SlideShare a Scribd company logo
1 of 20
Download to read offline
Basics of Cyber
Security
Nikunj Thakkar
About me
● Co-founder & CEO, DataOne Innovation Labs
● Lead, Gujarat Chapter, Headstart Network Foundation
● Jt. Secretary, DAIICT Alumni Association
● Currently building Shoppr.ai - A Customer Science platform
for E-Commerce Entrepreneurs
What are we going to talk about?
● What is CyberSpace?
● Cyber Security Challenges
● Evolution of Cyber Security
● Indian Cyber Situation
● Recent Cyber Attacks in India
● 10 Steps to Cyber Security
What is Cyberspace?
The interdependent network of information technology
infrastructures, which includes the Internet, telecommunications
networks, computer systems, and embedded processors and
controllers.
First coined in William Gibson’s novel “Neuromancer”, the term Cyberspace is used to
describe the range of information resources available through computer networks.
The Networked World - 1977
Source: http://bpastudio.csudh.edu/fac/lpress/history/arpamaps/arpanetmar77.jpg
The Networked World - Today
Source: https://www.theguardian.com/news/datablog/2015/jul/10/world-map-web-users-oxford-internet-institute
Rapid Development in Information
Technology
● Speed of Microprocessor chips doubles every 12-18 months
● Storage Density doubles every 12 months
● Bandwidth is doubling every 12 months
● Price keeps dropping making technology affordable &
pervasive
The Internet in India by 2020
730
Million Internet User
75%
New Users from Rural
Area
75%
Vernacular Language
Users
83%
CAGR for Mobile Video
Content
175
Online Shoppers
70%
Mobile E-Commerce
Transaction
50%
Mobile Travel
Transactions
The Cyberspace
● Cyberspace is the connected Internet Ecosystem
● Trends Exposing critical infrastructure to increased risk:
○ Interconnectedness of Sectors
○ Proliferation of exposure points
○ Concentration of Assets
● Cyber Intrusions and Attacks have increased dramatically over the last
decade, exposing sensitive personal and business information,
disrupting critical operations, and imposing high costs on the economy
● Cyber Security is protecting our cyberspace (critical infrastructure)
from attack, damage, misuse and economic espionage
Cyber Security Challenges
● Cyberspace has intrinsic vulnerabilities that can not be evacuated
● Innumerable entry points to internet
● Assigning attribution: Internet technology makes it relatively easy to
misdirect attribution to other parties
● Computer Network Defense techniques, tactics and practices largely
protect individual systems and networks rather than critical operations
(missions)
● Attack technology outpacing defense technology
● Nation states, non-state actors, and individuals are at a peer level, all
capable of waging attacks
Evolution of Cyber Security
Viruses(1990s)
Antivirus, Firewalls
Worms(2000s)
Antivirus, Firewalls
Botnets (late 2000s to Current)
Data Loss Prevention, Application aware Firewalls, SIM
Advanced Persistent Threats, Insiders (Current)
Network Flow Analysis
Source: https://www.checkpoint.com/wp-content/uploads/gen-v-generations-infographic-1024x749-1-1024x749.jpg
Indian Cyber Situation
● India ranks 3rd in terms of the highest number of internet users in the
world after USA and China, the number has grown 6 - fold between
2012 - 2017 with a compound annual growth rate of 44%
● India secures a spot amongst the top 10 spam - sending countries in
the world alongside USA
● India was ranked among the top five countries to be affected by
cybercrime, according to a recent report by online security firm
”Symantec Corp”.
Recent Cyber Attacks in India
Through a phishing email sent to an employee, hackers accessed the credentials
to execute a fund transfer, swindling Union Bank of India of $171 million, Prompt
action helped the bank recover almost the entire money
July 2016:
UNION
BANK OF
INDIA HEIST
The global ransomware attack took its toll in India with several thousands
computers getting locked down by ransom - seeking hackers. The attack also
impacted systems belonging to the Andhra Pradesh police and state utilities of
West Bengal
May 2017:
WANNACRY
RANSOMWA
RE
Recent Cyber Attacks in India
The food tech company discovered that data, including names, email IDs and
hashed passwords, of 17 million users was stolen by an ‘ethical’ hacker - who
demanded the company must acknowledge its security vulnerabilities - and
put up for sale on the Dark Web
May 2017:
DATA
THEFT AT
ZOMATO
The ransomware attack made its impact felt across the world, including India,
where container handling functions at a terminal operated by the Danish firm
AP Moller - Maersk at Mumbai’s Jawaharlal Nehru Port Trust got affected
June 2017:
PETYA
RANSOMWA
RE
10 Steps to Cyber Security
1. Network Security
Protect your networks against external and internal attack.
Manage the network primer. Filter out unauthorised access
and malicious contents. Monitor and test security controls.
2. Malware Protection
Produce relevant policy and establish anti - malware
defences that are applicable and relevant to all business
areas. Scan for malware across the Orgn.
3. Monitoring
Establish a monitoring strategy and produce supporting
policies. Continuously monitor all ICT system and networks.
Analyse logs for unusual activity that could indicate an attack.
10 Steps to Cyber Security
4. Incident Management
Establish an incident response and disaster recovery capability.
Produce and test incident management plans. Provide specialist
training to the incident management team. Report criminal
incidents to law enforcement.
5. User Education and
Awareness
Produce user policies covering acceptable and secure use of
the organisation’s systems. Establish a staff training
programme. Maintain user awareness of the cyber risks.
6. Home and Mobile
Working
Develop a mobile working policy and train staff to adhere to it.
Apply the secure baseline to all devices. Protect data both in
transit and at rest.
10 Steps to Cyber Security
7. Secure Configuration
Apply security patches and ensure that the secure configuration of
all ICT systems is maintained. Create a system inventory & define
a base line build for all ICT devices.
8. Removable Media
Controls
Produce a policy to control all access to removable media.
Limit media types and use. Scan all media for malware
before imported on the corporate system.
9. Managing User
Privileges
Establish account management processes and limit the
number of privileged accounts. Limit user privileges and
monitor user activity. Control access to activity and audit logs.
10 Steps to Cyber Security
10. Information Risk
Management Regime
Establish an effective governance structure and determine your
risk appetite. Maintain boards engagement with cyber risk. Produce
supporting information risk management policies.
Thank you :)

More Related Content

What's hot

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 

What's hot (20)

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 

Similar to Basics of Cyber Security

Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 

Similar to Basics of Cyber Security (20)

Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 

Recently uploaded

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Recently uploaded (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Basics of Cyber Security

  • 2. About me ● Co-founder & CEO, DataOne Innovation Labs ● Lead, Gujarat Chapter, Headstart Network Foundation ● Jt. Secretary, DAIICT Alumni Association ● Currently building Shoppr.ai - A Customer Science platform for E-Commerce Entrepreneurs
  • 3. What are we going to talk about? ● What is CyberSpace? ● Cyber Security Challenges ● Evolution of Cyber Security ● Indian Cyber Situation ● Recent Cyber Attacks in India ● 10 Steps to Cyber Security
  • 4. What is Cyberspace? The interdependent network of information technology infrastructures, which includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers. First coined in William Gibson’s novel “Neuromancer”, the term Cyberspace is used to describe the range of information resources available through computer networks.
  • 5. The Networked World - 1977 Source: http://bpastudio.csudh.edu/fac/lpress/history/arpamaps/arpanetmar77.jpg
  • 6. The Networked World - Today Source: https://www.theguardian.com/news/datablog/2015/jul/10/world-map-web-users-oxford-internet-institute
  • 7. Rapid Development in Information Technology ● Speed of Microprocessor chips doubles every 12-18 months ● Storage Density doubles every 12 months ● Bandwidth is doubling every 12 months ● Price keeps dropping making technology affordable & pervasive
  • 8. The Internet in India by 2020 730 Million Internet User 75% New Users from Rural Area 75% Vernacular Language Users 83% CAGR for Mobile Video Content 175 Online Shoppers 70% Mobile E-Commerce Transaction 50% Mobile Travel Transactions
  • 9. The Cyberspace ● Cyberspace is the connected Internet Ecosystem ● Trends Exposing critical infrastructure to increased risk: ○ Interconnectedness of Sectors ○ Proliferation of exposure points ○ Concentration of Assets ● Cyber Intrusions and Attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy ● Cyber Security is protecting our cyberspace (critical infrastructure) from attack, damage, misuse and economic espionage
  • 10. Cyber Security Challenges ● Cyberspace has intrinsic vulnerabilities that can not be evacuated ● Innumerable entry points to internet ● Assigning attribution: Internet technology makes it relatively easy to misdirect attribution to other parties ● Computer Network Defense techniques, tactics and practices largely protect individual systems and networks rather than critical operations (missions) ● Attack technology outpacing defense technology ● Nation states, non-state actors, and individuals are at a peer level, all capable of waging attacks
  • 11. Evolution of Cyber Security Viruses(1990s) Antivirus, Firewalls Worms(2000s) Antivirus, Firewalls Botnets (late 2000s to Current) Data Loss Prevention, Application aware Firewalls, SIM Advanced Persistent Threats, Insiders (Current) Network Flow Analysis
  • 13. Indian Cyber Situation ● India ranks 3rd in terms of the highest number of internet users in the world after USA and China, the number has grown 6 - fold between 2012 - 2017 with a compound annual growth rate of 44% ● India secures a spot amongst the top 10 spam - sending countries in the world alongside USA ● India was ranked among the top five countries to be affected by cybercrime, according to a recent report by online security firm ”Symantec Corp”.
  • 14. Recent Cyber Attacks in India Through a phishing email sent to an employee, hackers accessed the credentials to execute a fund transfer, swindling Union Bank of India of $171 million, Prompt action helped the bank recover almost the entire money July 2016: UNION BANK OF INDIA HEIST The global ransomware attack took its toll in India with several thousands computers getting locked down by ransom - seeking hackers. The attack also impacted systems belonging to the Andhra Pradesh police and state utilities of West Bengal May 2017: WANNACRY RANSOMWA RE
  • 15. Recent Cyber Attacks in India The food tech company discovered that data, including names, email IDs and hashed passwords, of 17 million users was stolen by an ‘ethical’ hacker - who demanded the company must acknowledge its security vulnerabilities - and put up for sale on the Dark Web May 2017: DATA THEFT AT ZOMATO The ransomware attack made its impact felt across the world, including India, where container handling functions at a terminal operated by the Danish firm AP Moller - Maersk at Mumbai’s Jawaharlal Nehru Port Trust got affected June 2017: PETYA RANSOMWA RE
  • 16. 10 Steps to Cyber Security 1. Network Security Protect your networks against external and internal attack. Manage the network primer. Filter out unauthorised access and malicious contents. Monitor and test security controls. 2. Malware Protection Produce relevant policy and establish anti - malware defences that are applicable and relevant to all business areas. Scan for malware across the Orgn. 3. Monitoring Establish a monitoring strategy and produce supporting policies. Continuously monitor all ICT system and networks. Analyse logs for unusual activity that could indicate an attack.
  • 17. 10 Steps to Cyber Security 4. Incident Management Establish an incident response and disaster recovery capability. Produce and test incident management plans. Provide specialist training to the incident management team. Report criminal incidents to law enforcement. 5. User Education and Awareness Produce user policies covering acceptable and secure use of the organisation’s systems. Establish a staff training programme. Maintain user awareness of the cyber risks. 6. Home and Mobile Working Develop a mobile working policy and train staff to adhere to it. Apply the secure baseline to all devices. Protect data both in transit and at rest.
  • 18. 10 Steps to Cyber Security 7. Secure Configuration Apply security patches and ensure that the secure configuration of all ICT systems is maintained. Create a system inventory & define a base line build for all ICT devices. 8. Removable Media Controls Produce a policy to control all access to removable media. Limit media types and use. Scan all media for malware before imported on the corporate system. 9. Managing User Privileges Establish account management processes and limit the number of privileged accounts. Limit user privileges and monitor user activity. Control access to activity and audit logs.
  • 19. 10 Steps to Cyber Security 10. Information Risk Management Regime Establish an effective governance structure and determine your risk appetite. Maintain boards engagement with cyber risk. Produce supporting information risk management policies.