Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 40

BORDER SECURITY FORCE

TRIPURA FRONTIER

“CYBER SECURITY SEMINAR”


BY-
S N JHA
2IC (PROV/IT)
CYBER SECURITY
CYBER SECURITY?

 A DEFENSIVE SOLUTION TO PROTECT ANY INTERNET-


CONNECTED SYSTEM FROM CYBER THREATS AND
ATTACKS.
 PROTECTION OF COMPUTER SYSTEMS
 THEFT OF OR DAMAGE TO
THEIR HARDWARE, SOFTWARE, OR ELECTRONIC
DATA,
 DISRUPTION OF SERVICES
 ENCOMPASSES A SYSTEM OF HARDWARE &
SOFTWARE
 USER AWARENESS
SCOPE
 CONCEPT OF NETWORK/INTERNET
 IMPORTANCE/BENEFITS OF CYBER SECURITY
 THREATS
 WHY CYBER CRIME?
 MEASURES
INTERNET SECURITY
COMPUTERS SECURITY
SMARTPHONE SECURITY
SOCIAL MEDIA SECURITY
 RESPONSE
 CYBER FORENSICS
 QUESTIONS?
BASICS OF INTERNET/NETWORK
A TYPICAL NETWORK
NETWORK ESSENTIALS
WHY NETWORKING??
WHAT IS THE INTERNET??
INTERCONNECTED(INTER) NETWORKS(NET) I.E.
INTERNET (NETWORK OF NETWORKS)
EXPANSIVE & EVERCHANGING
CONCEPT EXISTED SINCE EARLY 1990s (NIKOLA
TESLA)
FIRST MSG WAS SENT THROUGH APRANET IN
1969 UNIV OF CA, LA TO SRI, CA
FUNDED BY US DEPTT OF DEF( DARPA)
ROBERT ELLIOT KAHN/VINTON GRAY SERF (F/O
OF INTERNET-TCP/IP)
WHO’S VULNERABLE?
 EVERYONE!

 WHO USES COMPUTERS OR


NETWORKS IN THE PROCESS
OF DOING THEIR JOB.

 BOTH SERVERS AND END-USERS


ARE SUBJECT TO ATTACK

 SOCIAL MEDIA USERS

 ONLINE SERVICES USERS


CYBER CRIME, WHY?
 PASSION OF YOUNGSTERS
 DESIRE OF MAKING QUICK MONEY

 MISCONCEPTION OF FIGHTING A JUST CAUSE


 CAPACITY TO STORE DATA IN COMPARATIVELY SMALL
SPACE
 CONFIDENTIAL INFORMATION IS ONLINE
 USER NEGLIGENCE
 COMPLEXITY IN UNDERSTANDING TECHNOLOGY
 VULNERABILITIES IN SYSTEM
 NEW FORM OF CRIME
 EASY ACCESSIBILITY TO VICTIMS
 INACCESSIBILITY TO CRIMINALS
 ANONYMITY

 VOLATILE EVIDENCE
 DRAWBACKS IN CRIMINAL JUSTICE SYSTEM
 COMPUTER AS A TARGET

 COMPUTER AS A WEAPON
IMPORTANCE OF CYBER SECURITY

GOVERNMENT, MILITARY DATA


 CORPORATE DATA
 FINANCIAL DATA
 MEDICAL RECORDS/ DATA
 PERSONAL INFORMATION
 UNAUTHORIZED ACCESS OR EXPOSURE HAVE
NEGATIVE CONSEQUENCES
BENEFITS: CYBER SECURITY
 PROTECTION
MALWARE, RANSOMWARE
PHISHING/CYBER CRIMES
SOCIAL ENGINEERING
 PROTECTION FOR DATA & NETWORKS
 PREVENTION OF UNAUTHORIZED USERS ACCESSING
DIGITAL ASSETS
 IMPROVEMENT OF RECOVERY TIME AFTER A BREACH
 PROTECTION OF END USERS AND THEIR PERSONAL
INFORMATION
 IMPROVEMENT OF CONFIDENCE IN THE
ORGANIZATION
 SOCIAL MEDIA (RESPONSIBLE USER)
THREATS
MALWARES (BACKDOOR, KEY/SCREEN LOGGERS,
VIRUS, SPYWARES, RANSOMWARES)
DDoS ATTACKS
DIRECT ACCESS ATTACKS
EVESDROPPING/SPYING
PHISHING
SOCIAL ENGINEERING
SOCIAL MEDIA ( PIO, HONEYTRAP, BLACKMAIL,
ESPIONAGE, PERSONAL/PHYSICAL SECURITY, OS
INT)
THREATS
CYBER-STALKING
EMAIL SPOOFING
COMPUTER VANDALISM
CYBER TERRORISM
CHILD PORNOGRAPHY
CYBER CONTRABAND
CYBER LAUNDERING
BANKING FRAUDS
ONLINE SHOPPING/SELLING FRAUDS
ONLINE LOTTERY FRAUDS
SECURITY MEASURES
HARDWARE (UTMS, FIREWALL, IDS, HARDWARE
PROTECTION SYSTEM)
SOFTWARE (ANTIVIRUS, BLOCKERS, GENUINE
SOFTWARES, UPDATE)
ACCESS CONTROL (PHYSICAL/VIRTUAL)
RESPONSE MECHANISM
DIGITAL HYGIENE
END USER EDUCATION
COMPUTERS SECURITY
 WHERE IS YOUR COMPUTER LOCATED?
 WHO CAN GET TO IT?
 PHYSICAL SECURITY OF THE COMPUTER ROOM
 USE OF STAND ALONE COMPUTERS/ NO NETWORK
ACCESS
 NETWORKED COMPUTER/ NO DATA/BLANK
COMPUTER
 HARDWARE/SOFTWARE SECURITY LOCKS BE
INSTALLED ON PCS TO PREVENT UNAUTHORISED
ACCESS.

Remember! A stolen computer is the ultimate


loss of data and privacy
COMBINE PHYSICAL AND PASSWORD PROTECTION
 INTRODUCE POWER ON/BIOS & ADMINISTRATOR
PASSWORD.
 DISABLE THE ‘GUEST’ ACCOUNT.
 ACTIVATE THE SCREEN SAVER AND ENABLE PASSWORD
 PROTECT YOUR FILES WITH PASSWORD.
 GOOD PASSWORDS: EASY TO REMEMBER, HARD TO
GUESS
 DO NOT SHARE THE PARTITIONS/FOLDERS ON YOUR
SYSTEM. IF SHARED, PROTECT THEM WITH PROPER
PERMISSIONS.
 IF POSSIBLE, PREVENT PHYSICAL ACCESS WHEN YOU’RE
NOT AROUND
 LOG OUT WHEN YOU LEAVE THE ROOM
SMARTPHONE SECURITY
SMARTPHONE SECURITY
EASILY ACCESSIBLE TO ALL/INCREASED
VULNERABILITY
USE SCREEN LOCK/PASSWORD
PHYSICAL SECURITY
REPAIRS/DATA PROTECTION
DISABLE GEO TAGGING/LOCATION SHARING
ENABLE REMOTE WIPE/LOCATER
SIM LOCK
SMARTPHONE SECURITY
USE OF PUBLIC NETWORKS
DUBIOUS APPS
DUBIOUS WEBSITES
OTP PROTECTION/AUTHENTICATION
SIM SWAP FRAUD
DISABLE DATA/INTERNET WHEN NOT USING
NO USE POLICY ON DUTY
BACKUP DATA
INTERNET SECURITY
YOU ARE A TARGET!
FIREWALLS/UTMs
ANTIVIRUS
GENUINE SOFTWARES/UPDATES
PASSWORD SELECTION/MANAGEMENT
STICK TO OWN DEVICES
BE AWARE OF SURROUNDINGS/PHYSICAL
SECURITY
TRACK/DELETE DEGITAL FOOTPRINT
CONNECT SECURELY
BEWARE OF SOCIAL ENGINEERING
BACK UP YOUR DATA
YOU ARE NOT IMMUNE
CLICKING WITHOUT THINKING!
SOCIAL MEDIA SECURITY
ADDICTION?
STRONG PASSWORD/MANAGEMENT
DON’T BE FRIEND TO EVERYONE
CAREFUL WHAT YOU SHARE (NAME, ADDRESS,
WORK, FAMILY ETC)
NO OFFICIAL INFO
PICTURES IN UNIFORM MAKE YOU TARGET
PIO, HONEYTRAP, FRAUD, BLACMAIL, SEXUAL
CRIMES
• CHECK PRIVACY SETTINGS
• CHECK APP PERMISSIONS
• DISABLE AUTO DOWNLOAD
• DON’T RESPOND TO UNKOWN
PEOPLE/SOURCES
• NEVER POST/DISCLOSE PRIVATE/SESITIVE INFO
• DISABLE LOCATION/GEOTAGGING
• NEVER SHARE OTP/PASSWORDS/CREDIT
CARD/BANK INFO ETC
• BE THOUGHTFUL OF WHAT YOU SHARE,
• YOUR REAL FRIENDS & FAMILY ARE IN THE REAL
WORLD
RESPONSE WHEN COMPROMISED
 MITIGATE IMPACT
 IDENTIFICATION OF SOURCE
 COMMUNICATION
 AFFECTED PARTIES
 REGULATORY BODIES
 LAW ENFORCEMENT
 PREVENTION
 CHANGE PASSWORDS
 SUSPEND ACCOUNTS
 DETECTION
 ENABLE LOGGING
 REVIEW LOGS
 PREVENT RECURRENCE
 REVIEW POLICIES/SECURITY
 ENHANCE CONTROLS
CYBER FORENSICS
BEWARE!
NOTHING IS HIDDEN/SECURE IN CYBERWORLD!
VARIETY OF TECHNIQUES, TOOLS AND
SOFTWARE FOR FORENSIC APPLICATIONS
DATA ONCE WRITTEN IS RECOVERABLE
YOU ARE BEING WATCHED
YOU ARE LEAVING DIGITAL FOOTPRINTS
SEARCH/BROWSING/OTHER HISTORY
 IP ADDRESS
 MAC ADDRESSES/IMEI NUMBERS/MOBILE NUMBERS
NETWORK/CELL/ISP/DEVICE/OS/GEO LOCATION INFO
SUMMARY
CONCEPT OF NETWORK/INTERNET
IMPORTANCE/BENEFITS OF CYBER SECURITY
THREATS
WHY CYBER CRIME?
MEASURES
INTERNET SECURITY
COMPUTERS SECURITY
SMARTPHONE SECURITY
SOCIAL MEDIA SECURITY
CYBER FORENSICS
RESPONSE
IN THE LAST…
QUERIES?
THANKS!

You might also like