The increasing number of cyber attacks on Indian companies has raised questions on the safety of virtual networks. Phishing mails, cybercrimes and malware have not only taken cyber security to a different level but also forced developers to improve product safety.
Taking into consideration the intensity of cyber attacks and threats of data theft, the Centre for Development of Advanced Computing (CDAC) here has developed new software — ‘NAYAN,' ‘USB Pratirodh,' and ‘Malware Resist'— “keeping end-users in view. Most of the research and development was done on the vulnerability of computers due to malware and data thefts,” says director A.K. Jain.
NAYAN, short for Network Abhigham Niyanthran, controls the computer's access to different network services, thus protecting the internal network from threats and misuse. “The software helps the administrator control access of a computer to network services and monitor activity from anywhere in the network,” says executive director N. Sarat Chandra Babu.
Moreover, the software has a unique way of authenticating a system on the network by creating a machine imprint which is generated from various parameters such as the operating system, hard disk and RAM. “This imprint will ensure that the computer in the network is authentic and safe. NAYAN also ensures that only authorised personnel have access to configurations, personal information, source and destination IP's and roles assigned to users,” says team co-ordinator (R&D) P.R. Lakshmi Eswari.
Compatible with end systems with Windows XP, Vista, Linux (Ubuntu 9.04, BOSS and SUSE), NAYAN has a desktop firewall which enforces the Network Access Control policies of a company.
USB Pratirodh is used to secure data stored in laptops and PCs, and prevents unauthorised use of portable storage devices. “About 75 per cent companies experience internal data thefts due to usage of USB drives and other portable devices,” says Dr. Babu.
Once installed, the programme asks for a user name and password, which will help users authenticate USB drives. The software will not allow any data to seep into the computer once the USB drive is plugged. “Only when the user gives the password, will the USB drive be activated. The user can also bind one or more USB devices to be accessed on the system,” Ms. Eswari explains.
Apart from this, PCs can be protected from malware and other rogue programmes that cause damage. “By installing Malware Resist, the system's processes are monitored continuously for a set of critical behaviours that could affect the performance of computers. In case of any deviant activity, the user is notified through an alert, which helps them quarantine the processes. Once quarantined, these processes will not be allowed to function again,” says Mr. Jain.
Cyber forensic tools
CDAC is also taking up various projects related to IT security in its other centres across the country. “The centre in Thiruvananthapuram is working on tools for cyber forensics, while the one in Kolkata is developing solutions for steganography (hidden messages) and our centre in Bangalore has developed a tool for intrusion detection and prevention,” says Dr. Babu.