Beruflich Dokumente
Kultur Dokumente
CyberSecurity
S.Vijay Krishnan, SDE,
BSNL TVL
Why are we talking about
cybersecurity?
Recent Bigger Attacks
1. Operation Shady RAT : The
networks of 72 organisations across
the world were targeted in the
campaign which began in mid-2006,
continued up to 2010
2. TJX: 2009 - WiFi - More than 45
million people had their credit card
details stolen and some experts said
the actual figure was likely to be closer
to 94 million.
Recent Bigger Attacks
3. Heartland Payment Systems
This New Jersey payment processing
firm lost data on tens of millions of
credit cards in an attack in 2009.
4. Epsilon: The world's largest email
marketing firm, Epsilon, confirmed in
2011 that it had been the target of
hackers. Only names and email
addresses were stolen from the firm,
Recent Bigger Attacks
Indirectly
Biz, Edu, Gov have permanently replaced physical/manual
processes with Internet-based processes
What we can do ?
A solution to this problem will require both
the right technology and the right public
policy.
Spam
Virus
Worms
What to be aware of ??
Computer Viruses
Worms
Trojan Horses
Spyware
Adware
VIRUS
VIRUS
A computer virus is a computer program
that can copy itself and infect a computer
without permission or knowledge of the
user.
a program that replicates by infecting
other programs, so that they contain a
copy of the virus
How Virus Works.
Viral code is attached or inserted into the
order of execution so that when the legitimate
code is run the viral code is also run or run
instead of the legitimate code.
.COM
Start End
Prepended virus
(.COM)
Start End
= virus code
Appended virus
(.COM & .EXE)
= program flow
Jump End
Virus Phases
Dormant - waits for a trigger to start replicating
Propagation - copies itself into other programs of the
same type on a computer. Spreads when the user shares a
file with another computer. Usually searches a file for its
own signature before infecting.
Triggering - starts delivering payload. Sometimes
triggered on a certain date, or after a certain time after
infection.
Execution - payload function is done. Perhaps it put a
funny message on the screen, or wiped the hard disk clean.
It may become start the first phase over again.
WORM
Write Once Read Many
Worms are a subset of viruses
The differ in the method of attachment;
rather than attaching to a file like a virus a
worm copies itself across the network
without attachment.
Infects the environment rather than
specific objects
The Sapphire Worm or Slammer-
Jan 25, 2003
IS BETTER THAN
CURE
HOW TO PREVENT