Hurdles in implementation of cyber security in India.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Rebalancing the Northern Ireland economy Eamonn Donaghy Head of Tax KPMG in Belfast.
Logo Here Main Title Here October 2010 Designer Note: This presentation was created for one of the Big 4 Accounting Firms that has its own Branding Guidelines,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
MINISTRY FOR INFORMATION SOCIETY AND TELECOMMINUCATIONS CIRT - Computer Incident Response Team GOVERNMENT OF MONTENEGRO MINISTRY FOR INFORMATION SOCIETY.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Public Private Partnerships: What’s in it for my Government? 14 July 2011 Malcolm Butterfield.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Institute of Operational Risk Breakout Session - Operational Risk Nirvana KPMG Giles Triffitt Peter Watson Peter Docherty 1 November 2013.
BUSINESS PLUG-IN B6 Information Security.
1 Telstra in Confidence Managing Security for our Mobile Technology.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
E-Commerce Security and Fraud Issues and Protections
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Viruses & Destructive Programs
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Protecting Corporate Assets and the Brand in a Digitized, Global Environment July 29, 2013 Stacy-Ann Golding.
Information Warfare Playgrounds to Battlegrounds.
7 Information Security.
1 'According to the 2007 Internet Crime Report, Internet Crime Complaint Center (IC3) received 206,884 complaints of Internet crimes More than 90,000.
Randy Beavers CS 585 – Computer Security February 19, 2009.
KPMG UDAAN Project – Select Pictures. © 2015 KPMG, an Indian Registered Partnership and a member firm of the KPMG network of independent member firms.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Annette Rosta Associate Director Recruiting Diversity & Compliance KPMG Career Center Navigating Career Web Sites February 2012 Annette Rosta Associate.
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
Information Warfare Playgrounds to Battlegrounds.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Computer crimes.
FINANCIAL SERVICES ADVISORY SERVICES 13 March 2007 Challenges faced by consultants whilst consulting on Basel II.
Who is the typical fraudster? Michael Peer Partner 16 June 2011.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Information Security: Current Threats Marc Scarborough Information Security Officer
MIS323 – Business Telecommunications Chapter 10 Security.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Dimple Faujdar C.S 4 th year 08ERWCS017. INTRODUCTION TO CYBER CRIME Crime, E-crime, Hi-tech Crime Or Electronic Crime Is Where A Computer Is The Target.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber crime and security issues
Securing Information Systems
Securing Information Systems
Liberty International Underwriters
CYBER SECURITY...
Securing Information Systems
Prepared By : Binay Tiwari
LO1 - Know about aspects of cyber security
Presentation transcript:

Hurdles in implementation of cyber security in India

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 1 Table of contents Introduction Key facts and figures Top targeted sectors Current initiatives Key hurdles in implementing security Roadmap – Way forward

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 2 Introduction  Very important to protect the computer systems that support our nation’s critical operations, infrastructure and businesses  Telecommunications, defense, banks, public & private sector companies and government services, all depend on the security of their computer operations.  Increasing concern about attacks from individuals and groups with malicious intent, such as crime, terrorism, foreign intelligence gathering, and acts of war.  Dramatic increases in reported computer security incidents, the ease of obtaining and using hacking tools, the steady advance in the sophistication, effectiveness of attack technology and more destructive attacks.

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 3 Cyber Threat Evolution Virus Breaking Web Sites Malicious Code Advanced Worm / Trojan Identity Theft (Phishing) Organised Crime Data Theft, DoS / DDoS 1990’s Early onwards 1970’s

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 4 4