SlideShare uma empresa Scribd logo
1 de 9
norton
scientific
scam
reviews
India steps up battle against rising cyber crime wave

As Ankit Fadia, 28, works on his laptop, his fingers furiously
tapping away, there is silence in the packed auditorium in
central Delhi.
His projector throws images of codes and symbols onto a white
wall, and then suddenly, the crowd bursts into spontaneous
applause.
Another website has been successfully hacked and unlocked.
But rather than doing something illegal, Mr Fadia, who
describes himself as an ethical hacker, says he is trying to
protect people and businesses from a rising wave of cyber
crime.
"The      difficulty    about
tackling cyber crime is that
it's increasing all the time,"
says Mr Fadia.


"If we control one set of
attacks there are hundreds       As the number of people coming online in
                                 India rises so could the victims of hackers
more the next minute.
That's why we need our
systems,    policing,     the
law, prepared for this kind of
cyber             onslaught.”
Spam manager
 “Though India has laws aimed at tackling cyber crime, it isn't used
 effectively”
  --- Ankit Fadia ,Ethical hacker




 The BBC's Shilpa Kannan reports on what companies
 are doing to protect themselves from cyber attacks
According to a recent report by global research and accounting
firm Ernst and Young, data or information theft was the most
committed fraud in India last year.

That data can be anything from personal details, to bank
accounts, to company contacts and secrets.
Ernst and Young warns that it could cost companies as much as
5% of their profits if they are targeted by cyber criminals.

At the same time, there has been an increase in nuisance internet
issues such as spamming, with India recently overtaking the US to
become the top global contributor of junk messages. And while
this jams an inbox and is a headache for the consumer, for the
government there are also more serious issues, such as national
security and trying to avoid a potential cyber attack by a terrorist
group.
According to the Minister of State for Communications and
IT, Sachin Pilot, more than 100 Indian government websites were
hacked in the first three months of 2012.

It is no surprise then that the government has been trying to step
up its policing of cyberspace, and is mulling plans to build a
National Cyber Coordination Centre, which will detect malicious
cyber attacks and issue early warning alerts.

The IT industry lobby group Nasscom has also recommended
establishing a cyber command centre which would sit within the
defence forces. They argue the cyber command should be
equipped with defensive and offensive cyber weapons and staff
trained in cyber warfare
Cyber crime facts:
• Number of people subjected to cyber crimes globally in 2011 :
  431 million
• Number of cyber crime victims in India: 29.9 million
• Cost of cyber fraud globally: up to $388bn a year
• Cost of cyber fraud in India: $7.6bn a year - $4bn worth of direct
  losses and an additional $3.6bn in time spent resolving the crime
• Source: Norton Cybercrime Report 2011

Grey men
  But for observers such as hacker and author Mr Fadia, India
  already has some firepower in place with its Information
  Technology Act that was passed in 2000.
  The issue, however, is not with the law, rather the
  implementation of it.
"Though India has laws aimed at tackling cyber crime, it isn't used
effectively," explains Mr Fadia, who has tied up with the national police
academy in Hyderabad and helps train police officers in understanding
cyber crime.
"Even when arrests are made, very few people actually get convicted."
Experts say that even if you go after the criminals it is not always easy
to catch them because they usually operate behind the wall of
anonymity that the internet offers.
According to Arpinder Singh, head of Ernst and Young's Fraud
Investigation and Dispute Services, the company recently tried to
identify the profile of an Indian cyber fraudster.
What they found was that the fraudster had changed significantly.
Now, typically, they are a male middle-management employee in his
30's who is very ambitious and tech savvy. He can work anonymously
from a remote location.
This makes it harder to trace any wrongdoer, a task that will only get
harder as India's internet population grows from its current level of
about 120 million, or about 10% of the current population.
Mr Singh warns that as more people come online the risks to
companies both big and small will increase.
Safe practice
One small firm that is already taking defensive measures is UC Infosystems.
In a busy office in wesat Delhi, the company's technicians are breaking
down electronic equipment and consumer gadgets so they can service
their parts.
As well as being full of computers and keyboards, the office is also
brimming with confidential information such as client orders and
addresses, payment methods and other financial data.
In an increasingly competitive business, the founder of the firm wants to
make sure nothing can be lost or stolen.
"Though we are a small business, all our data is online," explains Sanjeev
Sharma.
"My accounts department processes financial data; the service staff can
access client addresses and phone numbers.
"I have to consider the possibility that my competition can steal the data.
That puts not just my business at risk, but all my valuable client data at
                                    risk."

Mais conteúdo relacionado

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

India steps up battle against rising cyber crime wave

  • 2. India steps up battle against rising cyber crime wave As Ankit Fadia, 28, works on his laptop, his fingers furiously tapping away, there is silence in the packed auditorium in central Delhi. His projector throws images of codes and symbols onto a white wall, and then suddenly, the crowd bursts into spontaneous applause. Another website has been successfully hacked and unlocked. But rather than doing something illegal, Mr Fadia, who describes himself as an ethical hacker, says he is trying to protect people and businesses from a rising wave of cyber crime.
  • 3. "The difficulty about tackling cyber crime is that it's increasing all the time," says Mr Fadia. "If we control one set of attacks there are hundreds As the number of people coming online in India rises so could the victims of hackers more the next minute. That's why we need our systems, policing, the law, prepared for this kind of cyber onslaught.”
  • 4. Spam manager “Though India has laws aimed at tackling cyber crime, it isn't used effectively” --- Ankit Fadia ,Ethical hacker The BBC's Shilpa Kannan reports on what companies are doing to protect themselves from cyber attacks
  • 5. According to a recent report by global research and accounting firm Ernst and Young, data or information theft was the most committed fraud in India last year. That data can be anything from personal details, to bank accounts, to company contacts and secrets. Ernst and Young warns that it could cost companies as much as 5% of their profits if they are targeted by cyber criminals. At the same time, there has been an increase in nuisance internet issues such as spamming, with India recently overtaking the US to become the top global contributor of junk messages. And while this jams an inbox and is a headache for the consumer, for the government there are also more serious issues, such as national security and trying to avoid a potential cyber attack by a terrorist group.
  • 6. According to the Minister of State for Communications and IT, Sachin Pilot, more than 100 Indian government websites were hacked in the first three months of 2012. It is no surprise then that the government has been trying to step up its policing of cyberspace, and is mulling plans to build a National Cyber Coordination Centre, which will detect malicious cyber attacks and issue early warning alerts. The IT industry lobby group Nasscom has also recommended establishing a cyber command centre which would sit within the defence forces. They argue the cyber command should be equipped with defensive and offensive cyber weapons and staff trained in cyber warfare
  • 7. Cyber crime facts: • Number of people subjected to cyber crimes globally in 2011 : 431 million • Number of cyber crime victims in India: 29.9 million • Cost of cyber fraud globally: up to $388bn a year • Cost of cyber fraud in India: $7.6bn a year - $4bn worth of direct losses and an additional $3.6bn in time spent resolving the crime • Source: Norton Cybercrime Report 2011 Grey men But for observers such as hacker and author Mr Fadia, India already has some firepower in place with its Information Technology Act that was passed in 2000. The issue, however, is not with the law, rather the implementation of it.
  • 8. "Though India has laws aimed at tackling cyber crime, it isn't used effectively," explains Mr Fadia, who has tied up with the national police academy in Hyderabad and helps train police officers in understanding cyber crime. "Even when arrests are made, very few people actually get convicted." Experts say that even if you go after the criminals it is not always easy to catch them because they usually operate behind the wall of anonymity that the internet offers. According to Arpinder Singh, head of Ernst and Young's Fraud Investigation and Dispute Services, the company recently tried to identify the profile of an Indian cyber fraudster. What they found was that the fraudster had changed significantly. Now, typically, they are a male middle-management employee in his 30's who is very ambitious and tech savvy. He can work anonymously from a remote location. This makes it harder to trace any wrongdoer, a task that will only get harder as India's internet population grows from its current level of about 120 million, or about 10% of the current population. Mr Singh warns that as more people come online the risks to companies both big and small will increase.
  • 9. Safe practice One small firm that is already taking defensive measures is UC Infosystems. In a busy office in wesat Delhi, the company's technicians are breaking down electronic equipment and consumer gadgets so they can service their parts. As well as being full of computers and keyboards, the office is also brimming with confidential information such as client orders and addresses, payment methods and other financial data. In an increasingly competitive business, the founder of the firm wants to make sure nothing can be lost or stolen. "Though we are a small business, all our data is online," explains Sanjeev Sharma. "My accounts department processes financial data; the service staff can access client addresses and phone numbers. "I have to consider the possibility that my competition can steal the data. That puts not just my business at risk, but all my valuable client data at risk."