Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty



Similar documents
Cybercrime: risks, penalties and prevention

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Top tips for improved network security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

September 20, 2013 Senior IT Examiner Gene Lilienthal

Managed Security Services

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

RETHINKING CYBER SECURITY Changing the Business Conversation

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

10 Things Every Web Application Firewall Should Provide Share this ebook

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

How do we Police Cyber Crime?

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Stop DDoS Attacks in Minutes

National Cyber Crime Unit

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

The Information Security Problem

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

EY Cyber Security Hacktics Center of Excellence

CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Annex to the Service Schedule for BTNet (also marketed as Internet Connect UK) - BT Assure DoS

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber Security Metrics Dashboards & Analytics

Cyber Risks and Insurance Solutions Malaysia, November 2013

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

A leadership perspectives white paper

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Agenda , Palo Alto Networks. Confidential and Proprietary.

I ve been breached! Now what?

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Policies and Practices on Network Security of MIIT

How To Cover A Data Breach In The European Market

TLP WHITE. Denial of service attacks: what you need to know

Bridging the gap between COTS tool alerting and raw data analysis

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Malware & Botnets. Botnets

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Internet threats: steps to security for your small business

RETHINK SECURITY FOR UNKNOWN ATTACKS

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Identifying Cyber Risks and How they Impact Your Business

How To Stop A Ddos Attack On A Website From Being Successful

Visualizing Threats: Improved Cyber Security Through Network Visualization

Into the cybersecurity breach

Overview of computer and communications security

Vulnerability Assessment & Compliance

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Stop DDoS Attacks in Minutes

Fighting Advanced Threats

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Security. 26 November 2012 Vol.18 No11

Internet Safety and Security: Strategies for Building an Internet Safety Wall

On-Premises DDoS Mitigation for the Enterprise

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

The Impact of Cybercrime on Business

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Transcription:

Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty

Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions

Cybercrime?

Cybercrime Definition All criminal offences which are committed with the aid of, or targeted at, communication devices in a network. Eg.: the Internet, the telephone line or the mobile network. In information security there are very real threats, and the main threat is crime Cybercrime is just like any other type of crime only with different tactics

Types/techniques of Cyber Crimes Spam Identity Theft Cyber fraud Phishing Extortion Bot/Botnets Malware DoS/DDoS Etc.

Emergency Response The public have grown used to stories about identity theft, hacking, stolen data and they re no longer shocked into action when they hear about it. Familiarity breeds contempt which is good news for criminals because the public stops being on its collective guard. But what if there was a way of a network being able to predict the next attack, a network that could detect even the smallest of threats and self-correct to avoid an attack?

How big is the problem, and who are the perpetrators From notoriety to ecrime Originally hackers and script kiddies seeking headlines and notoriety Now moved to extortion and organised crime (Russian mafia and highly organised criminal gangs) - Botnets for hire Revenue from ecrime greater than narcotics ecrime difficult to investigate

Cyber Crime is the new-age mafia, it is even bigger than the illegal drugs industry.

Feel the pain Do you want to be in the news?

What s all the fuss about DOS Attacks?

Distributed Denial of Service Attacks What and How? DOS is the deliberate denial of a service or services. DOS is not an attempt to penetrate systems, to steal or alter data. The attacker seeks to render a system inoperative, while keeping his identity secret. DDOS is a DOS attack launched from multiple sources. Launching an attack from multiple sources increases the potency of the attack and makes the task of tracing the source more difficult. Source: DTI Information Security Breaches Survey 2006 full survey results

Who is the target? Question: Who is a DOS target?. Answer: Any connected addressable device. Some targets are more likely, Governments, organisations, prominent companies, controversial companies or researchers, sporting bodies etc. But in essence anybody can fall victim. Question: Are there any specific sectors at risk? Answer: Online businesses retail, gambling, government, ISP s Banking, Utilities and Business to business Question: Are there any Compelling Events? Answer: Organisations might be targeted on particular events Big events e.g. gambling site when it s the Grand National. Rebellions against Government web sites Question: What happens? Answer: Ultimately bring the web site down which results in lost revenue, loss of goodwill i.e. customers can t get on the site. Impact third party organisations e.g. B2B sites

What is the solution?

BT DDOS Solution Its an integrated offer with BTnet: The service is delivered via BTnet, with integration traffic inspection Detection & Mitigation Solution A system of detectors across BTNet monitors the internet traffic directed at a website to identify traffic surges and unusual patterns of activity which could signify a DDoS attack. When an attack is identified, the traffic is diverted through a mitigation device which filters out attack traffic and allows genuine traffic to continue on to your site. Key factors in BT s detection and scrubbing solution include: monitoring of all traffic destined for your whole network, regardless of where it has come from. a unique profile of expected traffic for each client. automated responses. cleansing and removal of bad traffic. Customer portal showing intelligence reports. Quick Time to React 10 minutes V 30 minutes The BT Management Portal ensures that your entire internet accessible infrastructure is safe, 24/365. Our time window between spotting and reacting to suspicious activity is 10 minutes -considerably faster than the normal 30 minutes.

BT DDoS Solution in Action Monitor Customer Web site BT Core IP Network Peering Point BTNet Peering Point INTERNET Attack Traffic Cleansed Traffic TMS

BT DDOS Solution.contd. Superior Solution: Quicker Response Time 10 minutes V 30 minutes industry norm Minimal Network Latency BT already has extensive experience, in protecting our clients from all forms of security attacks: BT denies 14 million unauthorized connection attempts each day, prevents two million viruses per month and blocks five million spam messages each day. BT hosts and protects over 1,000 websites and over 1,500 firewalls for customers, many of which are mission critical to our client organizations.

What s in it for the customers? More cost-effective alternative to DIY measures This enables you to protect your organisation s brand and revenue while maximising investment in your online infrastructure. Network based services. No equipment is sited at your premises, for easier maintenance. A fast reaction time, with minimal false positives. Mitigation of high-volume traffic and application layer attacks, for a strong, multi-layered defence. Expertise and resources which adapt your security to match ever-evolving threats. Dedicated 24/365 monitoring Individual customer log-ins to the portal, for secure and confidential use. Single or multiple IP address ranges monitored, for equal protection across all your network zones. Online customer reports to monitor and assess your transactions. Alert thresholds defined by you to meet your needs.

Questions?