SlideShare a Scribd company logo
1 of 5
Download to read offline
India Advisory Notes
Safeguarding children from cyber
threats in times of a pandemic
Essential security practices
2 | P a g e
About us
The IET is one of the world’s largest professional societies for engineers, headquartered in the UK. Soon
to turn 150 years, we work closely with industry, academia and government in our mission to engineer a
better world. In line with this, we have specific global initiatives around key sectors that are relevant to
solving problems that impact the society at large. In India, we have over 13,000 members and wide
ranging activities in areas such as Future technologies, Future of Mobility and Transport, as well as the
Future of Work. Eminent engineers like Shri Ratan Tata, Former Chairman Tata Sons, N R Narayana
Murthy, Chairman Emeritus, Infosys and T V Ramachandran, President, Broadband India Forum (Ex-
Resident Director, Vodafone) are our Honorary Fellows.
With our members, we are driving innovation and change in the fields of engineering and technology.
We research, investigate, review and analyse the industry’s challenges, proposing solutions that will
have a significant impact on the world for years to come.
This advisory note is part of a series, put together by the IET’s expert volunteers in India in the backdrop
of the global pandemic brought about by Covid-19. In this paper, experts from our Cybersecurity
Working group detail how parents should conduct themselves in order to safeguard children from cyber
threats.
Read more about our Future Technology focus as well as our panels here:
https://india.theiet.org/innovation-knowledge/. To become a volunteer and to contribute, please write to
us at sectors@theiet.in
Disclaimers
This document is owned and maintained by the Institution of Engineering and Technology, India and the
design of the document is © IET India 2020.
The information contained in this document should not be interpreted as a representation of the views of
the IET, nor should it be assumed that it reflects any of its current or future policy. The information
cannot supersede any statutory or contractual requirements or liabilities and is offered without prejudice.
While the authors, publisher and contributors believe that the information and guidance given in this
work are correct, all parties must rely upon their own skill and judgement while making use of them.
Neither the authors nor the publishers assume any liability to anyone for any loss or damage caused by
an error or omission in the work, as a result of negligence or any other cause.
3 | P a g e
Introduction
Due to COVID-19, schools and colleges are non-operational across India. Although there is no
immediate disruption to education and teaching, learning has, almost entirely moved from physical
classrooms to online classes. This presents an added responsibility for parents to keep their children
safe from cyber criminals who could be trying to leverage this emergency and luring internet users to
click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best
practices to be followed to safeguard children from becoming targets of malware and thus, to protect
them cyber threats.
Make kids aware about cybersecurity threats
The essential factor in protecting children from cyber threats is to communicate
openly. Parents should treat cybersecurity as a subject of technology. A common
mistake is that parents approach online safety habits as a matter of values and
behaviour. In reality, children should be taught safe browsing behaviours as a skill
from a very young age.
Children should be made aware about social media deception tricks including the
ones where adversaries devise fraudulent profiles to befriend children pretending to
be friend or known buddy. Installing such malware helps cyber-criminals steal
sensitive information.
Safeguard your network
There are various content security products designed to protect home networks, and
they come with varying configurations at different security layers. They also offer
multiple configuration options to users for customising privacy settings to block
irrelevant content. Parents should explore these options proactively.
Use software and applications to restrict unsolicited content
To protect kids from content that is not suitable for their age, parents could use a host
of available apps as well as in-app filters. These applications restrict adult websites and
suspicious social networking sites for kids’ safety. They also check proxies and VPNs
that possibly allow bypassing content restrictions. They help enable ‘safe mode’ for
browsing the web and popular video platforms.
4 | P a g e
Use parental control applications
To ensure kids spend their extra time on the internet in a safe manner, parents can use
freely available control applications. These applications monitor and protect children
online. It is seen that this approach works better with younger kids than teenagers, as
teenagers quickly uncover ways to bypass such controls and access the content they
seek. Therefore, having open conversations with teenagers about being circumspect in
online environments are a better approach than such apps.
Before installing any stalker-ware applications it is important, that you ensure that they
are from a reliable source. Phony versions of these applications are aplenty and can be
cybersecurity threats by themselves.
Engage children onto learning platforms
In addition to applying necessary restrictions online, parents can also help their children
engage with a wealth of knowledge that is available online in a safe manner. Multiple
online learning platforms have now put their repertoire of content online for free
consumption. Learning resources like the IET’s Faraday Programme offer cool projects
and fun activities that could be tried at home. These are extremely engaging set of
activities that help learning concepts in Science, Technology, Engineering and
Mathematics (STEM). Explore them here: https://education.theiet.org/primary/ and
https://education.theiet.org/secondary/
Social responsibility
Technology organisations and telecom providers must come forward and do everything
they can, to keep children safe online. These includes providing access to no-cost (toll
free) child helplines, age-appropriate services and reliable e-education platforms. They
could also act as advocates of best practices and share child online safety advisories
with their subscribers at regular intervals.
Cautiousness against socially engineered attacks
From executives to employees to children - all those using home networks are potential
targets of cyber attackers. Social engineering always preys on unpatched vulnerabilities.
It is a constant attack that goes round the clock. Children are soft targets as
cybercriminals are experts in the art of masquerading, influencing, and devising
methods to trick children. A moment of lapse, and children inadvertently end up giving
attackers easy access to our networks and facilities.
While it is best practice to not share credit card details with anyone, if parents have
shared their credit card details and internet banking credentials with their children, it is
essential to regularly monitor and keep an eye on statements/bills to save themselves
from financial thefts that are on the rise.
5 | P a g e
Conclusion
We believe that we are currently witnessing the largest remote working scenario in the history of
mankind. While organisations are working on a range of measures to protect the interests of enterprise
security, cyber criminals are always exploring new ways to exploit vulnerabilities. The indispensability of
technology in lives of children and their active presence over the internet makes them a soft target for
cyber risks. Hence, it is important that children are equipped with the knowledge and skills to be safe
and responsible online and parents can play an important role in doing this.
People are following social distancing for the last few weeks to protect themselves against the novel
coronavirus. Likewise, people should learn and practice cyber distancing to safeguard themselves from
attackers.
Contributor
Anand Handa
Member – IET Cybersecurity Working Group
Project Executive Officer, Interdisciplinary Centre for Cyber Security and Cyber
Defence of Critical Infrastructures, Department of Computer Science and
Engineering, Indian Institute of Technology, Kanpur
If you have a question or query, please feel free to reach out to us at sectors@theiet.in. Read more
about our work at india.theiet.org

More Related Content

What's hot

MIT-e Program Information
MIT-e Program InformationMIT-e Program Information
MIT-e Program Informationbkamradt
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Jason Hong
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'JISC RSC Eastern
 
2010 09 27 e-safety master ver3
2010 09 27 e-safety master ver32010 09 27 e-safety master ver3
2010 09 27 e-safety master ver3Joy Rosario
 
Q3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfQ3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfBryanSmile
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Parental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneParental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneNischint
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security PresentationJonathan Ezor
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignoredrichard_turner
 
Digital citizenship and Digiteen intro
Digital citizenship and Digiteen introDigital citizenship and Digiteen intro
Digital citizenship and Digiteen introFlat Classroom
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignoredrichard_turner
 
Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyChildrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyAntonino Galo
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 

What's hot (20)

MIT-e Program Information
MIT-e Program InformationMIT-e Program Information
MIT-e Program Information
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
2010 09 27 e-safety master ver3
2010 09 27 e-safety master ver32010 09 27 e-safety master ver3
2010 09 27 e-safety master ver3
 
Challenges of adopting ar in education
Challenges of adopting ar in educationChallenges of adopting ar in education
Challenges of adopting ar in education
 
Q3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfQ3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdf
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Parental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneParental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhone
 
Reasons For Considering Mobile Learning
Reasons For Considering Mobile LearningReasons For Considering Mobile Learning
Reasons For Considering Mobile Learning
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
Digital citizenship and Digiteen intro
Digital citizenship and Digiteen introDigital citizenship and Digiteen intro
Digital citizenship and Digiteen intro
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyChildrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Similar to IET India Advisory: Safeguarding children from cyber threats in times of a pandemic

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )MAHIRA
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipInas Hafi
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelinesAVINASHRANJAN49
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Assignment Help
 
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...digitalrajnikant
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipggfg123
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 

Similar to IET India Advisory: Safeguarding children from cyber threats in times of a pandemic (20)

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Kinderguarded Intro
Kinderguarded IntroKinderguarded Intro
Kinderguarded Intro
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Resources
ResourcesResources
Resources
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelines
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
E-Safety
E-SafetyE-Safety
E-Safety
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 

More from IET India

Digital twins for secure, green and healthy future cities
Digital twins for secure, green and healthy future citiesDigital twins for secure, green and healthy future cities
Digital twins for secure, green and healthy future citiesIET India
 
Leveraging blockchain to transform rattled supply chains
Leveraging blockchain to transform rattled supply chainsLeveraging blockchain to transform rattled supply chains
Leveraging blockchain to transform rattled supply chainsIET India
 
Ventilator tracking for Covid-19 preparedness
Ventilator tracking for Covid-19 preparednessVentilator tracking for Covid-19 preparedness
Ventilator tracking for Covid-19 preparednessIET India
 
Electric vehicle charging infrastructure in India: Challenges and road ahead
Electric vehicle charging infrastructure in India: Challenges and road aheadElectric vehicle charging infrastructure in India: Challenges and road ahead
Electric vehicle charging infrastructure in India: Challenges and road aheadIET India
 
Resetting urban mobility 2020+ in India
Resetting urban mobility 2020+ in IndiaResetting urban mobility 2020+ in India
Resetting urban mobility 2020+ in IndiaIET India
 
Learning and Skilling - A Future Work Perspective
Learning and Skilling - A Future Work PerspectiveLearning and Skilling - A Future Work Perspective
Learning and Skilling - A Future Work PerspectiveIET India
 
Enabling Indian manufacturing MSMEs for global competitiveness
Enabling Indian manufacturing MSMEs for global competitivenessEnabling Indian manufacturing MSMEs for global competitiveness
Enabling Indian manufacturing MSMEs for global competitivenessIET India
 
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...IET India
 
E-mobility trends in India: Challenges and Opportunities
E-mobility trends in India: Challenges and OpportunitiesE-mobility trends in India: Challenges and Opportunities
E-mobility trends in India: Challenges and OpportunitiesIET India
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
Urban mobility in Bengaluru- Key takeaway report
Urban mobility in Bengaluru- Key takeaway reportUrban mobility in Bengaluru- Key takeaway report
Urban mobility in Bengaluru- Key takeaway reportIET India
 
IET's Engineering the Future of Work Playbook
IET's Engineering the Future of Work PlaybookIET's Engineering the Future of Work Playbook
IET's Engineering the Future of Work PlaybookIET India
 
IoT reshaping society
IoT reshaping societyIoT reshaping society
IoT reshaping societyIET India
 
IIoT for India's growth
IIoT for India's growthIIoT for India's growth
IIoT for India's growthIET India
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 
IoT for the energy sector
IoT for the energy sectorIoT for the energy sector
IoT for the energy sectorIET India
 
Indian telecom getting ready for m2 m iot
Indian telecom getting ready for m2 m iotIndian telecom getting ready for m2 m iot
Indian telecom getting ready for m2 m iotIET India
 
IoT case studies from india
IoT case studies from indiaIoT case studies from india
IoT case studies from indiaIET India
 
Fresh Thinking to SAFENET for IoT
 Fresh Thinking to SAFENET for IoT Fresh Thinking to SAFENET for IoT
Fresh Thinking to SAFENET for IoTIET India
 
Smart Education – Making education Efficient, Affordable and Reachable for India
Smart Education – Making education Efficient, Affordable and Reachable for IndiaSmart Education – Making education Efficient, Affordable and Reachable for India
Smart Education – Making education Efficient, Affordable and Reachable for IndiaIET India
 

More from IET India (20)

Digital twins for secure, green and healthy future cities
Digital twins for secure, green and healthy future citiesDigital twins for secure, green and healthy future cities
Digital twins for secure, green and healthy future cities
 
Leveraging blockchain to transform rattled supply chains
Leveraging blockchain to transform rattled supply chainsLeveraging blockchain to transform rattled supply chains
Leveraging blockchain to transform rattled supply chains
 
Ventilator tracking for Covid-19 preparedness
Ventilator tracking for Covid-19 preparednessVentilator tracking for Covid-19 preparedness
Ventilator tracking for Covid-19 preparedness
 
Electric vehicle charging infrastructure in India: Challenges and road ahead
Electric vehicle charging infrastructure in India: Challenges and road aheadElectric vehicle charging infrastructure in India: Challenges and road ahead
Electric vehicle charging infrastructure in India: Challenges and road ahead
 
Resetting urban mobility 2020+ in India
Resetting urban mobility 2020+ in IndiaResetting urban mobility 2020+ in India
Resetting urban mobility 2020+ in India
 
Learning and Skilling - A Future Work Perspective
Learning and Skilling - A Future Work PerspectiveLearning and Skilling - A Future Work Perspective
Learning and Skilling - A Future Work Perspective
 
Enabling Indian manufacturing MSMEs for global competitiveness
Enabling Indian manufacturing MSMEs for global competitivenessEnabling Indian manufacturing MSMEs for global competitiveness
Enabling Indian manufacturing MSMEs for global competitiveness
 
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...
 
E-mobility trends in India: Challenges and Opportunities
E-mobility trends in India: Challenges and OpportunitiesE-mobility trends in India: Challenges and Opportunities
E-mobility trends in India: Challenges and Opportunities
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
Urban mobility in Bengaluru- Key takeaway report
Urban mobility in Bengaluru- Key takeaway reportUrban mobility in Bengaluru- Key takeaway report
Urban mobility in Bengaluru- Key takeaway report
 
IET's Engineering the Future of Work Playbook
IET's Engineering the Future of Work PlaybookIET's Engineering the Future of Work Playbook
IET's Engineering the Future of Work Playbook
 
IoT reshaping society
IoT reshaping societyIoT reshaping society
IoT reshaping society
 
IIoT for India's growth
IIoT for India's growthIIoT for India's growth
IIoT for India's growth
 
IoT and security
IoT and securityIoT and security
IoT and security
 
IoT for the energy sector
IoT for the energy sectorIoT for the energy sector
IoT for the energy sector
 
Indian telecom getting ready for m2 m iot
Indian telecom getting ready for m2 m iotIndian telecom getting ready for m2 m iot
Indian telecom getting ready for m2 m iot
 
IoT case studies from india
IoT case studies from indiaIoT case studies from india
IoT case studies from india
 
Fresh Thinking to SAFENET for IoT
 Fresh Thinking to SAFENET for IoT Fresh Thinking to SAFENET for IoT
Fresh Thinking to SAFENET for IoT
 
Smart Education – Making education Efficient, Affordable and Reachable for India
Smart Education – Making education Efficient, Affordable and Reachable for IndiaSmart Education – Making education Efficient, Affordable and Reachable for India
Smart Education – Making education Efficient, Affordable and Reachable for India
 

Recently uploaded

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

IET India Advisory: Safeguarding children from cyber threats in times of a pandemic

  • 1. India Advisory Notes Safeguarding children from cyber threats in times of a pandemic Essential security practices
  • 2. 2 | P a g e About us The IET is one of the world’s largest professional societies for engineers, headquartered in the UK. Soon to turn 150 years, we work closely with industry, academia and government in our mission to engineer a better world. In line with this, we have specific global initiatives around key sectors that are relevant to solving problems that impact the society at large. In India, we have over 13,000 members and wide ranging activities in areas such as Future technologies, Future of Mobility and Transport, as well as the Future of Work. Eminent engineers like Shri Ratan Tata, Former Chairman Tata Sons, N R Narayana Murthy, Chairman Emeritus, Infosys and T V Ramachandran, President, Broadband India Forum (Ex- Resident Director, Vodafone) are our Honorary Fellows. With our members, we are driving innovation and change in the fields of engineering and technology. We research, investigate, review and analyse the industry’s challenges, proposing solutions that will have a significant impact on the world for years to come. This advisory note is part of a series, put together by the IET’s expert volunteers in India in the backdrop of the global pandemic brought about by Covid-19. In this paper, experts from our Cybersecurity Working group detail how parents should conduct themselves in order to safeguard children from cyber threats. Read more about our Future Technology focus as well as our panels here: https://india.theiet.org/innovation-knowledge/. To become a volunteer and to contribute, please write to us at sectors@theiet.in Disclaimers This document is owned and maintained by the Institution of Engineering and Technology, India and the design of the document is © IET India 2020. The information contained in this document should not be interpreted as a representation of the views of the IET, nor should it be assumed that it reflects any of its current or future policy. The information cannot supersede any statutory or contractual requirements or liabilities and is offered without prejudice. While the authors, publisher and contributors believe that the information and guidance given in this work are correct, all parties must rely upon their own skill and judgement while making use of them. Neither the authors nor the publishers assume any liability to anyone for any loss or damage caused by an error or omission in the work, as a result of negligence or any other cause.
  • 3. 3 | P a g e Introduction Due to COVID-19, schools and colleges are non-operational across India. Although there is no immediate disruption to education and teaching, learning has, almost entirely moved from physical classrooms to online classes. This presents an added responsibility for parents to keep their children safe from cyber criminals who could be trying to leverage this emergency and luring internet users to click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best practices to be followed to safeguard children from becoming targets of malware and thus, to protect them cyber threats. Make kids aware about cybersecurity threats The essential factor in protecting children from cyber threats is to communicate openly. Parents should treat cybersecurity as a subject of technology. A common mistake is that parents approach online safety habits as a matter of values and behaviour. In reality, children should be taught safe browsing behaviours as a skill from a very young age. Children should be made aware about social media deception tricks including the ones where adversaries devise fraudulent profiles to befriend children pretending to be friend or known buddy. Installing such malware helps cyber-criminals steal sensitive information. Safeguard your network There are various content security products designed to protect home networks, and they come with varying configurations at different security layers. They also offer multiple configuration options to users for customising privacy settings to block irrelevant content. Parents should explore these options proactively. Use software and applications to restrict unsolicited content To protect kids from content that is not suitable for their age, parents could use a host of available apps as well as in-app filters. These applications restrict adult websites and suspicious social networking sites for kids’ safety. They also check proxies and VPNs that possibly allow bypassing content restrictions. They help enable ‘safe mode’ for browsing the web and popular video platforms.
  • 4. 4 | P a g e Use parental control applications To ensure kids spend their extra time on the internet in a safe manner, parents can use freely available control applications. These applications monitor and protect children online. It is seen that this approach works better with younger kids than teenagers, as teenagers quickly uncover ways to bypass such controls and access the content they seek. Therefore, having open conversations with teenagers about being circumspect in online environments are a better approach than such apps. Before installing any stalker-ware applications it is important, that you ensure that they are from a reliable source. Phony versions of these applications are aplenty and can be cybersecurity threats by themselves. Engage children onto learning platforms In addition to applying necessary restrictions online, parents can also help their children engage with a wealth of knowledge that is available online in a safe manner. Multiple online learning platforms have now put their repertoire of content online for free consumption. Learning resources like the IET’s Faraday Programme offer cool projects and fun activities that could be tried at home. These are extremely engaging set of activities that help learning concepts in Science, Technology, Engineering and Mathematics (STEM). Explore them here: https://education.theiet.org/primary/ and https://education.theiet.org/secondary/ Social responsibility Technology organisations and telecom providers must come forward and do everything they can, to keep children safe online. These includes providing access to no-cost (toll free) child helplines, age-appropriate services and reliable e-education platforms. They could also act as advocates of best practices and share child online safety advisories with their subscribers at regular intervals. Cautiousness against socially engineered attacks From executives to employees to children - all those using home networks are potential targets of cyber attackers. Social engineering always preys on unpatched vulnerabilities. It is a constant attack that goes round the clock. Children are soft targets as cybercriminals are experts in the art of masquerading, influencing, and devising methods to trick children. A moment of lapse, and children inadvertently end up giving attackers easy access to our networks and facilities. While it is best practice to not share credit card details with anyone, if parents have shared their credit card details and internet banking credentials with their children, it is essential to regularly monitor and keep an eye on statements/bills to save themselves from financial thefts that are on the rise.
  • 5. 5 | P a g e Conclusion We believe that we are currently witnessing the largest remote working scenario in the history of mankind. While organisations are working on a range of measures to protect the interests of enterprise security, cyber criminals are always exploring new ways to exploit vulnerabilities. The indispensability of technology in lives of children and their active presence over the internet makes them a soft target for cyber risks. Hence, it is important that children are equipped with the knowledge and skills to be safe and responsible online and parents can play an important role in doing this. People are following social distancing for the last few weeks to protect themselves against the novel coronavirus. Likewise, people should learn and practice cyber distancing to safeguard themselves from attackers. Contributor Anand Handa Member – IET Cybersecurity Working Group Project Executive Officer, Interdisciplinary Centre for Cyber Security and Cyber Defence of Critical Infrastructures, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur If you have a question or query, please feel free to reach out to us at sectors@theiet.in. Read more about our work at india.theiet.org