cyber security threats and latest trends
TRANSCRIPT
-
7/29/2019 Cyber Security threats and Latest Trends
1/60
LATEST ISSUES & TRENDS IN CYBER
SECURITY & THREATS
Mostly OverEstimated / UnderEstimated
-
7/29/2019 Cyber Security threats and Latest Trends
2/60
Not here
to
-
7/29/2019 Cyber Security threats and Latest Trends
3/60
-
7/29/2019 Cyber Security threats and Latest Trends
4/60
Lets tryto get
familia
rwith
thethreat
vectors!!!
-
7/29/2019 Cyber Security threats and Latest Trends
5/60
How many of
you have seenthese in
THEATRES ?
-
7/29/2019 Cyber Security threats and Latest Trends
6/60
How many ofyou have FEW
orALL of thesein your
LAPTOPS andHDDs thru
TORRENTZ ?
-
7/29/2019 Cyber Security threats and Latest Trends
7/60
Ever thought
ofWhy is allthis FREE ?
-
7/29/2019 Cyber Security threats and Latest Trends
8/60
How many ofyou have
LINUX in yourWorkstation
s ?
-
7/29/2019 Cyber Security threats and Latest Trends
9/60
How many of
you haveWindows in
yourWorkstation
s ?
-
7/29/2019 Cyber Security threats and Latest Trends
10/60
-
7/29/2019 Cyber Security threats and Latest Trends
11/60
Collusion is an experimental add-
on for Firefox and allows you to see all
the third parties that are tracking
your movements across the Web. Itwill show, in real time, how that data
creates a spider-web of interactionbetween companies and other trackers.
-
7/29/2019 Cyber Security threats and Latest Trends
12/60
Friends List
Their Phone
NumbersTheir Addresses
Your SMSYour MMS
Your Browsing
HistoryYour Chats
Your relatives details
Your referencesUNWANTED APPS
-
7/29/2019 Cyber Security threats and Latest Trends
13/60
We are very POSITIVE on
web!!!!
-
7/29/2019 Cyber Security threats and Latest Trends
14/60
Does it Matter ?
-
7/29/2019 Cyber Security threats and Latest Trends
15/60
Lets find out the answer
with twoscenarios.
-
7/29/2019 Cyber Security threats and Latest Trends
16/60
-
7/29/2019 Cyber Security threats and Latest Trends
17/60
-
7/29/2019 Cyber Security threats and Latest Trends
18/60
In such timesSecuring the IT
Environment getting
DIFFICULT by day?
-
7/29/2019 Cyber Security threats and Latest Trends
19/60
LETS GET BACK BY FEW YEARS!!!!When securing the IT environment was easier than it is today.
-
7/29/2019 Cyber Security threats and Latest Trends
20/60
Basic informat ion such asusers locations, the
appl icat ionsthey were runn ing and the
typesof devicesthey were us ing were known variables.
LETS GET BACK BY FEW YEARS!!!!
BACK
-
7/29/2019 Cyber Security threats and Latest Trends
21/60
In add it ion , thisin format ion
was fair ly s tat ic, so secur i typo l ic ies scaled reasonably well
LETS GET BACK BY FEW YEARS!!!!
BACK
-
7/29/2019 Cyber Security threats and Latest Trends
22/60
Appl icat ions ran onded icated serversin thedata cen ter
LETS GET BACK BY FEW YEARS!!!!
BACK
-
7/29/2019 Cyber Security threats and Latest Trends
23/60
TheIT organizationcontro l led
accessto tho se app l icat ions and
establ ished boundar ies toenforce
secur i ty pol ic ies
LETS GET BACK BY FEW YEARS!!!!
BACK
-
7/29/2019 Cyber Security threats and Latest Trends
24/60
for the most partthe netwo rk experienced
predic table traff ic patterns
LETS GET BACK BY FEW YEARS!!!!
T M
-
7/29/2019 Cyber Security threats and Latest Trends
25/60
HAPPY CISO!!!!!!
TOUCHING MOMENT
-
7/29/2019 Cyber Security threats and Latest Trends
26/60
-
7/29/2019 Cyber Security threats and Latest Trends
27/60
Changing the way the netwo rk is A rchi tected
-
7/29/2019 Cyber Security threats and Latest Trends
28/60
Appl icat ions/Datamay move betweenserversor
evendata cen tersorcountr ies
-
7/29/2019 Cyber Security threats and Latest Trends
29/60
Mult iple diversemobi ledevicesconnectto the corpo rate
netwo rk from var iouslocat ions
-
7/29/2019 Cyber Security threats and Latest Trends
30/60
At the same time, users are
extending the corporate network
by going to the cloud forcollaborative applications like
Dropbox or Google
IT no longer knows which
devices may connect to thenetwork or their location.
Data isnt just safely resting in the
data center; it is traversing
the countries.
-
7/29/2019 Cyber Security threats and Latest Trends
31/60
BOTNETS
-
7/29/2019 Cyber Security threats and Latest Trends
32/60
BOTNETS
40% of the computers
are Botted
A botnet is a collection of internet-
connected programs
communicating with other
similar programs in order toperform tasks.
-
7/29/2019 Cyber Security threats and Latest Trends
33/60
So all this
-
7/29/2019 Cyber Security threats and Latest Trends
34/60
So all thisalong withthese two
CurrentGiants make
a great
AttackSurface
-
7/29/2019 Cyber Security threats and Latest Trends
35/60
CRIMEWAREas aSERVICE
-
7/29/2019 Cyber Security threats and Latest Trends
36/60
PRISMis a mass elect ronic s urvei l lance data mining p rogram kn own to h avebeen operated by the United States Nat ional Secur i ty Agency (NSA) since 2007
-
7/29/2019 Cyber Security threats and Latest Trends
37/60
The Central Monito r ing System is amass electron ic
survei l lanceprogram in stal led by C-DOT, an Ind ian
Government owned agency .
The CMS gives Ind ia's secur i ty agencies and in com e tax
off ic ialscentral ized access to India's
telecommunicat ions netwo rkand the abi l i ty to
l isten inon & record mobi leland l ine and satell i tecalls and ) , and readpr ivate emails, SMS and MMS and track th e geograph ical
locat ion of indiv idu als, al l in real t ime.
-
7/29/2019 Cyber Security threats and Latest Trends
38/60
Operation B70
-
7/29/2019 Cyber Security threats and Latest Trends
39/60
It is the type of attack that
-
7/29/2019 Cyber Security threats and Latest Trends
40/60
Refers to a hacking technique
that leveragesvulnerabilities
in the code of a web applicationto allow an attacker to send
maliciouscontent from an end-
user and collect some type of
It is the type of attack that
takes advantage of
impropercoding of your
web applications that allowshackerto inject SQL
commands into say a login
form to allow them to gain
access to the data heldwithin your database.
B E l it
-
7/29/2019 Cyber Security threats and Latest Trends
41/60
A form ofmalicious code that takes advantage of a
flaw orvulnerability in an operating system orpieceof software with the intent to breach browser
security to alter a user's browser settings withouttheir knowledge
Browser Exploits
-
7/29/2019 Cyber Security threats and Latest Trends
42/60
-
7/29/2019 Cyber Security threats and Latest Trends
43/60
-
7/29/2019 Cyber Security threats and Latest Trends
44/60
Domains of
security
-
7/29/2019 Cyber Security threats and Latest Trends
45/60
-
7/29/2019 Cyber Security threats and Latest Trends
46/60
-
7/29/2019 Cyber Security threats and Latest Trends
47/60
Who decides the Security QRs.?????Sadly.till date the approach has been mostlyreactive since we have been traditional inconfiguring SECURITY!!!!!!!
-
7/29/2019 Cyber Security threats and Latest Trends
48/60
-
7/29/2019 Cyber Security threats and Latest Trends
49/60
-
7/29/2019 Cyber Security threats and Latest Trends
50/60
-
7/29/2019 Cyber Security threats and Latest Trends
51/60
-
7/29/2019 Cyber Security threats and Latest Trends
52/60
WHAT DO WE DO TODAY?
-
7/29/2019 Cyber Security threats and Latest Trends
53/60
TAKE CONTROLLED
RISK
WHAT DO WE DO TODAY?
NO TWO ORG orUSERS CAN HAVE SAME
MODEL OF SECURITY IMPLEMENTATION
THE NEED IS CUSTOMISED MODELFOR EVERYONE
KEEP YOUREYES/EARS OPEN
Know EAL of your product
C h
-
7/29/2019 Cyber Security threats and Latest Trends
54/60
Stringent
Hardening
Monitoring
tools
Analysis
tools
Cryptography
Strong
Passwords
Firewalls/UTM
s
AccessControls
Updates
Cyber
Hygiene
Secure
Design
IT IQCookies
Know your
Live DVDs
OpenSource
Common
Passwords
-
7/29/2019 Cyber Security threats and Latest Trends
55/60
-
7/29/2019 Cyber Security threats and Latest Trends
56/60
And will keep
F l
-
7/29/2019 Cyber Security threats and Latest Trends
57/60
Impersonati
onFailure
False
Identity
Revoked Rights
UnauthDisclosure
Theft of Access
Tokens
DoS
Breach of
Anonymity
Unknown
Outsider Attack
User Fraud
Insider Attack
Access
Threats
I AM NOT REFERRING TO SCI FI
-
7/29/2019 Cyber Security threats and Latest Trends
58/60
TIME TRAVELLING ROBOTS FROM
THE FUTUREFace recognition starts getting perfectSpeech recognition starts getting perfect
Speaker recognition starts getting perfect
We dont have a good AI todayBut we are improving on AI by day
We have cheap storage
We are recording what goes on.
I AM NOT REFERRING TO SCI FI
-
7/29/2019 Cyber Security threats and Latest Trends
59/60
AI will be able to scan ourpast in future
Time travelling robotsare not going to come in our
timesbut they will be there
to scan our pastlaterand in the future they
will be able to know
everythingwe did today
E-Mail : [email protected]
mailto:[email protected]:[email protected] -
7/29/2019 Cyber Security threats and Latest Trends
60/60
p @ p j g
Blog at : http://anupriti.blogspot.com
Twitter : @it_updates
mailto:[email protected]://anupriti.blogspot.com/http://anupriti.blogspot.com/mailto:[email protected]