0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
199 Ansichten22 Seiten
This document discusses cybersecurity, cybercrimes, and how to stay safe online. It defines cybersecurity as protecting networks, devices, programs and data from attacks. Cybercriminals are those who conduct illegal activities such as credit card fraud, hacking, or defamation online. Cybercrimes are classified as those against individuals or organizations. The document provides tips for safe internet use like not sharing personal information, using parental controls, and creating strong passwords. It warns about social engineering scams and outlines Indian laws related to cybercrime.
This document discusses cybersecurity, cybercrimes, and how to stay safe online. It defines cybersecurity as protecting networks, devices, programs and data from attacks. Cybercriminals are those who conduct illegal activities such as credit card fraud, hacking, or defamation online. Cybercrimes are classified as those against individuals or organizations. The document provides tips for safe internet use like not sharing personal information, using parental controls, and creating strong passwords. It warns about social engineering scams and outlines Indian laws related to cybercrime.
This document discusses cybersecurity, cybercrimes, and how to stay safe online. It defines cybersecurity as protecting networks, devices, programs and data from attacks. Cybercriminals are those who conduct illegal activities such as credit card fraud, hacking, or defamation online. Cybercrimes are classified as those against individuals or organizations. The document provides tips for safe internet use like not sharing personal information, using parental controls, and creating strong passwords. It warns about social engineering scams and outlines Indian laws related to cybercrime.
Cybersecurity, Laws and Awareness. 15th august 2020 What is Cybersecurity?
Cyber security refers to the body of
technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Who are cybercriminals ?
Person who conducts following activities are called as Cybercriminals:
Illegal Videos Credit card fraud Cyberstalking Defaming another online Gaining unauthorized access to computer systems Ignoring copyright Software licensing and trademark protection Overriding encryption to make illegal copies Software piracy Stealing another’s identity (Identity theft) to perform criminal acts Classification of cybercrimes
Cybercrime against individual:
Electronic mail spoofing and other online frauds Phishing Spamming Cyberdefamation Cyberstalking and harassment Computer sabotage Illegal videos offenses Password sniffing Social Networking Sites
Communicate with friends. Find people with similar interests. How to beware of Predators
Pretends as other children or kindly adults
Trick children into revealing personal information Lure children and teenagers into meeting them in person Keep Personal Information “Private” Never reveal: Name Address Phone number School name
Don’t post or send photographs of yourself.
Choose a nondescript screen name. Basic Internet Rules for Children
Never give out identifying information.
Never write or post anything you wouldn’t be comfortable with the whole world seeing. Treat others online as you would treat them in person. Never share your password. Never open an email or click on a link from someone you don’t know. Never download or click on anything without checking with me or another trusted adult first. Video-Sharing Sites Popular video-sharing sites: YouTube Vimeo
Never search for inappropriate content online.
Inappropriate Content There are “bad” parts of the Internet, just as there are “bad” parts of town. Shield yourself: parental control software ( windows family safety) child-friendly search engines (Kiddle, Kidrex) bookmarks to favorite sites Social engineering
A technique to influence and persuasion to deceive people to obtain the
information or perform some action.
Social engineers exploit the natural tendency of a person to trust Social
engineer’s word, rather than exploiting computer security holes. Social engineering
A technique to influence and persuasion to deceive people to obtain the
information or perform some action.
Social engineers exploit the natural tendency of a person to trust Social
engineer’s word, rather than exploiting computer security holes. Social engineering Scenario! How you can protect yourself being a victim? Never to give out personal information, such as name, home address, or telephone number, to anyone they don’t know through email, Twitter, Facebook, or in online chat rooms or bulletin boards. Regularly updating security software can protect your family against scammers, hackers, and other online threats that can compromise your computer system Create unique passwords Prevent cyberbullying Types of attacks on we Indians Face?
Ask for OTPs
Sim Swapping ATM Swapping Internet banking spoofing. 31% of Indians organization may be the victim of cyber attacks. Keys Points to remember for life, This Independence Day. Never share your passwords with anybody. Keep your passwords very very unique. Never visit illegal websites. Never allowed any strangers use your device. Never share OTPs #OTP NAHI DUNGA. Never share ATM card Details with anybody. Hacking and Indian laws
Cybercrimes are punishable under 2 categories:
ITA 2000 (Information Technology Act 2000) IPC (Indian Penal Code) The Indian Penal Code (IPC) is the official criminal code of India. It is comprehensive code intended to cover all substantive aspects of criminal law. Credits
Netflix Government Of India Presentation On Cybersecurity. Government of USA on Child Safety. Economic Times for Facts And figure. PTO today. SAKEC Professor – Gauri Deshpande.