1 / 22

Presented By : Rakshit Tandon Consultant – IAMAI- Safe Surfing

Om sai ram. How Safe Are We ?. Presented By : Rakshit Tandon Consultant – IAMAI- Safe Surfing Advisor – Cyber Complaint Cell, UP Police , Agra. Fourth India Digital Summit 2009. Started March 2009 Covered 22 Cities , 10 States , 100+ schools Covered 1.75 lac students Much more to go….

ham
Download Presentation

Presented By : Rakshit Tandon Consultant – IAMAI- Safe Surfing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Om sai ram How Safe Are We ? Presented By: Rakshit Tandon Consultant – IAMAI- Safe Surfing Advisor – Cyber Complaint Cell, UP Police , Agra Fourth India Digital Summit 2009

  2. Started March 2009 Covered 22 Cities , 10 States , 100+ schools Covered 1.75 lac students Much more to go….

  3. Major Threats on Internet for users • Malware • Phishing • Internet Connection Security • Cyber Stalking/ Cyber Defamation • Email Scams • Financial Frauds • VOIP Calls Rakshit Tandon

  4. Malware Downloading pirated content. Social Networking sites are a target. Fake Anti Virus Software's. Web Attacks. Consumer Needs: Major youth visit sites for Bollywood songs , wallpapers, games and screensavers, mobile ringtones and mobile applications “We are so conditioned to click on links, and the bad guys know this,” “The email lures, the enticements and the personalization of malware attacks are getting much better. Social engineering attacks on social networks are beginning to explode and will only get worse.” Rakshit Tandon

  5. Popular sites among youth…. Rakshit Tandon

  6. Phishing • Major Victims • Banks • Email Service Providers • Social Networking Sites Rakshit Tandon

  7. Vishing • Vishing is the criminal practice of using social engineering and Voice over IP(VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. • Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals. Rakshit Tandon

  8. Broad band ConnectionSecurity – Wi-Fi Hacking • Problems • High Usage Bills. • Crime Done by others Internet Connection. • Users not educated about Changing default passwords of Modem and Internet Connection. Rakshit Tandon

  9. WI-FI (Internet Hacking) Rakshit Tandon

  10. Wi-Fi Hacked • After the Ahmedabad bomb blasts where terrorists hacked the wi-fi system of an American in Mumbai, A terror e-mail claiming responsibility for the Ahmedabad bomb blasts was sent to some private new channels on July 27 from US national Haywood's computer. • Criminals using WAR DRIVING Technique. Rakshit Tandon

  11. Cyber Defamation / Cyber Stalking • Students are major victim of Cyber Stalking / Defamation • Security issue on Social Networking Sites a. Data Theft b. Impersonation c. Defamatory Content d. Fake Applications and fake links to Malwares. • New Security Measures to be added to Social Networking Sites. Rakshit Tandon

  12. Email Threats • Spoofing / Forging Rakshit Tandon

  13. Credit Card Cloning SKIMMERS How Skimmers are used Writers to Duplicate Cards Rakshit Tandon

  14. VOIP Calls • When voice is digitized, encoded, compressed into packets and exchanged over IP networks, it is susceptible to misuse. • Cyber criminals will be drawn to the VoIP medium to engage in voice fraud, data theft and other scams—similar to the problems email has experienced. • ***The Intelligence Bureau has asked the communication ministry to block all internet telephony (VoIP) services to and from the country until the Department of Telecom (DoT) puts in place a mechanism to track such calls. • *** 15 Sep, 2009,TNN Rakshit Tandon

  15. Major threats for Mobile Users • SIM Cloning • Duplicating IMEI Numbers on Unbranded Sets • Mobile Viruses • Mobile Data Security • Identity Verification and Procurement of Connections • Mobile Payments / Banking • Caller ID/SMS Spoofing Rakshit Tandon

  16. Mobile security • PIN LOCKING • MEMORY CARD LOCKING • PHONE LOCKING • PHONE LOCK IF SIM CHANGED • APPLICATION LOCKING • REMOTE LOCKING • Mobile Trackers ( Third Party Applications) Rakshit Tandon

  17. Mobile Tracker Rakshit Tandon

  18. Mobile Threats • Every mobile handset has a unique factory-coded Electronic Serial Number (ESN) and a Mobile Identification Number (MIN). • Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. Result : • You could run up huge bills, and worse, your mobile phone number could be misused for criminal activities. Rakshit Tandon

  19. Mobile Viruses • Cabir / Mabir • MOS Trojan – Sends Automated SMS on high cost centres. • The Trojan.Mos virus is included on the MOSQUITO game. When you install this game, (maybe not from the original one) the virus will also be installed on your system's folder.The affect of this virus is it will use your SMS gateway to send messages to a high cost number, hence you will be charged. • If you place antivirus software on a mobile device, it will run the battery down, so mobile security will require new approaches and partnerships between manufacturers, carriers and application developers Rakshit Tandon

  20. Challenges to Law Enforcement Agencies • Surveillance of Mobile Phones • Tracing VOIP Calls • Tracking IP Details from Service Providers • Fake Identity of connections • Fake Accounts in Banks Rakshit Tandon

  21. Thank You Rakshit Tandon Email : rakshittandon@yahoo.co.in Cell: +91-9760010017

More Related