Professional Documents
Culture Documents
http://www.information-age.com/cyber-attacks-number-1-business-risk-123471046/ Millions of Indian debit cards 'compromised' in security breach - BBC News
Cybercrimes on the rise
Inside story of cyber attacks on India’s banks, airlines, railways… and the fightback - The Week
cyber security: Over 53,000 cyber security incidents observed in 2017 - Times of India (indiatimes.com)
Security Challenges/Vulnerabilities
• Types of Issues: Virus, worms, Trojans, bots. Viruses, worms, Trojans, and
bots are all part of a class of software called malware.
• The vast majority, however, are installed by some action from a user, such
as clicking an e-mail attachment or downloading a file from the Internet.
Malware: Viruses, Worms, Bots
• Bots can be used for either good or malicious intent. Bots often
automate tasks and provide information or services that would
otherwise be conducted by a human being.
http://www.financialexpress.com/india-news/aadhaar-sim-linking-fraud-how-this-man-lost-rs-1-3-lakh-from-his-
salary-account-is-a-big-lesson-for-all-of-us/894488/
Dormant Account
https://www.youtube.com/watch?v=8V0GEEGnBtg
Spyware
• Cyber stalking refers to repeated contacts with a victim and can include:
making false accusations, gaining information on the victim, encouraging
others to harass the victim, attacking data and equipment of the victim,
or using the Internet to place false orders for goods or services.
https://www.hindustantimes.com/health/blue-whale-challenge-why-teenagers-are-vulnerable-to-the-game-and-what-you-can-do-about-it/stor
y-Yc91FxDuGBinBJj3LVBq4J.html
https://www.ndtv.com/india-news/what-happens-in-blue-whale-game-agonised-survivor-reveals-1746731?amp=1&akamai-rum=off
Cyber war and Cyber Terrorism
https://economictimes.indiatimes.com/tech/internet/cyber-crime-becoming-industry-may-occur-very-often-raj
nath/articleshow/63297333.cms
https://www.bloombergquint.com/politics/2018/03/15/russian-hackers-attacking-u-s
-power-grid-aviation-fbi-warns
https://economictimes.indiatimes.com/news/international/world-news/us-hits-russians-with-sanc
tions-for-election-meddling-cyber-attacks/articleshow/63320821.cms
https://www.youtube.com/watch?v=L78r7YD-kNw
Software Vulnerability
• A security breach may cut into a firm’s market value almost immediately
2) Policies and Create formal policies for use of and safeguarding IS resources
Procedures and outline the procedures to be followed and disaster recovery
plans.
4) Training Personnel need to know the policies, plans, what their roles and
tasks are, and how to do them.
• Types of threat.
• Identity management
• Identifying valid users
• Controlling access
Implementation
• WEP security
• Static encryption keys are relatively easy to crack
• Improved if used in conjunction with VPN.
• WPA2 specification
• Replaces WEP with stronger standards.
• Continually changing, longer encryption keys.
• Uses two, mathematically related keys: public key and private key.
• Sender encrypts message with recipient’s public key.
• Recipient decrypts with private key.
Digital Certificate
• Data file used to establish the identity of users and electronic assets
for protection of online transactions,
• Responsibility for security resides with the company owning the data
48
Accessibility
• What is it?
• URL :
• Vox - https://www.youtube.com/watch?v=sBKPacCuXsw
• AIB - https://www.youtube.com/watch?v=mfY1NKrzqi0
Personal Data Protection Bill, 2019