Cysec PDF
Cysec PDF
Cysec PDF
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
blackMail
Dear All,
There is a very ingenious blackmailing email circulating
around asking for money in bitcoins. ... they all have a Subject: [email protected] is hacked
few similar features: From: [email protected]
Date: Thu, October 18, 2018 4:35 pm
Hello!
• They include a password that My nickname in DARKNET is derrik82. I hacked this
mailbox more than six months ago, through it I infected
you probably have used your operating system with a virus (trojan) created by me
and have been monitoring you for a long time.
• Claim to have installed So, your password from [email protected] is xxxxxxxxx
Even if you changed the password after that - it does not
malware, and record video of matter, my virus
...
you through your webcam. I was most struck by the intimate content sites that you
occasionally visit. You have a very wild imagination, I tell
• Threaten to reveal your adult you!
...
website habits and send videos Send the above amount on my BTC wallet (bitcoin):
1EZS92K4xJbymDLwG4F7PNF5idPE62e9XY
... Since reading this letter you have 48 hours!
• Demand bitcoins...
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Insider Attacks
• CBI
• Paytm
• ...
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Harari], 21 Lessons
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
• I have a dream!(MLK)
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
• Semantic Consistency
• End-to-End Security
• Business Management
Does not play the human way at all! Mostly parallelized search in
hardware (200 million positions/second!)
• December 2017: AlphaGo Zero used reinforcement learning to teach
itself chess in 4 hours! Beat world’s best program Stockfish
comprehensively!
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Deep Patient
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
3rd Platform
Analytics
Internet
of Things
Cloud
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Social
• Facebook, Twitter, GooglePlus
...
• Web 2.0 (Right to Assembly)
• Crowdsourcing (Wikipedia)
Internet
of Things
Cloud
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Internet
• Data Loss Prevention (Fortress
of Things Approach - Firewall, IDS/IPS -
won’t work!)
Cloud
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
3rd Platform
• Knowledge is Power!
• Collect,
Analytics Analyse, Infer, Predict
Internet
of Things
Cloud
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Shipping
• VMs separate OS from bare
3rd Platform metal (at great cost-
AnalyticsHypervisor, OS image)
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
3rd Platform
• Ambient Services (Maps,
Messaging, Traffic modelling
Analytics
and prediction, ...)
Internet • Business Use Cases (Ola Cabs,
of Things Home Depot, Philips
Healthcare, ...)
• Impact on wireless bandwdith,
Cloud storage, analytics (velocity of
BIG data, not size)
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Internet’s Nightmare
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Atlas.arbor.net
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Atlas.arbor.net
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Atlas.arbor.net
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Who is scanning?
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Malicious Servers
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Exchanging Secrets
Goal
A and B to agree on a secret number. But, C can listen to all their
conversation.
Solution?
A tells B: I’ll send you 3 numbers. Let’s use their LCM as the key.
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Exchanging Secrets
Goal
A and B to agree on a secret number. But, C can listen to all their
conversation.
Solution?
A tells B: I’ll send you 3 numbers. Let’s use their LCM as the key.
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Mutual Authentication
Goal
A and B to verify that both know the same secret number. No
third party (intruder or umpire!)
Solution?
A tells B: I’ll tell you first 2 digits, you tell me the last two...
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Mutual Authentication
Goal
A and B to verify that both know the same secret number. No
third party (intruder or umpire!)
Solution?
A tells B: I’ll tell you first 2 digits, you tell me the last two...
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Zero-Knowledge Proofs
Goal
A to prove to B that she knows how to solve the cube. Without
actually revealing the solution!
Solution?
A tells B: Close your eyes, let me solve it...
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Zero-Knowledge Proofs
Goal
A to prove to B that she knows how to solve the cube. Without
actually revealing the solution!
Solution?
A tells B: Close your eyes, let me solve it...
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Vulnerabilities
• Application Security
• Buggy code
• Buffer Overflows
• Host Security
• Server side (multi-user/application)
• Client side (virus)
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
• Transmission Security
Introduction to Cyber Security
The Good The Bad The Ugly
Security Requirements
• Traffic Analysis Should not even know who is communicating with whom. Why?
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Security Mechanisms
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Threat-Defence Matrix
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
• Anti-Virus
• Firewall
• Patch Management
• IDS/IPS
• WAF
• ..
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
Deception Technologies
• Decoys
• Fake servers/services (ATM, Swift, ...)
• Must blend and adapt (not stale)
• ...
• Lures
• Vulnerable Ports/Services
• Mis-configuration
• Breadcrumbs
• Mis-direction
• File with credentials/mis-direction
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security
The Good The Bad The Ugly
What next?
िशवकुमार G. Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मबं ु ई (IIT Bomb
Introduction to Cyber Security