Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations.



Similar documents
Security in the Network Infrastructure - DNS, DDoS,, etc.

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Promoting a cyber security culture and demand compliance with minimum security standards;

Research Topics in the National Cyber Security Research Agenda

Data Security & Privacy

The FBI and the Internet

Cyber Security and Control System Survivability:

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Internet Safety and Security: Strategies for Building an Internet Safety Wall


Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

2012 Bit9 Cyber Security Research Report

Certified Cyber Security Analyst VS-1160

Ed Ferrara, MSIA, CISSP Fox School of Business

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Network/Internet Forensic and Intrusion Log Analysis

Network Security and the Small Business

Security A to Z the most important terms

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Managed Security Services

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, Unclassified

locuz.com Professional Services Security Audit Services

Cyber Security and Critical Information Infrastructure

The UK cyber security strategy: Landscape review. Cross-government

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Network Incident Report

How To Protect Your Network From Attack From A Hacker On A University Server

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Investigating Computer Crime. Professor Carsten Maple University of Bedfordshire 8th February 2013

Information Security Summit 2005

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

Security and Privacy

Fostering Incident Response and Digital Forensics Research

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Current Threat Scenario and Recent Attack Trends

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

Detailed Description about course module wise:

Ethical Hacking Course Layout

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

FORBIDDEN - Ethical Hacking Workshop Duration

Technology Crime Services

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Course Content: Session 1. Ethics & Hacking

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

What s Hot and What s Not in the World of Cyber Security and Cyber Crime

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Executive Cyber Security Training. One Day Training Course

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

SECURING INFORMATION SYSTEMS

CYBERTRON NETWORK SOLUTIONS

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

URBAN SECURITY & POLICING

COB 302 Management Information System (Lesson 8)

Defending Against Data Beaches: Internal Controls for Cybersecurity

The Hillstone and Trend Micro Joint Solution

INTERPOL. Executive Summary

Keyword: Cloud computing, service model, deployment model, network layer security.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

The Information Security Problem

How To Protect Yourself From Cyber Crime

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Unit title: Cyber Security Fundamentals (SCQF level 4)

CYBERCRIME AND THE LAW

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

RMAR Technologies Pvt. Ltd.

Opportunities in Indian IT Security Market

D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

FSP-201: Ethical Hacking & IT Security

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cybersecurity Strategic Talent Management. March, 2012

DNS Firewall Overview Speaker Name. Date

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

STRATEGIC POLICING REQUIREMENT

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Transcription:

Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations. The exponential increase in Cyber Crimes, the rapid advancement in technology, the total absence of any boundaries and the anonymity of cyber criminal, all pose a major challenge in cyber crime investigation. Technology gets obsolete within no time and so constant updating is needed for effectively combating cyber crimes. To tide over these new challenges in Cyber Security and for adept handling of the emerging Cyber Crimes, Kerala Police has made a road map to establish, a unique and first of its Kind initiative, called Kerala Police CyberDome - A High Tech Public Private Partnership Centre for Cyber Security and handling of Cyber Crimes. The Government has accorded sanction for the establishment of CyberDome and it is going to come up in Techno park, where the space is under development. The Cyber Dome also envisages an online office of Technical experts/ethical Hackers/ Cyber professionals, who can assist the police in the area of Cyber Security and Cyber Crime Investigation. This online office would contain a group of specially selected experts who will give assistance/ suggestions to the police to tackle the various cyber policing issues cropping up in the cyber world. Hence we are pleased to call for nominations from Cyber Security Experts/ Ethical Hackers/Cyber Professionals to be nominated as Cyber Dome Officers. All nominations will be scrutinized and based on their professional competency, unblemished background and domain knowledge they will be placed as online officers of CyberDome. They will be given ID Cards/Stars/ Ranks based on their contributions to the cyberdome project. It is reiterated that Cyber dome is a contributory project and so the volunteers are not entitled to any payments whatsoever, now or in the future. Hence persons who have a

sense of social responsibility only need to apply. Also persons who are already employed and well settled are preferred. All interested persons may kindly contact us with their full CV and their area of expertise and how they can contribute to Cyberdome, on the mail ID cyberdome2015@gmail.com Secondly we also call for nominations from interested Software companies who want to enter into a mutual agreement with CyberDome to develop Policing softwares. The Industry software companies will have to provide their technical experts to assist the police in various fields of crime monitoring, policing the web, assistance in the investigation of cyber crimes, development of new software for police and a host of other areas. If the software companies are willing to support the Police, as a Company itself, in specific tasks, without any financial costs to the department, then the department can sign separate agreements for specific tasks also. For example- If a company agrees to design a new software for the department, then they can align with the police and do so, free of cost for the department. The company will be free to sell the software to other police forces in the country or outside. Any other models where the software companies can come and tie up with the Police is also welcome, in the interest of Cyber Security. Details and ideas on all the above can be sent to cyberdome2015@gmail.com - Apart from the points mentioned above, the Centre will perform the following primary activities, in nutshell for the overall cyber Security of the State 1. Internet Monitoring 2. Virtual Policing 3. Social Media in Virtual Policing 4. Automated threat intelligence in near real-time 5. Cyber Forensics 6. Tweetalongs 7.Facebook Quiz 8. Virtual Courts 9. Tracking System for Protecting Children 10. Criminal Apprehension Software 11. Safe Surfing Online Web App 12. Fugitives at your

fingertips Software 13. Child ID App 14. Fingerprint Capture Application 15 Guardian Web Application 16 Image Analysis Software 17 Victim identification: 18 Online Network Investigation Application 19 Access Blocking Application 20 Stolen/Lost Travel Documents (SLTD) Database 21 Stolen Vehicle Database 22 Money Laundering Automated Search Service 23 Cyber Security Advisory. Hence if any individual or Software company is ready to associate with Kerala Police in the above mentioned areas, then kindly get in touch with us on the email ID, cyberdome2015@gmail.com It may please be remembered that CyberDome is a model of public- police cooperation for cyber security and may not be taken as a commercial entity. in the cyber world. Cyberdome can be built and developed with the support of the citizens for ensuring a Cyber Secure world. Hence we request your whole hearted support for this venture. Manoj Abraham IPS Inspector General of Police

Kerala Police E Governance in Police? E governance, in police, is the application of (ICT) for delivering dli i btt better Policing i services to the community. www.keralapolice.org 1

Attacks are increasingly easy to conduct Drivers: fear and impact Email propagation of malicious code Stealth /advanced scanning techniques Widespread attacks using NNTP to distribute attack Widespread attacks on DNS infrastructure DDoS attacks Increase in worms Sophisticated command and control 2008 Skill level nee eded by attackers Executable code attacks (against browsers) Anti-forensic techniques Automated widespread attacks Home users targeted GUI intruder tools Hijacking sessions Internet social engineering attacks 1990 Packet spoofing Automated probes/scans Widespread denial-of-service attacks Techniques to analyze code for vulnerabilities without source code Distributed attack tools Increase in wide-scale Trojan horse distribution Windows-based remote controllable Trojans (Back Orifice) Attac ck sophistication Source: SE/CERT CC The three major broad areas of concern are. Cyber Warfare Cyber Espionage Cyber Crime www.keralapolice.org 2

Major Bottlenecks we face. Highly technical International Nature Rapidly changing.. Cumbersome procedures Non cooperation Slow pace of law enforcement Anonymity Cyber Dome A Public- Private Collaborative effort for Cyber Security January 2003 www.keralapolice.org 3

Objectives Serve as Cyber Security Hub for Public- private participation in Cyber Security. Conduct and Foster Cyber Security Research Serve as a High Tech Resource Centre in Cyber Ci Crime Investigation Provide Cyber Security Training to Private and Public Sector Where? Cyber Dome is coming at Techno Parkwhere it will be a physical meeting point for law enforcement and players from the industry www.keralapolice.org 4

Modalities.. The hardware will be primarily be procured by the Police department and the establishment costs of the centre is envisaged on a private- public shared basis. The Industry software companies will be asked to provide their technical experts to assist the police in various fields of crime monitoring, policing the web, assistance in the investigation of cyber crimes, development of new software for police and a host of other areas. Functions/ Tasks.. -To develop Police related software and applications in Crime prevention and detection - Police will provide the domain knowledge and the private sector will have to provide the technical expertise for the same on the plank of Corporate Social responsibility www.keralapolice.org 5

Research and Development Centre.. If the software companies are willing to support the Police, as a Company itself, in specific tasks, without any financial costs to the department, then the department can sign separate agreements for specific tasks also. For example- If a company agrees to design a new software for the department, then they can align with the police and do so, free of cost for the department. The company will be free to sell the software to other police forces in the country or outside. Internet Monitoring www.keralapolice.org 6

Social Networking for Awareness. www.keralapolice.org 7

Delhi Rape case Agitation Recent Communal riots in UP These points towards the reach and scope of Social media today and the need to monitor them Child Pornography. www.keralapolice.org 8

Tracking System for Protecting Children Safe Surfing Online Web App www.keralapolice.org 9

www.keralapolice.org 10

Automated crime intelligence in near real time Money Laundering Automated Search Service www.keralapolice.org 11

Anti Piracy on the Net Also we propose to include. Criminal Apprehension Software Stolen Vehicle Database Cyber Security Advisory Cyber Security Training www.keralapolice.org 12

Which are mutually beneficial Need is of Global Networking. www.keralapolice.org 13

Networking between Government Departments for information sharing is crucial Networking Between Law Enforcement Agencies around the country and around the world Networking between IT industry and the Police. So Kindly partner us in making a. Cyber Secure World www.keralapolice.org 14

Kerala Police won the Asia-Pacific Information Security Leadership Achievements (ISLA) Award 2013 Nulcon Black Shield Award 2014 www.keralapolice.org 15

www.keralapolice.org Manoj Abraham IPS Inspector General of Police Kerala, India manojabraham05@gmail.com 91-9497998993 www.keralapolice.org 16