1 / 29

Infrastructure issues for Cyber Security & Terrorism

This article discusses the challenges in ensuring cyber security and countering terrorism in the context of infrastructure. It explores the economic integration, new technologies, and global laws that impact cybersecurity. The article also highlights the need for adapting to the evolving threats and protecting critical information infrastructures.

brunell
Download Presentation

Infrastructure issues for Cyber Security & Terrorism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Infrastructure issues for Cyber Security & Terrorism By Prof N K GOYAL President, CMAI Association of India Communications Multimedia And Infrastructure Founder Member, Chairman Emeritus, Telecom Equipment Manufacturing Association of India, TEMA Vice Chairman, ITU APT India, Chairman CTIA Member Governing Council Telecom Equipment & Services Export Promotion Council (TEPC)(GOI) Chairman, ITPS, Dubai Former Director, NFL, Government of India at Manthan Cyber Suraksha National Conference 19th July, 2018 Raipur Chhatisgarh, India www.cmai.asia +91 98 111 29879 nkgoyals@yahoo.co.in

  2. AGENDA • CMAI Association • World’s Biggest wonder • Economic Integration • New Technologies • UK European Laws • Countries local technologies • Cyber in ancient times www.cmai.asia

  3. CES, 2009 being inaugurated and ribbon cutting at Las Vegas on 8th January, 2009 by NK Goyal with Sir Howard Stringer, Chairman & CEO of Sony Corporation, Mr. Tom Hanks, the American movie star, Mr.Gary Yacoubian, Chairman CEA & President of Myer-Emco AudioVideo, Mr. Gary Saprio, Vice President of CEA, Ms. Qu., Presixdent, CECC China, Mr. Patrick Lavelle, President and CEO of Audiovox, Mr. Peter Lesser, President and CEO of X-10 (USA) Inc, Mr. Loyd Ivey, Chairman and CEO of MiTek Electronics and Communications, Mr. Jay McLellan, President and CEO of Home Automation, Inc. (HAI), Mr. Mike Mohr, President of Celluphone, Mr.Grant Russell, President of Kleen Concepts 

  4. CMAI Association of India Communications Multimedia & Infrastructure • Professional trade body across ICT sector covering communications, electronics, multimedia, IT, VAS, telecom operators, infrastructure, civil aviations, alternate energy, hardware and software etc. • More than 54 MOUs across the globe. • Participation and organization of international and national Exhibitions, trade shows and seminars. • Assist for strategic operations, trade, businesses and manufacturing • Special emphasis and promotion of environmental friendly policies and to cultivate generally good values in public and general awareness and protection • Developing scientific knowledge and practical means for protecting man and his environment from the harmful effects of environmental hazards like e waste, radiation etc.

  5. World’s Biggest Wonder • We all know death..but think it will not meet us and never plan death strategy. • Likewise most of people and Companies don’t see themselves as attractive targets for hackers. And never plan strategy to handle it. • We never accept that we have been breached. We learn this suddenly when data is lost of Police arrives our door in search of ,someone who we may not now.

  6. Modern Technology v/s Cyber Risks • Modern societies have a growing dependency on information and communication technologies that are globally interconnected. • Based on open architecture ..enter ay one any side • The interconnectivity also creates interdependencies and risks that need to be managed at the national, regional and international levels. • Enhancing cyber security and protecting critical information infrastructures is essential to each nation's security and economic well-being.

  7. Economic Integration beyond National territories • Global economic integration creates new kinds of risks for national security. Foreign ownership of telecommunications services is one such risk. • In the earlier territorial concept of security, borders were clearly demarcated, industries were national, and key services were state-owned or provided by national firms. This made the management of security tasks (Such as communications interception) easier for national authorities.

  8. Economic Integration beyond National territories….cont. • However, the economic underpinnings of this territorial approach have been eroded. • Agreements on international trade and finance, buttressed by technological developments, made it easier for nationals of one country to own and invest in companies and provide services in another country. • International agreements to remove regulatory obstacles for foreign ownership, combined with national economic policies that privatize and deregulate key services are increasing the integration of national economies.

  9. New Technologies New Threats • Information security breaches/spamming/ attackers/internal misuse. • Customer Data Threats, identity thefts- Secondary use of personal data by the companies • Keeping pace with every day new technologies. Planned lobby of global technical experts for dream technologies with several not achievable hypes and promises. • With Globalization comes threat from across the borders to protect the systems • Network security issues for operators and citizens • Modern era economic war gaining more important than physical war. • Entire Country can be brought to standstill and virtually collapsed…airports, railways, power generation, modern day war machines

  10. New Technologies New Threats…cont. • Basic decision required should we forget National security to avail latest technologies. Where will be we, if National security is compromised? • This calls for better security and Internet Governance • 26/11 communication issues. • Wifi used for terror emails for Delhi blasts in September, 2008 traced to residence in Chembur, Mumbai, and Prior to Ahmedabad blasts in July, 2008 traced to the residence of US national Kenneth Haywood in Navi Mumbai. • Technology is also being very widely used in all sorts of crime ranging from credit card fraud to data theft to simple defamation. • Regulatory requirement need of time to avoid unsecured wireless networks as also National security requirements.

  11. Cyber security economics……..Dispiriting realization Current economic incentives favor cyber attackers • Cyber attacks are comparatively cheap and easy to execute. • The profits that can be generated from cyber attacks are enormous. • Because of the typically long distance physical proximity, there is very little risk of being caught or suffering retaliation. • The cyber defensive perimeter is nearly limitless. • Losses are difficult to assess. • Defense is costly and often does not generate perceived adequate return on investment.

  12. Mobile New Threats • Cell phone more a voice phone but internet, smart with all one can conceive. • New technologies Blackberry, VOIP, Skype, Goggle Voice, Satellite Phones, what's app voice, telegram voice etc • Cell phones without IMEI numbers or duplicate IMEI numbers. • No central mechanism to prohibit stolen phones being used • Multiple phones at same address without knowledge of customer

  13. Laws in UK • All messages sent and received by members of the Foreign & Commonwealth Office and its missions overseas may be automatically logged, monitored and/or recorded in accordance with the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000. • Govt. keep and use information in line with the Data Protection Act 1998. Govt. may release this personal information to other UK government departments and public authorities.

  14. European Laws • European Union tightening legal loophole in current lawful intercept laws so that European law enforcement can listen in on phone calls traveling over the Internet. • This due to problems Italian authorities are facing criminals using both VoIP and Skype to frustrate investigators.

  15. World promoting for specific technologies • CDMA • GSMA • TDSCDMA • TD LTE • India……? Cordect, CDOT, RAX GPON, NGN…..? We can make 3G/4G/5G…market access?

  16. China Technical Growth Factors • Companies establishes cooperative R&D labs with universities and research institutes to back up their business development, which provides affluent fund for universities and research institutes to purchase test equipment. • Besides telecom, the defense and aerospace sectors have become the hubs of activity for test equipment vendors. • The deteriorating security environment and intensified focus on homeland security have accelerated spending on the aerospace, military, and defense segments. • The Government is intensifying efforts to modernize its armed forces and the deployment of high-tech weaponry unlocks a host of opportunities • China's space programs have provided a huge fillip to the aerospace segment.

  17. China Support to TDSCDMA MIIT on 22.1.2009 announced following measures for development of TD-SCDMA: • Earmarking funds specifically for TD-SCDMA development • Allowed access to existing Government funds for the Electronics and Hi-tech Industries. • Govt. aimed to favor TD-SCDMA technology over alternatives in Govt. procurements and encouraged the use of the standard in e-government, wireless city, rural informatization and e-business projects. • The approval process for TD-SCDMA projects was accelerated

  18. China Support to TDSCDMA…contd. • The Govt. supported TD-SCDMA network construction through measures such as ensuring good locations and power supplies for base stations • MIIT prioritized the granting of network access licenses to TD-SCDMA handsets and provide specialists to support TD-SCDMA terminal manufacturers. • Owners of networks that refuse to share infrastructure with the TD-SCDMA network where it is deemed necessary faced punishment. • Government made 25 standards in 2009 for the upgrade of TD-SCDMA to the 3.5G HSUPA technology, and later migrated into the 4G TD-LTE standard.

  19. Some Telecom Scandals • Vodafone is alleged to have spied on its own directors during the boardroom dispute over the strategy being pursued by Arun Sarin in 2006 which lead to the departure of chairman Lord MacLaurin and the resignation of former chief executive Sir Chris Gent from his role as life president. • There was scandal engulfing Germany's Deutsche Telekom which has also been alleged to have spied on its directors to shut down leaks to journalists. • Czech Republic television alleged that T-Mobile breached data protection laws when it passed customer details to a partner bank, Komercni banka for a co-branded credit card service.

  20. Unusual global Technological Trends • Is there a tendency to market newer more expensive technology because the promised technology results are not delivered in existing technologies for various valid reasons? • Is there a trend to create lots of hype for a technology which is expected to be available in market may be after 2-3 years? • Is anybody analyzing the actual speed and results delivered on existing technology as was hyped? • Is it a fact that announcement of new things are made based on ideal conditions and higher spectrum, which in ordinary case are not feasible in actual conditions? • Prepaid preferred marketing emphasis not only for hassle free receipts but also higher call charges

  21. Unusual global Technological Trends…cont • Some of upcoming technological news items, may or may not be correct factually • AT&T downgraded 2G signal strength to beef up its 3G network, leaving some customers either to be stuck with lower quality 2G service or upgrading to a 3G iPhone. • Indian Operators not caring for 2G,3G networks and now emphasizing on 4G • Verizon is supposedly neglecting its DSL network as it puts in FiOS.  • Qwest is accused of using interference with its fiber-to-the-node network as a "tool" to urge DSL customers to switch to FTTN. • Customers complaining of low speed, lack of signal on existing wireless and always get suggestion to move rto 3G,4G…5G

  22. Report on the Capability of the People’s Republic of China to conduct Cyber Warfare and Computer Network Exploitation • US-China Economic and Security Review Commission prepared Northrop Grumman September, 2009. • The Chinese have adopted a formal IW strategy called “Integrated Network Electronic Warfare” (INEW) that consolidates the offensive mission for both computer network attack (CNA) and EW. • INEW includes using techniques such as electronic jamming, electronic deception and suppression to disrupt information acquisition and information transfer, launching a virus attack or hacking to sabotage information processing and information utilization, and using anti-radiation and other weapons based on new mechanisms to destroy enemy information platforms and information facilities. • The PLA maintains a network of universities and research institutes that support information warfare related education. • The Chinese may attempt to target potentially vulnerable networks associated with strategic civilian ports, shipping terminals, or railheads that are supporting the military’s movement of critical supplies and personnel.

  23. Northrop Grumman….cont. • China’s long term investment in its high technology sectors is paying dividends for the PLA as they have access to increasing numbers of domestic firms able to design, build, and service advanced IT systems in support of PLA C4ISR and CNO requirements. (Page 49) • Huawei is a well established supplier of specialized telecommunications equipment, training and related technology to the PLA that has, along with others such as Zhongxing, and Datang, received direct funding for R&D on C4ISR systems capabilities. All of these firms originated as state research institutes and continue to receive preferential funding and support from the PLA • ZTE Corp, another of China’s large telecommunications manufacturers, and Huawei, also provide certification training and related engineering training to PLA personnel assigned to communications and IW related positions, according to provincial level Communist Party military newspapers.

  24. Northrop Grumman…cont. • Civilian IT companies have provided personnel to staff IW militia units that are tasked with both CNA and CND missions during wartime and extensive CNE missions during peacetime.95 • Venus Technologies Inc, which has close ties to the hacker groups XFocus and NSFocus, is also a well known provider of information security and computer network operations expertise to the PLA.

  25. The Ramayana – A Case StudyinSecurity! Ravana Mareecha Laxman Ram Sita

  26. The Ramayana – Forensic Analysis Keyto Ravana’s successwas: Spoofingofidentities Spear-Pfishingunsuspectingvictim Social Engineer par Excellence Lackingsecurity-awareness invictims

  27. CYBER HISTORY • The first recorded cyber crime was recorded in the year 1820. (joeshp marie) • The first spam email took place in 1978 which was sent over ARPANET • The first Virus sent over Arpanet was “creeper” IN 1971 : “I’M CREEPER, CATCH ME IF YOU CAN !!”

  28. Where is my cell phone mama.. I want to SMS to God that I have reached safely! GOD ACKNOWLEDGES AND WISHES BEST

  29. Thanks get Connected nkgoyals@yahoo.co.in , No. - +91 98111 29879 www.cmai.asia www.cmaievents.com http://in.linkedin.com/in/nkgoyals, http://www.facebook.com/cmai.nkgoyal

More Related