2. Overview
What is Cyber Security?
RBI Framework
Security Layers
Security Threats
Security Measures
Dos and Don'ts
Conclusion
3. What is Cyber Security?
Computer security, cybersecurity or information technology
security is the protection of computer systems and networks
from information disclosure, theft of or damage to their
hardware, software, or electronic data
4. Security Myths
Myths -Firewalls make your data secure. Encryption makes
your data secure. Hackers cause most security breaches.
In fact, 80% of data loss is caused by insiders. In fact,
encryption is only one approach to securing data. Security
also requires access control, data integrity, system
availability, and auditing.
In fact, 40% of Internet break-ins occur in spite of a firewall
being in place!!!!
5. Security Triad
Ensuring that data is
protected from
unauthorized access
Ensuring
that data
can be
modified
only by
appropriate
mechanisms
The degree to which authorized
users can access information for
legitimate purposes
6. Points of Concerns in Banking
• Letting vendors define “good security”
• Underestimating the required security expertise
•Lack of operational Security
• Assigning untrained people to maintain security
• Relying primarily on a firewall.
• Firstly think of budget concerns, neglecting the value of their
information
and organizational reputations.
• Authorizing reactive, short-term fixes so problems re-emerge
rapidly
7. - Risk: A possibility that a threat exploits a vulnerability in an asset and causes damage
or loss to the asset
– Threat: Something that can potentially cause damage to the organization, IT Systems
or network.
– Vulnerability: A weakness in the organization, IT Systems, or network that can be
exploited by a threat
Defining the risks , threats and vulnerabilities
10. Physical Security
Physical Security is the fundamental layer of security.
Physical security describes measures that are designed to prevent
unauthorized physical access to data, equipment, resources and
personal and protect the same from physical damage or harm.
This includes protection from natural and man-made disasters
which includes fires, floods, theft accidents etc.
Physical Security is often overlooked because of more technical
logical breaches.
12. Physical Security
Preventing physical security breach is the prime concern of the administrators.
Following are the devices that are associated with the Physical Security of the
premises.
1. Boom Barrier
2. CCTV
3. Visitor Management System (VMS)
4. RFID
5. Biometric Scanners
6. Digital Locks
14. Passwords
Use Strong Passwords using combination of Uppercase Lower Case
Numerical and Special Characters
Never use pets name, birthdates, telephone nos, names, dictionary words
etc
Never share a password – don’t store a password on internet or on local
computer
Good Password – S@{h!n~ -
Make it something you can visualize. It’s easier to remember that way
The more personal the better. “mY5orit3$hirt’sR3d” (my favorite shirt is
red)
15. PROTECTING DATA AND ASSETS
–Branches Perspective
• Secure your Documents and DATA
• Restrict USB Access on All Computers at Branches
• Use Your E mails Securely
• Report Any Unusual Instances to Head Office.
• Use Strong Passwords
• Never Share the Password
• Lock your computer before you leave your Desk
• Update your Antivirus Regularly – In case the Software is not getting Updated
inform IT Department
• Lock your Cabin after leaving premise.
• Keep an Eye on suspicious behavior of others at work.
16. Symptoms of being infected with a virus !
1. You see unexpected messages or images.
2. You hear unexpected sounds, played at random.
3. Programs start unexpectedly.
4. Your personal firewall tells you that an application has tried to
connect to the Internet (and it’s not a program that you ran).
5. Your friends tell you that they have received e-mail messages from
your address and you haven’t sent them anything.
6. Your computer ‘freezes’ frequently, or programs start running
slowly.
7. You get lots of system error messages.
8. The operating system will not load when you start your computer.
9. You notice that files or folders have been deleted or changed.
10.You notice hard disk access (shown by one of the small flashing
lights) when you’re not aware of any programs running.
11.Your web browser behaves erratically, e.g. you can’t close a
browser window.
17. Just in case if you are infected…
• Disconnect the infected computer from the Internet.
• Isolate the machine. Nothing comes in nothing goes out.
• Update anti-virus signatures (Don’t use the compromised
machine)
• Start the computer in safe mode and perform extensive
scanning
• Use anti-virus program for removing the malicious program.
• If automated removal doesn’t yield result, closely observe the
behavior of your computer.
• Make a note of all the programs which start automatically
when the computer boots up.
• Search for suspicious entries. Delete the registry entries which
correspond to suspicious entries.
• Use tools like curr ports or command like netstat to monitor
opened TCP/IP and UDP ports on the local computer.
• Terminate the processes which seems to be suspicious.
• For damage beyond repair… Reinstall OS and be vigilant !
18. Types f Attacks
DoS and DDoS
it is aimed at preventing authorized, legitimate users from accessing
services on the network. A DoS attack can be initiated by sending invalid
data to applications or network services until the server hangs or simply
crashes. The most common form of a DoS attack is TCP attacks.
A network attacker can increase the enormity of a DoS attack by initiating
the attack against a single network from multiple computers or systems.
This type of attack is known as a distributed denial of service (DDoS)
attack. Network administrators can experience great difficulty in fending
off DDoS attacks, simply because blocking all the attacking computers,
can also result in blocking authorized users.
20. MAN IN THE MIDDLE
MITM
It occurs when a cracker eavesdrops on a secure communication
session and monitors, captures and controls the data being sent
between the two parties communicating. The attacker attempts
to obtain information so that he/she can impersonate the
receiver and sender.
23. MPLS
Internet
MPLS
Internet
Mobile 4G
Mobile Banking
Branch Computer
Firewall
Firewall
Attacker
Attacker
Attacker
Attacker
Server Server
Man in the Middle
DLP
Phishing
Vishing
Virus Malware
Trojan
Rouge Software
Network Intrusion
Credential Hack
Software Flaw
Network Sniffing
Credential Hack
Network Attack
DOS
DDOS
Port Scan and
penetration
Misconfigured Network
Wrong Routing Tables
Carrier Side Wire Tapping
24. SSL- HTTPS
• A PAD LOCK Represents SSL – Secure Socket Layer
• The Technology Ensures that the communication between the webserver and the Client is
Encrypted.
• The Technology Ensures that the website is 100 %Genuine
• The Technology protects the Confidential Data entered by the consumer , even the internet
service provider does not know about it.
• Its Save and protects from Man in the Middle.
31. Security Measures
Security Awareness
Encryption
Strong Passwords
Up to date Antivirus
Next Gen Firewall / UTM
Mobile Device Management
Network Monitoring
Policy Framework
32. Encryption
Cryptography
The field of study related to encoded information (comes from
Greek word for "secret writing")
Encryption
The process of converting plaintext into cipher text
Decryption
The process of converting cipher text into plaintext
35. Policy Framework
Policy frame work ensures the integrity and
security with in the organization
Frameworks such as ISO 27001, BSI,
PCIDSS,PADSS etc. ensure and standardize
security practices.
It reduces the chances of loopholes in the
infrastructure.
Policy and Procedures helps the organization to
mitigate with the security threats.
36. Conclusion
Conduct Security Awareness Programs, Educate Employees.
Secure the premises
Deploy Antivirus software
Deploy Firewall/UTM
Deploy Network Monitoring Tools
Deploy Security Frame Work
Secure Identity and Personal Information.
Get the It systems audited for extra loopholes and vulnerabilities.