Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Cyber Warfare : The World War III PowerPoint Presentation
Download Presentation
Cyber Warfare : The World War III

Cyber Warfare : The World War III

847 Views Download Presentation
Download Presentation

Cyber Warfare : The World War III

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Cyber Warfare : The World War III By: Hemal Patel MD & CEO, Elitecore Technologies Ltd.

  2. Presentation Sketch What is Cyber crime / Cyber warfare? Cyber Warfare - Weapons Why Cyber Attacks Succeed Is India ready? Fighting Cyber Warfare

  3. What is Cyber Crime / Warfare?

  4. Cyber crime “ any unlawful acts wherein the computer is either a tool or target or both.” Cyber Warfare: “Cyber Warfare is an attack on information in the information age” War on Information is to gain knowledge and control over key information

  5. Evolution of the Virtual Battleground

  6. Evolution of the Real Battleground It will be on Cyber World The Next War Will not be Fought on Battlefields

  7. Old Battleground vs. Cyber Battleground Battleground IP Networks Battle Strategy Implant Intrusions Spy Spyware, Malware Cyber War Bait Phishing, Pharming Ammunition Virus, Trojans Botnets/Zombies Root-kits Artillery

  8. Tools used for Protection Old Battleground vs. Cyber Battleground Fort & Huge Walls Cyber Cell Traditional Firewall and security Softwares Arms & Ammunitions Cyber War New Modern era tools and guns Third Generation Firewall and UTM’s Soldiers, commander in chief Lawyers, cyber crime consultants and police force

  9. Who is the Target?

  10. Cyber Attacks are Getting Targeted When? 2003 - 2005 Attacker Profile • Professional writers and crime rings who got down to business • Designed attacks to commit financial fraud Motive of the attack • To hit large organizations – impacting their business and crippling their customers • To Sniff out personal information, such as a SSN or bank account number • To generate thousands of dollars from the harvested data

  11. Hitting the Financial Targets Who were the victims? • Users, Employees of Large Organizations and Financial Institutions What were the attack vectors? • Blending of email and web threats • Social engineering – Phishing emails • Weak Web and email applications Example • Paypal, Ebay, Authorize.net

  12. Narrowing the targets: Cyber Attackers Working Smart When? 2005 onwards Attacker Profile • No longer mere individuals • Collaboration among professional programmers with access to greater pooled resources • Virtual Consortiums dedicated to creation and distribution of malicious software intended to steal money from individuals

  13. Narrowing the targets: Cyber Attackers Working Smart Motive of the attack • To target Regional players and individuals – to escape attention • Attacks driven by financial motives • To steal confidential information from specific companies - Identity theft Who are the victims? • Small corporations, Key Individuals What are the attack vectors? • Spear phishing – exploiting individuals’ trust • New hybrid combinations - spy phishing

  14. Narrowing the targets: Cyber Attackers Working Smart • Examples • Bank Of India • ICICI Bank • ABC, XYZ… Do you know about them? Have you heard about such small regional attacks? • Such Attacks Fly under the radar • Have a prolonged Lifespan • Cause significantly high financial damage to Victims

  15. Targeted Attacks on Nation’s Networks A Full-fledged Cyber Attack on a nation involves 4 steps. FIRECELL 1 Gain control over Network of Government and Defense Establishments 2 Bring down the Financial Systems The Stock Markets and Banks 3 Take Control of the Nations’ Utilities Power, Telecom 4 Take control over personal identities ITax / Passport data Let’s see an instance - Movie Clip The Result Could Easily and Rapidly bring the Nation to a Standstill!

  16. Why Cyber Attacks Succeed?

  17. Who are the Attackers ? Insiders External Attackers Role • Initiators • Victims • Conduits Motives • Malicious Intent - Greed • Disgruntled employees – Vengeance • User Ignorance • External Attackers getting insider information • Targeting insider victims • Targeting insiders as conduits

  18. Why Cyber Attacks Succeed Attacks - Tactics have changed • Attacks are becoming Targeted • Information of key personnel available publicly • Attacks are short-lived - Zero-day attacks • Cyber Warfare favors the attacker • Hackers say there’s always at least one machine that is unprotected. And it only takes one!

  19. Why Cyber Attacks Succeed Defense - We are not well prepared • Lack of Security Awareness, Ignorance • Lack of national strategy on countering insurgency in the cyberspace • Even up-to-date systems totally miss cleverly disguised attacks • Unclear / loopholes in Cyberoam crime laws • Unclear punishment • Lack of Dynamism in Formation of Cyber laws

  20. Examples of Cyber Crime Some Recent Examples

  21. Examples of Cyber Crime Some Recent Examples

  22. Is India Prepared?

  23. Is India Prepared to fight Cyber War? • Not that nothing has been done to fight the Cyber War • The question is how well are weprepared? • Is there a clear direction? • Draft amendments to IT Act 2000 do not address Cyber-warfare or Cyber-terrorism

  24. Check what the Hackers can do! What Happened? • After Pokhran II test in 1998, - Hackers called ’Milworm’ broke into BARC site and posted anti Indian and anti-nuclear messages • In 1999, website of Indian Science Congress Association was defaced and the hacker posted provocative comments about Kashmir • In 2002, 9 websites of India’s top telecom companies were defaced and were posted with content accusing India of Human Right violations What can Happen? • The hacker can hack the network of utilities • The hacker can intrude the network and steal the information being exchanged between ministries • Hacker can alter the public information that results in instability of the stock market

  25. Fighting the Cyber Warfare

  26. Fighting the Cyber War - Cyber Counter Intelligence • Need for Central Nodal Agency • National strategy on countering insurgency in the cyberspace • Creation of National Nodal Agency for IP Security deployments • Right Security Solution • A solution which provides complete Internet Security • A solution which fights both Internal and External Threats • A solution which results in lowCapex and Opex • Security Awareness • About the most recent type of threats/attacks • About the do’s and don’ts of Internet usage • About preventing the leakage of confidential information

  27. Fighting the Cyber Warfare The Cyberoam Way

  28. Cyberoam – Identity based Unified Threat Management Cyberoam is the Identity based UTM solution that offers Integrated Internet Security with fine granularity through its unique identity - based policies. It offers comprehensive threat protection with: • Stateful-Inspection Firewall • VPN • IPS • Gateway Anti-virus • Gateway Anti-spam • Content filtering • Bandwidth management • Multi-Link Manager • Comprehensive Reporting

  29. Thank You To Know more about Cyberoam Visit www.cyberoam.com Email: hemal.patel@elitecore.com