SlideShare una empresa de Scribd logo
1 de 55
Descargar para leer sin conexión
1 
Role, Charter & Responsibilities 
A Presentation by Muktesh Chander IPS 
Centre Director 
NCIIPC 
NTRO 
Government of India 
National Critical Information 
Infrastructure Protection 
Centre (NCIIPC)
2 
Critical Information Infrastructure (CII) 
Threats to CII 
Examples of Cyber attacks to CIIs 
International Critical Information Infrastructure Protection Efforts 
International Information Security Standards 
Information Security initiatives in India 
National Critical Information Infrastructure Protection Centre (NCIIPC) 
Outline of Presentation
3 
Energy 
Transportation ( air, surface, rail & water) 
Banking & Finance 
Telecommunication 
Defence 
Space 
Law enforcement, security & intelligence 
Sensitive Government organisations 
Public Health 
Water supply 
Critical manufacturing 
E-Governance 
…
4 
In general Critical Infrastructure (CI) can be defined as: 
“those facilities, systems, or functions, whose incapacity or destruction would cause a debilitating impact on national security, governance, economy and social well-being of a nation”. 
Critical Information Infrastructure (CII) are those ICT infrastructure upon which core functionality of Critical Infrastructure is dependent. 
 As per Section 70 of IT Act 2000, CII is defined as: 
“the computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety.” 
Critical Information Infrastructure
5 
Information Infrastructure 
CI 
CI 
CI 
CII 
CII 
CI 
CII 
Figure: Varying Dependence of CI on Information Infrastructure 
Inter-dependence
6 
Characteristics of CII 
Highly Complex 
Distributed 
Interconnected 
Interdependent 
Increasing trend in all of the above
7 
Complexity and Inter-dependence 
of CII
8 
Threats to CII are classified as: 
◦Internal Threat 
It is defined as “One or more individuals with the access and/or inside knowledge of a company, organization, or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with the intent to cause harm.” 
Insider betrayals cause losses due to IT sabotage, Fraud, and Theft of Confidential or proprietary information 
This may be intentional or due to ignorance 
◦External Threat 
Arise from outside of the organization by individuals, hackers, organizations, terrorists , foreign Government agents, non state actors and pose risk like Crippling CII, Espionage, Cyber/Electronic warfare, Cyber Terrorism etc. 
Types of threats to CIIs
9 
Malware Attacks ( 19,719,262 distinct malware so far) 
Email attachments 
Smartphones 
Removable media 
Web Application Attacks 
Client Side Attacks, MITM 
Social Engineering Attacks 
Social network 
Wireless attacks 
DoS/DDoS 
Botnet 
SCADA APTs 
Embedded systems 
Supply Chain contamination 
Threat vectors to CII
10
11 
Individuals 
Disgruntled or ex employee 
Rivals (Industrial Espionage) 
Hackers, Script kiddies, Crackers 
Cyber criminals (organized as well as unorganized) 
Hactivists 
Cyber Mercenaries 
Terrorist groups (CyberJehadis) 
Non state actors 
Hostile states 
Threat actors
12 
•Damage or destruction of CII 
•Disruption or degradation of services 
•Loss of sensitive and strategic information 
•Widespread damage in short time 
•Cascading effects on several CII 
Effects of Cyber Attacks on CII
13 
Example of Cyber Attacks on CII
14 
Discovered in June 2010 
It is first known targeted worm to attack a particular type of Industrial Control Systems (ICS). 
It primarily spreads via portable USB drive 
It first exploits zero-day vulnerabilities to infect Windows based workstations then attacks associated Programmable Logical Controller (PLC) based SCADA machines and modifies their configuration and behaviour. 
Stuxnet, which affected the Nuclear program of Iran is the most sophisticated APT. 
Stuxnet Virus: A New weapon of War
15 
Concentration of infections in Iran. 
Stuxnet spread and geographical distribution of infected systems
16 
Discovered in September 2011. 
Affected countries include Iran, France, UK, Hungary, Austria, and Indonesia. 
It is a variant of Stuxnet virus. 
Unlike Stuxnet Duqu worm does not replicate but is ‘highly targeted’ and uses Trojans to gather sensitive information and passwords and send back to a command and control server. 
It does not have a payload like Stuxnet, but instead seems to exist to set up remote access capabilities. 
Duqu Virus: A Stuxnet Variant
17 
20 MB in size 
Cause: 
◦Flame can spread to other systems over LAN or USB stick. 
◦Mine computer to record Skype conversation, screenshots, keyboard activity and network traffic, turns infected computers into Bluetooth becons which attempt to download contact information from nearby Bluetooth- enabled devices. 
◦Collected information is sent back to remote control servers. 
Effect: 
◦Initially infected 1000 machines, with victims including governmental organizations, financial organizations etc. in Iran, Egypt, Sudan, Lebanon, Saudi Arabia and Israel. 
Flame Malware
18 
Targets: 
◦Energy Sector. 
◦Disrupted services of Saudi Aramco and Qatar RasGas. 
Effect: 
◦Capable to spread to other offline workstations on network. 
◦Wipes disks of workstations and overwrites Master Boot Record preventing them from booting. 
Motive: 
◦Unlike other Cyber Espionage Malware, Shamoon is a Cyber Sabotage Weapon. 
Shamoon Malware (August 2012)
19 
From Cyber Skirmishes 
to 
Cyber Warfare
20 
Cause: 
◦Malicious emails when opened dropped Trojan horse . 
◦Trojan horse connects back to Control Server to download and install Gh0st Rat Trojan. 
Effect: 
◦Gh0st Rat allows attackers to gain complete, real time control of computers running Microsoft windows. 
◦Infiltrated high-value political, economic, and media locations in 103 countries. 
◦Compromised computer systems of embassies, foreign ministries and other government offices, Dalai Lama’s centers in India, London and New York city etc. 
GhostNet: Cyber Spying 
Operation
21 
Cause: 
◦A malware ecosystem employed by the attackers via GhostNet etc. 
◦Ecosystem Leveraged multiple redundant cloud computing systems, social networking platforms, free web hosting services etc to maintain persistent control. 
Effect: 
◦Complex cyber espionage network. 
◦Theft of classified and sensitive documents. 
◦Collateral compromise: Visa applications stolen. 
◦Command and control Infrastructure that leverage cloud based social media services. 
Shadow in Cloud: Cyber 
Espionage
22 
On 4th December 2011, Iran captured an American Lockheed Martin RQ-170 Sentinel unmanned aerial vehicle (UAV) 
Iranian Government claimed that drone was brought down by its cyber warfare unit stationed near Kashmar. 
An Iranian engineer claimed that the drone was captured by jamming both satellite and land- originated control signals to the UAV, followed up by a spoofing attack, feeding the UAV false GPS data to make it land in Iran at what the drone thought was its home base in Afghanistan 
Cyber Attack brought down US Drone RQ-170
23 
Incident Time Frame 
◦Start 27 April 2007, End 18 May 2007, Duration 3 weeks 
Methods 
◦DoS and DDoS; Website defacement; Attacking DNS servers; 
◦Mass e-mail and comment spam. 
Targets 
◦Servers of institutions responsible for the Estonian Internet infrastructure; 
◦Governmental and political targets (parliament, president, ministries, state agencies, etc); 
◦Services provided by the private sector (ebanking, news organisations etc); 
◦Personal and random targets. 
Estonia 2007 Cyber Conflict
24 
Incident Time Frame 
◦Start 8 August 2008; End 28 August 2008; Duration 3 weeks 
Methods 
◦DoS and DDoS attacks;Distribution of malicious software together with attack instructions; exploiting SQL vulnerability; 
◦Defacement; Using e-mail addresses for spamming and targeted attacks. 
Targets 
◦Government sites (President, Parliament, ministries; local government of Abkhazia); News and media sites, online Discussion forums, Financial institutions etc. 
Georgia 2008 Cyber Conflict
25 
Incident Time Frame 
◦Start 28 June 2008; End 2 July 2008; Duration 4 days. 
Methods 
◦Defacement. Pro-Soviet and communist symbols as well as profane anti-Lithuanian slogans posted on websites. 
◦Some e-mail spam. 
Targets 
◦Over 3oo private sector (95%) and governmental (5%) websites; 
◦Damage largely avoided to the public sector due to timely warning; 
◦Private sector suffered most. 
Lithuanian 2008 Cyber Conflict
26 
Cyber attacks on 
Indian Government Infrastructure
27 
As reported by Indian Computer Emergency Response Team (CERT-In) a total no. of 90, 119, 252 and 219 Government websites were defaced by various hacker groups in the year 2008, 2009, 2010 and January – October 2011 respectively 
13000 incidents handled by CERT in in 2011 
Cyber attacks on Indian Government Websites
28 
Loss of confidential information from sensitive organisations 
Email Compromises
29 
International efforts for Protection 
Of Critical Information 
Infrastructure
30 
UN Resolution 58/199 
ITU, G8 
Agencies for protection of Critical Infrastructure: 
◦Europe: European program for Critical Information Infrastructure Protection (EPCIP) 
◦United Kingdom: Centre for the Protection of National Infrastructure (CPNI) 
◦United States: Responsibility of Critical Infrastructure protection falls under the jurisdiction of the Department of Homeland Security. 
◦Australia: National Security agency 
◦South Korea: National Intelligence Service 
International CIIP initiatives
31 
Information Security Management
32 
Some Information Security facts 
◦ It is a multidisciplinary subject 
◦Security depends on people, process more than technology; 
◦Internal employees are a far bigger threat to information security than any outside threat; 
◦Security is not static entity but a running process; it should flow through the organization. 
◦Moving from technical, managerial, standardization & certification to the Forth wave of Information security Governance (B. Von Solms ) 
Information Security Management
33 
◦ISO/IEC 27000 family; 
◦ISO 31000: Risk Management; 
◦ISO 22301: Business continuity Management etc . 
Federal Information Processing Standard (FIPS) 
Control Objective for Information and Related Technologies (COBIT) 
Information Technology Infrastructure Library (ITIL) 
Payment Card Industry Information Security Standard (PCIDSS) 
Data Security Council of India Security Framework (DSF) 
International Standards
34 
Specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System (ISMS) within an organisation. 
It is usually applicable to all types of organisations, including business enterprises, government agencies, and so on. 
It is a normative standard against which certification is obtained. 
Adopts Plan-DO-Check-Act (PDCA) model and is applied to structure all ISMS processes. 
ISO/IEC 27001
35 
Establish the ISMS 
Implement and operate the ISMS 
Monitor and Review the ISMS 
Maintain and Improve the ISMS 
Plan 
Do 
Check 
Act 
Information security Requirements and Expectations 
Managed Information Security and Operations 
PDCA Model 
ISO/IEC 27001 Standard (contd..)
36 
ISO/IEC 27001 ISMS Requirements 
◦General requirements 
Establishing and managing the ISMS 
Establish the ISMS, Implement and operate the ISMS 
Monitor and review the ISMS, Maintain and improve the ISMS 
◦Documentation requirements 
General, Control of documents, Control of records 
◦Management responsibility Management commitment 
Resource management Provision of resources 
Training, awareness and competence 
◦Internal ISMS audits 
◦Management review of the ISMS 
General, Review input, Review output 
◦ISMS improvement 
Continual improvement, Corrective action, Preventive action 
ISO/IEC 27001 Standard (contd..)
37 
Criminal Offences 
Subsection 
Sending offensive messages, including attachments, through communications service 
66A 
Dishonestly receiving stolen computer resource or communication device 
66B 
Identity theft 
66C 
Cheating by personating 
66D 
Violation of privacy 
66E 
Cyber terrorism: defined as causing denial of service, illegal access, introducing a virus in any of the critical information infrastructure of the country defined u/s 70 with the intent to threaten the unity, integrity, security or sovereignty of India or strike terror in the people or any section of the people; or gaining illegal access to data or database that is restricted for reasons of the security of state or friendly relations with foreign states. 
66F 
Publishing or transmitting of material containing sexually explicit act in electronic form 
67A 
Publishing or transmitting of material depicting children in sexually explicit act 
67B 
Preservation and retention of information by intermediaries as may be specified for such duration and in such manner and format as the central government may prescribe. 
67C 
IT Act 2000
38 
Section 70 deals with declaration of protected systems as any computer resource which directly or indirectly affects the facility of critical information infrastructure (CII) 
Protected Systems
39 
Sec 66 F: Punishment for Cyber Terrorism- (1) Whoever,- 
(A) with intent to threaten the unity, integrity, security or sovereignty of India or strike error in the people or any section of the people by- 
(i) deny or cause the denial of access to any person authorized to access computer resources; or 
(ii) attempting to penetrate or access a computer resource without authorization or exceeding authorised access; or 
(iii) introducing or causing to introduce any computer contaminant; or and by any means of such conduct causes or is likely to cause death or injuries to person or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section 70. 
Cyber Terrorism
41 
Under Section 70A NCIIPC, under NTRO is being declared as the nodal agency for the protection of Critical Information Infrastructure of India. 
Gazette notification for NCIIPC under section 70A (1) is underway. 
NCIIPC under its mandate from section 70A(2) of IT Act is responsible for all measures including R&D for protection of Critical Information Infrastructure 
Rules under section 70A being notified. 
National Critical Information Infrastructure Protection Centre (NCIIPC)
42 
NCIIPC Vision 
“To facilitate safe, secure and resilient Information Infrastructure for Critical Sectors of the Nation”
43 
“To take all necessary measures to facilitate protection of Critical Information Infrastructure from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction through coherent coordination, synergy and raising information Security awareness among all stakeholders.” 
NCIIPC Mission
44 
CERT-IN 
NCIIPC 
Organizational Security Department 
LEAs 
LOW 
Criticality 
HIGH 
HIGH 
Dependency 
Dependency and Criticality Matrix for NCIIPC
45 
Prevention and early warning 
Detection 
Mitigation 
Response 
Recovery 
Resilience
46 
Identification of Critical Sub-sectors 
Study of Information Infrastructure of identified critical sub-sectors 
Issue of Daily / Monthly cyber alerts / advisories 
Malware Analysis 
Tracking zombies and Malware spreading IPs 
Cyber Forensics activities 
Research and Development for Smart and Secure Environment. 
Facilitate CII owners in adoption of appropriate policies, standards, best practices for protection of CII. 
Annual CISO Conference for Critical Sectors. 
Awareness and training 
24X7 operation and helpdesk 
NCIIPC Activities
NTRO has identified 17 sub-sectors initially and has started activities for 7 sub-sectors named below: 
•Air Traffic Management (ATM), Civil Aviation (Transportation) 
•Power grid (Energy) 
•MTNL 
•NSEI 
•BSNL 
•Railways 
•SBI
Sl No. 
SECTOR as identified in crisis management plan 2010 
Sub- sector 
Dept./Agency 
Organization 
Specific Area 
Remarks 
1. 
Transportation 
Civil aviation 
AAI 
ATC 
Work under progress 
2. 
Transportation 
Railways 
IRCTC RAILTEL 
Passenger reservation system, communication 
Work under progress 
3. 
Transportation 
Shipping 
Port 
Port management 
4. 
Energy 
Power 
Powergrid corporation 
POSOCO 
Work under progress 
5. 
Energy 
Nuclear 
BAARC, NPCL 
6. 
Energy 
Oil & Gas 
ONGC 
7. 
Finance/Banking 
Finance 
NSE, BSE, Central Economic Intelligence Bureau (CEIB) 
SIEN network (CEIB) NFS(National Financial Switches) 
Work under progress 
8. 
Finance/Banking 
Banking 
SBI, RBI 
INFINET, NEFT, SIEN 
Work under progress 
9. 
ICT 
Communication 
MTNL, BSNL 
Work under progress
Sl No. 
SECTOR as identified in crisis management plan 2010 
Sub- sector 
Dept./Agency 
Organization 
Specific Area 
Remarks 
10. 
ICT 
IT 
NIC 
NKN, SWAN 
11. 
Law Enforcement, Security & intelligence 
Law Enforcement & Security 
ITBP, SSB, CRPF, Assam Rifles, BSF, CISF 
12. 
Law Enforcement, Security & intelligence 
Law Enforcement & Security 
MHA 
CCTNS 
13. 
Law Enforcement, Security & intelligence 
Intelligence Agencies 
R&AW, IB, NTRO, CBI, NIA 
NATGRID, FRRO Networks Cobweb 
Work under progress 
14. 
Space 
-- 
ISRO 
Spacenet, Remote sensing, spacebased Programme 
15. 
Defence 
Army, Navy, Air Force, Coast guard, Strategic Forces Command 
16. 
MEA 
-- 
-- 
Passport Database/Visa 
OTHERS 
17. 
Sensitive Govt. Organisations 
PMO, NSCS, Planning Commission, Cabinet Sectt., MHS, Registrar General Doordarshan & AIR 
AADHAAR 
Network from any of these areas which go through NIC
50 
Each Organisation/Ministry in Critical Sector should nominate a Nodal Officer (CISO) for interaction with NCIIPC. 
CISO will be the point of contact for NCIIPC. 
Nodal Officer/CISO
51 
CISO responsibilities include, but not limited to: 
◦Build an Information security culture 
◦Assist senior management in the development, implementation and maintenance of an information security infrastructure. 
◦Develop, communicate and ensure compliance with organizational information security policy, standards and guidelines 
◦Ensure regulatory and Standards compliance 
◦Develop a security awareness and training program 
◦Periodically conduct internal audit to check compliance with organizational security policy, standard and guidelines 
◦Risk Management 
◦Incident Management 
◦Business Continuity Management 
◦Assist senior management in acquisition of products, tools and services related to information & related technology. 
CISO Roles & Responsibilities
52 
Guidelines for Protecting Critical Information Infrastructure 
Under preparation with the help of Academia and Industry
53 
We understand several Ministries/Departments have identified organisations under their administrative control as a Sectoral CERT for their respective Ministries/Departments 
We would expect these Sectoral CERTS henceforth workout an institutional mechanism to synergistically work with NCIIPC towards providing effective protection to the CII in these Ministries/Departments. 
NCIIPC Expectations
54 
Take some time to fill questionnaire 
Provide details of information security measures being taken in your organisation 
Leave above documents when you go for lunch. 
Feedback
55 
Marching towards building a culture of cyber security NCIIPC at your Service Thank you

Más contenido relacionado

La actualidad más candente

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)k33a
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...usman butt
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testingAbdul Rahman
 
Cyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in IndiaCyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in IndiaAltacit Global
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 

La actualidad más candente (20)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)
 
O.s. lab all_experimets
O.s. lab all_experimetsO.s. lab all_experimets
O.s. lab all_experimets
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
System security
System securitySystem security
System security
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
 
Cyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in IndiaCyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in India
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Vlsm
VlsmVlsm
Vlsm
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 

Destacado

Topico04 esgotos-sanitarios (1)
Topico04 esgotos-sanitarios (1)Topico04 esgotos-sanitarios (1)
Topico04 esgotos-sanitarios (1)Cleriston Machado
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...TheAnfieldGroup
 
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist AttackOpen Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist AttackSeven Questions Consulting Limited
 
vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006Agha A
 
As armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na SíriaAs armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na SíriaPLETZ.com -
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Roger Johnston
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...Ahmed Al Enizi
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentationIISPEastMids
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness TrainingChris Fearnley
 
Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED) Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED) Akshad Veer
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner, RCDD
 

Destacado (20)

Topico04 esgotos-sanitarios (1)
Topico04 esgotos-sanitarios (1)Topico04 esgotos-sanitarios (1)
Topico04 esgotos-sanitarios (1)
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
 
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist AttackOpen Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
 
vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006
 
As armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na SíriaAs armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na Síria
 
Intro terrorism
Intro terrorismIntro terrorism
Intro terrorism
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
The New Security - Post "9/11"
The New Security - Post "9/11"The New Security - Post "9/11"
The New Security - Post "9/11"
 
Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Journal of Physical Security 8(1)
Journal of Physical Security 8(1)
 
2016 07-19 ctp update and assessment
2016 07-19 ctp update and assessment2016 07-19 ctp update and assessment
2016 07-19 ctp update and assessment
 
Exploring ISIS in Yemen
Exploring ISIS in YemenExploring ISIS in Yemen
Exploring ISIS in Yemen
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness Training
 
Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED) Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED)
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering Biography
 

Similar a National Critical Information Infrastructure Protection Centre (NCIIPC): Role and Responisbilities

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdfVarinSingh1
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxBini R A
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threatsSsendiSamuel
 

Similar a National Critical Information Infrastructure Protection Centre (NCIIPC): Role and Responisbilities (20)

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Case study 13
Case study 13Case study 13
Case study 13
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
114-116
114-116114-116
114-116
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threats
 

Más de Cybersecurity Education and Research Centre

Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Cybersecurity Education and Research Centre
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Cybersecurity Education and Research Centre
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Cybersecurity Education and Research Centre
 

Más de Cybersecurity Education and Research Centre (17)

Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social NetworksAutomated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
TASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet InfrastructureTASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet Infrastructure
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
 
Clotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and IncorrectClotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and Incorrect
 
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing PageEmerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasuresExploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
 
The future of interaction & its security challenges
The future of interaction & its security challengesThe future of interaction & its security challenges
The future of interaction & its security challenges
 

Último

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Último (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

National Critical Information Infrastructure Protection Centre (NCIIPC): Role and Responisbilities

  • 1. 1 Role, Charter & Responsibilities A Presentation by Muktesh Chander IPS Centre Director NCIIPC NTRO Government of India National Critical Information Infrastructure Protection Centre (NCIIPC)
  • 2. 2 Critical Information Infrastructure (CII) Threats to CII Examples of Cyber attacks to CIIs International Critical Information Infrastructure Protection Efforts International Information Security Standards Information Security initiatives in India National Critical Information Infrastructure Protection Centre (NCIIPC) Outline of Presentation
  • 3. 3 Energy Transportation ( air, surface, rail & water) Banking & Finance Telecommunication Defence Space Law enforcement, security & intelligence Sensitive Government organisations Public Health Water supply Critical manufacturing E-Governance …
  • 4. 4 In general Critical Infrastructure (CI) can be defined as: “those facilities, systems, or functions, whose incapacity or destruction would cause a debilitating impact on national security, governance, economy and social well-being of a nation”. Critical Information Infrastructure (CII) are those ICT infrastructure upon which core functionality of Critical Infrastructure is dependent.  As per Section 70 of IT Act 2000, CII is defined as: “the computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety.” Critical Information Infrastructure
  • 5. 5 Information Infrastructure CI CI CI CII CII CI CII Figure: Varying Dependence of CI on Information Infrastructure Inter-dependence
  • 6. 6 Characteristics of CII Highly Complex Distributed Interconnected Interdependent Increasing trend in all of the above
  • 7. 7 Complexity and Inter-dependence of CII
  • 8. 8 Threats to CII are classified as: ◦Internal Threat It is defined as “One or more individuals with the access and/or inside knowledge of a company, organization, or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with the intent to cause harm.” Insider betrayals cause losses due to IT sabotage, Fraud, and Theft of Confidential or proprietary information This may be intentional or due to ignorance ◦External Threat Arise from outside of the organization by individuals, hackers, organizations, terrorists , foreign Government agents, non state actors and pose risk like Crippling CII, Espionage, Cyber/Electronic warfare, Cyber Terrorism etc. Types of threats to CIIs
  • 9. 9 Malware Attacks ( 19,719,262 distinct malware so far) Email attachments Smartphones Removable media Web Application Attacks Client Side Attacks, MITM Social Engineering Attacks Social network Wireless attacks DoS/DDoS Botnet SCADA APTs Embedded systems Supply Chain contamination Threat vectors to CII
  • 10. 10
  • 11. 11 Individuals Disgruntled or ex employee Rivals (Industrial Espionage) Hackers, Script kiddies, Crackers Cyber criminals (organized as well as unorganized) Hactivists Cyber Mercenaries Terrorist groups (CyberJehadis) Non state actors Hostile states Threat actors
  • 12. 12 •Damage or destruction of CII •Disruption or degradation of services •Loss of sensitive and strategic information •Widespread damage in short time •Cascading effects on several CII Effects of Cyber Attacks on CII
  • 13. 13 Example of Cyber Attacks on CII
  • 14. 14 Discovered in June 2010 It is first known targeted worm to attack a particular type of Industrial Control Systems (ICS). It primarily spreads via portable USB drive It first exploits zero-day vulnerabilities to infect Windows based workstations then attacks associated Programmable Logical Controller (PLC) based SCADA machines and modifies their configuration and behaviour. Stuxnet, which affected the Nuclear program of Iran is the most sophisticated APT. Stuxnet Virus: A New weapon of War
  • 15. 15 Concentration of infections in Iran. Stuxnet spread and geographical distribution of infected systems
  • 16. 16 Discovered in September 2011. Affected countries include Iran, France, UK, Hungary, Austria, and Indonesia. It is a variant of Stuxnet virus. Unlike Stuxnet Duqu worm does not replicate but is ‘highly targeted’ and uses Trojans to gather sensitive information and passwords and send back to a command and control server. It does not have a payload like Stuxnet, but instead seems to exist to set up remote access capabilities. Duqu Virus: A Stuxnet Variant
  • 17. 17 20 MB in size Cause: ◦Flame can spread to other systems over LAN or USB stick. ◦Mine computer to record Skype conversation, screenshots, keyboard activity and network traffic, turns infected computers into Bluetooth becons which attempt to download contact information from nearby Bluetooth- enabled devices. ◦Collected information is sent back to remote control servers. Effect: ◦Initially infected 1000 machines, with victims including governmental organizations, financial organizations etc. in Iran, Egypt, Sudan, Lebanon, Saudi Arabia and Israel. Flame Malware
  • 18. 18 Targets: ◦Energy Sector. ◦Disrupted services of Saudi Aramco and Qatar RasGas. Effect: ◦Capable to spread to other offline workstations on network. ◦Wipes disks of workstations and overwrites Master Boot Record preventing them from booting. Motive: ◦Unlike other Cyber Espionage Malware, Shamoon is a Cyber Sabotage Weapon. Shamoon Malware (August 2012)
  • 19. 19 From Cyber Skirmishes to Cyber Warfare
  • 20. 20 Cause: ◦Malicious emails when opened dropped Trojan horse . ◦Trojan horse connects back to Control Server to download and install Gh0st Rat Trojan. Effect: ◦Gh0st Rat allows attackers to gain complete, real time control of computers running Microsoft windows. ◦Infiltrated high-value political, economic, and media locations in 103 countries. ◦Compromised computer systems of embassies, foreign ministries and other government offices, Dalai Lama’s centers in India, London and New York city etc. GhostNet: Cyber Spying Operation
  • 21. 21 Cause: ◦A malware ecosystem employed by the attackers via GhostNet etc. ◦Ecosystem Leveraged multiple redundant cloud computing systems, social networking platforms, free web hosting services etc to maintain persistent control. Effect: ◦Complex cyber espionage network. ◦Theft of classified and sensitive documents. ◦Collateral compromise: Visa applications stolen. ◦Command and control Infrastructure that leverage cloud based social media services. Shadow in Cloud: Cyber Espionage
  • 22. 22 On 4th December 2011, Iran captured an American Lockheed Martin RQ-170 Sentinel unmanned aerial vehicle (UAV) Iranian Government claimed that drone was brought down by its cyber warfare unit stationed near Kashmar. An Iranian engineer claimed that the drone was captured by jamming both satellite and land- originated control signals to the UAV, followed up by a spoofing attack, feeding the UAV false GPS data to make it land in Iran at what the drone thought was its home base in Afghanistan Cyber Attack brought down US Drone RQ-170
  • 23. 23 Incident Time Frame ◦Start 27 April 2007, End 18 May 2007, Duration 3 weeks Methods ◦DoS and DDoS; Website defacement; Attacking DNS servers; ◦Mass e-mail and comment spam. Targets ◦Servers of institutions responsible for the Estonian Internet infrastructure; ◦Governmental and political targets (parliament, president, ministries, state agencies, etc); ◦Services provided by the private sector (ebanking, news organisations etc); ◦Personal and random targets. Estonia 2007 Cyber Conflict
  • 24. 24 Incident Time Frame ◦Start 8 August 2008; End 28 August 2008; Duration 3 weeks Methods ◦DoS and DDoS attacks;Distribution of malicious software together with attack instructions; exploiting SQL vulnerability; ◦Defacement; Using e-mail addresses for spamming and targeted attacks. Targets ◦Government sites (President, Parliament, ministries; local government of Abkhazia); News and media sites, online Discussion forums, Financial institutions etc. Georgia 2008 Cyber Conflict
  • 25. 25 Incident Time Frame ◦Start 28 June 2008; End 2 July 2008; Duration 4 days. Methods ◦Defacement. Pro-Soviet and communist symbols as well as profane anti-Lithuanian slogans posted on websites. ◦Some e-mail spam. Targets ◦Over 3oo private sector (95%) and governmental (5%) websites; ◦Damage largely avoided to the public sector due to timely warning; ◦Private sector suffered most. Lithuanian 2008 Cyber Conflict
  • 26. 26 Cyber attacks on Indian Government Infrastructure
  • 27. 27 As reported by Indian Computer Emergency Response Team (CERT-In) a total no. of 90, 119, 252 and 219 Government websites were defaced by various hacker groups in the year 2008, 2009, 2010 and January – October 2011 respectively 13000 incidents handled by CERT in in 2011 Cyber attacks on Indian Government Websites
  • 28. 28 Loss of confidential information from sensitive organisations Email Compromises
  • 29. 29 International efforts for Protection Of Critical Information Infrastructure
  • 30. 30 UN Resolution 58/199 ITU, G8 Agencies for protection of Critical Infrastructure: ◦Europe: European program for Critical Information Infrastructure Protection (EPCIP) ◦United Kingdom: Centre for the Protection of National Infrastructure (CPNI) ◦United States: Responsibility of Critical Infrastructure protection falls under the jurisdiction of the Department of Homeland Security. ◦Australia: National Security agency ◦South Korea: National Intelligence Service International CIIP initiatives
  • 32. 32 Some Information Security facts ◦ It is a multidisciplinary subject ◦Security depends on people, process more than technology; ◦Internal employees are a far bigger threat to information security than any outside threat; ◦Security is not static entity but a running process; it should flow through the organization. ◦Moving from technical, managerial, standardization & certification to the Forth wave of Information security Governance (B. Von Solms ) Information Security Management
  • 33. 33 ◦ISO/IEC 27000 family; ◦ISO 31000: Risk Management; ◦ISO 22301: Business continuity Management etc . Federal Information Processing Standard (FIPS) Control Objective for Information and Related Technologies (COBIT) Information Technology Infrastructure Library (ITIL) Payment Card Industry Information Security Standard (PCIDSS) Data Security Council of India Security Framework (DSF) International Standards
  • 34. 34 Specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System (ISMS) within an organisation. It is usually applicable to all types of organisations, including business enterprises, government agencies, and so on. It is a normative standard against which certification is obtained. Adopts Plan-DO-Check-Act (PDCA) model and is applied to structure all ISMS processes. ISO/IEC 27001
  • 35. 35 Establish the ISMS Implement and operate the ISMS Monitor and Review the ISMS Maintain and Improve the ISMS Plan Do Check Act Information security Requirements and Expectations Managed Information Security and Operations PDCA Model ISO/IEC 27001 Standard (contd..)
  • 36. 36 ISO/IEC 27001 ISMS Requirements ◦General requirements Establishing and managing the ISMS Establish the ISMS, Implement and operate the ISMS Monitor and review the ISMS, Maintain and improve the ISMS ◦Documentation requirements General, Control of documents, Control of records ◦Management responsibility Management commitment Resource management Provision of resources Training, awareness and competence ◦Internal ISMS audits ◦Management review of the ISMS General, Review input, Review output ◦ISMS improvement Continual improvement, Corrective action, Preventive action ISO/IEC 27001 Standard (contd..)
  • 37. 37 Criminal Offences Subsection Sending offensive messages, including attachments, through communications service 66A Dishonestly receiving stolen computer resource or communication device 66B Identity theft 66C Cheating by personating 66D Violation of privacy 66E Cyber terrorism: defined as causing denial of service, illegal access, introducing a virus in any of the critical information infrastructure of the country defined u/s 70 with the intent to threaten the unity, integrity, security or sovereignty of India or strike terror in the people or any section of the people; or gaining illegal access to data or database that is restricted for reasons of the security of state or friendly relations with foreign states. 66F Publishing or transmitting of material containing sexually explicit act in electronic form 67A Publishing or transmitting of material depicting children in sexually explicit act 67B Preservation and retention of information by intermediaries as may be specified for such duration and in such manner and format as the central government may prescribe. 67C IT Act 2000
  • 38. 38 Section 70 deals with declaration of protected systems as any computer resource which directly or indirectly affects the facility of critical information infrastructure (CII) Protected Systems
  • 39. 39 Sec 66 F: Punishment for Cyber Terrorism- (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or strike error in the people or any section of the people by- (i) deny or cause the denial of access to any person authorized to access computer resources; or (ii) attempting to penetrate or access a computer resource without authorization or exceeding authorised access; or (iii) introducing or causing to introduce any computer contaminant; or and by any means of such conduct causes or is likely to cause death or injuries to person or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section 70. Cyber Terrorism
  • 40.
  • 41. 41 Under Section 70A NCIIPC, under NTRO is being declared as the nodal agency for the protection of Critical Information Infrastructure of India. Gazette notification for NCIIPC under section 70A (1) is underway. NCIIPC under its mandate from section 70A(2) of IT Act is responsible for all measures including R&D for protection of Critical Information Infrastructure Rules under section 70A being notified. National Critical Information Infrastructure Protection Centre (NCIIPC)
  • 42. 42 NCIIPC Vision “To facilitate safe, secure and resilient Information Infrastructure for Critical Sectors of the Nation”
  • 43. 43 “To take all necessary measures to facilitate protection of Critical Information Infrastructure from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction through coherent coordination, synergy and raising information Security awareness among all stakeholders.” NCIIPC Mission
  • 44. 44 CERT-IN NCIIPC Organizational Security Department LEAs LOW Criticality HIGH HIGH Dependency Dependency and Criticality Matrix for NCIIPC
  • 45. 45 Prevention and early warning Detection Mitigation Response Recovery Resilience
  • 46. 46 Identification of Critical Sub-sectors Study of Information Infrastructure of identified critical sub-sectors Issue of Daily / Monthly cyber alerts / advisories Malware Analysis Tracking zombies and Malware spreading IPs Cyber Forensics activities Research and Development for Smart and Secure Environment. Facilitate CII owners in adoption of appropriate policies, standards, best practices for protection of CII. Annual CISO Conference for Critical Sectors. Awareness and training 24X7 operation and helpdesk NCIIPC Activities
  • 47. NTRO has identified 17 sub-sectors initially and has started activities for 7 sub-sectors named below: •Air Traffic Management (ATM), Civil Aviation (Transportation) •Power grid (Energy) •MTNL •NSEI •BSNL •Railways •SBI
  • 48. Sl No. SECTOR as identified in crisis management plan 2010 Sub- sector Dept./Agency Organization Specific Area Remarks 1. Transportation Civil aviation AAI ATC Work under progress 2. Transportation Railways IRCTC RAILTEL Passenger reservation system, communication Work under progress 3. Transportation Shipping Port Port management 4. Energy Power Powergrid corporation POSOCO Work under progress 5. Energy Nuclear BAARC, NPCL 6. Energy Oil & Gas ONGC 7. Finance/Banking Finance NSE, BSE, Central Economic Intelligence Bureau (CEIB) SIEN network (CEIB) NFS(National Financial Switches) Work under progress 8. Finance/Banking Banking SBI, RBI INFINET, NEFT, SIEN Work under progress 9. ICT Communication MTNL, BSNL Work under progress
  • 49. Sl No. SECTOR as identified in crisis management plan 2010 Sub- sector Dept./Agency Organization Specific Area Remarks 10. ICT IT NIC NKN, SWAN 11. Law Enforcement, Security & intelligence Law Enforcement & Security ITBP, SSB, CRPF, Assam Rifles, BSF, CISF 12. Law Enforcement, Security & intelligence Law Enforcement & Security MHA CCTNS 13. Law Enforcement, Security & intelligence Intelligence Agencies R&AW, IB, NTRO, CBI, NIA NATGRID, FRRO Networks Cobweb Work under progress 14. Space -- ISRO Spacenet, Remote sensing, spacebased Programme 15. Defence Army, Navy, Air Force, Coast guard, Strategic Forces Command 16. MEA -- -- Passport Database/Visa OTHERS 17. Sensitive Govt. Organisations PMO, NSCS, Planning Commission, Cabinet Sectt., MHS, Registrar General Doordarshan & AIR AADHAAR Network from any of these areas which go through NIC
  • 50. 50 Each Organisation/Ministry in Critical Sector should nominate a Nodal Officer (CISO) for interaction with NCIIPC. CISO will be the point of contact for NCIIPC. Nodal Officer/CISO
  • 51. 51 CISO responsibilities include, but not limited to: ◦Build an Information security culture ◦Assist senior management in the development, implementation and maintenance of an information security infrastructure. ◦Develop, communicate and ensure compliance with organizational information security policy, standards and guidelines ◦Ensure regulatory and Standards compliance ◦Develop a security awareness and training program ◦Periodically conduct internal audit to check compliance with organizational security policy, standard and guidelines ◦Risk Management ◦Incident Management ◦Business Continuity Management ◦Assist senior management in acquisition of products, tools and services related to information & related technology. CISO Roles & Responsibilities
  • 52. 52 Guidelines for Protecting Critical Information Infrastructure Under preparation with the help of Academia and Industry
  • 53. 53 We understand several Ministries/Departments have identified organisations under their administrative control as a Sectoral CERT for their respective Ministries/Departments We would expect these Sectoral CERTS henceforth workout an institutional mechanism to synergistically work with NCIIPC towards providing effective protection to the CII in these Ministries/Departments. NCIIPC Expectations
  • 54. 54 Take some time to fill questionnaire Provide details of information security measures being taken in your organisation Leave above documents when you go for lunch. Feedback
  • 55. 55 Marching towards building a culture of cyber security NCIIPC at your Service Thank you