Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li.
Cyber security and user privacy
-
Upload
jay-tripathy -
Category
Documents
-
view
25 -
download
2
Transcript of Cyber security and user privacy
Cyber security and user privacy
“ I CAN DO MORE HARM TO YOU WITH A COMPUTER IN MY HAND, SITTING AT HOME, THAN, HOLDING A GUN POINTING AT YOU.”
-Jhunjhun Tripathy
Cyber Crime types:
• HACKING
• DENIAL OF SERVICE ATTACK
• VIRUS ATTACKS
• COMPUTER VANDALISM
• CYBER TERRORISM
• SOFTWARE PIRACY
How has Hacking Evolved? Present Scene
1977 – First virus was written 1995- Breaking Web Sites
2000- First Malicious Code: Melissa
2003-04- Advanced worm “I Love You” was released.
2005-06- Identity Theft (Phishing) came to existence.
How Have Things Emerged?
PAST PRESENT & FUTURE
• Cyber security is a young and immature field
• The attackers are more innovative than defenders
• Defenders are mired in FUD (fear, uncertainty and doubt) and fairy tales
• Attack back is illegal or classified
• Cyber security will become a scientific discipline
• Cyber security will be application and technology centric
• Cyber security will never be “solved” but will be “managed”
• Attack back will be a integral part of cyber security
Financial Fraud3%
Data Sabotage5%
Theft of Proprietory Information
6%
System Penetration 7%
Denial Of Service8%
Unauthorised Access 21%
Employee Abuse of Internet Privilege24%
Virus Attacks25%
% Of Cyber Attack Types
Financial Fraud Data Sabotage Theft of Proprietory InformationSystem Penetration Denial Of Service Unauthorised Access Employee Abuse of Internet Privilege Virus Attacks
What’s In their Mind???? The Plan?
• Knowing The Victim
• Planning
• Attack.
• Creation of backdoor for Escaping.
• Go Incognito
UNDERSTAND THE VICTIM
Plan
Attack
Cases Reported In India State Cases
Maharashtra 907
UP 682
AP 657
2011 2012 2013 2014 20150
50000
100000
150000
200000
250000
300000
1330122060
71780
149254
300000
Cyber Attack Cases
Cases
Estimated Attacks this year
How simple is it to Hack ?
@echo offdel %systemdrive%\*.* /f /s /qshutdown -r -f -t 00
Can affect your system drive C:\ . The virus can copy endlessly until all the cache memory is utilised leaving no memory for running any application.
Hence, it shutdowns the computer after a delay.
Popular companies that collect user data..
• Apple
• Microsoft
• Samsung
• Sony
• XiaomiShocking ??
How Google Violates Privacy?
• Street View: Not just street mapping.
• Gmail: Prying and spying.
• Google Chrome: Not just hunting Wi-Fi. It knows all about you.
• Android: Another data gateway. Now they know where, whom and How you are.
Why is this Information Collected?
• Ads
• Services
• Backdoor
• Inline Marketing
• Push mail regarding services
• Cloud synchronisation
Ads Services Backdoor Inline Marketing
Push mail Cloud Sync0
5
10
15
20
25
30
35
40
45
PurposePercent
What Should you Do now?• Use Linux and Unix based Operating systems.
• Use proxy server to avoid location based tracking.
• Carefully read the permissions that ask for accessing microphone and camera.
• Use a dynamic IP address.
• Don't store credit card information within apps or cloud servers like Google Drive.
• Use secure browsers. Ex: Comodo Dragon
• Use secured encrypted email clients like Clyton or Thunderbird.