5
Hurdles in implementation of cyber security in India

Hurdles in implementation of cyber security in India

  • Upload
    cicada

  • View
    34

  • Download
    0

Embed Size (px)

DESCRIPTION

Hurdles in implementation of cyber security in India. Table of contents. Introduction Key facts and figures Top targeted s ectors Current initiatives Key hurdles in implementing security Roadmap – Way forward. Introduction. - PowerPoint PPT Presentation

Citation preview

Page 1: Hurdles in implementation of cyber security in India

Hurdles in implementation of cyber security in India

Page 2: Hurdles in implementation of cyber security in India

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 2

Table of contents

Introduction

Key facts and figures

Top targeted sectors

Current initiatives

Key hurdles in implementing security

Roadmap – Way forward

Page 3: Hurdles in implementation of cyber security in India

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 3

Introduction

Very important to protect the computer systems that support our nation’s critical operations,

infrastructure and businesses

Telecommunications, defense, banks, public & private sector companies and government services,

all depend on the security of their computer operations.

Increasing concern about attacks from individuals and groups with malicious intent, such as crime,

terrorism, foreign intelligence gathering, and acts of war.

Dramatic increases in reported computer security incidents, the ease of obtaining and using hacking

tools, the steady advance in the sophistication, effectiveness of attack technology and more

destructive attacks.

Page 4: Hurdles in implementation of cyber security in India

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 4

Cyber Threat Evolution

Virus

Breaking Web Sites

Malicious Code

Advanced Worm / Trojan

Identity Theft (Phishing)

Organised CrimeData Theft, DoS /

DDoS

1990’s Early 2000 2003-04 2005-06 2007 onwards

1970’s

Page 5: Hurdles in implementation of cyber security in India

© 2012 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. 55