An Overview to Information Security and Security Initiatives in India Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In)

Slides:



Advertisements
Similar presentations
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Advertisements

Philippine Cybercrime Efforts
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
1 Case Study ESTABLISHING NATIONAL CERT By Saleem Al-Balooshi Etisalat - AE.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Cyber Security Issues in South Korea and CSIRTs Cooperation September 17, 2014 Eunju Pak
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Internet Security Aspects Dr. Gulshan Rai Director Indian Computer Emergency Response Team (CERT-In) Department of Information Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computer & Network Security
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Chap1: Is there a Security Problem in Computing?.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Computer Security By Duncan Hall.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
MIS323 – Business Telecommunications Chapter 10 Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Security tools for records managers Frank Rankin.
06 Sep 2006 Cyber security Cyber Security for Protection of Critical Information Infrastructure B J Srinath Director & Scientist ‘ F ’, CERT-In Department.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Information Management System Ali Saeed Khan 29 th April, 2016.
Reach us at Call: | Visit:
Washington State Auditor’s Office Cybersecurity Preparing for the Inevitable Washington State Auditor’s Office Peg Bodin, CISA, Local IS Audit Manager.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Challenges We Face On the Internet
Securing Information Systems
Cybersecurity Awareness
Cyber Issues Facing Medical Practice Managers
David J. Carter, CISO Commonwealth Office of Technology
INFORMATION SYSTEMS SECURITY and CONTROL
Contact Center Security Strategies
Premier Employee Program Version 4.0
LO1 - Know about aspects of cyber security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Anatomy of a Common Cyber Attack
Presentation transcript:

An Overview to Information Security and Security Initiatives in India Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In)

Objectives Why we need security To understand Information Security To know Security Initiatives in India

Why Security? Polish Teen Faces Charges for Allegedly Manipulating Train System (January 11, 2008) Barclays Chairman Victim of Identity Theft (January 10 & 11, 2008) Stolen Laptops Hold Nashville Voter Data ( 337,000 voters) (January 3, 2008)

Security: The Need The consequences of insufficient security –Identity theft –Compromised customer confidence; loss of business –Service interruption (e.g., ) –Loss of competitive advantage –Equipment theft –Embarrassing media coverage –Substantial financial loss –Legal penalties

What’s at stake? When connecting to the Internet, three things are put at risk: –Data –Resources –Reputation

Facebook Widget Installing Spyware

Information Security – CIA Confidentiality –ensuring that information is accessible only to those authorized to have access Integrity –assurance of accuracy and reliability of information –unauthorized modification of data is prevented Availability –Information is being accessible and usable upon demand by an authorized entity Non Repudiation –Verification of the sender and the recipient were, in fact, the parties who claimed to send or receive the message, respectively

Threats to Information Security Confidentiality – Unauthorised Disclosure Integrity – Unauthorised Alteration Availability –Disruption

Threats An event, the occurrence of which could have an undesirable impact on the well-being of an asset. [ISC2] International Information Systems Security Certification Consortium Any circumstances or event that has the potential to cause harm to a system or network.That means, that even the existence of a(n unknown) vulnerability implies a threat by definition. [CERT]

Vulnerability A feature or bug in a system or program which enables an attacker to bypass security measures. An aspect of a system or network that leaves it open to attack. Absence or weakness of a risk-reducing safeguard. It is a condition that has the potential to allow a threat to occur with greater frequency, greater impact or both.

Threats

Current trend of cyber threats Targeted attacks Stealing of data/modification Identity theft (Phishing) Spread of malicious code Distributed Denial of service attacks Website Defacements

Rapid Development of Cyber Threats

Confidentiality INFORMATION SECURITY Integrity Availability Authenticity Security Policy People Process Technology Regulatory Compliance Access Control Security Audit User Awareness Program Incident Response Firewall, IPS/IDS Encryption, PKI Antivirus Information Security Management

What actions need to be taken User awareness –Security portals for user awareness –Ad campaigns Enterprise security –CSIRTs Sectoral cooperation and coordination –Sectoral CERTs National coordination –CERT-In Global coordination –APCERT, ASEAN, FIRST

Need for cooperation Users Organisations CSIRTs, CERTs ISPs Domain registrars DNS operators IT vendors Law enforcement agencies

Govt. Initiatives Formation of CERT-In (January, 2003) Nodal agency for –Responding to security incidents –Prevention of incidents by means of generating user awareness –Promotion of security best pratices Coordination at –Sectoral level –National level –International level

CERT-In initiatives Directives issued to Govt. and public sector organisations to –Implement ISO security standard –Perform regular security audits –Shifting of websites onto ‘.in’ name space –Hosting of websites within country Empanelment of IT Security auditors Creation of awareness by organising training programs for CISOs, System administrators Issuance of security guidelines

CERT-In initiatives Collaboration with security vendors like Microsoft, Redhat, Cisco, Symantec, McAfee, TrendMicro etc. Security surveys and reports Created forum on Phishing and Spam in collaboration with CII & other stakeholders Issued “Securing Home Computers” and “Web Server Security” Guidelines Informative Web Portals created in collaboration with Microsoft & Redhat for general user

25 Information Sharing: Stakeholders ISPs, Key Networks CERTs CSIRTs Vendors Media Law Enforcement Agencies Home Users CERT-In --- Government Sector -Critical Information Infrastructure - Corporate Sector International CERTs

International Cooperation FIRST APCERT CERT/CC US-CERT JPCERT Korean CERT

DIT initiatives Generation of trained manpower on Information security –Master trainers in Information Security (60) –Short-term/long-term courses in Information Security Certification, Vulnerability Assessment, training programs in the area of IT –STQC

DIT initiatives R&D projects –Cryptography –Steganography –Network Behavior Analysis –Biometric Authentication –Mobile Security –Cyber Forensics

Indian Website Defaced in Year 2007

Security Incidents handled by CERT-In during 2007

Latest attack vectors Compromise of popular websites and subsequent distribution of malware visiting the website Compromise of accounts and distribution of malicious attachments to contact list users Collection of user credentials through keyloggers

Activities of CERT-In Activities messages received Incidents handled Security Alerts/ Incident Notes Advisories Vulnerability Notes Security Guidelines94211 White papers-3622 Trainings17676 Indian Website Defacement tracked Open Proxy Servers tracked Bot Infected System tracked

33 Communication channels CERT-In website –About 1460 users visiting the site per day –Significant increase of site visit during major events CERT-In Incident Response Help Desk –Toll free nos (Voice) (FAX) CERT-In mailing list –About 1100 individuals from various national and international security organizations CIOs Database ISPs Postal mail

Conclusion Let us work together for a vision. Create an society in which spam, viruses and worms, the plagues of modern information technology are eliminated.

Thank you Incident Response HelpDesk Phone: FAX: