2/26/20141TRAI. Background Threats Present Status Challenges and Strategies 2/26/2014TRAI2.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Session 3 – Information Security Policies
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
C8- Securing Information Systems
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Topic 5: Basic Security.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Securing Information Systems
Broadband Challenges 2017 Christopher Tamarin
Securing Information Systems
Information Security – Current Challenges
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Security in Networking
8 Building Blocks of National Cyber Strategies
Risk of the Internet At Home
Chapter 9 E-Commerce Security and Fraud Protection
E-Commerce for Developing Countries (EC-DC)
INFORMATION SYSTEMS SECURITY and CONTROL
Promoting Global Cybersecurity
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Deborah Housen-Couriel, ADV.
Presentation transcript:

2/26/20141TRAI

Background Threats Present Status Challenges and Strategies 2/26/2014TRAI2

Critical infrastructure means the computers, computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data, content data and/or traffic data so vital to this country that the incapacity or destruction of or interference with such systems and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters. (Source: ITU Toolkit for Cybercrime Legislation) All critical infrastructures are increasingly dependent on ICT for communication, information management and control functions. 2/26/2014TRAI3

Security refers to minimizing the vulnerabilities of assets and resources. – An asset is anything of value. – Vulnerability is any weakness that could be exploited to violate a system or the information it contains. – A threat is a potential violation of security 2/26/2014TRAI4

ICT has direct impact on economic growth, social behaviour and conduction of business. As a result, it is now considered one of the core critical infrastructure. Monitoring and control of various core infrastructure like electricity, water supply, medical services are getting computerised, increasing their dependency on ICT. Protection of ICT infrastructure is vital as it has wide ramifications both direct and indirect on critical infrastructure. The emerging information infrastructure differ radically in terms of scale, connectivity, and dependencies from traditional structures. 2/26/2014TRAI5

Cyber-threats are evolving rapidly both in terms of nature and capability to cause harm. Threats must be managed to maximize social benefits from ICTs and to reduce risks resulting from interdependences and vulnerabilities. Communication systems are interconnected resulting in global interdependencies and vulnerabilities including threats to the national systems. Protective measures require continual technological improvements and new approaches, to minimize threats on ICT. 2/26/2014TRAI6

Broadband Trends Wireless, Broadband and Data is the future. 7

8 Source: CISCO PetaByte / Month IP based networks are becoming default choice for ICT. All IP Network IP networks are able to provide different services including triple play. IP technologies support flexibility, managed QoS, dynamic bandwidth management and support different applications. IP networks are cost effective when compared with legacy network. IP networks are resilient, robust, modular, scalable and require low capex/ opex.

9

10

2/26/2014TRAI11 IP based networks are becoming default choice for ICT. Features IP networks are able to provide different services including triple play. IP technologies support flexibility, managed QoS, dynamic bandwidth management and support different applications. IP networks are cost effective when compared with legacy network. IP networks are resilient, robust, modular, scalable and require low capex/ opex.

12 Malware Cyber warfare Threats to VoIP and mobile devices The evolving cyber crime economy Botnet Data Driven

13 AreaCharacteristic SecrecyKeeping information out of the hands of unauthorized users Authentication Determining whom you are talking to before revealing sensitive information or entering into a business deal Non-repudiationto ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Nonrepudiation is the assurance that someone cannot deny something Integrity controlModification of message in transit or concocted

14

2/26/2014TRAI15 Sector/ Verticals Information and communication Banking & finance Emergency services Power Water supply networks Air traffic control Transportation Defense and security Government Food and agriculture etc Threat Identity theft Spyware Phishing Denial of Service Hack Botnet Malware Viruses Spam Pop-ups etc Impact Data Theft Industrial Espionage System Downtime Financial Frauds Reduced QoS Harassment Information Loss Compromised National Security Defamation Economic slowdown

2/26/2014TRAI16 Network security problems can be divided roughly into four closely interwined areas: AreaCharacteristic SecrecyKeeping information out of the hands of unauthorized users Authentication Determining whom you are talking to before revealing sensitive information or entering into a business deal Non-repudiationto ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Nonrepudiation is the assurance that someone cannot deny something Integrity controlModification of message in transit or concocted

2/26/2014TRAI17 Attacks on Network Attack within subnet Broadcast storm Media Access Control (MAC) Flooding Dynamic Host Control Protocol (DHCP) DoS DHCP rogue Spanning Tree hijack Address Resolution Protocol (ARP) table poisoning IP address spoofing Attacks on Services Denial of Service (DOS) Backdoor Man in Middle Password Guessing Brute Force Dictionary Software Exploitation Malicious Codes Viruses Adware Spyware Worms Trojans Browse Hijackers

2/26/2014TRAI18 Type of Threats Bot-network operators Criminal groups Foreign intelligence services Hackers Insiders Phishers Spammers Spyware/malware authors Terrorists

2/26/2014TRAI19 Source: websense.com

2/26/2014TRAI20 Wireless IP network – Misuse of Wi-Fi signals- need for protections – Subscriber awareness issues – Securing subscriber devices Source: Survey by Deloitte and Data Security Council of India (DSCI)

2/26/2014TRAI21 Misuse of IP Ports –Attacks using open IP Ports –Misuse of application in absence of server hardening –Exploiting Hardware / Software vulnerabilities Security Issues : IP Ports

2/26/2014TRAI22 ThreatValue (July 10) Spam88.9% Phishing –one in Virusesone in s Malicious websites 4,425 new sites per day Total Global Spam Volume each day 120 billion URL- shortened spam 23.4 billion (in may 2010) Source: MessageLab

All need to protect our critical information infrastructures, as risks are huge, especially in electronic warfare. The rapid growth of ICTs and societal inter-dependency have led a shift to perception of Critical Information Infrastructure threats and, as a consequence, cyber security has become international political agenda. It is crucial to understand the risks that accompany new technologies in order to maximize the benefits. Growing threats to security, at the level of the individual, the firms, government and critical infrastructures, make security everyones responsibility. It is important to understand and keep up-to-date contours of fast changing challenges. 2/26/2014TRAI23

2/26/2014TRAI24 Approach and Strategies Licensing and Regulatory Measures Legal Measures: Technical and Procedural Measures Capacity Building International Cooperation

Assign specific responsibility to service providers Close identification of SPAM sites across the countries and automatic closure. Creation of database of different sources related security threats. Punitive measures against defaulting service providers in complying to regulatory instructions. Acquisition of CERT and periodic audit of network vulnerability. 2/26/2014TRAI25

Adoption of appropriate legislation against the misuse of ICTs for criminal or disruptive purposes, including activities intended to affect the integrity of national critical information infrastructures. Threats can originate from anywhere around the globe, the challenges are inherently international in scope and require international cooperation, investigative assistance, common substantive and procedural provisions. There is urgent need to enhance information sharing to improve incidence response capabilities. 2/26/2014TRAI26 Standardization brings private sector and governments to coordinate work and promote the harmonization of security policy and standards globally. Various standards and security provision defined by international organizations like ITU, IEEE etc. should be implemented across all countries. These standards must provide safeguards for security and updated regularly to combat new security risk.

Promote cybersecurity risk awareness for all citizens; Build an education system that will enhance understanding of cybersecurity in information technology; Expand and train the workforce to protect the Nations competitive advantage; Help organizations and individuals make smart technological choices as they manage risk. Develop skills to reduce risk and exposure from unsecure environment Enabling citizen through impowerment of: – Knowledge, – capabilities and – Decision-making. 2/26/2014TRAI27

28 Challenges All need to protect our critical information infrastructures, as risks are huge, especially in electronic warfare. The rapid growth of ICTs and societal inter-dependency have led a shift to perception of Critical Information Infrastructure threats and, as a consequence, cyber security has become international political agenda. It is crucial to understand the risks that accompany new technologies in order to maximize the benefits. Growing threats to security, at the level of the individual, the firms, government and critical infrastructures, make security everyones responsibility. It is important to understand and keep up-to-date contours of fast changing challenges.

2/26/2014TRAI29 Way Forward: Security is important, manageable but requires participation of all stakeholder and awareness in masses. Service providers must be sensitized to make a secure network for future. CIIP unit must act effectively with the help of various partners across the globe. The establishment of Public-Private Partnerships with strong mutual trust is essential for the success of the CIIP unit.

2/26/2014TRAI30 S K Gupta, Advisor (Converged Network) Telecom Regulatory Authority of India J.L. Nehru Marg, New Delhi – Ph (O) (Fax) S K Gupta, Advisor (Converged Network) Telecom Regulatory Authority of India J.L. Nehru Marg, New Delhi – Ph (O) (Fax) Thank You 30