You are on page 1of 18

Cyber Crime & Network

Security in India

CIO Focus Security 2008


Presentation by Adam Rice & AJ Vijayakumar

©2008 Tata Communications, Ltd. All Rights Reserved


Explosive Internet Growth and Impacts to Businesses

India
Internet Usage Stats and Telecommunications Market Report

Internet Usage and Population Statistics: Internet use has been a key driver to enhance
both Domestic & Global Trade in India
Year Users Population % Pen. Usage Source
1998 1,400,000 1,094,870,677 0.1% ITU % Real GDP Growth Rate
1999 2,800,000 1,094,870,677 0.3% ITU 12 10.5
8.3 7.5
2000 5,500,000 1,094,870,677 0.5% ITU 8 5.6 5.5 5.3 5.1
2001 7,000,000 1,094,870,677 0.7% ITU 4.5 4.0
2002 16,500,000 1,094,870,677 1.6% ITU 4
2003 22,500,000 1,094,870,677 2.1% ITU 0
2004 25,000,000 1,094,870,677 2.28% IAMAI

nd
na

ea

an
a
on
di

si
or

si
2005 38,500,000 1,112,225,812 3.46% IAMAI

hi

or

la

iw
ne
In

ay
ap

ai
C

Ta
do
g

al
ng

Th
2006 50,600,000 1,112,225,812 4.55% CIA

on

In
Si

H
2007 60,000,000 1,129,667,528 5.31% ITU
Source: Morgan Stanley Research

E-Commerce Media & Entertainment Government Education Online Banking


Business Process Outsourcing
Defining “Cyber Crime”

Webster's New Millennium™ Dictionary of English


Entry: Cyber Crime
Part of Speech: noun
Definition: A crime committed on a computer network, esp. the Internet
Example: Identity theft is a Cyber Crime.

ƒ Spamming ƒ Espionage ƒ Malware (cont.)


ƒ DDoS ƒ Internet Harassment ƒ Downloader
ƒ Unauthorized access ƒ Malware ƒ Adware
ƒ ƒ Ransomeware
ƒ Social Engineering Virus
ƒ Worm ƒ Child Pornography
ƒ Hacking
ƒ Trojan ƒ Telecom Fraud
ƒ Phishing
ƒ Bot ƒ Financial Fraud
ƒ Identity Theft ƒ Rootkit ƒ Computer Fraud
ƒ Cyber-stalking ƒ Spyware
ƒ Information warfare ƒ Backdoor
News/Media Perspective of Cyber Crime in the India
Cybercrime Threatens National Security in Cyber Crime On A Roll In India
India

Posted by Rushabh Chokshi on


Date: September 27, 2007 November 2nd, 2007
Source: merinews.com
It is The New Age in Cyber Crime, according
By: Fahim Ahmedi
to latest news cyber criminals are now
targeting Enterprises and Consumers based in
Tier III cities

India is now taking steps to fight against the Cybercrime: A threat to national security
cyber crime, Indian police are now being
Date: September 17, 2007
trained on how the Internet, e-mail, and other
Source: merinews.com
computer-based tools can be used by
By: Fahim Ahmedi
criminals to illegally obtain information stored
in databases The ever increasing cyber crime is taking the
world by storm. Technology is a boon but it also
has dangerous implications if left undetected.
Cyberspace is one such area that needs to pull
all security strings together before things go out
of hand.
News/Media Perspective of Cyber Crime in the India

Ankit Fadia, a 21-year-old computer whizkid


and author of ’The Unofficial Guide to Ethical
Hacking’ said “I could hack a state-owned
bank’s website or a government
communications website which shows the
vulnerability, thousands of Indian websites
are being hacked each day”.
News/Media Perspective of Cyber Crime in the India

Cyber crime in India on the decline: Report


Posted online: Monday, January 07, 2008 at 12:00:00
Updated: Monday, January 07, 2008 at 10:37:53

New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the
“new age” crime have declined with the most noticeable difference seen in Gujarat.
However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in
Gujarat.
A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually
decreased. “This is only a statistics based on the number of cases registered,” he added.

darkREADING
Annual CIS Study: Cost of Cybercrime Is Skyrocketing
Average annual loss per company has more than doubled since last year, according
to bellwether study
September 11, 2007 | 5:55 PM
By Tim Wilson
Site Editor, Dark Reading
Net Neutrality vs. Censorship

Clean the Pipes


The Threats are Real
Global Activity Maps

Source: Arbor Networks 2008


Internet Service Providers Security Concerns

Top
Concern

Source: Arbor Networks 2007


The Botnet Problem Starts with Compromised PCs
ƒ 150 of 600 million online PCs worldwide are The most common infection methods detected by
bot infected S21sec include browser exploits (65%), e-mail
(Source: BBC 2007 interview with Vint Cerf) attachments (13%), operating system exploits
(11%), downloaded Internet files (9%) and other
ƒ 52,771 new infected PCs daily methods (2%), as illustrated in the figure below.
(Source: Symantec 2007)
Infection Methods
Downloaded Other
ƒ Rapid growth in tools used by Cyber Files 2%
Criminals 9%
ƒ Victims often do not know that they have OS Exploits
been compromised! 11%

ƒ Easy to use tools with varying levels of


Email Browser
anonymity offered to cyber criminals
Attachments Exploits
13% 65%

Source: S21sec
The Botnet Problem Starts with Compromised PCs
ƒ 150 of 600 million online PCs Malcode Additions 2007
worldwide are bot infected
Spyware 308
(Source: BBC 2007 interview with Vint Cerf)
Rootkit 1,138
ƒ 52,771 new infected PCs daily
Keylogger 1,463
(Source: Symantec 2007)
Other 14,907

ƒ Rapid growth in available tools used Password Stealer 22,982

by Cyber Criminals! Dialer 23,449

ƒ Victims often do not know that they Backdoor 25,997

have been compromised! Downloader 41,389

ƒ Easy to use tools with varying levels Virus 48,889

of anonymity offered to cyber Adware 55,873

criminals! Worm 64,173

Trojan 109,246

0 20,000 40,000 60,000 80,000 100,000 120,000

Source: IBM ISS x-Force Trend Report 2007


The Botnet Problem – Devastating Impact to Businesses
Common Exploits from Botnets
ƒ Identity Theft
ƒ Credit card /Email fraud
ƒ Theft/Fraud in online banking and auctions
ƒ Theft storage and distribution of login ID/Password, financial
data, etc…
ƒ DDoS (Distributed Denial of Service)
ƒ 50% of Botnets used for DDoS attacks
(Source: S21 sec)
ƒ Each bot generates 40kbps
ƒ Small botnets command up to 10,000 bots
ƒ Large botnets command up to 1 million bots
ƒ 20+ Gbps DDoS attacks witnessed in 2007
(Source: Arbor Networks Inc. 2007)
ƒ Spam
ƒ Each spam bot can send 3 spam emails per second
(259,000/day)
ƒ 94% of all emails is Spam (Google/Postini 2006)
There are Solutions in Sight
Solutions Commentary
ƒ Preventing PC compromise ƒ Vulnerability assessment, ƒ Identity vulnerabilities and enforce a
penetration testing, anti-virus, priority based patch management
etc… approach to secure PCs from known
exploits.
Securing against Botnet attacks

ƒ Employ a Defense in Depth Strategy when Securing your Enterprise! ƒ Layer your defenses against network
security threats to minimize the
impact!
ƒ Preventing Identity Theft ƒ Content filtering services, anti- ƒ Combat a variety of Phishing,
virus, intrusion detection and Pharming, malware and web/email
prevention systems fraud activities that can result in
identity theft
ƒ Preventing DDoS ƒ Cloud based and or CPE based ƒ Stopping in the cloud within the
anti-DDoS services. provider’s network reduces the chance
ƒ Cloud is recommended. of a last mile bottleneck, which
completes the attacker’s work
ƒ Preventing Spam ƒ Cloud-based and or CPE based ƒ Stopping in the cloud through a proxy-
anti-spam solution based service saves unnecessary
bandwidth exhaustion and saves costs
Tata Communications Has Taken a Stance Against Cyber Crime!
What are Your Next Actions to Securing your Enterprise from Cyber
Crime?
Assess your Current state to define your Next steps
ƒ Take a custom self-assessment to determine your next steps
ƒ Web-based module www.tatacommunications.com/security/assessment

Combat
Cyber
Crime!
Thank You

www.tatacommunications.com
Managed Services Portfolio
Managed Security Services

You might also like