“Be ware and be aware of
social media risks”
Prime Point Srinivasan
JCI, Madras Marina
5th
April 2014
What we will discuss
• Global internet scenario
• Websites and social media
networking sites
• Challenges before the users...
Global Internet scenario
• Out of 7.1 billion population, 2.9
bn use internet.38.5 % use
internet globally
• 12% internet ...
Websites and social media
• 1.5 bn Top Level domains (TLDS)
com, org, net, info, biz, us
• Facebook, Twitter, LinkedIn,
Yo...
Social media networking sites
• Facebook has 1.25 bn users (100
M users in India) Twitter 250 M
users
• Linkedin 280 M use...
Social Media
• 600 million status updates / day
• 400 milion emails per day (80%
spam)
• 350 millions photo uploads / day
Huge bandwidth loss due to
unproductive and unwanted usage
of social media
+
wastage of server space at global
level
Internet is a
double edged
weapon
Challenges before the users
• Information hacking. Eg: id and
password theft. The id is being
used for illegal purposes;
•...
Cyber Challenges
• Morphing / spoofing of IP address
and email address. Sending mails
as if it emanates from your IP
addre...
Cyber Challenges
• Defamation / character
assassination of persons or
organizations through internet and
social media.
• S...
Cyber Challenges
• Cyber Terrorism
• Eg: Spreading rumours to create
clash, enmity, etc., Intruding on
the computer system
Information Technology Act
• IT Act 2000 effective from 17th
October 2000
• Amendment of 2008 effective from
27th
October ...
Which are the devices ?
• PCs, Laptops, Iphones, Ipads,
Tablets, mobiles with internet,
etc.
• Mobile phones without inter...
Cyber offenses punishable
• Sections 43, 43A, 65, 66 and 67A
of the IT Act define some of the
offenses and the correspondi...
• 66A. Punishment for sending
offensive messages through
communication service, etc.
• Any person who sends, by means
of a...
• (b) any information which he
knows to be false, but for the
purpose of causing annoyance,
inconvenience, danger,
obstruc...
• (c) any electronic mail or
electronic mail message for the
purpose of causing annoyance or
inconvenience or to deceive o...
How to protect ourselves
• Use BOSS operating system
• Ignore all spam mails, lottery or
prize mails, or mails asking for
...
How to protect ourselves
• Use licensed software – avoid
pirated software. Use licensed anti
virus software
• Avoid sharin...
How to protect ourselves
• Some of the college and school
students in the name of confession
pages, post messages malignin...
How to protect ourselves
• Avoid taking unknown people as
friends. Review frequently.
• Avoid hate/abusive messages –
Avoi...
How to protect ourselves
• Avoid games In social media and
mobile apps. (do not become
addict)
• Avoid apps as far as poss...
How to protect ourselves
• Avoid forwarding controversial
mails or messages through
internet and mobile
• Victims of cyber...
Avoid addiction to internet
-treat social media like shoes –
use only when you need
Thank you
K. Srinivasan
Prime Point Foundation and
Editor in Chief PreSense and New
Gen Thamizhan
www.corpezine.com
prpoin...
Upcoming SlideShare
Loading in …5
×

Be ware and be aware of social media risks

330
-1

Published on

Prime Point Srinivasan addressed Junior Chamber International India - Madras Marina chapter on 5th April 2014 on the theme "Be ware and be aware of Social Media risks".

Published in: Social Media, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
330
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Be ware and be aware of social media risks

  1. 1. “Be ware and be aware of social media risks” Prime Point Srinivasan JCI, Madras Marina 5th April 2014
  2. 2. What we will discuss • Global internet scenario • Websites and social media networking sites • Challenges before the users • Information Technology Act 2000 • Protecting from cyber challenges
  3. 3. Global Internet scenario • Out of 7.1 billion population, 2.9 bn use internet.38.5 % use internet globally • 12% internet penetration in India and I billion mobile phones
  4. 4. Websites and social media • 1.5 bn Top Level domains (TLDS) com, org, net, info, biz, us • Facebook, Twitter, LinkedIn, YouTube, + many more • Blogs (wordpress and blogger) • Discussion groups (yahoo & google)
  5. 5. Social media networking sites • Facebook has 1.25 bn users (100 M users in India) Twitter 250 M users • Linkedin 280 M users • Wordpress 80 M blogs; • YouTube 1 bn + users and 4 bn + viewers per day.
  6. 6. Social Media • 600 million status updates / day • 400 milion emails per day (80% spam) • 350 millions photo uploads / day
  7. 7. Huge bandwidth loss due to unproductive and unwanted usage of social media + wastage of server space at global level
  8. 8. Internet is a double edged weapon
  9. 9. Challenges before the users • Information hacking. Eg: id and password theft. The id is being used for illegal purposes; • Cyber stalking – Cyber harassment through mail, mobile sms, phone call etc.
  10. 10. Cyber Challenges • Morphing / spoofing of IP address and email address. Sending mails as if it emanates from your IP address or email. • Cyber squatting – Getting the domain name of the branded person or organization and selling to the company at huge price.
  11. 11. Cyber Challenges • Defamation / character assassination of persons or organizations through internet and social media. • Spamming – sending unwanted and irrelevant junk mails.
  12. 12. Cyber Challenges • Cyber Terrorism • Eg: Spreading rumours to create clash, enmity, etc., Intruding on the computer system
  13. 13. Information Technology Act • IT Act 2000 effective from 17th October 2000 • Amendment of 2008 effective from 27th October 2009 • Using of computer for committing crime is an offense – computer is defined in the Act
  14. 14. Which are the devices ? • PCs, Laptops, Iphones, Ipads, Tablets, mobiles with internet, etc. • Mobile phones without internet • Even washing machines and electric ovens with memory chip
  15. 15. Cyber offenses punishable • Sections 43, 43A, 65, 66 and 67A of the IT Act define some of the offenses and the corresponding punishments.
  16. 16. • 66A. Punishment for sending offensive messages through communication service, etc. • Any person who sends, by means of a computer resource or a communication device,— • (a) any information that is grossly offensive or has menacing character; or
  17. 17. • (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,
  18. 18. • (c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, • shall be punishable with imprisonment for a term which may extend to three years and with fine.
  19. 19. How to protect ourselves • Use BOSS operating system • Ignore all spam mails, lottery or prize mails, or mails asking for passwords and private data • Keep complicated password – do not share with others
  20. 20. How to protect ourselves • Use licensed software – avoid pirated software. Use licensed anti virus software • Avoid sharing personal information in social media. (phone numbers, address) Ladies may avoid uploading photos
  21. 21. How to protect ourselves • Some of the college and school students in the name of confession pages, post messages maligning teachers and other students. When the victims complain to police, the person who writes can be imprisoned for 3 to 5 years. Avoid maligning others.
  22. 22. How to protect ourselves • Avoid taking unknown people as friends. Review frequently. • Avoid hate/abusive messages – Avoid ‘liking’ such message. Do not share such messages • Avoid uploading photos with intimate pose
  23. 23. How to protect ourselves • Avoid games In social media and mobile apps. (do not become addict) • Avoid apps as far as possible • Sharing of porno contents is punishable under IPC and IT Act. • Impersonation is dangerous
  24. 24. How to protect ourselves • Avoid forwarding controversial mails or messages through internet and mobile • Victims of cyber offense should file a police complaint • Ensure safe journey in Cyber Space
  25. 25. Avoid addiction to internet -treat social media like shoes – use only when you need
  26. 26. Thank you K. Srinivasan Prime Point Foundation and Editor in Chief PreSense and New Gen Thamizhan www.corpezine.com prpoint@gmail.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×