Current Trends in Cyber Security Course on Cyber Attack Detection - - PowerPoint PPT Presentation

current trends in
SMART_READER_LITE
LIVE PREVIEW

Current Trends in Cyber Security Course on Cyber Attack Detection - - PowerPoint PPT Presentation

Current Trends in Cyber Security Course on Cyber Attack Detection & Mitigation Techniques (NIT-K) S. K. Pal Defence Research & Development Organization (DRDO) SAG, Metcalfe House, Delhi 27-Jul-2020 1 What is Cyberspace? Refers to


slide-1
SLIDE 1
  • S. K. Pal

Current Trends in Cyber Security

27-Jul-2020 1

Defence Research & Development Organization (DRDO) SAG, Metcalfe House, Delhi Course on Cyber Attack Detection & Mitigation Techniques (NIT-K)

slide-2
SLIDE 2

What is Cyberspace?

27-Jul-2020 2

  • Refers to the digital world of computer networks
  • Components of cyberspace: Hardware (communication,

networking, IT), software (OS, browser, antivirus, apps) & data (in the memory, disk, cloud).

  • Other components: Cognitive users & cyber personas.
  • Negative impact: psychological, physiological.
  • Browsing habits & psychographic profiling.
  • Gadgets, sensors & data: Huge amount of data is

generated – 2.5 exabytes / day.

slide-3
SLIDE 3

27-Jul-2020 3

Useful Applications

Requirements: Availability, QoS, Confidentiality, Privacy, Authenticity, Integrity

slide-4
SLIDE 4

Data – a Valuable Resource

27-Jul-2020 4

  • Data – the most valuable resource.
  • Sensitive & personal data.
  • What is your personal data?
  • Data breaches & information leakage:

Who is responsible?

  • Legal implications: GDPR, Data Protection Bill,

IT Act 2000.

  • Surveillance state & privacy index.
slide-5
SLIDE 5

Research Problem: Protection of sensitive & personal data using technology and policies

27-Jul-2020 5

Research Problem: Identifying the technical reasons (attack surface, attack vectors) for recent data breaches & development of mitigation strategies

slide-6
SLIDE 6

27-Jul-2020 6

Human aspect of cybercrime

  • Focusing only on the technical side won’t help to

curb cybercrimes.

  • Smart hackers & cybercriminals first measure

victimization by online engagement (email or social media) and by studying online behaviour e.g. impulse

  • nline shopping, playing online games, downloading

music, visiting specific websites etc.

  • People who show signs of low self-control are found

more susceptible to malware attacks.

The Human Factor

slide-7
SLIDE 7

27-Jul-2020 7

  • Phishing, spear phishing, pharming, smishing,

vishing.

  • Mobile phones and app permissions.
  • Personal information sharing on social media.
  • Free WiFi, free downloads, free malware!

The Human Factor

slide-8
SLIDE 8
  • Using old OS, browsers, antivirus, unpatched IT

resources and application software.

  • Responding to unknown emails (links, attachments).
  • Visiting unknown / suspicious websites.
  • Storing classified / personal information on Internet PCs,

laptops & smartphones.

  • Unauthorized use of USB-drives / removable storage.
  • Irresponsible use of smart phones & social media.

Reasons for Cyber Breaches

27-Jul-2020 8

slide-9
SLIDE 9

27-Jul-2020 9

  • Website hacks & defacements.
  • Data & information thefts.
  • Phishing attacks on E-commerce & financial websites.
  • Cybercriminals targeting social & professional networks.
  • Cybercrimes targeting mobile platforms (smartphones

& tablets).

Cyber Crimes in India

slide-10
SLIDE 10

27-Jul-2020 10

  • Identity theft.
  • Data exfiltration, company secrets, IPR.
  • DoS, DDoS.
  • Ransomware infection.
  • Crypto-mining.
  • Supply-chain infection.

Other Cyber Crimes

slide-11
SLIDE 11

27-Jul-2020 11

  • Surface web
  • Dark web
  • Deep web
  • TOR encrypted sites & traffic

Misuse of Information

slide-12
SLIDE 12

Research Problem: Cyber security recommender system for web browsers & mobile devices

27-Jul-2020 12

Research Problem: Identification & analysis of TOR traffic (in the organization)

slide-13
SLIDE 13
  • Concept involves the battlespace use & management of

ICT in pursuit of a competitive advantage over an

  • pponent.
  • Involves collection of tactical information, spreading of

propaganda or disinformation to demoralize or manipulate the enemy, disrupting/denying victim’s ability to gather & distribute information.

  • Makes use of technology.

Also focuses on human-related aspects of information use. e.g. misinformation & fake news.

Information & Cyber Warfare

27-Jul-2020 13

slide-14
SLIDE 14

27-Jul-2020 14

Cyber Attacks

  • Home devices - Web cameras, climate control devices,

door locks, refrigerators

  • Medical devices – Insulin pump, paceamaker
  • Car electronics
  • Hospital, bank servers (ransomware)
  • Critical systems – energy grid, nuclear power plant
slide-15
SLIDE 15

27-Jul-2020 15

  • Cyberspace is now considered as the fifth domain /

dimension of warfare.

  • Nature of cyber warfare is asymmetric. Incoming attacks

are not predictable.

  • State actors have become active in the cyberspace

(Stuxnet, Flame, Gauss, Duqu...).

  • Like nuclear weapons & missiles, new cyber-weapons

(anonymous, zero-day) are being developed by many countries.

Cyber Warfare

slide-16
SLIDE 16

The Road Ahead

  • Large volumes of data are generated every moment.

Its’ proper use & protection is crucial.

  • Apart from technology, human factor plays a vital role

in cyber security.

  • Cyberspace is the new dimension of warfare.
  • Machine Learning is a lucrative tool both for cyber

defence and cyber attacks.

  • The present crisis has widened the horizon of cyber

threat landscape. Organizations should quickly adapt to these changes and pay more attention to cyber security.

27-Jul-2020 16

slide-17
SLIDE 17

skptech@yahoo.com

Thanks for your attention

?

27-Jul-2020 17