2. We’ll try to outlining how we can work more securely on the Internet and help
protect our company’s information (including customer data) and financial
assets against online fraud and other cyber crimes.
You’ve heard the tales of how companies and organizations were damaged and
in some cases even destroyed by cyber criminals. Here are a few true stories:
• A thief stole a company laptop, and the company lost a decade of irreplaceable research
and intellectual property worth millions.
• A newly-hired executive received email from what looked like his company’s travel agency,
where he was asked to click a link to confirm the accuracy of his personal details. This took
him to an official-looking site where he found his personal data. There, he was asked to
download software that would link his Outlook email account to the travel agency’s booking
system. In so doing, he downloaded malicious software that spread through his new
company.
• Hackers broke into the computers of a retail chain through an unsecured wireless network
and stole the financial information of all its customers, which cost the company millions in
lost business and was ruinous to its reputation.
Most often, damage to big corporations dominates the news, but cyber crooks
target small and midsized businesses, too
3. It’s a Jungle out there
Computer Viruses
Trojan Horses
Address Book Theft
DNS Poisoning
Zombies, IP Spoofing
Password Grabber
Network worms
Logic Bombs
Hijacked Home page
Most Popular
• Hoaxes
• Pop-ups
• Scams
• Spam
• Phishing
4. Did you know?
News: In 2004 a computer virus infected 1 million computers within and hour.
Computer Virus, network worms, Trojan Horse… these are
computer programs which tells computer what to do and how to
do it.
Silent Features :
Computer Virus - Needs a Host File, Copies Itself, Executable
Network Worm- No host (self contained), Copies Itself,
Executable
Trojan horse - No host (self contained), Does not copy itself,
Importer Program
Typical Symptoms: File deletion, File Corruption, Visual Effect, Pop-ups,
Erratic / unwanted behaviour, Computer crashes.
5. The most common source of
threat are
Human error and mistakes
Malicious human activity
Natural Event and disaster
Note to Read
6. Top 5 Information Security
Concerns for the Corporation
or Business
Awareness
Information Security Management
Weaknesses during Implementation
‘it cannot happen to me’ syndrome
Underestimation of Technology
7. What can be done to Prevent
Make Security awareness a corporate priority and
educate your staff.
Enable real time protection, Implement Firewall
Designate security support staff
Update all vendor Security patches
Subscribe to several security bulletins
Periodic reboot and reload all computers
Control, limit or block all download and installs
Install Antivirus software on computer, keep it current
Backup you data regularly.
Create Strong Password and keep them private
8. Hoax, Trojan Horse
Hoax
If the message tells you to do something,
tells you to take immediate action.
Cites a recognizable source to give itself
credibility e.g “Microsoft has warned…”
If in doubt, check it out on authoritative
hoax site
securityresponse.symantec.com/avcenter/hoax.html
svil.mcafeesecurity.com/vil/hoaxes.asp
9. Trojan horse
Downloading a File, Installing a program,
opening an attachment, opening bogus
website, copy file from someone else.
It exploits computers ports letting its friends
enter.
Security patches often close computer ports
and vulnerabilities.
10. Scams
the steps we’ve covered so far are about protecting our company
information—customer data, intellectual property, and the like—
as well as vital financial assets.
But scams abound. For example, an employee, asked to confirm
her password in an email message sent by someone posing as
her system administrator, gave criminals access to the company
network, bringing business to a halt.
Or a payroll processing firm was hit by a phishing attack that sent
email to its businesses customers, asking them to reveal
passwords to continue to use their company’s payroll services
11. Avoid putting confidential information in email unless it’s encrypted.
(Encryption enhances data security by scrambling the contents so that it
can be read only by someone who has the right key to unscramble it.)
Also, avoid putting sensitive information in instant or text messages, as
these are not typically secure. This includes account numbers,
passwords, intellectual property, customer data, and so on.
Beware of scams—the most dangerous are the ones that appear to be
legitimate.
Small and midsized businesses are as much a target of scams as
individuals. Scams directed to them can include links that advertise false
products, hoaxes that claim you’ve received a refund from the IRS or a
package from the post office that your company never ordered, charges
for unauthorized advertising or office supplies, or urgent requests to
update account information.
All scams are designed to collect information the scammer can use to
steal company data or money—or both
12. It’s a good idea to treat all public wireless connections as a
security risk because they’re often unsecured. This means that
Wi-Fi hot spots at coffee shops, hotels and motels, airports,
libraries, and other public places may be open to anyone who
wants to look at the traffic passing through them, using
inexpensive and readily available devices.
Sometimes, businesses don’t have a firewall between their point
of sale computers—the cash registers that take your credit card
for payment—and the free wireless access they offer customers.
This can enable criminals to steal your credit card number when
you buy something.
Or watch out for mock Wi-Fi hotspots, which often top the list of
available connections, enticing you with names like “Free Wi-Fi.”
Clicking one may expose your device to a hacker who could take
control of it.
So look at some ways to connect to the web more safely when
you’re on the go
13. References
Authoritative Security Alert Information
securityresponse.symantec.com/ (Symantec)
www.microsoft.com/security
www.apple.com/support/security/
Authoritative Free Public Anti-Virus Removal Tool
Information
http://www.symantec.com/security_response/re
movaltools.jsp
http://www.mcafee.com/us/threat-
center/technology/global-threat-intelligence-
technology.aspx
14. IT Act 2008 – Govt of India
The IT Act 2008 extensively amends the Information Technology Act 2000:
The increasing popularity of smartphones is addressed, and the term
‘communication devices’ is defined to mean ‘cell phones, personal digital
assistance or combination of both or any other device used to communicate,
send or transmit any text, video or image’.
The validation of electronic signatures and contracts is addressed, and
‘electronic signature’ is substituted for ‘digital signature’ throughout the Act,
promoting technological neutrality. The term ‘electronic signature’ is defined
to mean ‘authentication of any electronic record by a subscriber by means of
[a specified] electronic technique… and includes digital signature’.
Section 43A mandates that corporations are responsible for implementing
and maintaining ‘reasonable security practices and procedures’ to protect
‘sensitive personal data or information’. They are now liable for breaches and
must pay compensation to affected parties.
Owners of a given IP address are now responsible for content accessed or
distributed through it.
New forms of crime not covered by the original Act are addressed and new
penal provisions are included. Details of these offences are listed below.
The majority of offences under the IT Act 2008 are punishable by up to three
years’ imprisonment and a fine of up to one lakh rupees
15. International Standards
ISO/IEC 27001:2013
is the international standard that sets out the
specifications of an information security management
system (ISMS), a systematic approach to information
security that encompasses people, process, and
technology. An ISMS compliant with ISO 27001 can help
organisations meet all their information security
regulatory compliance objectives, as well as helping
them to prepare and position themselves for new and
emerging regulations.