Cyber Crime & Network
                                                            Security in India




                                                                   CIO Focus Security 2008
                                                        Presentation by Adam Rice & AJ Vijayakumar




©2008 Tata Communications, Ltd. All Rights Reserved
Explosive Internet Growth and Impacts to Businesses

            India
            Internet Usage Stats and Telecommunications Market Report


  Internet Usage and Population Statistics:                    Internet use has been a key driver to enhance
                                                               both Domestic & Global Trade in India
  Year    Users       Population      % Pen.   Usage Source
  1998    1,400,000   1,094,870,677    0.1%        ITU        %                   Real GDP Growth Rate
  1999    2,800,000   1,094,870,677    0.3%        ITU        12     10.5
                                                                            8.3   7.5
  2000    5,500,000   1,094,870,677    0.5%        ITU         8                        5.6     5.5    5.3       5.1
  2001    7,000,000   1,094,870,677    0.7%        ITU                                                                      4.5      4.0
  2002   16,500,000   1,094,870,677    1.6%        ITU         4
  2003   22,500,000   1,094,870,677    2.1%        ITU         0
  2004   25,000,000   1,094,870,677   2.28%       IAMAI




                                                                                       g




                                                                                                                       nd
                                                                     na


                                                                                      a


                                                                                      e




                                                                                      a

                                                                                                                ea




                                                                                                                                  an
                                                                                     a
                                                                                   on
                                                                                    di




                                                                                    si
                                                                                   or




                                                                                   si
  2005   38,500,000   1,112,225,812   3.46%       IAMAI




                                                                   hi




                                                                                                             or


                                                                                                                       la


                                                                                                                                iw
                                                                                 ne
                                                                                 In




                                                                                ay
                                                                                ap


                                                                                 K




                                                                                                                    ai
                                                               C




                                                                                                         K




                                                                                                                             Ta
                                                                              do
                                                                               g


                                                                              al
                                                                             ng




                                                                                                                 Th
  2006   50,600,000   1,112,225,812   4.55%        CIA




                                                                            on


                                                                            M


                                                                           In
                                                                          Si


                                                                          H
  2007   60,000,000   1,129,667,528   5.31%        ITU
                                                                                              Source: Morgan Stanley Research

     E-Commerce        Media & Entertainment          Government          Education       Online Banking
                              Business Process Outsourcing
Defining “Cyber Crime”

 Webster's New Millennium™ Dictionary of English
 Entry:              Cyber Crime
 Part of Speech:     noun
 Definition:         A crime committed on a computer network, esp. the Internet
 Example:            Identity theft is a Cyber Crime.

    Spamming                      Espionage                    Malware (cont.)
    DDoS                          Internet Harassment             Downloader
    Unauthorized access           Malware                         Adware
                                     Virus                        Ransomeware
    Social Engineering
                                     Worm                      Child Pornography
    Hacking
                                     Trojan                    Telecom Fraud
    Phishing
                                     Bot                       Financial Fraud
    Identity Theft                   Rootkit                   Computer Fraud
    Cyber-stalking                   Spyware
    Information warfare              Backdoor
News/Media Perspective of Cyber Crime in the India
      Cybercrime Threatens National Security in              Cyber Crime On A Roll In India
      India

                                                             Posted by Rushabh Chokshi on
      Date: September 27, 2007                               November 2nd, 2007
      Source: merinews.com
                                                             It is The New Age in Cyber Crime, according
      By: Fahim Ahmedi
                                                             to latest news cyber criminals are now
                                                             targeting Enterprises and Consumers based in
                                                             Tier III cities


         India is now taking steps to fight against the     Cybercrime: A threat to national security
         cyber crime, Indian police are now being
                                                            Date: September 17, 2007
         trained on how the Internet, e-mail, and other
                                                            Source: merinews.com
         computer-based tools can be used by
                                                            By: Fahim Ahmedi
         criminals to illegally obtain information stored
         in databases                                       The ever increasing cyber crime is taking the
                                                            world by storm. Technology is a boon but it also
                                                            has dangerous implications if left undetected.
                                                            Cyberspace is one such area that needs to pull
                                                            all security strings together before things go out
                                                            of hand.
News/Media Perspective of Cyber Crime in the India




                         Ankit Fadia, a 21-year-old computer whizkid
                         and author of ’The Unofficial Guide to Ethical
                         Hacking’ said “I could hack a state-owned
                         bank’s website or a government
                         communications website which shows the
                         vulnerability, thousands of Indian websites
                         are being hacked each day”.
News/Media Perspective of Cyber Crime in the India



 Cyber crime in India on the decline: Report
 Posted online: Monday, January 07, 2008 at 12:00:00
 Updated: Monday, January 07, 2008 at 10:37:53



 New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the
 “new age” crime have declined with the most noticeable difference seen in Gujarat.
 However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in
 Gujarat.
 A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually
 decreased. “This is only a statistics based on the number of cases registered,” he added.


                                     darkREADING
                                     Annual CIS Study: Cost of Cybercrime Is Skyrocketing
                                     Average annual loss per company has more than doubled since last year, according
                                     to bellwether study
                                     September 11, 2007 | 5:55 PM
                                     By Tim Wilson
                                     Site Editor, Dark Reading
Net Neutrality vs. Censorship


           Clean the Pipes
The Threats are Real
Global Activity Maps




                       Source: Arbor Networks 2008
Internet Service Providers Security Concerns




                                                            Top
                                                            Concern




                                               Source: Arbor Networks 2007
The Botnet Problem Starts with Compromised PCs
 150 of 600 million online PCs worldwide are   The most common infection methods detected by
 bot infected                                  S21sec include browser exploits (65%), e-mail
 (Source: BBC 2007 interview with Vint Cerf)   attachments (13%), operating system exploits
                                               (11%), downloaded Internet files (9%) and other
 52,771 new infected PCs daily                 methods (2%), as illustrated in the figure below.
 (Source: Symantec 2007)
                                               Infection Methods
                                                          Downloaded     Other
 Rapid growth in tools used by Cyber                         Files        2%
 Criminals                                                    9%
 Victims often do not know that they have          OS Exploits
 been compromised!                                    11%

 Easy to use tools with varying levels of
                                                    Email                     Browser
 anonymity offered to cyber criminals
                                                Attachments                   Exploits
                                                    13%                         65%


                                                                                   Source: S21sec
The Botnet Problem Starts with Compromised PCs
 150 of 600 million online PCs                 Malcode Additions 2007
 worldwide are bot infected
                                                       Spyware    308
 (Source: BBC 2007 interview with Vint Cerf)
                                                        Rootkit       1,138
 52,771 new infected PCs daily
                                                     Keylogger        1,463
 (Source: Symantec 2007)
                                                         Other                 14,907

                                               Password Stealer                   22,982
 Rapid growth in available tools used
 by Cyber Criminals!                                     Dialer                    23,449

                                                      Backdoor                         25,997
 Victims often do not know that they
 have been compromised!                             Downloader                                  41,389

                                                          Virus                                    48,889
  Easy to use tools with varying levels
 of anonymity offered to cyber                          Adware                                           55,873

 criminals!                                              Worm                                               64,173

                                                         Trojan                                                                      109,246

                                                                  0           20,000     40,000      60,000       80,000   100,000   120,000

                                                                                                    Source: IBM ISS x-Force Trend Report 2007
The Botnet Problem – Devastating Impact to Businesses
Common Exploits from Botnets
   Identity Theft
      Credit card /Email fraud
      Theft/Fraud in online banking and auctions
      Theft storage and distribution of login ID/Password, financial
      data, etc…
   DDoS (Distributed Denial of Service)
      50% of Botnets used for DDoS attacks
      (Source: S21 sec)
      Each bot generates 40kbps
      Small botnets command up to 10,000 bots
      Large botnets command up to 1 million bots
      20+ Gbps DDoS attacks witnessed in 2007
      (Source: Arbor Networks Inc. 2007)
   Spam
      Each spam bot can send 3 spam emails per second
      (259,000/day)
      94% of all emails is Spam (Google/Postini 2006)
There are Solutions in Sight
                                                    Solutions                           Commentary
  Preventing PC compromise               Vulnerability assessment,           Identity vulnerabilities and enforce a
                                         penetration testing, anti-virus,    priority based patch management
                                         etc…                                approach to secure PCs from known
                                                                             exploits.
Securing against Botnet attacks

  Employ a Defense in Depth Strategy when Securing your Enterprise!          Layer your defenses against network
                                                                             security threats to minimize the
                                                                             impact!
  Preventing Identity Theft              Content filtering services, anti-   Combat a variety of Phishing,
                                         virus, intrusion detection and      Pharming, malware and web/email
                                         prevention systems                  fraud activities that can result in
                                                                             identity theft
  Preventing DDoS                        Cloud based and or CPE based        Stopping in the cloud within the
                                         anti-DDoS services.                 provider’s network reduces the chance
                                         Cloud is recommended.               of a last mile bottleneck, which
                                                                             completes the attacker’s work
  Preventing Spam                        Cloud-based and or CPE based        Stopping in the cloud through a proxy-
                                         anti-spam solution                  based service saves unnecessary
                                                                             bandwidth exhaustion and saves costs
Tata Communications Has Taken a Stance Against Cyber Crime!
What are Your Next Actions to Securing your Enterprise from Cyber
Crime?
Assess your Current state to define your Next steps
    Take a custom self-assessment to determine your next steps
    Web-based module www.tatacommunications.com/security/assessment




                                                                      Combat
                                                                       Cyber
                                                                       Crime!
Thank You



      www.tatacommunications.com
Managed Services Portfolio
Managed Security Services

More Related Content

PPTX
Cyber security presentation
XLS
Programme Assurance Questionnaire V1.4
PDF
M&A Integration Planning The Integration Of An Acquired Companys Legal De...
PPSX
Cyber crime and cyber security
PPT
Ppt for womens day
PPTX
Awareness Against Cyber Crime
PPT
Domestic violence against women (1).ppt fourth semester
PPTX
Quiz 2013 MALAYALAM QUIZ FOR CHILDREN
Cyber security presentation
Programme Assurance Questionnaire V1.4
M&A Integration Planning The Integration Of An Acquired Companys Legal De...
Cyber crime and cyber security
Ppt for womens day
Awareness Against Cyber Crime
Domestic violence against women (1).ppt fourth semester
Quiz 2013 MALAYALAM QUIZ FOR CHILDREN

Viewers also liked (20)

PDF
Cyber Crime Awareness Project
PPTX
GENERAL QUIZ ...IDENTIFY THE PERSONALITY
PPT
My Quiz in Kerala
PDF
A Call to Action on Violence Against Women
PPTX
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
PDF
Science Quiz Malayalam
DOC
Cyber crime final report
PDF
Cyber crime
PPSX
Domestic Violence Against Women And Girls In Powerpoint (Created By Mann Bdr...
PPT
Domestic Violence Against Women [1].Ppt Dyuti.
PDF
Keralaprashnothareeyam (Kerala Quiz)
PPTX
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)
PPTX
India quiz Prelims
PPTX
Ethical and safety recommendations for research on domestic
PDF
Top Cyber Security Trends for 2016
PPT
CYBER CRIME AND SECURITY
PPTX
Cyber-crime PPT
PPTX
Cyber security
PPTX
Cyber crime ppt
Cyber Crime Awareness Project
GENERAL QUIZ ...IDENTIFY THE PERSONALITY
My Quiz in Kerala
A Call to Action on Violence Against Women
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Science Quiz Malayalam
Cyber crime final report
Cyber crime
Domestic Violence Against Women And Girls In Powerpoint (Created By Mann Bdr...
Domestic Violence Against Women [1].Ppt Dyuti.
Keralaprashnothareeyam (Kerala Quiz)
കേരളപ്രശ്നോത്തരീയം(Kerala Quiz)
India quiz Prelims
Ethical and safety recommendations for research on domestic
Top Cyber Security Trends for 2016
CYBER CRIME AND SECURITY
Cyber-crime PPT
Cyber security
Cyber crime ppt
Ad

Similar to Cyber Crime and Network Security in India (20)

PDF
JayaDigital agency Facebook marketing presentation
PDF
U.S. Renewable Energy Market And Growth
PDF
Past and Future Development of Logistics: A European Perspective
PDF
Spiral Of Knowledge - 1965
PDF
Infosec Workforce Development Framework For Thailand
PDF
Design4 services HCDI Seminar Sangiorgi
PDF
5 Ways To Build Asset Centric Applications
PDF
Mm triangle board2
PDF
"Ukraine and Global Sourcing", The Ambassador of Ukraine to the Kingdom of No...
PDF
Resume Draft
PDF
Lobna eltoony.hypoglycemia and weight gain
PDF
Technology use and educational performance
PDF
Cruella challenge 2011 Century Map
PDF
ePortfolios: Documenting Life Long Learning of Professionals to Reflect Pract...
PDF
Moodle 2.0 themes
PDF
Infographic E-commerce in Italy 2011
PDF
Kiss the BRD Good-Bye
PPTX
Valuation of Enterprise Social Media
PDF
Eduserv OpenID Meeting: OpenID Today
PPT
6.09 Develop A Plan And Execute
JayaDigital agency Facebook marketing presentation
U.S. Renewable Energy Market And Growth
Past and Future Development of Logistics: A European Perspective
Spiral Of Knowledge - 1965
Infosec Workforce Development Framework For Thailand
Design4 services HCDI Seminar Sangiorgi
5 Ways To Build Asset Centric Applications
Mm triangle board2
"Ukraine and Global Sourcing", The Ambassador of Ukraine to the Kingdom of No...
Resume Draft
Lobna eltoony.hypoglycemia and weight gain
Technology use and educational performance
Cruella challenge 2011 Century Map
ePortfolios: Documenting Life Long Learning of Professionals to Reflect Pract...
Moodle 2.0 themes
Infographic E-commerce in Italy 2011
Kiss the BRD Good-Bye
Valuation of Enterprise Social Media
Eduserv OpenID Meeting: OpenID Today
6.09 Develop A Plan And Execute
Ad

More from Tata Communications (9)

PPTX
Tata Unified Communications Services
PPTX
Total Network Solutions
PDF
Consider Outsourcing
PDF
Connecting a Continent With 802.16d - The Indian Experience
PPTX
Wireless Infrastructure in India
PPT
IPv6: Early Mover Advantage?
PPT
IPv6: Forecasts and Trends
PPT
Business Transformation and Innovative Business Models
PPT
Broadband on WiMAX: Technology Delivery vs. Market Needs
Tata Unified Communications Services
Total Network Solutions
Consider Outsourcing
Connecting a Continent With 802.16d - The Indian Experience
Wireless Infrastructure in India
IPv6: Early Mover Advantage?
IPv6: Forecasts and Trends
Business Transformation and Innovative Business Models
Broadband on WiMAX: Technology Delivery vs. Market Needs

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPT
What is a Computer? Input Devices /output devices
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
observCloud-Native Containerability and monitoring.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
The various Industrial Revolutions .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Unlock new opportunities with location data.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
Zenith AI: Advanced Artificial Intelligence
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Tartificialntelligence_presentation.pptx
Hindi spoken digit analysis for native and non-native speakers
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
observCloud-Native Containerability and monitoring.pptx
Module 1.ppt Iot fundamentals and Architecture
1 - Historical Antecedents, Social Consideration.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
The various Industrial Revolutions .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Benefits of Physical activity for teenagers.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Unlock new opportunities with location data.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Architecture types and enterprise applications.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
DP Operators-handbook-extract for the Mautical Institute

Cyber Crime and Network Security in India

  • 1. Cyber Crime & Network Security in India CIO Focus Security 2008 Presentation by Adam Rice & AJ Vijayakumar ©2008 Tata Communications, Ltd. All Rights Reserved
  • 2. Explosive Internet Growth and Impacts to Businesses India Internet Usage Stats and Telecommunications Market Report Internet Usage and Population Statistics: Internet use has been a key driver to enhance both Domestic & Global Trade in India Year Users Population % Pen. Usage Source 1998 1,400,000 1,094,870,677 0.1% ITU % Real GDP Growth Rate 1999 2,800,000 1,094,870,677 0.3% ITU 12 10.5 8.3 7.5 2000 5,500,000 1,094,870,677 0.5% ITU 8 5.6 5.5 5.3 5.1 2001 7,000,000 1,094,870,677 0.7% ITU 4.5 4.0 2002 16,500,000 1,094,870,677 1.6% ITU 4 2003 22,500,000 1,094,870,677 2.1% ITU 0 2004 25,000,000 1,094,870,677 2.28% IAMAI g nd na a e a ea an a on di si or si 2005 38,500,000 1,112,225,812 3.46% IAMAI hi or la iw ne In ay ap K ai C K Ta do g al ng Th 2006 50,600,000 1,112,225,812 4.55% CIA on M In Si H 2007 60,000,000 1,129,667,528 5.31% ITU Source: Morgan Stanley Research E-Commerce Media & Entertainment Government Education Online Banking Business Process Outsourcing
  • 3. Defining “Cyber Crime” Webster's New Millennium™ Dictionary of English Entry: Cyber Crime Part of Speech: noun Definition: A crime committed on a computer network, esp. the Internet Example: Identity theft is a Cyber Crime. Spamming Espionage Malware (cont.) DDoS Internet Harassment Downloader Unauthorized access Malware Adware Virus Ransomeware Social Engineering Worm Child Pornography Hacking Trojan Telecom Fraud Phishing Bot Financial Fraud Identity Theft Rootkit Computer Fraud Cyber-stalking Spyware Information warfare Backdoor
  • 4. News/Media Perspective of Cyber Crime in the India Cybercrime Threatens National Security in Cyber Crime On A Roll In India India Posted by Rushabh Chokshi on Date: September 27, 2007 November 2nd, 2007 Source: merinews.com It is The New Age in Cyber Crime, according By: Fahim Ahmedi to latest news cyber criminals are now targeting Enterprises and Consumers based in Tier III cities India is now taking steps to fight against the Cybercrime: A threat to national security cyber crime, Indian police are now being Date: September 17, 2007 trained on how the Internet, e-mail, and other Source: merinews.com computer-based tools can be used by By: Fahim Ahmedi criminals to illegally obtain information stored in databases The ever increasing cyber crime is taking the world by storm. Technology is a boon but it also has dangerous implications if left undetected. Cyberspace is one such area that needs to pull all security strings together before things go out of hand.
  • 5. News/Media Perspective of Cyber Crime in the India Ankit Fadia, a 21-year-old computer whizkid and author of ’The Unofficial Guide to Ethical Hacking’ said “I could hack a state-owned bank’s website or a government communications website which shows the vulnerability, thousands of Indian websites are being hacked each day”.
  • 6. News/Media Perspective of Cyber Crime in the India Cyber crime in India on the decline: Report Posted online: Monday, January 07, 2008 at 12:00:00 Updated: Monday, January 07, 2008 at 10:37:53 New Delhi, January 6: Contrary to popular belief that cyber crime is on the rise, statistics show that the cases of the “new age” crime have declined with the most noticeable difference seen in Gujarat. However, no reasons were attributed in the report for the decline in the registration of cyber crime related cases in Gujarat. A senior official said the decline does not indicate that the incidents of cyber crime in the state had actually decreased. “This is only a statistics based on the number of cases registered,” he added. darkREADING Annual CIS Study: Cost of Cybercrime Is Skyrocketing Average annual loss per company has more than doubled since last year, according to bellwether study September 11, 2007 | 5:55 PM By Tim Wilson Site Editor, Dark Reading
  • 7. Net Neutrality vs. Censorship Clean the Pipes
  • 8. The Threats are Real Global Activity Maps Source: Arbor Networks 2008
  • 9. Internet Service Providers Security Concerns Top Concern Source: Arbor Networks 2007
  • 10. The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs worldwide are The most common infection methods detected by bot infected S21sec include browser exploits (65%), e-mail (Source: BBC 2007 interview with Vint Cerf) attachments (13%), operating system exploits (11%), downloaded Internet files (9%) and other 52,771 new infected PCs daily methods (2%), as illustrated in the figure below. (Source: Symantec 2007) Infection Methods Downloaded Other Rapid growth in tools used by Cyber Files 2% Criminals 9% Victims often do not know that they have OS Exploits been compromised! 11% Easy to use tools with varying levels of Email Browser anonymity offered to cyber criminals Attachments Exploits 13% 65% Source: S21sec
  • 11. The Botnet Problem Starts with Compromised PCs 150 of 600 million online PCs Malcode Additions 2007 worldwide are bot infected Spyware 308 (Source: BBC 2007 interview with Vint Cerf) Rootkit 1,138 52,771 new infected PCs daily Keylogger 1,463 (Source: Symantec 2007) Other 14,907 Password Stealer 22,982 Rapid growth in available tools used by Cyber Criminals! Dialer 23,449 Backdoor 25,997 Victims often do not know that they have been compromised! Downloader 41,389 Virus 48,889 Easy to use tools with varying levels of anonymity offered to cyber Adware 55,873 criminals! Worm 64,173 Trojan 109,246 0 20,000 40,000 60,000 80,000 100,000 120,000 Source: IBM ISS x-Force Trend Report 2007
  • 12. The Botnet Problem – Devastating Impact to Businesses Common Exploits from Botnets Identity Theft Credit card /Email fraud Theft/Fraud in online banking and auctions Theft storage and distribution of login ID/Password, financial data, etc… DDoS (Distributed Denial of Service) 50% of Botnets used for DDoS attacks (Source: S21 sec) Each bot generates 40kbps Small botnets command up to 10,000 bots Large botnets command up to 1 million bots 20+ Gbps DDoS attacks witnessed in 2007 (Source: Arbor Networks Inc. 2007) Spam Each spam bot can send 3 spam emails per second (259,000/day) 94% of all emails is Spam (Google/Postini 2006)
  • 13. There are Solutions in Sight Solutions Commentary Preventing PC compromise Vulnerability assessment, Identity vulnerabilities and enforce a penetration testing, anti-virus, priority based patch management etc… approach to secure PCs from known exploits. Securing against Botnet attacks Employ a Defense in Depth Strategy when Securing your Enterprise! Layer your defenses against network security threats to minimize the impact! Preventing Identity Theft Content filtering services, anti- Combat a variety of Phishing, virus, intrusion detection and Pharming, malware and web/email prevention systems fraud activities that can result in identity theft Preventing DDoS Cloud based and or CPE based Stopping in the cloud within the anti-DDoS services. provider’s network reduces the chance Cloud is recommended. of a last mile bottleneck, which completes the attacker’s work Preventing Spam Cloud-based and or CPE based Stopping in the cloud through a proxy- anti-spam solution based service saves unnecessary bandwidth exhaustion and saves costs
  • 14. Tata Communications Has Taken a Stance Against Cyber Crime!
  • 15. What are Your Next Actions to Securing your Enterprise from Cyber Crime? Assess your Current state to define your Next steps Take a custom self-assessment to determine your next steps Web-based module www.tatacommunications.com/security/assessment Combat Cyber Crime!
  • 16. Thank You www.tatacommunications.com