0% found this document useful (0 votes)
17 views40 pages

Session 1

Uploaded by

crazythings246
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views40 pages

Session 1

Uploaded by

crazythings246
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

MAHE-ISAC Centre of Excellence for Cybersecurity

02-11-2023 1
What is Cybersecurity?

Cyber security is the practice of defending computers, servers, mobile devices,


electronic systems, networks, and data from malicious attacks.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 2


Cybersecurity in the individual level

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 3


Job opportunities in cybersecurity

• There is an undersupply of professionals in the cybersecurity space,


with almost three million unfulfilled positions in various capacities.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 4


Cyber Security spending

02-11-2023 5
MAHE-ISAC CoE for Cybers ecurity
Types of Cybersecurity
Type Description

Data security Data security protects by giving limited access only to the authorized
ones to prevent any data theft

Application security This type of security should be developed from the design stage of the
program. Continuous updates of the apps should include the security
system, so new threats could be detected early.
Mobile security Mobiles including tablets and cell phones are also prone to threats that
could come from wire/devices like USB and wireless like Bluetooth
and the internet.
Network security By connecting people, networks have a bigger possibility of getting
intrusion and attacks. The admin/host is also a part of the security
system
Endpoint security Users and entry points (users’ devices) are most likely to get
malicious threats from a virus such as Malware. The form of security
could be anti-virus software, but the best one is the education for users
to carefully plug in USBs, responding to suspicious links and more

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 6


Types of Cybersecurity

Cloud security Cloud is a digital data storage that enables users to store and download data.
Although the storage companies run their own cyber security system, the users also
need to be careful in managing their cloud account

Database and Not only the digital software but the hardware could also be stolen. The security
Infrastructure system should cover digitally and physically.
security

Business Unexpected incidents might cause data loss. The owners should design a system to
continuity and recover the loss or at least to back up the data. Another way is designing Business
disaster Continuity which is a plan to run the business with some missing resources/data
recovery

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 7


Importance of Cybersecurity

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 8


Cyber Threats’ Methods

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 9


Sources of cyber threats

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 10


Tips on building your Cyber Security

• Avoid any suspicious emails, chats, texts, or links from unknown senders, especially if
they ask you to input your particular data.
• Regularly update pins or passwords with unique and strong ones. This could block access
to the hackers that are currently logging into your account.
• Never use public and unsecured Wi-Fi. People could break into your device using a
wireless connection.
• Have a secure backup.
• Use cyber security technologies such as Identity and Access Management (IAM),
Security Information and Event Management (SIEM), and data security platform.
• Educate and check the staff to minimize the insider threat.
• Try Third-Party Risk Management (TRPM).
• Employ IT professionals that could detect any possible threats or protect from any
hackers’ attacks.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 11


Tips on building your Cyber Security(Continued…)

• Choose cyber security strategy, at least choose some software protection like anti-
virus or others.
• Use multi-factor authentication as it is harder to get broken down.
• Do not recklessly log in to various devices.
• Prepare for the worst by making secondary plans in case there is data/resource
loss.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 12


Best practices to protect from cyber threats

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 13


Security attacks and services

Security attack: Any action that compromises the security of information


owned by an organization

 The components to attack


 Hardware
 Software
 Data
Security mechanism: A mechanism that is designed to detect , prevent or
recover from a security attack

Security service: A service that enhances the security of the data


processing systems and the information transfers of an organization.
The services are intended to counter security attacks, and they make use of
one or more security mechanisms to provide the service

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 14


Security services

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 15


General categories of security attacks(Threats)

Interruption: An asset of the system is destroyed or becomes unavailable or


unusable - attack on availability

Interception: An unauthorized party gains access to an asset – attack on


confidentiality

Modification: An unauthorized party not only gains access to but tampers


with an asset – attack on integrity

Fabrication: An unauthorized party inserts counterfeit objects into the system


– attack on authenticity

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 16


Types of attacks-Active and Passive

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 17


A model for network security

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 18


Cyber Crime

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 19


Cybercrime

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 20


Cybercrime

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 21


Two forms of Cyber crime

• Computer based crime

• Computer facilitated crime

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 22


The 5 most cyber attacked industries

• Healthcare: For ex, breach of patient profiles


• Manufacturing : For ex, phishing attack to understand the
• manufacturing secret
• Financial Services : For ex, steal financial account, credit card,
or other payment card information.
• Government : For ex., Cyber terrorism
• Transportation: For ex, Disruption to traffic lights, toll booths,
and electronic traffic signs

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 23


Why do breaches occur?

Watering hole attack: Infecting websites and luring users to a malicious site

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 24


Cybercrime – Types
Type Description

Child Child sexually abusive material (CSAM) refers to a


Pornography/Child material containing sexual images in any form, of a
sexually abusive child who is abused or sexually exploited
material
Cyber Bullying A form of harassment or bullying inflicted through
the use of electronic or communication devices such
as computers, mobile phones, laptops, etc.

Cyber Stalking Cyberstalking is the use of electronic communication


by a person to follow a person, or attempts to contact
a person to foster personal interaction repeatedly
despite a clear indication of disinterest by such
https://www.youtube.com/watch?v=KAQunv1pi1k
person

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 25


Cybercrime – Types
Type Description

Online Job Fraud Online Job Fraud is an attempt to defraud people who
are in need of employment by giving them false hope/
promise of better employment with higher wages

Online Sextortion Online Sextortion occurs when someone threatens to


distribute private and sensitive material using an
electronic medium if he/ she doesn’t provide images
of a sexual nature, sexual favours, or money.

Cyber Grooming Cyber Grooming is when a person builds an online


relationship with a young person and tricks or
pressures him/ her into doing a sexual act

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 26


Cybercrime – Types
Type Description
Phishing Phishing is a type of fraud that involves stealing
personal information such as Customer ID, IPIN,
Credit/Debit Card number, Card expiry date, CVV
number, etc. through emails that appear to be from a
legitimate source.
Vishing Vishing is an attempt where fraudsters try to seek
personal information like Customer ID, Net Banking
password, ATM PIN, OTP, Card expiry date, CVV etc.
through a phone call
Smishing Smishing is a type of fraud that uses mobile phone text
messages to lure victims into calling back on a
fraudulent phone number, visiting fraudulent websites
or downloading malicious content via phone or web
Sexting Sexting is an act of sending sexually explicit digital
images, videos, text messages, or emails, usually by cell
phone. MAHE-ISAC CoE for Cybers ecurity
02-11-2023 27
Cybercrime – Types
Type Description
Ransomware Ransomware is a type of computer malware that encrypts the
files, storage media on communication devices like desktops,
Laptops, Mobile phones etc., holding data/information as a
hostage.
The victim is asked to pay the demanded ransom to get his
device decrypts
Viruses, Worms, and A computer virus is a program written to enter your computer
Trojans and damage/alter your files/data and replicate itself. Worms
are malicious programs that make copies of themselves again
and again on the local drive, network shares, etc. A Trojan
horse is not a virus. It is a destructive program that looks like
a genuine application.
Data Breach A data breach is an incident in which information is accessed
without authorization
Denial of Services (DoS) A Denial of Services (DoS) attack is an attack intended for
attack denying access to computer resources without the permission
of the owner or any other person who is in charge of a
02-11-2023 computer, computer
MAHE-ISAC system
CoE for Cybers ecurity or computer network 28
Cybercrime – Types

Type Description
Cyber-Squatting Cyber-Squatting is an act of registering, trafficking in or
using a domain name with an intent to profit from the
goodwill of a trademark belonging to someone else.

Cryptojacking Cryptojacking is the unauthorized use of computing


resources to mine cryptocurrencies.

Online Drug Trafficking Online Drug Trafficking is a crime of selling, transporting,


or illegally importing unlawful controlled substances, such
as heroin, cocaine, marijuana, or other illegal drugs using
electronic means.

Espionage Espionage is the act or practice of obtaining data and


information without the permission and knowledge of the
owner

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 29


Cybercrime – Types

Type Description
SIM Swap Scam SIM Swap Scam occurs when fraudsters manage to get a new
SIM card issued against a registered mobile number
fraudulently through the mobile service provider

Credit Card Fraud or Credit card (or debit card) fraud involves the unauthorized use
Debit Card Fraud of other’s credit or debit card information for the purpose of
purchases or withdrawing funds from it.

Impersonation and Impersonation and identity theft is an act of fraudulently or


identity theft dishonestly making use of the electronic signature, password
or any other unique identification feature of any other person
Spamming Spamming occurs when someone receives an unsolicited
commercial message sent via email, SMS, MMS and any other
similar electronic messaging media

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 30


Cybercrime – Types
Type Description
Copyright violations Copyrighted work is reproduced, distributed, performed,
publicly displayed or made into a derivative work without the
permission of the copyright owner

Sales and investment Stock fraud and investment fraud is deceptive practice in the
fraud stock or commodities markets that induces investors make
purchase or sale decisions on the basis of false information

Website Defacement Website Defacement is an attack intended to change the visual


appearance of a website and/ or make it dysfunctional. The
attacker may post indecent, hostile and obscene images,
messages, videos, etc
Pharming Pharming is a cyber-attack aiming to redirect a website’s traffic
to another, bogus website

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 31


IT act 2000
✓ Section 43(d) - damages or causes to be damaged any computer, computer
system, network, data, data base or any program. It includes physical or virtual
means.

✓ Section 43(e) - disrupts or causes disruption.


Example- disconnecting the power cable

✓ Section 43(f) - denies or causes denial of access to any authorized person.


Example, A alters user ID or password of B.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 32


IT act 2000

✓ Section 43(g): provides any assistance to any person in contravention of this Act.

✓Section 43(i): destroys, deletes or alters any information, including diminishing its
value or effecting it injuriously by any means.

✓ Section 43(j): steals, conceals, destroys or alters or causes any person to steal,
conceal, destroy or alter any computer source code with an intention to cause damage.
This Section is added by the Amendment Act. 2008

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 33


IT act 2000/2008
✓Section 66 – Computer related offences. This section is related to Sec 43.
Example hacking

✓Section 66A – Sending offensive message from any communication device.

✓Section 66B – Dishonestly receiving or retaining any computer resource or


communication device - imprisonment upto 3 years or fine upto Rs.1 lac or both.
Example, purchasing stolen computer or cell phone

✓Section 66C – Theft of identity – imprisonment upto 3 years and fine upto
Rs.1 lac. Example, cloning of ATM cards. Unauthorizedly gaining access to the
emails of husband and father-in-law

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 34


IT act 2000/2008

✓Section 66D – Cheating by personation – imprisonment upto 3 years and fine


upto Rs.1 lac. Example, online fraud cases, representation as businessman,
claiming of lottery amount, claiming of ancestral property, etc.

✓Section 66E – Violating privacy – intentionally knowingly captures, publishes


or transmits the image of a private area of any person without his or her consent
under circumstances violating the privacy of that person - Imprisonment upto 3
years and fine upto Rs.1 lac.
✓Obscene MMS, objectionable SMS are covered under this.

✓Section 66F – Cyber Terrorism – Life imprisonment; Causing death or injuries;


Intent to threaten the unity, integrity, security or sovereignty of India or to strike
terror.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 35


IT act 2000/2008
✓Section 67 – Publishing or transmitting obscene material in e-form – first
conviction imprisonment upto 3 years and fine upto Rs.5 lac – second or
subsequent conviction imprisonment upto 5 years and fine upto Rs.10 lac. Covered
under Section 292 of IPC.
✓Section 67A - Publishing or transmitting material containing sexually explicit
act in eform – first conviction imprisonment upto 5 years and fine upto Rs.10 lac –
second or subsequent conviction imprisonment upto 7 years and fine upto Rs.10
lac.
✓Section 67B - Publishing or transmitting material depicting children in sexually
explicit act in e-form – first conviction imprisonment upto 5 years and fine upto
Rs.10 lac – second or subsequent conviction imprisonment upto 7 years and fine
upto Rs.10 lac.
✓Sections 67C, 68, 69, 69A, 69B, 70A – deal with cyber offences relating to
violation of directions of government or other competent authority -Intermediaries,
certifying authorities.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 36


National Cyber Crime Reporting Portal of India

• This portal is an initiative of the Government of India to facilitate victims/


complainants to report cybercrime complaints online.
https://cybercrime.gov.in/
• This portal caters for all types of cybercrime complaints including complaints
pertaining to
– online Child Pornography (CP),
– Child Sexual Abuse Material (CSAM),
• Sexually explicit content such as Rape/Gang Rape (CP/RGR) content
• Other cybercrimes such as mobile crimes, online and social media crimes, online
financial frauds, ransomware, hacking, cryptocurrency crimes and online cyber
trafficking.
• The portal also provides an option of reporting an anonymous complaint about
reporting online Child Pornography (CP) or sexually explicit content such as
Rape/Gang Rape (RGR) content.

https://www.youtube.com/watch?v=KAQunv1pi1k

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 37


How to protect yourself against Cybercrime

• Keep software and operating system updated


• Use anti-virus software and keep it updated
• Use strong passwords
• Never open attachments in spam emails
• Do not click on links in spam emails or untrusted websites
• Do not give out personal information unless secure
• Be mindful of which website URLs you visit
• Keep an eye on your bank statements

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 38


Thank you

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 39


Annexure

• Threat intelligence is data that is collected, processed, and analyzed to


understand a threat actor's motives, targets, and attack behaviors.
• A framework is more of guidelines but help to proceed in a particular
direction. On the other hand, standard does not leave any choice and one has
to follow specific method to complete a job.
• “Cyber posture” refers to an organization's ability to protect its networks,
information, and systems from threats.
• Regulatory compliance is an organization's adherence to laws, regulations,
guidelines and specifications relevant to its business processes.

02-11-2023 MAHE-ISAC CoE for Cybers ecurity 40

You might also like