* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Licens
Deep packet inspection wikipedia , lookup
Airport security wikipedia , lookup
Distributed firewall wikipedia , lookup
Information security wikipedia , lookup
Wireless security wikipedia , lookup
Security-focused operating system wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Cyberwarfare wikipedia , lookup
Social engineering (security) wikipedia , lookup
Mobile security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
International cybercrime wikipedia , lookup
Computer security wikipedia , lookup
5/25/2017 1 TRAI • Background • Threats • Present Status • Challenges and Strategies 5/25/2017 TRAI 2 • “Critical infrastructure means the computers, computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data, content data and/or traffic data so vital to this country that the incapacity or destruction of or interference with such systems and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters.” (Source: ITU Toolkit for Cybercrime Legislation) • All critical infrastructures are increasingly dependent on ICT for communication, information management and control functions. 5/25/2017 TRAI 3 • ‘Security’ refers to minimizing the vulnerabilities of assets and resources. – An ‘asset’ is anything of value. – ‘Vulnerability’ is any weakness that could be exploited to violate a system or the information it contains. – A ‘threat’ is a potential violation of security 5/25/2017 TRAI 4 • ICT has direct impact on economic growth, social behaviour and conduction of business. As a result, it is now considered one of the core critical infrastructure. • Monitoring and control of various core infrastructure like electricity, water supply, medical services are getting computerised, increasing their dependency on ICT. • Protection of ICT infrastructure is vital as it has wide ramifications both direct and indirect on critical infrastructure. • The emerging information infrastructure differ radically in terms of scale, connectivity, and dependencies from traditional structures. 5/25/2017 TRAI 5 • Cyber-threats are evolving rapidly both in terms of nature and capability to cause harm. • Threats must be managed to maximize social benefits from ICTs and to reduce risks resulting from interdependences and vulnerabilities. • Communication systems are interconnected resulting in global interdependencies and vulnerabilities including threats to the national systems. • Protective measures require continual technological improvements and new approaches, to minimize threats on ICT. 5/25/2017 TRAI 6 Broadband Trends Wireless, Broadband and Data is the future. 7 All IP Network • IP networks are able to provide different services including triple play. • IP technologies support flexibility, managed QoS, dynamic bandwidth management and support different applications. • IP networks are cost effective when compared with legacy network. PetaByte / Month • IP networks are resilient, robust, modular, scalable and require low capex/ opex. Source: CISCO IP based networks are becoming default choice for ICT. 8 Trends •Wireless is dominating in market •Voice is not a primary service in telecom now. Data Traffic is increasing multifold day by day. •Convergence is now reality. Market boundaries are blurring with adaptation of convergence. •All IP based services being adopted by service providers as well consumer. •New category of content providers are capturing the market. •The forecasted investment in Mobile Broadband technologies reflects the importance the mobile industry places on enabling consumers to access any type of content on the move - whatever they want, whenever they want, wherever they want. Customer Demand is any type of content on the move - whatever they want, whenever they want, wherever they want. 9 •Issues • Data on wireless is demanding trends, however to fulfill the demand of high speed data and internet provisioning of sufficient spectrum is a great challenge. •Demand of IP based services generates the demand for more and more IP addresses. Present available IPv4 addresses are insufficient to cater the demand in near future. •On one side IP based network provides the flexibility to deliver various services however on other side generates the security threats. • Demand for new value added services and technology innovation allow to deliver various types of contents through the network. However, regulating these content is a challenge. •Technology is capable to deliver various contents and services. Market is very competitive and managing the Net neutrality in such scenario is a challenge. •With convergence market boundaries are blurring and service providers are encroaching each others markets. It generate the issues of level playing field between old and new entrants. •Digital divide is major concern. •Education to consumer in rapid changing scenario is also a challenge 10 Features • IP networks are able to provide different services including triple play. • IP technologies support flexibility, managed QoS, dynamic bandwidth management and support different applications. • IP networks are cost effective when compared with legacy network. • IP networks are resilient, robust, modular, scalable and require low capex/ opex. IP based networks are becoming default choice for ICT. 5/25/2017 TRAI 11 Malware Botnet Data Driven The evolving cyber crime economy Cyber warfare Threats to VoIP and mobile devices 12 Area Characteristic Secrecy Keeping information unauthorized users out of the hands of Authentication Determining whom you are talking to before revealing sensitive information or entering into a business deal Non-repudiation to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Nonrepudiation is the assurance that someone cannot deny something Integrity control Modification of message in transit or concocted Wireless IP network IP Ports Misuse of Wi-Fi signalsneed for protections •Misuse of IP Ports Subscriber awareness issues •Misuse of application in absence of server hardening Securing subscriber devices •Exploiting Hardware / Software vulnerabilities •Attacks using open IP Ports 13 Smart Attackers •The art of cyber attack is improving faster than our ability to respond. •Emerging threats like Conficker, GhostNet etc outsmarts our defense capabilities by using sophisticated techniques. •Cyber attackers have the strategic edge. Cyber attacks are being considered as third greatest threat to the security after nuclear war and weapons of mass destruction (WMD). •A new threat "Cybergeddon" has been coined, in which an advanced society, that has most of its major infrastructure systems linked to or controlled by computers, is sabotaged by computer hackers with catastrophic results. 14 Sector/ Verticals Threat Impact • Information and communication • Identity theft • Data Theft • Spyware • Industrial Espionage • Emergency services • Phishing • System Downtime • Power • Denial Service • Banking & finance • Water networks supply • Air traffic control • Transportation • Defense security and • Government • Food and agriculture etc 5/25/2017 of • Financial Frauds • Reduced QoS • Hack • Harassment • Botnet • Information Loss • Malware • Viruses • Compromised National Security • Spam • Defamation • Pop-ups etc • Economic slowdown TRAI 15 • Network security problems can be divided roughly into four closely interwined areas: Area Characteristic Secrecy Keeping information unauthorized users Authentication Determining whom you are talking to before revealing sensitive information or entering into a business deal Non-repudiation to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Nonrepudiation is the assurance that someone cannot deny something Integrity control Modification of message in transit or concocted 5/25/2017 TRAI out of the hands of 16 Attacks on Services • Denial of Service (DOS) Attacks on Network • Backdoor • Attack within subnet • Man in Middle • Broadcast storm • Password Guessing • Media Access Control (MAC) Flooding • Brute Force • Dictionary • Dynamic Host Control Protocol (DHCP) DoS • Software Exploitation Malicious Codes • DHCP rogue • Viruses • Spanning Tree hijack • Address Resolution (ARP) table poisoning • Adware Protocol • Spyware • Worms • IP address spoofing • Trojans • Browse Hijackers 5/25/2017 TRAI 17 Type of Threats • Bot-network operators • Criminal groups • Foreign intelligence services • Hackers • Insiders • Phishers • Spammers • Spyware/malware authors • Terrorists 5/25/2017 TRAI 18 Source: websense.com 5/25/2017 TRAI 19 • Wireless IP network – Misuse of Wi-Fi signals- need for protections – Subscriber awareness issues – Securing subscriber devices Source: Survey by Deloitte and Data Security Council of India (DSCI) 5/25/2017 TRAI 20 Security Issues : IP Ports •Misuse of IP Ports – Attacks using open IP Ports – Misuse of application in absence of server hardening – Exploiting Hardware / Software vulnerabilities 5/25/2017 TRAI 21 Threat Value (July 10) Spam 88.9% Phishing – one in 557.5 email Viruses one in 306.1 emails Malicious websites 4,425 new sites per day Total Global Spam Volume each day 120 billion URLshortened spam 23.4 billion (in may 2010) 5/25/2017 Source: MessageLab TRAI 22 • All need to protect our critical information infrastructures, as risks are huge, especially in electronic warfare. • The rapid growth of ICTs and societal inter-dependency have led a shift to perception of Critical Information Infrastructure threats and, as a consequence, cyber security has become international political agenda. • It is crucial to understand the risks that accompany new technologies in order to maximize the benefits. • Growing threats to security, at the level of the individual, the firms, government and critical infrastructures, make security everyone’s responsibility. • 5/25/2017 It is important to understand and keep up-to-date contours of fast changing challenges. TRAI 23 Approach and Strategies • Licensing and Regulatory Measures • Legal Measures: • Technical and Procedural Measures • Capacity Building • International Cooperation 5/25/2017 TRAI 24 • Assign specific responsibility to service providers • Close identification of SPAM sites across the countries and automatic closure. • Creation of database of different sources related security threats. • Punitive measures against defaulting service providers in complying to regulatory instructions. • Acquisition of CERT and periodic audit of network vulnerability. 5/25/2017 TRAI 25 • Adoption of appropriate legislation against the misuse of ICTs for criminal or disruptive purposes, including activities intended to affect the integrity of national critical information infrastructures. • Threats can originate from anywhere around the globe, the challenges are inherently international in scope and require international cooperation, investigative assistance, common substantive and procedural provisions. • There is urgent need to enhance information sharing to improve incidence response capabilities. 5/25/2017 Standardization brings private sector and governments to coordinate work and promote the harmonization of security policy and standards globally. Various standards and security provision defined by international organizations like ITU, IEEE etc. should be implemented across all countries. These standards must provide safeguards for security and updated regularly to combat new security risk. TRAI 26 • Promote cybersecurity risk awareness for all citizens; • Build an education system that will enhance understanding of cybersecurity in information technology; • Expand and train the workforce to protect the Nation’s competitive advantage; • Help organizations and individuals make technological choices as they manage risk. smart • Develop skills to reduce risk and exposure from unsecure environment • Enabling citizen through impowerment of: – Knowledge, – capabilities and 5/25/2017 – Decision-making. TRAI 27 Challenges All need to protect our critical information infrastructures, as risks are huge, especially in electronic warfare. The rapid growth of ICTs and societal inter-dependency have led a shift to perception of Critical Information Infrastructure threats and, as a consequence, cyber security has become international political agenda. It is crucial to understand the risks that accompany technologies in order to maximize the benefits. new Growing threats to security, at the level of the individual, the firms, government and critical infrastructures, make security everyone’s responsibility. It is important to understand and keep up-to-date contours of fast changing challenges. 28 Way Forward: • Security is important, manageable but requires participation of all stakeholder and awareness in masses. • Service providers must be sensitized to make a secure network for future. • CIIP unit must act effectively with the help of various partners across the globe. • The establishment of Public-Private Partnerships with strong mutual trust is essential for the success of the CIIP unit. 5/25/2017 TRAI 29 Thank You S K Gupta, Advisor (Converged Network) Telecom Regulatory Authority of India J.L. Nehru Marg, New Delhi – 110002 Ph. +91-11- 23217914 (O) +91-11- 23211998 (Fax) Email: [email protected] 5/25/2017 TRAI 30 30