1. Cyber security and user privacy
“I CAN DO MORE HARM TO YOU WITH A COMPUTER IN
MY HAND, SITTING AT HOME, THAN, HOLDING A GUN
POINTING AT YOU.”
-Jhunjhun Tripathy
3. How has Hacking Evolved? Present Scene
1977 – First virus
was written
1995- Breaking
Web Sites
2000- First
Malicious
Code: Melissa
2003-04-
Advanced worm “I
Love You” was
released.
2005-06- Identity
Theft (Phishing)
came to existence.
2007-08
Organised crime/
Data Theft on rise.
Present-
Encrypted
terrorist message
and cloud
Hacking.
4. How Have Things Emerged?
PAST PRESENT & FUTURE
• Cyber security is a young and
immature field
• The attackers are more innovative
than defenders
• Defenders are mired in FUD (fear,
uncertainty and doubt) and fairy
tales
• Attack back is illegal or classified
• Cyber security will become a
scientific discipline
• Cyber security will be application
and technology centric
• Cyber security will never be “solved”
but will be “managed”
• Attack back will be a integral part of
cyber security
5. Financial Fraud
3%
Data Sabotage
5%
Theft of Proprietory
Information
6%
System Penetration
8%
Denial Of Service
8%
Unauthorised Access
21%
Employee Abuse of Internet
Privilege
24%
Virus Attacks
25%
% Of Cyber Attack Types
Financial Fraud Data Sabotage Theft of Proprietory Information
System Penetration Denial Of Service Unauthorised Access
Employee Abuse of Internet Privilege Virus Attacks
6. What’s In their Mind???? The Plan?
• Knowing The Victim
• Planning
• Attack.
• Creation of backdoor for
Escaping.
• Go Incognito
UNDERSTAND
THE VICTIM
Plan
Attack
7. Cases Reported In India
State Cases
Maharashtra 907
UP 682
AP 657
0
50000
100000
150000
200000
250000
300000
2011 2012 2013 2014 2015
13301
22060
71780
149254
300000
Cyber Attack Cases
Cases
Estimated
Attacks this
year
8. How simple is it to Hack ?
@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00
Can affect your system
drive C: . The virus can
copy endlessly until all
the cache memory is
utilised leaving no
memory for running any
application.
Hence, it shutdowns
the computer after a
delay.
9. Popular companies that collect user data..
• Facebook
• Google
• Apple
• Microsoft
• Samsung
• Sony
• Xiaomi
10. How Google Violates Privacy?
• Street View: Not just street mapping.
• Gmail: Prying and spying.
• Google Chrome: Not just hunting Wi-Fi. It knows all about
you.
• Android: Another data gateway. Now they know where,
whom and How you are.
11. Why is this Information Collected?
• Ads
• Services
• Backdoor
• Inline Marketing
• Push mail regarding services
• Cloud synchronisation
0
5
10
15
20
25
30
35
40
45
Ads Services Backdoor Inline
Marketing
Push mail Cloud Sync
Purpose
Percent
12. What Should you Do now?
• Use Linux and Unix based Operating systems.
• Use proxy server to avoid location based tracking.
• Carefully read the permissions that ask for accessing microphone and camera.
• Use a dynamic IP address.
• Don't store credit card information within apps or cloud servers like Google
Drive.
• Use secure browsers. Ex: Comodo Dragon
• Use secured encrypted email clients like Clyton or Thunderbird.