support companies and get you to give them remote access to your computer.
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 36

18
23-12-2024

QR Code Scam

Who thought a QR code


could be dangerous?

They are everywhere, especially in


restaurants. Criminals can place their
own sticker over the legitimate one. So
that when you scan it, you will be
redirected to a fake site.

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 37

Exercise:1 या आप का ईमेल या मोबाइल से कभी Data Breach हुआ है ? Check it out


12 BILLION Accounts were stolen from hacked sites & apps So
even if you have a STRONG PASSWORD, it may still not be
enough. Check if yours account was leaked at
https://haveibeenpwned.com

38

19
23-12-2024

Exercise:2 आप पासवड कतना Secure है ? Check it out at

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 39

Exercise:3 Almost Everything Google know about you…Seriously – Everything !! (since 2 decades)
Especially if you use Google's products like; Android, Gmail, Goggle Drive, Google Maps, YouTube, Google Search
https://myactivity.google.com/myactivity

40

20
23-12-2024

Exercise:4 आप के नाम/आधार पर कतने मोबाइल नंबर और िसम चलता है ?

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 41

https://tafcop.sancharsaathi.gov.in/telecomUser/

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 42

21
23-12-2024

Exercise:5 Microsoft Office- Keep All macros disabled

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 43

Security Controls
Perimeter protection
01 (Firewall, AV, DPI, IPS/IDS)

End point Security, System


02 Hardening, Application & NAC

Multi-Layer 03 Network Segmentation


Security
Architecture
Application Security (WAF,
04 Email Security)

Analytics [SIEM, Network


05 Security Monitoring, Logging]
44

22
23-12-2024

Security Controls

Cyber Awareness Activities


& Incident Reporting
06 01 Principle of Least privilege

VAPT, Mock Drills, Inter-


Centre Audits, 3rd Party 05 02 Air-Gapped Networks
Audits

Patch Management 04 03 Secure Code Practices

IIRS Training Course on ‘Geodata sharing and Cyber Security’ 45

Thank You
Acknowledgement: Director, SAC | GD-CSIG, ITND-SAC and IIRS Team

Cyber Security OCTOBER


Awareness
Month 2024
IIRS Training Course on ‘Geodata sharing and Cyber Security’ 46

23

You might also like