Professional Documents
Culture Documents
Cyber Security Threats and Latest Trends
Cyber Security Threats and Latest Trends
Not
here to
Lets
try to
get
famili
ar with
the
threa
How many of
you have
seen these in
THEATRES ?
How many of
you have
FEW or ALL
of these in
your
LAPTOPS
and HDDs
Ever
thought of
Why is all
this FREE ?
How many
of you have
LINUX in
your
Workstati
ons ?
How many
of you have
Windows
in your
Workstati
ons ?
Collusion is an experimental
add-on for Firefox and allows you
to see all the third parties
that are tracking your
movements across the Web. It
will show, in real time, how
that data creates a spiderweb of interaction between
companies and other trackers.
UNWANTED
APPS
Friends List
Their Phone
Numbers
Their Addresses
Your SMS
Your MMS
Your Browsing
History
Your Chats
Your relatives
details
Does it
In such times
Securing the IT
Environment
getting DIFFICULT
by day?
users
locations, the applications they were
running and the types of devices they
Basic information such as
In addition, this
Applications ran on
servers
dedicated
IT organization
controlled access to those
The
enforce
security policies
boundaries to
TOUCHING
MOMENT
HAPPY CISO!!!!!!
Welcome CLOUDS
Changing the way the network is Architected
Welcome
VIRTUALIZATION
network
by going to the cloud for
extending the corporate
is traversing
the countries.
BOTNETS
So all this
along with
these two
Current
Giants
make a
great
Attack
Surface
CRIMEWARE as a SERVICE
electronic
surveillance program installed by C-DOT, an Indian
Government owned agency.
access to India's
telecommunications network and the ability to
listen in on & record mobile
landline and satellite calls and ) , and read
private emails, SMS and MMS and track the geographical
location of individuals, all
in real time.
Operation B70
Life :
2-3 Years
Browser Exploits
form
DYNAMIC ATTACK
SURFACE
Domains
of security
WHAT DO WE DO TODAY?
NO TWO ORG or USERS CAN HAVE SAME
MODEL OF SECURITY IMPLEMENTATION
THE NEED IS CUSTOMISED
FOR EVERYONE
MODEL
KEEP YOUR
EYES/EARS OPEN
Cryptography
Updates
OpenSourc
e
Stringent
Hardening
Monitoring
tools
Access
Controls
Analysis
tools
Cyber
Hygiene
IT IQ
Strong
Passwords
Live DVDs
Secure
Design
Firewalls/U
TMs
Know your
Common
Passwords
Cookies
False
Identity
Imperson
ation
Failure
User Fraud
Unknown
Outsider
Attack
Breach of
Anonymity
Insider Attack
Threats
Unauth
Disclosure
Access
Revoked
Rights
DoS
Theft of
Access
Tokens
able to know
everything we did today
E-Mail : anupamtiwari@fedoraproject.org
Blog at : http://anupriti.blogspot.com
Twitter : @it_updates