CUSAT Annual Report 2007-2008

Total Page:16

File Type:pdf, Size:1020Kb

CUSAT Annual Report 2007-2008 CUSAT Annual Report 2007-2008 THE YEAR IN RETROSPECT This report presented as required under Section 37 (i) of Chapter VI of the Cochin University of Science and Technology Act, 1986 covers the activities of the University during the period from April 1st, 2007 to March 31st, 2008. The year under report witnessed steady progress in the effort of various University Departments / Schools / Institution towards higher level of excellence in teaching and research and in organising a series of academic activities. 1 CUSAT Annual Report 2007-2008 2 CUSAT Annual Report 2007-2008 PART I AIMS AND OBJECTIVES The University of Cochin came into being on July 10th, 1971 by an ordinance which was replaced by the Cochin University Act 1971. The University of Cochin was reorganised and converted into a full-fledged University of Science and Technology by the Cochin University of Science and Technology Act, 1986 for the promotion of graduate and post graduate studies and advanced research in Applied Science, Technology, Industry, Commerce, Management and Social Science. The University shall have the following objectives i. to prosecute and promote research in Applied Science, Technology, Industry, Commerce, Management and Social Science for the advancement of knowledge and for the betterment of society. ii. to provide facilities & offer opportunities for graduate & post-graduate education in Applied Science, Technology, Industry, Commerce, Management and Social Science by Instruction, Training, Research, Development and Extension and by such other means as the University may deem fit. iii. to devise and implement programmes of education in Applied Science, Technology, Industry, Commerce, Management and Social Science that are relevant to the changing needs of society in terms of breadth of diversity and depth of specialization. iv. to serve as a centre for fostering co-operation and exchanging of ideas between the academic and research community on the one hand and industry on the other. v. to organise exchange programme with other institutions of repute in India and abroad with a view to keeping abreast of the latest developments in relevant areas of teaching and research. 3 CUSAT Annual Report 2007-2008 The University’s basic philosophy and goals find eloquent expression in its coat of aims emblazoning the motto Tejasvi navadhitamastu. In essence it means May learning illumine us both (the teacher and the taught). The rising sun together with the coconut palm represents the birth of a new centre of learning in the land of Kerala. The book represents learning the factory its application and the transmission tower its centre of learning, that of fostering study and research in Applied Science, Technology, Industry, Commerce, Management and Social Science and the transference of such knowledge for the betterment of humanity. ❉❉❉ 4 CUSAT Annual Report 2007-2008 UNIVERSITY AUTHORITIES VICE CHANCELLOR Prof. (Dr.) P.K. Abdul Azis (upto 11-06-07) Sri. P.J. Thomas (12-06-07 upto 13-11-07) Sri. T.K. Jose (14-11-07 upto 15-01-08) Sri. K.M. Abraham (16-01-08 upto 03-02-08) Dr. Gangan Pratap (04-02-08 onwards) PRO-VICE-CHANCELLOR Dr. N.D. Inasu REGISTRAR Dr. A. Ramachandran FINANCE OFFICER Sri. Sebastian Ouseph 5 CUSAT Annual Report 2007-2008 MEMBERS OF THE SYNDICATE 1. Vice Chancellor 2. Pro Vice Chancellor 3. The Director of Technical Education, Directorate of Technical Education, Padmavilasom Road, Thiruvananthapuram. 4. The Principal Secretary to Government, Higher Education Department, Government Secretariat, Thiruvananthapuram - 695 001 5. The Secretary to Government, Finance Department, Government Secretariat, Thiruvananthapuram - 695 001 6. The Executive Vice President, Kerala State council for Science, Technology and Environment, Sasthra Bhavan, Pattom P.O., Thiruvananthapuram – 695 004. 7. Dr. K.N. Chandrasekharan Pillai, Director, Indian Law Institute, Bhagwandas Road, New Delhi - 110 001. 8. Dr. V.P.N.Nampoori, Prof. & Director, International School of Photonics, Cusat, Kochi - 22 9. Dr. Joy Job Kulavelil, HB 48, KKP Nagar, Union Christ College P.O., Aluva-2 10. Adv. K.Mohanachandran, H.No. XXXII/36, Chitrakalalayam Road, Edappally Toll, Kochi - 682 024 11. Sri. Baby Chakrapani, Lecturer, Department of Atmospheric Sciences, Cusat, Kochi - 16 12. Prof. P.O.J. Lebba, Yakeen, Asramam, Kollam - 691 002 13. Dr. I.S.Bright Singh, Professor & Director, School of Environmental Studies, Cusat, Kochi - 22 14. Shri. N.K.Vasudevan, H.No. III/354, Sindooram, Adarsh Lane, Thrikkakara, Kochi - 682 021 15. Shri. C.M.Dinesh Mani, M.L.A., Chanthuruthil Veedu, Vennala, Kochi - 682 028 16. Shri. Alphons Kannamthanam, M.L.A., Fathima Church Road, Elamkulam, Kochi - 682 020 17. Dr. Achuth Sankar S.Nair, Hon. Director, Centre for Bio-Informatics, University of Kerala, Kariavattom P.O., Thiruvanathapuram - 685 581 18. Dr. S.Salim, Kudumbasree Mission, Civil Station, Kakkanad, Ernakulam. 19. The Chairperson, Cochin University Union, Cusat, Kochi - 22 ❉❉❉ 7 CUSAT Annual Report 2007-2008 MEMBERS OF ACADEMIC COUNCIL EX-OFFICIO MEMBERS 1. The Vice Chacellor 2. The Pro-Vice Chancellor NOMINEES OF VC’S OF OTHER UNIVERSITIES 1. Dr. V.Krishna Kumar, Dean, Faculty of Science, University of Calicut, Calicut University P.O. - 673 635 2. Dr. D. Damodaran Namboodiri, Dean I/C, Faculty of Fisheries, College of Fisheries Panangad, Kochi - 682 506. MEMBERS OF THE SYNDICATE 3. The Director of Technical Education, Directorate of Technical Education, Padmavilasom Road, Thiruvananthapuram 4. The Secretary to Government, Higher Education Department., Government Scretariat, Thiruvananthapuram 5. The Secretary to Government, Finance Department, Government Scretariat, Thiruvananthapuram 6. The Executive Vice President, Kerala State council for Science, Technology and Environment, Sasthra Bhavan, Pattom P.O., Thiruvananthapuram – 695 004. 7. Dr. K.N. Chandrasekharan Pillai, Director, Indian Law Institute, Bhagwandas Rd. New Delhi-1 8. Dr. V.P.N.Nampoori, Prof. & Director, International School of Photonics, Cusat, Kochi - 22 9. Dr. Joy Job Kulavelil, HB 48, KKP Nagar, Union Christ College P.O., Aluva-2 10. Adv. K.Mohanachandran, H.No. XXXII/36, Chitrakalalayam Road, Edappally Toll, Kochi - 682 024 11. Sri. Baby Chakrapani, Lecturer, Department of Atmospheric Sciences, Cusat, Kochi - 16 12. Dr. I.S.Bright Singh, Professor & Director, School of Environmental Studies, Cusat, Kochi - 22 13. Prof. P.O.J. Lebba, Yakeen, Asramam, Kollam - 691 002 8 CUSAT Annual Report 2007-2008 14. Shri. N.K.Vasudevan, H.No. III/354, Sindooram, Adarsh Lane, Thrikkakara, Kochi - 682 021 15. Shri. C.M.Dinesh Mani, M.L.A., Chanthuruthil Veedu, Vennala, Kochi - 682 028 16. Shri. Alphons Kannamthanam, M.L.A., Fathima Church Road, Elamkulam, Kochi - 682 020 17. Dr. Achuth Sankar S.Nair, Hon. Director, Centre for Bio-Informatics, University of Kerala, Kariavattom P.O., Thiruvanathapuram - 685 581 18. Dr. S.Salim, Kudumbasree Mission, Civil Station, Kakkanad, Ernakulam. DEANS OF FACULTIES 1. Prof. P.O.J. Lebba (Dean Faculty of Engineering, (Former consultant AICTE & Former Principal, TKM College of Engineering, Kollam) Yakeen, Asramam, Kollam - 691 002 2. Dr. I.S.Bright Singh (Dean, Faculty of Environmental Studies), Professor & Director, School of Environmental Studies, Cusat, Kochi - 22 3. Dr. V.P.N.Nampoori (Dean, Faculty of Technology), Prof. & Director, International School of Photonics, Cusat, Kochi - 22 4. Dr. A. Aravindakshan (Dean, Faculty of Humanities), Professor, Dept. of Hindi, CUSAT, Kochi - 22. 5. Dr. V. Unnikrishnan Nayar (Dean, Faculty of Science), Puthenpura, TC XV/1351(2), Gandhi Nagar, Union Christian College P.O., Aluva - 2 6. Dr. D.Rajasenan (Dean, Faculty of Social Sciences), Professor, Department of Applied Economics, Cusat, Kochi - 22 7. Dr. K. Mohankumar (Dean, Faculty of Marine Sciences), Professor, Department of Atmospheric Sciences, CUSAT, Kochi - 16 8. Dr. P.S.John (Dean, Faculty of Medical Sciences), Professor & Head, Department of Orthopedics, Government Medical College, Gandhi Nagar P.O., Kottayam - 686 008 9. Dr. K.N. Chandrasekharan Pillai (Dean, Faculty of Law), Director, Indian Law Institute, Bhagwandas Rd. New Delhi-1 CHAIRMAN BOARDS OF STUDIES 1. Dr. M.I.Thampan (Engg. UG), Mannaraprayil, Meenkunnam P.O., Arakuzha (Via), Muvattupuzha - 686 672 2. Dr. Kailaschandra Bhanu (Medical Sciences), Professor of Paediatrics, Co-operative Medical College, HMT Colony, Kalamassery - 683 503. 9 CUSAT Annual Report 2007-2008 3. Dr. C.G.Krishnadas Nair (Aerospace Technology), Former CMD, Hindustan Aeronautics Ltd., Aeronautical Society of India Building, Suranjandas Road, Bangalore- 560 075. 4. Dr. A.Krishnamoorthy (Maths), Head and Professor, Department of Mathematics, Cusat, Kochi - 22 5. The Head, Department of Computer Application, Cusat, Kochi - 22 6. The Head, Department of Biotechnology, Cusat, Kochi - 22 7. The Head, Department of Instrumentation, Cusat, Kochi - 22 8. Dr. Benny Mathews Abraham (Engg PG), Professor of Civil Engineering, School of Engineering, Cusat, Kochi - 22 9. Dr. I.S.Bright Singh (EVS), Professor & Director, School of Environmental Studies, Cusat, Kochi - 22 10. Dr. I.S.Bright Singh (Marine Biotechnology), Professor & Director, School of Environmental Studies, Cusat, Kochi - 22 11. Dr. Rani Joseph (PS&RT), Professor, Department of Polymer Sciecen and Rubber Technology, Cusat, Kochi - 22 12. Dr. V.P.N.Nampoori (Photonics), Prof. & Director, International School of Photonics, Cusat, Kochi - 22 13. The Head, Department of Statistics, Cusat, Kochi - 22 14. Dr. M.R.Anantharaman
Recommended publications
  • Identifying Threats Associated with Man-In-The-Middle Attacks During Communication Between a Mobile Device and the Back End Server in Mobile Banking Applications
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 35-42 www.iosrjournals.org Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications Anthony Luvanda1,*Dr Stephen Kimani1 Dr Micheal Kimwele1 1. School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, PO Box 62000-00200 Nairobi Kenya Abstract: Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications.
    [Show full text]
  • Compromised Connections
    COMPROMISED CONNECTIONS OVERCOMING PRIVACY CHALLENGES OF THE MOBILE INTERNET The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and many other international and regional treaties recognize privacy as a fundamental human right. Privacy A WORLD OF INFORMATION underpins key values such as freedom of expression, freedom of association, and freedom of speech, IN YOUR MOBILE PHONE and it is one of the most important, nuanced and complex fundamental rights of contemporary age. For those of us who care deeply about privacy, safety and security, not only for ourselves but also for our development partners and their missions, we need to think of mobile phones as primary computers As mobile phones have transformed from clunky handheld calling devices to nifty touch-screen rather than just calling devices. We need to keep in mind that, as the storage, functionality, and smartphones loaded with apps and supported by cloud access, the networks these phones rely on capability of mobiles increase, so do the risks to users. have become ubiquitous, ferrying vast amounts of data across invisible spectrums and reaching the Can we address these hidden costs to our digital connections? Fortunately, yes! We recommend: most remote corners of the world. • Adopting device, data, network and application safety measures From a technical point-of-view, today’s phones are actually more like compact mobile computers. They are packed with digital intelligence and capable of processing many of the tasks previously confined
    [Show full text]
  • Mobile Financial Fraud April 2013
    White Paper: Mobile Financial Fraud April 2013 Mobile Threats and the Underground Marketplace Principal Investigator and Corresponding Author Jart Armin Contributing Researchers Andrey Komarov, Mila Parkour, Raoul Chiesa, Bryn Thompson, Will Rogofsky Panel & Review Dr. Ray Genoe (UCD), Robert McArdle (Trend Micro), Dave Piscitello (ICANN), Foy Shiver (APWG), Edgardo Montes de Oca (Montimage), Peter Cassidy (APWG) APWG Mobile Fraud web site http://ecrimeresearch.org/wirelessdevice/Fraud/ Table of Contents Abstract ..................................................................................................................................... 2 Introduction and Starting Position ........................................................................................ 2 A Global Overview .................................................................................................................. 3 Vulnerabilities Overview ....................................................................................................... 3 The Underground Mobile Market ....................................................................................... 13 Mobile DNS & Traffic ........................................................................................................... 15 iBots & the Pocket Botnet ..................................................................................................... 18 Mobile Intrusion ...................................................................................................................
    [Show full text]
  • APT and Cybercriminal Targeting of HCS June 9, 2020 Agenda
    APT and Cybercriminal Targeting of HCS June 9, 2020 Agenda • Executive Summary Slides Key: • APT Group Objectives Non-Technical: managerial, strategic • APT Groups Targeting Health Sector and high-level (general audience) • Activity Timeline Technical: Tactical / IOCs; requiring • TTPs in-depth knowledge (sysadmins, IRT) • Malware • Vulnerabilities • Recommendations and Mitigations TLP: WHITE, ID#202006091030 2 Executive Summary • APT groups steal data, disrupt operations, and destroy infrastructure. Unlike most cybercriminals, APT attackers pursue their objectives over longer periods of time. They adapt to cyber defenses and frequently retarget the same victim. • Common HPH targets include: • Healthcare Biotechnology Medical devices • Pharmaceuticals Healthcare information technology • Scientific research • HPH organizations who have been victim of APT attacks have suffered: • Reputational harm Disruption to operations • Financial losses PII/PHI and proprietary data theft • HC3 recommends several mitigations and controls to counter APT threats. TLP: WHITE, ID#202006091030 3 APT Group Objectives • Motivations of APT Groups which target the health sector include: • Competitive advantage • Theft of proprietary data/intellectual capital such as technology, manufacturing processes, partnership agreements, business plans, pricing documents, test results, scientific research, communications, and contact lists to unfairly advance economically. • Intelligence gathering • Groups target individuals and connected associates to further social engineering
    [Show full text]
  • Strategic Perspectives on Cybersecurity Management and Public Policies Volume 3 (2017)
    VOLUME 3 (2017) ▪ ISSUE 2 STRATEGIC PERSPECTIVES ON CYBERSECURITY MANAGEMENT AND PUBLIC POLICIES VOLUME 3 (2017) VOLUME ▪ ISSUE ISSUE 2 ANALYSES ▪ POLICY REVIEWS ▪ OPINIONS The European Cybersecurity Journal is a new specialized quarterly publication devoted to cybersecurity. It will be a platform of regular dialogue on the most strategic aspects of cybersecurity. The main goal of the Journal is to provide concrete policy recommendations for European decision-makers and raise awareness on both issues and problem-solving instruments. EDITORIAL BOARD Chief Editor: Dr Joanna Świątkowska The ECJ is a quarterly journal, published in January, CYBERSEC Programme Director and Senior Research Fellow of the April, July and October. Kosciuszko Institute, Poland Honorary Member of the Board: Dr James Lewis Director and Senior Fellow of the Strategic Technologies Program, Center for Strategic and International Studies (CSIS), USA Citations:This journal should be cited as follows: “European Cybersecurity Journal”, Member of the Board: Alexander Klimburg Volume 3 (2017), Issue 2, page reference Nonresident Senior Fellow, Cyber Statecraft Initiative, Atlantic Council ; Affiliate, Belfer Center of Harvard Kennedy School, USA Published by: The Kosciuszko Institute Member of the Board: Helena Raud ul. Feldmana 4/9-10 Member of the Board of the European Cybersecurity Initiative, Estonia 31-130 Kraków, Poland Member of the Board: Keir Giles Phone: 00 48 12 632 97 24 Director of the Conflict Studies Research Centre (CSRC), UK E-mail: [email protected] Editor Associate: Izabela Albrycht www.ik.org.pl Chairperson of the Kosciuszko Institute, Poland www.cybersecforum.eu Executive Editor: Karine Szotowski Printed in Poland by Drukarnia Diament | diamentdruk.pl Designer: Paweł Walkowiak | perceptika.pl DTP: Marcin Oroń Proofreading: Justyna Kruk and Agata Ostrowska ISSN: 2450-21113 Disclaimer: The views expressed in articles are the authors’ and not necessarily those of the Kosciuszko Institute.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Threat Landscape Report – 1St Quarter 2018
    TLP-AMBER Threat Landscape Report – 1st Quarter 2018 (FINAL) V1.0 – 10/04/2018 This quarterly report summarises the most significant direct cyber threats to EU institutions, bodies, and agencies (EU-I or 'Constituents') in Part I, the development of cyber-threats on a broader scale in Part II, and recent technical trends in Part III. KEY FINDINGS Direct Threats • In Europe, APT28 / Sofacy threat actor (likely affiliated to Russia military intelligence GRU) targeted government institutions related to foreign affairs and attendees of a military conference. Another threat actor, Turla (likely affiliated to Russia’s security service FSB) executed a cyber-operation against foreign affairs entities in a European country. • A spear-phishing campaign that targeted European foreign ministries in the end of 2017 was attributed to a China-based threat actor (Ke3chang) which has a long track record of targeting EU institutions (since 2011). As regards cyber-criminality against EU institutions, attempts to deliver banking trojans are stable, ransomware activities are still in decline and cryptojacking on the rise. Phishing lures involve generic matters (’invoice’, ‘payment’, ‘purchase’, ‘wire transfer’, ‘personal banking’, ‘job application’) and more specific ones (foreign affairs issues, European think tanks matters, energy contracts, EU delegation, EU watch keeper). Almost all EU-I are affected by credential leaks (email address | password) on pastebin-like websites. Several credential- harvesting attempts have also been detected. Attackers keep attempting to lure EU-I staff by employing custom methods such as spoofed EU-I email addresses or weaponisation of EU-I documents. Broader Threats • Critical infrastructure. In the energy sector, the US authorities have accused Russian actors of targeting critical infrastructure (including nuclear) for several years and are expecting this to continue in 2018.
    [Show full text]
  • Malware Detection and Analysis: Challenges and Research Opportunities
    1 Malware Detection and Analysis: Challenges and Research Opportunities Zahid Akhtar Department of Network and Computer Security, State University of New York Polytechnic Institute, USA. Email: [email protected] Malwares are continuously growing in sophistication and hobbyists and cyber-offenders trying to show their ability numbers. Over the last decade, remarkable progress has been by causing havoc and to steal information potentially for achieved in anti-malware mechanisms. However, several pressing monetary gains, respectively. They are popularly known as issues (e.g., unknown malware samples detection) still need to be addressed adequately. This article first presents a concise hackers, black hats and crackers, and could be external/internal overview of malware along with anti-malware and then sum- menace, industrial spies or foreign governments. Malwares marizes various research challenges. This is a theoretical and can be used to change or erase data from victim computers, perspective article that is hoped to complement earlier articles to collect confidential information, or to hijack systems in and works. order to attack other devices, send spams, host and share illicit contents, bring down servers, penetrate networks, and cripple critical infrastructures. I. INTRODUCTION Consequently, a broad range of tools and schemes have Use of personal computers and mobile devices coupled been devised to detect and mitigate malware attacks [1]. Anti- with internet has now become integral part of everyday life. malware systems thwart malwares by determining whether This ubiquity of high interconnectivity has prompted many given program has malign intent or not [4]. Despite great serious privacy and security menaces as well as different advancement of malware defense techniques and their inces- other malicious activities.
    [Show full text]
  • Geopolitical Impact on Cyber Threats from Nation-State Actors
    Commodification of Cyber Capabilities: A Grand Cyber Arms Bazaar Table of Contents Page Executive Summary .......................................................................................................................1 Cyber Threat Landscape: More Actors, Capabilities, and Connectivity ................................2 Common Approaches to Acquiring Cyber Capability: Buy, Build, Bridge ............................5 Grand Cyber Arms Bazaar: A Framework for Categorizing Sophistication .........................7 Strolling the Grand Bazaar...................................................................................................8 Organizational Maturity .......................................................................................................9 Operational Intent ..............................................................................................................12 Applying the Framework: Case Studies ...................................................................................14 Case Study #1: North Korea .............................................................................................14 Case Study #2: Vietnam....................................................................................................17 Case Study #3: Artem Radchenko and Oleksander Ieremenko ........................................19 Policy Challenges: Deterrence, Redlines, and Escalation .......................................................19 Dearth of Effective Approaches to Deterrence ..................................................................20
    [Show full text]
  • Istrinternet Security Threat Report Volume
    ISTRInternet Security Threat Report Volume 23 01 Introduction Page 2 ISTR April 2017 THE DOCUMENT IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENT. THE INFORMATION CONTAINED IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. INFORMATION OBTAINED FROM THIRD PARTY SOURCES IS BELIEVED TO BE RELIABLE, BUT IS IN NO WAY GUARANTEED. SECURITY PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT (“CONTROLLED ITEMS”) ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER FOR YOU TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT SUCH CONTROLLED ITEMS. Back to Table of Contents 01 Introduction 03 Facts and Figures Executive Summary Malware Big Numbers Web Threats Methodology Email Vulnerabilities Targeted Attacks 02 Year in Review Mobile Threats The Cyber Crime Threat Landscape Internet of Things Targeted Attacks by Numbers
    [Show full text]
  • Finfisher Product Suite Usageusage
    IT INTRUSION –– FinFisher Product Suite UsageUsage • Information Gathering •PC Surveillance •Hacking •Information Exploitation •Information Interception 2 Components • FinFisher USB Suite •FinFisher Remote Hacking Kit • FinSpy •FinFly •FinTraining • Fin Au dit •New Products -2008 3 FinFisher USB Suite • Suite to locally extract information from target systems with little or no user interaction • Data analysis/Report generation at Head- quarters 4 Components • FinFisher USB Suite – FinFisher HQ –FinFisher 1 –FinFisher 2 –FinFisher 3 • FinFisher Remote Hacking Kit •FinSpy •FinFly • FinTraining •FinAudit •New Products -2008 5 FinFisher HQ •Graphical User Interface for FinFisher 1 and 2 • UdUsed to configure operatiltional options • Generates certificates for encryption •Deciphers and imports data from dongles •Generates reppgorts from gathered data •Updates FinFisher 1 and 2 systems 6 FinFisher HQ 7 Components • FinFisher USB Suite – FinFisher HQ – FinFisher 1 – Fin Fis her 2 –FinFisher 3 •FinFisher Remote Hacking Kit •FinSpy •FinFly • Fin Trai n ing •FinAudit •New Products -2008 8 FinFisher 1 •U3 USB Dongle •Executes on insertion with little or no user intervention • Obtains system and account information for: • Windows Accounts • E-Mail Accounts (Microsoft Outlook / Express, …) • Instant Messenger Accounts (MSN, Yahoo, ICQ, …) • System Details (Product Keys, Hotfixes, …) • Network Information (Open Ports, Cookies, History, …) •All gathered data is asymmetrically enciphered • Bypasses installed Anti-Virus/Anti-Spyware software 9 FinFisher 1 10 Components • FinFisher USB Suite – FinFisher HQ –FinFisher 1 – Fin Fis her 2 –FinFisher 3 •FinFisher Remote Hacking Kit •FinSpy •FinFly • Fin Trai n ing •FinAudit •New Products -2008 11 FinFisher 2 •U3 USB Dongle •Executes on insertion with little or no user intervention • Gets a copy of all locally stored E-Mails from the target system • Obtains specific files by file-extension (e.
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy the Many Faces of Anonymous
    hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York Hacker Hoaxer Whistleblower 2015 PB 13-08-15.indd 3 8/13/2015 3:44:42 PM Epilogue: The State of Anonymous “I have grown to love secrecy. It seems to be the one thing that can make modern life mysterious or marvelous to us. The commonest thing is delightful if only one hides it.” Oscar Wilde “The political education of apolitical technical people is extra ordinary.” Julian Assange he period described in this book may seem to many to represent the pinnacle of Anonymous activity: their Tsupport role in the various movements that constituted the Arab Spring; the high-profile media attention garnered by the gutsy LulzSec and AntiSec hacks; the ever growing com- mitment to domestic social justice issues seen in engagements against rape culture and police brutality. Unsurprisingly, this impressive flurry of protest activity was met with similarly impressive law enforcement crackdowns. Throughout Europe, Asia, Australia, and the Americas, law enforcement officials detained over one hundred Anonymous activists—including many of the figures profiled in this book: Jeremy Hammond and John Borell in the United States, and Ryan Ackroyd and Mustafa Al-Bassam in the United Hacker Hoaxer Whistleblower 2015 PB 13-08-15.indd 401 8/13/2015 3:44:54 PM 402 hacker, hoaxer, whistleblower, spy Kingdom. Others arrested were geeky activists whose “crime” had been to simply channel a small portion of their computer resources toward DDoS campaigns organized by Anonymous in an effort to collectively shame financial organizations, such as PayPal when they caved to government pressure and terminated all services to the embattled whistleblowing organ- ization WikiLeaks.
    [Show full text]