6. Poll-1
Q1-What are the reasons for increase in Cyber Attacks(Multiple Choice)
i. The Cost of communication
ii. The Application moving from Intranet to Internet
iii. Hacking tools as a service (HaaS)
iv. The proliferation of the Darknet
Q2- What is the linkage between Work from Home (WFH) and Cyber attacks?
i. The attack surface for the hacker has increased
ii. The cost of hacking has got reduced because of WFH
iii. Anybody can see the network Traffic
Q3- The percentage of Traffic which flows through the Surface web /Clearnet as
the over all percentage
i. Less than 15 %
ii. Between 15% and 50 %
iii. Between 51% and 65%
iv. Greater than 65% 6
10. Borderless Universe
• Cyber is the new hype /fashion whatever you
may call it
• Cyber and data privacy are the two hot topics
that we hear day in and day out.
• The changing face of ransomware attacks{steal,
lock/encrypt and inform}
– Availability
– Confidentiality
• Work From Home saw massive explosion in the
attack surface
10
13. Ransomware as a service-
Netwalker
• PRESENTATION TITLE
Some of the high-
profile victims
targeted by
NetWalker include
Equinix, Enel Group,
the Argentina immigr
ation
agency, University of
California San
Francisco (UCSF),
and K-Electric
32. Live Cyber Threat Global Map
• PRESENTATION TITLE
https://threatmap.checkpoint.com/
33. 1.Cyber Introduction
Recent Cyber Attacks
Popular Attack Vectors
Rainbow Principle for CAs
Report Incidents & Cyber Crimes
Agenda
3
5
2
4
1
33
34. Rainbow Principle for Cyber
Security
1. Use Genuine OS &Patching
2. Implement Firewall & VPN on all
devices
3. No Administrator rights on
laptops/desktops
4. Awareness amongst employees
5. Restrict Download of any type of
software/Mail attachments
6. Passwords on Tally Client level
/Use Password Vaults and no excel
for saving passwords
7. Regular Backups
36. Prevent Identity Theft
• Simplest Way
• 2 FA
• Other Hygiene
• No common password
for financial accounts
and non financial
• Privacy Risk leads to
impersonation risk
• Date of Birth
• Mobile Number
• Emailid etc
36
37. 1.Risk & Opening thoughts
Cyber landscape in COVID Times
Popular Attack Vectors
Cyber Hygiene& Privacy
Report Incidents & Cyber Crimes
Agenda
3
5
2
4
1
37
38. Responding to Cyber Attacks
38
It is not about getting about
being attacked, it is all about
how you respond to the Cyber
Attack
45. • What is wonder?
• Day after day countless people
die. Yet the living wish to live
forever. O Lord, what can be a
greater wonder
• Day after day countless cyber
attacks happen . Yet the Top
Management thinks that their
organisation will not be
attacked. O Lord, what can be a
greater wonder than this
Conclusion
45
Poll 1- on privacy as per GDPR and q-2 will be the fine imposed
APT attack discovered by Kaspersky
The APT platform consists of two main parts: Tokyo and Yokohama. Both were detected on all infected computers. Tokyo acts as the main back door and delivers the second-stage malware. Interestingly, it remains in the system even after the second phase starts, evidently to operate as an additional communication channel. Yokohama, meanwhile, is the weapon payload of the second stage. It creates a virtual file system complete with plugins, third-party libraries, and configuration files. Its arsenal is extensive in the extreme:
Stealing cookies,
Intercepting documents from the print queue,
Collecting data about the victim (including a list of backup copies of their iOS device),
Recording and taking screenshots of VoIP calls,
Stealing optical disc images made by the victim,
Indexing files, including those on external drives, and potentially stealing specific files when the drive is detected again.