Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.

Slides:



Advertisements
Similar presentations
Cloud computing security related works in ITU-T SG17
Advertisements

Protection of Information Assets I. Joko Dewanto 1.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Cyber Security : Indian perspective 8 Feb 2009 Dr. Gulshan Rai Director, CERT-IN Govt. of India
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Lisa Farmer, Cedo Vicente, Eric Ahlm
An Overview to Information Security and Security Initiatives in India Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In)
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
E-Commerce Security and Fraud Issues and Protections
Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Securing Information Systems
Enterprise Risk ManagementSeptember 2010Miami, FL © 2010 Enterprise Risk Management Information Security- Facing the Risks in Electronic Channels and Social.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SEC835 Database and Web application security Information Security Architecture.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Internet Security Aspects Dr. Gulshan Rai Director Indian Computer Emergency Response Team (CERT-In) Department of Information Technology.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Computer Crime and Information Technology Security
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Lessons Learned in Smart Grid Cyber Security
BotNet Detection Techniques By Shreyas Sali
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Cyber crime & Security Prepared by : Rughani Zarana.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
IS Network and Telecommunications Risks Chapter Six.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Hurdles in implementation of cyber security in India.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Information Security: Current Threats Marc Scarborough Information Security Officer
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
06 Sep 2006 Cyber security Cyber Security for Protection of Critical Information Infrastructure B J Srinath Director & Scientist ‘ F ’, CERT-In Department.
Dimple Faujdar C.S 4 th year 08ERWCS017. INTRODUCTION TO CYBER CRIME Crime, E-crime, Hi-tech Crime Or Electronic Crime Is Where A Computer Is The Target.
Information Management System Ali Saeed Khan 29 th April, 2016.
Securing Information Systems
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
E-Commerce Security and Fraud Issues and Protections
Presentation transcript:

Cyber Security : Indian perspective

22 Internet Infrastructure in INDIA

Innovation fostering the Growth of NGNs Smart devices –Television –Computers –PDA –Mobile Phone ( Single device to provide an end-to-end, seamlessly secure access) Application Simplicity –Preference of single, simple and secure interface to access applications or content –Ubiquitous interface - web browser Flexible Infrastructure Because of these areas of evolution, today’s NGNs are defined more by the services they support than by traditional demarcation of Physical Infrastructure.

The Emergence of NGNs The communication network operating two years ago are father’s telecommunication Network. NGNs are teenager’s Network. No longer consumer and business accept the limitation of single-use device or network. Both individuals and Business want the ability to communicate, work and be entertained over any device, any time, anywhere. The demand of these services coupled with innovation in technology is advancing traditional telecommunication far outside its original purpose.

Challenges for Network Operator Business challenges include new Pricing Structure, new relationship and new competitors. Technical challenges include migrating and integrating with new advances in technologies from fibre optics, installation of Wi-Fi support. Developing a comprehensive Security Policy and architecture in support of NGN services.

NGN Architecture Identify Layer Compromises of end users owned by a telecom or a third-party service provider accessing services using devices like PC, PDA or mobile phone, to connect to the Internet Service Layer Hosts service applications and provides a framework for the creation of customer-focused services provided by either operator or a third-party service provider Network Layer Performs service execution, service management, network management and media control functions Connects with the backbone network Internet Third-Party Application Untrusted Web Tier Service Provider Application Service Delivery Platform (Service Provider ) Service Delivery Platform Common Framework Backbone Network Partly Trusted

Cyber Threat Evolution Virus Breaking Web Sites Malicious Code (Melissa) Advanced Worm / Trojan (I LOVE YOU) Identity Theft (Phishing) Organised Crime Data Theft, DoS / DDoS

Cyber attacks being observed Web defacement Spam Spoofing Proxy Scan Denial of Service Distributed Denial of Service Malicious Codes –Virus –Bots Data Theft and Data Manipulation –Identity Theft –Financial Frauds Social engineering Scams

9 Security Incidents reported during 2008

Global Attack Trend Source: Websense

11 Top originating countries – Malicious code

12 Three faces of cyber crime Organised Crime Terrorist Groups Nation States

Security of Information Assets Security of information & information assets is becoming a major area of concern With every new application, newer vulnerabilities crop up, posing immense challenges to those who are mandated to protect the IT assets Coupled with this host of legal requirements and international business compliance requirements on data protection and privacy place a huge demand on IT/ITES/BPO service organizations We need to generate ‘Trust & Confidence’

Challenges before the Industry

Model Followed Internationally Internationally, the general approach has been to have legal drivers supported by suitable verification mechanism. For example, in USA Legal drivers have been –SOX –HIPPA –GLBA –FISMA etc. In Europe, the legal driver has been the “Data Protection Act” supported by ISO27001 ISMS.

16 Confidentiality INFORMATION SECURITY Integrity Availability Authenticity Security Policy People Process Technology Regulatory Compliance Access Control Security Audit User Awareness Program Incident Response Firewall, IPS/IDS Encryption, PKI Antivirus Information Security Management

Status of security and quality compliance in India Quality and Security –Large number of companies in India have aligned their internal process and practices to international standards such as ISO 9000 CMM Six Sigma Total Quality Management –Some Indian companies have won special recognition for excellence in quality out of 18 Deming Prize winners for Total Quality Management in the last five years, six are Indian companies.

ISO 27001/BS7799 Information Security Management Government has mandated implementation of ISO27001 ISMS by all critical sectors ISMS has mainly three components –Technology –Process –Incident reporting and monitoring 296 certificates issued in India out of 7735 certificates issued worldwide Majority of certificates issued in India belong to IT/ITES/BPO sector

Information Technology – Security Techniques Information Security Management System World China Italy JapanSpain India USA ISO (175 counties)

Distributed Honeypot Deployment

PC & End User Security: Auto Security Patch Update Windows Security Patch Auto Update No. of Download ActiveX: 18 Million Internet Microsoft Download Ctr. ActiveX DL Server Sec. Patch ActiveX Site

Incident Response Help Desk PC & End User Security Internet PSTN Make a call using 1800 – Send fax using 1800 – Communicate through at Number of security incidents handled during 2008 (till Oct): 1425 Vulnerability Assessment Service