Rakshit Tandon - PowerPoint PPT Presentation

1 / 22
About This Presentation
Title:

Rakshit Tandon

Description:

Om sai ram Presented By: Rakshit Tandon Consultant IAMAI- Safe Surfing Advisor Cyber Complaint Cell, UP Police , Agra How Safe Are We ? Fourth India Digital ... – PowerPoint PPT presentation

Number of Views:715
Avg rating:3.0/5.0
Slides: 23
Provided by: Rak77
Category:

less

Transcript and Presenter's Notes

Title: Rakshit Tandon


1
Om sai ram
  • Presented By
  • Rakshit Tandon
  • Consultant IAMAI- Safe Surfing
  • Advisor Cyber Complaint Cell, UP Police , Agra

How Safe Are We ?
Fourth India Digital Summit 2009
2
Started March 2009 Covered 22 Cities , 10
States , 100 schools Covered 1.75 lac
students Much more to go.
3
(No Transcript)
4
Major Threats on Internet for users
  • Malware
  • Phishing
  • Internet Connection Security
  • Cyber Stalking/ Cyber Defamation
  • Email Scams
  • Financial Frauds
  • VOIP Calls

Rakshit Tandon
5
Malware
  • Downloading pirated content.
  • Social Networking sites are a target.
  • Fake Anti Virus Software's.
  • Web Attacks.
  • Consumer Needs
  • Major youth visit sites for Bollywood songs ,
    wallpapers, games and screensavers, mobile
    ringtones and mobile applications
  • We are so conditioned to click on links, and the
    bad guys know this, The email lures, the
    enticements and the personalization of malware
    attacks are getting much better. Social
    engineering attacks on social networks are
    beginning to explode and will only get worse.

Rakshit Tandon
6
Popular sites among youth.
Rakshit Tandon
7
Phishing
  • Major Victims
  • Banks
  • Email Service Providers
  • Social Networking Sites

Rakshit Tandon
8
Vishing
  • Vishing is the criminal practice of using social
    engineering and Voice over IP(VoIP) to gain
    access to private personal and financial
    information from the public for the purpose of
    financial reward.
  • Vishing is typically used to steal credit card
    numbers or other information used in identity
    theft schemes from individuals.

Rakshit Tandon
9
Broad band ConnectionSecurity Wi-Fi Hacking
  • Problems
  • High Usage Bills.
  • Crime Done by others Internet Connection.
  • Users not educated about Changing default
    passwords of Modem and Internet Connection.

Rakshit Tandon
10
WI-FI (Internet Hacking)
Rakshit Tandon
11
Wi-Fi Hacked
  • After the Ahmedabad bomb blasts where terrorists
    hacked the wi-fi system of an American in Mumbai,
    A terror e-mail claiming responsibility for the
    Ahmedabad bomb blasts was sent to some private
    new channels on July 27 from US national
    Haywood's computer.
  • Criminals using WAR DRIVING Technique.

Rakshit Tandon
12
Cyber Defamation / Cyber Stalking
  • Students are major victim of Cyber Stalking /
    Defamation
  • Security issue on Social Networking Sites
  • a. Data Theft
  • b. Impersonation
  • c. Defamatory Content
  • d. Fake Applications and fake links to
    Malwares.
  • New Security Measures to be added to Social
    Networking Sites.

Rakshit Tandon
13
Email Threats
  • Spoofing / Forging

Rakshit Tandon
14
Credit Card Cloning
SKIMMERS
How Skimmers are used
Writers to Duplicate Cards
Rakshit Tandon
15
VOIP Calls
  • When voice is digitized, encoded, compressed
    into packets and exchanged over IP networks, it
    is susceptible to misuse.
  • Cyber criminals will be drawn to the VoIP medium
    to engage in voice fraud, data theft and other
    scamssimilar to the problems email has
    experienced.
  • The Intelligence Bureau has asked the
    communication ministry to block all internet
    telephony (VoIP) services to and from the country
    until the Department of Telecom (DoT) puts in
    place a mechanism to track such calls.
  • 15 Sep, 2009,TNN

Rakshit Tandon
16
Major threats for Mobile Users
  • SIM Cloning
  • Duplicating IMEI Numbers on Unbranded Sets
  • Mobile Viruses
  • Mobile Data Security
  • Identity Verification and Procurement of
    Connections
  • Mobile Payments / Banking
  • Caller ID/SMS Spoofing

Rakshit Tandon
17
Mobile security
  • PIN LOCKING
  • MEMORY CARD LOCKING
  • PHONE LOCKING
  • PHONE LOCK IF SIM CHANGED
  • APPLICATION LOCKING
  • REMOTE LOCKING
  • Mobile Trackers ( Third Party Applications)

Rakshit Tandon
18
Mobile Tracker
Rakshit Tandon
19
Mobile Threats
  • Every mobile handset has a unique factory-coded
    Electronic Serial Number (ESN) and a Mobile
    Identification Number (MIN).
  • Cell phone cloning is copying the identity of one
    mobile telephone to another mobile telephone.
  • Result
  • You could run up huge bills, and worse, your
    mobile phone number could be misused for criminal
    activities.

Rakshit Tandon
20
Mobile Viruses
  • Cabir / Mabir
  • MOS Trojan Sends Automated SMS on high cost
    centres.
  • The Trojan.Mos virus is included on the MOSQUITO
    game. When you install this game, (maybe not from
    the original one) the virus will also be
    installed on your system's folder.The affect of
    this virus is it will use your SMS gateway to
    send messages to a high cost number, hence you
    will be charged.
  • If you place antivirus software on a mobile
    device, it will run the battery down, so mobile
    security will require new approaches and
    partnerships between manufacturers, carriers and
    application developers

Rakshit Tandon
21
Challenges to Law Enforcement Agencies
  • Surveillance of Mobile Phones
  • Tracing VOIP Calls
  • Tracking IP Details from Service Providers
  • Fake Identity of connections
  • Fake Accounts in Banks

Rakshit Tandon
22
Thank You
Rakshit Tandon Email rakshittandon_at_yahoo.co.in C
ell 91-9760010017
Write a Comment
User Comments (0)
About PowerShow.com