Information Security a CHALLENGE - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Information Security a CHALLENGE

Description:

Massive refinement in concept of Information Security ... Managed VirusScan with AntiSpyware. Managed Personal Firewall. Managed Virus Defense ... – PowerPoint PPT presentation

Number of Views:49
Avg rating:3.0/5.0
Slides: 18
Provided by: BAJR8
Category:

less

Transcript and Presenter's Notes

Title: Information Security a CHALLENGE


1
Information SecurityaCHALLENGE
  • Ashok.Veeta

2
THE PACE
  • World IT and IT Services market in the year 2006
  • US 4 trillion
  • Decrease in cost computing power and
  • communication connectivity
  • Growing population of user-centric services
  • Internet Commerce
  • e-Governance
  • On-demand services
  • Telecommuting
  • Individualized entertainment

3
ROLE OF SECURITY
  • Massive refinement in concept of Information
    Security
  • Confined to method for keeping potentially
  • harmful users
  • Security is currently much more focused on
    enabling users to extract value from computing
    infrastructure.

4
KEY INITIATIVES(INDIA)
  • Security Policy, Compliance and Assurance Legal
    Framework
  • Best Practices ISO 27001- Mandated for Public
    Companies and critical
  • sectors
  • Security Assurance Framework for IT/BPO
  • IT Act, 2000
  • IT (Amendment) Bill, 2006 Provisions for
    Data Protection
  • Computer crimes like phishing, identity theft,
    e-Commerce frauds, etc.
  • Security Incident Early Warning Response
  • CERT-In National Cyber Alert System
  • Security training / Capacity building
  • Skill Competence development
  • Collaboration with International organizations
    and universities to train
  • personnel
  • Domain Specific training Cyber Forensics
  • Research and Development

5
BILL(AMENDMENT)2006
  • To amend IT Act, 2000 primarily to strengthen
    provisions regarding
  • Data Protection (Followed approaches in APEC
    and US)
  • Corporate bodies to implement best practices
    to protect data
  • Heavy Compensation to affected user (Section
    43A)
  • Breach of Confidentiality Privacy
  • Intermediary and service providers not to
    disclose personal information of subscriber/user
    acquired by them while providing services.
  • Penalties in form of Imprisonment and Fine
    (Section 72A)
  • Pornography including child pornography
    (Section 67A)
  • Computer related offence
  • Expansion of list of offences (Section 66
    expanded)
  • Identity theft (Section 417A)
  • Phishing (Section 419A)
  • Spoofing and SPAM (Section 66A)
  • E-Commerce Frauds
  • Rationalization of duties to safeguard the
    interest of service providers
  • (Section 79)

6
CYBER ATTACKS
  • Phishing
  • Around 490 phishing cases affecting financial
    institutions in India and
  • abroad were observed in the year 2007 so far
  • Increase in cases of fast-flux phishing and
    rock-phish
  • Bots
  • Botnets are evolving with increased number of
    Bots
  • The Command and Control (CC) Servers
    controlling the Bots in India are
  • located in USA, China, Germany, South Korea,
    Spain
  • The command control server regularly
    shifting
  • Attacks
  • Top attack originating countries USA, China,
    Australia, Taiwan, Russia
  • Targeted attacks are on the rise
  • Increasing data leakage and financial driven
    crimes
  • 2777 Indian websites were defaced in 2007 so
    far
  • SPAM
  • On an average source of about 58 SPAM e-mails
    towards India is from
  • US Region
  • Spam constitutes 18 of email traffic from
    India

7
CONT..
  • Attackers are refining their methods and
    consolidating assets to create global networks
    that support coordinated criminal activity
  • The current threat environment is characterized
    by compound attacks simultaneously from different
    locations
  • Convergence of malware authors, phishers,
    spammers
  • Increased inter-operability between diverse
    threats blended threats
  • Fake data about domain registrant on WHOIS
    directory

8
CERTIFIERS
  • FIRST (Full Member)
  • APCERT (General Member)
  • CERT/CC and US-CERT
  • JPCERT
  • Korean CERT
  • European CERTs
  • CSIRT, UK
  • German CERT
  • Finland CERT
  • French CERT
  • Netherlands CERT
  • Norwegian CERT

9
AUDIT AND ASSURANCE
  • AAA TECHNOLOGIES
  • SYSMAN COMPUTERS
  • AUDITIME INFORMATION SYSTEMS
  • INDUSFACE CONSULTING
  • INFORMATION SYSTEMS AUDITORS AND CONSULTANTS
  • CYBERQ CONSULTING
  • HARIBHAKTI AND CO
  • TATA CONSULTANCY SERVICES,
  • SIFY
  • PRICEWATERHOUSECOOPERS
  • MAHINDRA-BRITISH TELECOM
  • SATYAM COMPUTER SERVICES
  • SECURE SYNERGY
  • STQC DIRECTORATE
  • RAMCO SYSTEMSI

10
SERVICES
  • Managed VirusScan with AntiSpyware
  • Managed Personal Firewall
  • Managed Virus Defense
  • Secure Messaging Service
  • Secure Surfing Service
  • Endpoint Security Service
  • Log Management Service
  • Security Device Management
  • In Source Security Service
  • Vulnerability Management Services

11
STANDARDS
  • ISMS
  • ISO/IEC 27001
  • ISO 15408
  • IS 15150
  • BS 1799

12
INTERNATIONAL COOPERATION
  • Incident Response Activities
  • DDoS Attacks on websites of Estonia
  • CERT-In worked in coordination with NATO and
    other European CERTs to mitigate attacks
    originating from India
  • Incident Handling Drills
  • APCERT International Security Drill, 19
    December, 2006
  • 15 CERTs and security teams from 13 economies
    participated
  • ASEAN CERTs International Security Drill, 16
    July, 2007
  • 11 CERTs and security teams participated
  • CERT-In developed simulated malware application
    for the
  • security drill

13
COLLABORATIONS
  • To resolve incidents, we need to track actual
    attacker
  • Information exchange is needed globally in
    respect of BOTS, SPAM
  • DDOS attacks and nature of cyber incidents
    between
  • Law Enforcement
  • CERTs
  • Service providers
  • Domain owners
  • Domain registrars
  • Reconciling various legal regimes with
    technological
  • capability
  • Standard procedures/manuals among countries
  • mandating service providers for supply of
    information

14
CONCLUSION
  • Let us work together for a vision.
    Create a society in which spam, viruses
    and worms, the plagues of modern information
    technology are eliminated.

15
ANY
  • QUESTIONS

16
THANKS
  • FOR LISTENING

17
QUIZ
  • ANY TWO NAMES OF AUDIT COMPANIES
  • FULL FORM OF ISMS
  • NAME ONE CYBER ATTACK
  • ANY TWO ASIAN CERTIFIERS
Write a Comment
User Comments (0)
About PowerShow.com