Cyber Security Awareness
Overview
What is Cyber Security?
RBI Framework
Security Layers
Security Threats
Security Measures
Dos and Don'ts
Conclusion
What is Cyber Security?
Computer security, cybersecurity or information technology
security is the protection of computer systems and networks from
information disclosure, theft of or damage to their hardware,
software, or electronic data
Security Myths
Myths -Firewalls make your data secure. Encryption makes
your data secure. Hackers cause most security breaches.
In fact, 80% of data loss is caused by insiders. In fact,
encryption is only one approach to securing data. Security also
requires access control, data integrity, system availability, and
auditing.
In fact, 40% of Internet break-ins occur in spite of a firewall
being in place!!!!
Security Triad
Ensuring
that data
can be Ensuring that data is
modified protected from
only by unauthorized access
appropriate
mechanisms
The degree to which authorized
users can access information for
legitimate purposes
Defining the risks , threats and vulnerabilities
- Risk: A possibility that a threat exploits a vulnerability in an asset and causes damage or
loss to the asset
– Threat: Something that can potentially cause damage to the organization, IT Systems or
network.
– Vulnerability: A weakness in the organization, IT Systems, or network that can be
exploited by a threat
Points of Concerns in Banking
Lack of Cyber Security Awareness
Weakness in Security Framework
Weak Physical and logical security
Unable to explain and answer to queries of Customers.
Dependency on the vendors
weak record keeping practices and incident response
mechanism.
Lack of vigilance
Cyber Security Framework by RBI
Security Layers
Physical Security
Physical Security is the fundamental layer of security.
Physical security describes measures that are designed to prevent
unauthorized physical access to data, equipment, resources and
personal and protect the same from physical damage or harm.
This includes protection from natural and man-made disasters which
includes fires, floods, theft accidents etc.
Physical Security is often overlooked because of more technical
logical breaches.
Physical Security
Physical Security
Preventing physical security breach is the prime concern of the administrators.
Following are the devices that are associated with the Physical Security of the
premises.
1. Boom Barrier
2. CCTV
3. Visitor Management System (VMS)
4. RFID
5. Biometric Scanners
6. Digital Locks
LOGICAL SECURITY
Passwords
Use Strong Passwords using combination of Uppercase Lower Case
Numerical and Special Characters
Never use pets name, birthdates, telephone nos, names, dictionary words etc
Never share a password – don’t store a password on internet or on local
computer
Good Password – S@{h!n~ -
Make it something you can visualize. It’s easier to remember that way
The more personal the better. “mY5orit3$hirt’sR3d” (my favorite shirt is red)
PROTECTING DATA AND ASSETS
–Branches Perspective
• Secure your Documents and DATA
• Restrict USB Access on All Computers at Branches
• Use of Mutli Factor Authentication
• Use Your E mails Securely
• Report Any Unusual Instances to Head Office.
• Use Strong Passwords
• Never Share the Password
• Lock your computer before you leave your Desk
• Update your Antivirus Regularly – In case the Software is not
getting Updated inform IT Department
• Lock your Cabin after leaving premise.
• Keep an Eye on suspicious behavior of others at work.
Symptoms of being infected with a virus !
1. You see unexpected messages or images.
2. You hear unexpected sounds, played at random.
3. Programs start unexpectedly.
4. Your personal firewall tells you that an application has tried to
connect to the Internet (and it’s not a program that you ran).
5. Your friends tell you that they have received e-mail messages from
your address and you haven’t sent them anything.
6. Your computer ‘freezes’ frequently, or programs start running
slowly.
7. You get lots of system error messages.
8. The operating system will not load when you start your computer.
9. You notice that files or folders have been deleted or changed.
10. You notice hard disk access (shown by one of the small flashing
lights) when you’re not aware of any programs running.
11. Your web browser behaves erratically, e.g. you can’t close a browser
window.
Just in case if you are infected…
• Disconnect the infected computer from the Internet.
• Isolate the machine. Nothing comes in nothing goes out.
• Update anti-virus signatures (Don’t use the compromised
machine)
• Start the computer in safe mode and perform extensive scanning
• Use anti-virus program for removing the malicious program.
• If automated removal doesn’t yield result, closely observe the
behavior of your computer.
• Make a note of all the programs which start automatically when
the computer boots up.
• Search for suspicious entries. Delete the registry entries which
correspond to suspicious entries.
• Use tools like curr ports or command like netstat to monitor
opened TCP/IP and UDP ports on the local computer.
• Terminate the processes which seems to be suspicious.
• For damage beyond repair… Reinstall OS and be vigilant !
Types f Attacks
DoS and DDoS
it is aimed at preventing authorized, legitimate users from accessing services
on the network. A DoS attack can be initiated by sending invalid data to
applications or network services until the server hangs or simply crashes. The
most common form of a DoS attack is TCP attacks.
A network attacker can increase the enormity of a DoS attack by initiating the
attack against a single network from multiple computers or systems. This type
of attack is known as a distributed denial of service (DDoS) attack. Network
administrators can experience great difficulty in fending off DDoS attacks,
simply because blocking all the attacking computers, can also result in
blocking authorized users.
DDos
DDOS & BOT NET
Face Book DDOS ATTACK BY CHINESE HACKERS
MAN IN THE MIDDLE
MITM
It occurs when a cracker eavesdrops on a secure communication
session and monitors, captures and controls the data being sent
between the two parties communicating. The attacker attempts to
obtain information so that he/she can impersonate the receiver
and sender.
MITM
Rouge Software
Network Sniffing
Network Intrusion Attacker
Credential Hack Credential Hack
Software Flaw Network Attack
DOS
DDOS
Port Scan and
penetration
Internet Internet
Mobile BankingMobile 4G
Firewall
Attacker Server Server
MPLS MPLS
Man in the Middle Firewall
DLP
Phishing
Vishing
Virus Malware
Trojan
Misconfigured Network
Branch Computer
Wrong Routing Tables
Carrier Side Wire Tapping
Attacker Attacker
SSL- HTTPS
• A PAD LOCK Represents SSL – Secure Socket Layer
• The Technology Ensures that the communication between the webserver and the Client is
Encrypted.
• The Technology Ensures that the website is 100 %Genuine
• The Technology protects the Confidential Data entered by the consumer , even the internet
service provider does not know about it.
• Its Save and protects from Man in the Middle.
User Frauds
Phishing
Phishing Sites
Identity Theft
Shoulder Surfing
Identity Stealing
Online Frauds
Nigerian Frauds
Online Lottery
Employment Frauds
Online Data Entry Frauds
Internet Frauds
Credit Card /Debit Card Frauds
Document Forgery
Phishing
What is Phishing ?
the fraudulent practice of sending emails ostensibly from a known or trusted
sender in order to induce targeted individuals to reveal
confidential information.
Types of Phishing
•Spear Phishing.
•Whaling.
•Vishing.
•Email Phishing.
Phishing
Phishing
INSIDER ATTACK
PREVENT INSIDER ATTACK
• STAY VIGILANT
• Give Access permissions on Need to do and need to Know Basis
• Ensure Antivirus, EDR on each end point.
• Secure physical security of documents, and other valuable things.
Social Engineering Do’s and Don’ts
Security Measures
Security Awareness
Encryption
Strong Passwords
Up to date Antivirus
Next Gen Firewall / UTM
Mobile Device Management
Network Monitoring
Policy Framework
Encryption
Cryptography
The field of study related to encoded information (comes from
Greek word for "secret writing")
Encryption
The process of converting plaintext into cipher text
Decryption
The process of converting cipher text into plaintext
Encryption
Digital Signature
Policy Framework
Policy frame work ensures the integrity and
security with in the organization
Frameworks such as ISO 27001, BSI,
PCIDSS,PADSS etc. ensure and standardize
security practices.
It reduces the chances of loopholes in the
infrastructure.
Policy and Procedures helps the organization to
mitigate with the security threats.
Conclusion
Conduct Security Awareness Programs, Educate Employees.
Secure the premises
Deploy Antivirus software
Deploy Firewall/UTM
Deploy Network Monitoring Tools
Deploy Security Frame Work
Secure Identity and Personal Information.
Get the It systems audited for extra loopholes and vulnerabilities.