SlideShare a Scribd company logo
1 of 19
Download to read offline
HOWTO BE SAFE ONLINE
Presented By:
Abhinav Prakash Pathak
TYPES OF SOCIAL MEDIA
Social Media
Facebook
• A popular free social networking website that
allows registered users to create profiles,
upload photos and video, send messages and keep
in touch with friends, family and colleagues
Snapchat
• A photo messaging application that enables
the user to take pictures, record videos, add texts
and drawings, and send them to a list of recipients.
Instagram
• A Free online photo sharing and
social network platform that allows members users to upload, edit and share
photos with other members through the Instagram website, email, and social
media sites such asTwitter, Facebook,Tumblr.
Twitter
• A Free social networking microblogging service that allows registered
members to broadcast short posts called tweets.Twitter members can
broadcast tweets and follow other users' tweets by using multiple platforms
and devices.
Benefits of Social Media
1. Communication with friends and family members;
can comment on life events
1. Ways to update on one’s life without a phone call or
a letter.
2. Can contact people they haven’t talked to or heard
from in a while.
3. Allows for self expression (Art, music and political
ideas).
4. Helps develop self-identity.
Risks/Dangers of Social Media
•Cyber Bullying
•Geolocation
•Inappropriate content
•Sexting
•Online Predators
•Breaking Laws
Using Social Media Safely
Privacy and security settings exist for a reason: Learn about and use the
privacy and security settings on social networks. They are there to help you
control who sees what you post and manage your online experience in a
positive way.
Keep personal info personal: Be cautious about how much personal
information you provide on social networking sites. The more information you
post, the easier it may be for a hacker or someone else to use that information
to steal your identity, access your data or commit other crimes such as stalking.
When in doubt, throw it out: Links in email, tweets, posts and online
advertising are often how cybercriminals try to steal your personal information.
Even if you know the source, if something looks suspicious, delete it.
Know what action to take: If someone is harassing or threatening you,
remove them from your friends list, block them and report them to the
site administrator.
Keep security software current: Having the latest security software, web
browser and operating system is the best defense against viruses,
malware and other online threats.
Own your online presence: When applicable, set the privacy and security
settings on websites to your comfort level for information sharing. It’s OK
to limit how and with whom you share information.
Unique account, unique passphrase: Having separate passphrases for
every account helps to thwart cybercriminals. At a minimum, separate
your work and personal accounts and make sure that your critical
accounts have the strongest passphrases.
CASES REGISTERED UNDER CYBER CRIME CASES DURING 2015 (All
India 11,592)
Number of
Cases Re
gistered
upto 20
15
0
to
6
1
Above 500
Map P
owered by DevInfo, UNICEF
6
0
to
2
1
15
1
to25
0
25
1
to50
0
Sl.
No
Crime Heads under
IPC Crimes
Cases Registered
%
Var.
Persons Arrested
%
Var.
2013 2014 2015 2013 2014 2015
1
Offences by Public
Servant
1 0 0 - 2 0 0 -
2
Fabrication/Destruction
of
Electronic Records for
Evidence
12 1 4 300.0 11 1 2 50.0
3 Cheating@ - 1,115 2,255 102.2 - 335 754 55.6
4 Forgery 747 63 45 -28.6 626 58 72 19.4
5 Data Theft@ - 55 84 52.7 - 11 135 91.9
6 Criminal Breach of
Trust
518 54 42 -22.2 471 39 1,292 97
7 Counterfeiting * 59 10 12 20.0 93 8 14 42.9
8 Others - 974 980 0.6 - 772 598 -29.1
Total Offences under IPC
1,337 2,272 3,422 50.6 1,203 1,224 2,867 57.3
How to know if you are victim of Cyber
Crime Fraud
•Cyber defamation & cyber bullying: Publishing defamatory statements against
the CM of any state on social media platforms like Facebook or twitter.
•Cyber bullying: Posting obscene pictures of a woman on social media or
blackmailing her with her private pictures with the intention to obtain sexual
favors, sending her rape threats via text messages.
•Taking obscene pictures and videos of any woman engaged in private activities
with the use of mobile phone or camera.
• Cyber stalking: Sending messages to any woman on social media and calling her
on her mobile phone despite her clear ignorance.
•Selling pornography, obscene pictures and videos through online platform.
Cyber theft: Stealing personal data, financial information or business/corporate data
of any person or company from their computer systems.
Cyber Fraud:Attaching a fake electronic signature to an electronic contract.
Making a false electronic document to produce it as evidence against the accused in
the court of law.
Deceiving the customers with damaged products on e-commerce platforms
(Amazon, OLX India, Flipkart) and inducing them to make online payments for those
products.
Phishing: Sending fake messages or emails with a link to a particular webpage to
induce the victims to unwittingly enter personal data (contact details, bank account
details, and passwords, etc) or with the intention to install harmful viruses in the
devices of the victims as soon as they open the link.
Hacking & cyber bullying: Hacking someone’s social media account to make fake
posts on their behalf.
Cyber terrorism & cyberextortion: Hacking someone’s computer to encrypt all the
data and files stored in the computer and demanding ransom to decrypt them.
PROCEDURE FOR FILLING
ONLINE COMPLAINT
The cybercrime complaints can be registered on National Cyber
Crime Reporting Portal which is the initiative of the Government
of India to facilitate the nation-wide cybercrime complaints and
to make it feasible for the victims/complainants to have access to
the cybercrime cells and to all the information related to
cybercrimes at their fingertips. National Cyber Crime Reporting
Portal is one of the components of Indian Cyber Crime
Coordination Centre established by the Ministry of Home Affairs,
Government of India and deals with all types of cybercrimes.
Report Crime related to Women or Children
1. Child Pornography (CP)
2. Child Sexual Abuse Material (CSAM)- Material containing sexually
3. explicit images (in any form) of a child who is abused or exploited
4. Sexually explicit content (such as Rape/Gangrape)
Report Other Cybercrimes
1. Mobile crimes
2. Social Media crimes
3. Online financial frauds
4. Cyber trafficking
5. Ransomware
6. Hacking
How to file cyber crime complaint online?
1.Go to National Cyber Crime Reporting Portal of Ministry of home affairs.
Link: https://cybercrime.gov.in/
•Click on tab ‘File a Complaint’. Then accept the terms and conditions and click on
‘Accept’ tab. It will lead you to new page.
•On new page you will get to two options. If your complaint is related to cyber
crime against woman or child then choose option ‘Report cyber crime related to
women/child’ and click on ‘Report’. In these cases you can also report
anonymously.
If your complaint is related other than this then click on ‘Report other cyber
crimes’.
•After choosing right option you have to login for website. For login, fill all the
information required then enter your mobile number to generate OTP (One Time
Password).While choosing State/UT choose option where crime was committed.
•Fill all the details and submit. You will get number by which you can track your
complaint.
THANK YOU…

More Related Content

What's hot

Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...International Islamic University Malaysia
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Benjamin Ang
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Matthew Charles
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 

What's hot (20)

Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 

Similar to How to safe online (presented by abhinav pathak)

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 

Similar to How to safe online (presented by abhinav pathak) (20)

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Internet safety
Internet safetyInternet safety
Internet safety
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Facebook
FacebookFacebook
Facebook
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

How to safe online (presented by abhinav pathak)

  • 1. HOWTO BE SAFE ONLINE Presented By: Abhinav Prakash Pathak
  • 3. Social Media Facebook • A popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues Snapchat • A photo messaging application that enables the user to take pictures, record videos, add texts and drawings, and send them to a list of recipients.
  • 4. Instagram • A Free online photo sharing and social network platform that allows members users to upload, edit and share photos with other members through the Instagram website, email, and social media sites such asTwitter, Facebook,Tumblr. Twitter • A Free social networking microblogging service that allows registered members to broadcast short posts called tweets.Twitter members can broadcast tweets and follow other users' tweets by using multiple platforms and devices.
  • 5. Benefits of Social Media 1. Communication with friends and family members; can comment on life events 1. Ways to update on one’s life without a phone call or a letter. 2. Can contact people they haven’t talked to or heard from in a while. 3. Allows for self expression (Art, music and political ideas). 4. Helps develop self-identity.
  • 6. Risks/Dangers of Social Media •Cyber Bullying •Geolocation •Inappropriate content •Sexting •Online Predators •Breaking Laws
  • 7. Using Social Media Safely Privacy and security settings exist for a reason: Learn about and use the privacy and security settings on social networks. They are there to help you control who sees what you post and manage your online experience in a positive way. Keep personal info personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data or commit other crimes such as stalking. When in doubt, throw it out: Links in email, tweets, posts and online advertising are often how cybercriminals try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
  • 8. Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them and report them to the site administrator. Keep security software current: Having the latest security software, web browser and operating system is the best defense against viruses, malware and other online threats. Own your online presence: When applicable, set the privacy and security settings on websites to your comfort level for information sharing. It’s OK to limit how and with whom you share information. Unique account, unique passphrase: Having separate passphrases for every account helps to thwart cybercriminals. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passphrases.
  • 9.
  • 10. CASES REGISTERED UNDER CYBER CRIME CASES DURING 2015 (All India 11,592) Number of Cases Re gistered upto 20 15 0 to 6 1 Above 500 Map P owered by DevInfo, UNICEF 6 0 to 2 1 15 1 to25 0 25 1 to50 0
  • 11.
  • 12.
  • 13. Sl. No Crime Heads under IPC Crimes Cases Registered % Var. Persons Arrested % Var. 2013 2014 2015 2013 2014 2015 1 Offences by Public Servant 1 0 0 - 2 0 0 - 2 Fabrication/Destruction of Electronic Records for Evidence 12 1 4 300.0 11 1 2 50.0 3 Cheating@ - 1,115 2,255 102.2 - 335 754 55.6 4 Forgery 747 63 45 -28.6 626 58 72 19.4 5 Data Theft@ - 55 84 52.7 - 11 135 91.9 6 Criminal Breach of Trust 518 54 42 -22.2 471 39 1,292 97 7 Counterfeiting * 59 10 12 20.0 93 8 14 42.9 8 Others - 974 980 0.6 - 772 598 -29.1 Total Offences under IPC 1,337 2,272 3,422 50.6 1,203 1,224 2,867 57.3
  • 14. How to know if you are victim of Cyber Crime Fraud •Cyber defamation & cyber bullying: Publishing defamatory statements against the CM of any state on social media platforms like Facebook or twitter. •Cyber bullying: Posting obscene pictures of a woman on social media or blackmailing her with her private pictures with the intention to obtain sexual favors, sending her rape threats via text messages. •Taking obscene pictures and videos of any woman engaged in private activities with the use of mobile phone or camera. • Cyber stalking: Sending messages to any woman on social media and calling her on her mobile phone despite her clear ignorance. •Selling pornography, obscene pictures and videos through online platform.
  • 15. Cyber theft: Stealing personal data, financial information or business/corporate data of any person or company from their computer systems. Cyber Fraud:Attaching a fake electronic signature to an electronic contract. Making a false electronic document to produce it as evidence against the accused in the court of law. Deceiving the customers with damaged products on e-commerce platforms (Amazon, OLX India, Flipkart) and inducing them to make online payments for those products. Phishing: Sending fake messages or emails with a link to a particular webpage to induce the victims to unwittingly enter personal data (contact details, bank account details, and passwords, etc) or with the intention to install harmful viruses in the devices of the victims as soon as they open the link. Hacking & cyber bullying: Hacking someone’s social media account to make fake posts on their behalf. Cyber terrorism & cyberextortion: Hacking someone’s computer to encrypt all the data and files stored in the computer and demanding ransom to decrypt them.
  • 16. PROCEDURE FOR FILLING ONLINE COMPLAINT The cybercrime complaints can be registered on National Cyber Crime Reporting Portal which is the initiative of the Government of India to facilitate the nation-wide cybercrime complaints and to make it feasible for the victims/complainants to have access to the cybercrime cells and to all the information related to cybercrimes at their fingertips. National Cyber Crime Reporting Portal is one of the components of Indian Cyber Crime Coordination Centre established by the Ministry of Home Affairs, Government of India and deals with all types of cybercrimes.
  • 17. Report Crime related to Women or Children 1. Child Pornography (CP) 2. Child Sexual Abuse Material (CSAM)- Material containing sexually 3. explicit images (in any form) of a child who is abused or exploited 4. Sexually explicit content (such as Rape/Gangrape) Report Other Cybercrimes 1. Mobile crimes 2. Social Media crimes 3. Online financial frauds 4. Cyber trafficking 5. Ransomware 6. Hacking
  • 18. How to file cyber crime complaint online? 1.Go to National Cyber Crime Reporting Portal of Ministry of home affairs. Link: https://cybercrime.gov.in/ •Click on tab ‘File a Complaint’. Then accept the terms and conditions and click on ‘Accept’ tab. It will lead you to new page. •On new page you will get to two options. If your complaint is related to cyber crime against woman or child then choose option ‘Report cyber crime related to women/child’ and click on ‘Report’. In these cases you can also report anonymously. If your complaint is related other than this then click on ‘Report other cyber crimes’. •After choosing right option you have to login for website. For login, fill all the information required then enter your mobile number to generate OTP (One Time Password).While choosing State/UT choose option where crime was committed. •Fill all the details and submit. You will get number by which you can track your complaint.