Cyber Security : Indian perspective

Cyber Security : Indian perspective 8 Feb 2009 Dr. Gulshan Rai Director, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 ...
Author: Owen Mason
7 downloads 2 Views 2MB Size
Cyber Security : Indian perspective 8 Feb 2009

Dr. Gulshan Rai Director, CERT-IN Govt. of India [email protected]

Web Evolution Web Sites (WWW) 1993

Web Invented and implemented 130 Nos. web sites

1994

2738 Nos.

1995

23500 Nos.

2007

550 Million Nos.

2008

850 Million Nos.

Internet Infrastructure in INDIA

3

Innovation fostering the Growth of NGNs • Smart devices – – – –

Television Computers PDA Mobile Phone (Single device to provide an end-to-end, seamlessly secure access)

• Application Simplicity – Preference of single, simple and secure interface to access applications or content – Ubiquitous interface - web browser

• Flexible Infrastructure Because of these areas of evolution, today’s NGNs are defined more by the services they support than by traditional demarcation of Physical Infrastructure.

The Emergence of NGNs • The communication network operating two years ago are father’s telecommunication Network. • NGNs are teenager’s Network. • No longer consumer and business accept the limitation of single-use device or network. • Both individuals and Business want the ability to communicate, work and be entertained over any device, any time, anywhere. • The demand of these services coupled with innovation in technology is advancing traditional telecommunication far outside its original purpose.

The Complexity of Today’s Network Changes Brought in IT • Large network as backbone for connectivity across the country • Multiple Service providers for providing links – BSNL, MTNL, Reliance, TATA, Rail Tel • Multiple Technologies to support network infrastructure CDMA, VSAT, DSL • Multiple Applications

Trends shaping the future • Ubiquitous computing, networking and mobility • Embedded Computing • Security • IPv6 • VoIP

Perimeter Network

Intranet

Laptops Extranet Servers Servers

Unmanaged Devices

New PC

Router

Router

Router

Internet Network `

`

`

Infrastructure

Desktops

Branch Offices

Branch Offices Perimeter Network Servers

`

Router

`

Router

Internet Unmanaged Devices Router Unmanaged Device

`

Home Users Remote Workers

6

`

Challenges for Network Operator • Business challenges include new Pricing Structure, new relationship and new competitors. • Technical challenges include migrating and integrating with new advances in technologies from fibre optics, installation of Wi-Fi support. • Developing a comprehensive Security Policy and architecture in support of NGN services.

To Reap Benefits • To reap benefits of NGN, the operator must address – – – –

Technology Risk Security Efficiency

NGN Architecture Identify Layer Compromises of end users owned by a telecom or a third-party service provider accessing services using devices like PC, PDA or mobile phone, to connect to the Internet

Partly Trusted

Third-Party Application

Untrusted

Internet

Service Layer Web Tier

Hosts service applications and provides a framework for the creation of customer-focused services provided by either operator or a third-party service provider

Network Layer Performs service execution, service management, network management and media control functions

Service Provider Application

Service Delivery Platform

Service Delivery Platform (Service Provider )

Common Framework

Connects with the backbone network

Backbone Network

Growing Concern • Computing Technology has turned against us • Exponential growth in security incidents – Pentagon, US in 2007 – Estonia in April 2007 – Computer System of German Chancellory and three Ministries – Highly classified computer network in New Zealand & Australia • Complex and target oriented software • Common computing technologies and systems • Constant probing and mapping of network systems 10

Cyber Threat Evolution

Malicious Code (Melissa)

Virus

Advanced Worm / Trojan (I LOVE YOU)

Breaking Web Sites

1977

1995

Identity Theft (Phishing)

2000

2003-04

Organised Crime Data Theft, DoS / DDoS

2005-06

2007-08

Cyber attacks being observed • • • • • • •

Web defacement Spam Spoofing Proxy Scan Denial of Service Distributed Denial of Service Malicious Codes – Virus – Bots

• Data Theft and Data Manipulation – Identity Theft – Financial Frauds

• Social engineering Scams

Security Incidents reported during 2008

13

Trends of Incidents • Sophisticated attacks – Attackers are refining their methods and consolidating assets to create global networks that support coordinated criminal activity

• Rise of Cyber Spying and Targeted attacks – Mapping of network, probing for weakness/vulnerabilities

• Malware propagation through Website intrusion – Large scale SQL Injection attacks like Asprox Botnet

• Malware propagation through Spam on the rise – Storm worm, which is one of the most notorious malware programs seen during 2007-08, circulates through spam

Trends of Incidents • Phishing – Increase in cases of fast-flux phishing and rock-phish – Domain name phishing and Registrar impersonation

• Crimeware – Targeting personal information for financial frauds

• Information Stealing through social networking sites • Rise in Attack toolkits – Toolkits like Mpack and Neospolit can launch exploits for browser and client-side vulnerabilities against users who visit a malicious or compromised sites

Global Attack Trend

Source: Websense

Top originating countries – Malicious code

17

Three faces of cyber crime

• Organised Crime • Terrorist Groups • Nation States

18

Security of Information Assets • Security of information & information assets is becoming a major area of concern • With every new application, newer vulnerabilities crop up, posing immense challenges to those who are mandated to protect the IT assets • Coupled with this host of legal requirements and international business compliance requirements on data protection and privacy place a huge demand on IT/ITES/BPO service organizations • We need to generate ‘Trust & Confidence’

Challenges before the Industry

Model Followed Internationally • Internationally, the general approach has been to have legal drivers supported by suitable verification mechanism. • For example, in USA Legal drivers have been – – – –

SOX HIPPA GLBA FISMA etc.

• In Europe, the legal driver has been the “Data Protection Act” supported by ISO27001 ISMS.

Information Security Management INFORMATION SECURITY

Confidentiality

Integrity

People

Process

Technology

Availability

Authenticity

Security Policy Regulatory Compliance User Awareness Program Access Control Security Audit Incident Response Encryption, PKI Firewall, IPS/IDS Antivirus

22

Cyber Security Strategy – India •

Security Policy, Compliance and Assurance – Legal Framework – – – –



Security Incident – Early Warning & Response – CERT-In National Cyber Alert System –





Domain Specific training – Cyber Forensics

Research and Development – – –



Skill & Competence development Training of law enforcement agencies and judicial officials in the collection and analysis of digital evidence Training in the area of implementing information security in collaboration with Specialised Organisations in US

Setting up Digital Forensics Centres –



Information Exchange with international CERTs

Capacity building – –



IT Act, 2000 IT (Amendment) Bill, 2006 – Data Protection & Computer crimes Best Practice ISO 27001 Security Assurance Framework- IT/ITES/BPO Companies

Network Monitoring Biometric Authentication Network Security

International Collaboration

Status of security and quality compliance in India • Quality and Security – Large number of companies in India have aligned their internal process and practices to international standards such as • ISO 9000 • CMM • Six Sigma • Total Quality Management – Some Indian companies have won special recognition for excellence in quality out of 18 Deming Prize winners for Total Quality Management in the last five years, six are Indian companies.

ISO 27001/BS7799 Information Security Management • Government has mandated implementation of ISO27001 ISMS by all critical sectors • ISMS 27001 has mainly three components – Technology – Process – Incident reporting and monitoring

• 296 certificates issued in India out of 7735 certificates issued worldwide • Majority of certificates issued in India belong to IT/ITES/BPO sector

Information Technology – Security Techniques Information Security Management System World

China

Italy

Japan

Spain

India

USA

ISO 9000 951486 (175 counties)

210773

115309

73176

65112

46091

36192

27001

146

148

276

93

296

94

7732

CERT-In Work Process Analysis

Detection

Dissemination & Support

Department Department of of Information Information Technology Technology

ISP Hot Liners

Major ISPs

Private Sectors

Foreign Ptns

Home Users Analysis

Detect

Dissemination

Recovery

Press & TV / Radio

Distributed Honeypot Deployment

PC & End User Security: Auto Security Patch Update Windows Security Patch Auto Update

Microsoft Download Ctr.

Internet

ActiveX DL Server

No. of Download ActiveX: 18 Million

Sec. Patch ActiveX Site

PC & End User Security Incident Response Help Desk

Internet

PSTN

• • • • •

Make a call using 1800 – 11 - 4949 Send fax using 1800 – 11 - 6969 Communicate through email at [email protected] Number of security incidents handled during 2008 (till Oct): 1425 Vulnerability Assessment Service

Int’l Co-op: Cyber Security Drill Joint International Incident Handling Coordination Drill

• Participated APCERT International Incident Handling Drill 2006 • Participants: 13 APCERT Members and New Zealand, Vietnam including 5 major Korean ISPs • Scenario: Countermeasure against Malicious Code and relevant infringement as DDoS attack

• Participated APCERT International Incident Handling Drill 2007 • Participants: 13 APCERT Members + Korean ISPs • Scenario: DDoS and Malicious Code Injection • To be Model: World Wide Cyber Security Incidents Drill among security agencies

Thank you Incident Response Help Desk Phone: 1800 11 4949 FAX:

1800 11 6969

e-mail: incident at cert-in.org.in http://www.cert-in.org.in