High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Cyber.ppt
1. Information Security and Cyber Crimes:
The objective of this message is to educate
and create awareness amongst the public on
use of Technology, Internet media and its
implications on possible cyber crimes. Some
of the possible preventive measures, one can
take to avoid getting victimized for a cyber
crime
2. At the end of this presentation you
will learn
What is Cyber Crime
Types of Cyber Crime
Threats & Trends of Cyber Crime
3. Criminals & Internet
Cyber Laws Cyber crime is a generic term that refers to all
criminal activities done using the medium of computers, the
internet, cyber space and the worldwide web.
"Cyber Security“ means protecting information, equipment,
devices, computer, computer resource, communication device
and information stored therein from unauthorized access, use,
disclosure, disruption, modification or destruction.
Cyber law is a term used to describe the legal issues related
to use of communications technology, particularly
"cyberspace", i.e. the Internet. Cyber Law is represented by
Indian IT ACT 2008
5. Cyber Crime – Upward Trends
• Huge increase in the use of Internet and smart phones
• Individuals share personal and work related
information on Internet
•Critical and sensitive information are shared on
Internet
• Financial transactions take place on Internet
• Security controls are never 100% and adequate
• BAD guys are always ahead of GOOD guys
6. Cyber Crime – Its No more a
fun
Committing any crime using
cyber space (using internet) is
no more fun as there are
stringent laws.
7. Common Cyber-crime scenarios and
Applicability of Legal Sections
Let us look into some common cyber-crime scenarios
which can attract prosecution as per the penalties and
offences prescribed in IT Act 2000 (amended via 2008)
Act and Indian Penal Codes.
8. ATM Card Fraud and Lottery Fraud
• Committing cheating by impersonation in the name of
bank manager or e.g. using names and logos of reputed
companies
Provisions Applicable:- Sections 66C, 66D of IT Act and
section 420 of the IPC.
9. Harassment via fake public profile on social
networking site
• Creation of fake profile in social media using personal
details of others like picture, name and other data
Provisions Applicable:- Sections 66C of IT Act and 500 of
IPC
10. Online Hate Community
• Uploading mainly in social media and in other websites etc
with intent to spread communal hatred
Provisions Applicable: Section and 153/153A /
153B/295/295A/504/505 of the Indian Penal Code.
11. Email Account Hacking
• Making unauthorized access / hacking of mail ID , any
type of social network IDs, websites etc
Provisions Applicable:- Section 66 of Information
Technology Act
12. Creation of fake websites mainly for
cheating or defamation
• If any fake website or alike website is created for the
purpose of cheating or defamation to any organization
where identical features and logos are used.
• Provisions Applicable:- 66D of IT Act and
468/469/471/419/420 IPC
13. Introducing malignant contents, alteration
and deletion of data etc
• If any virus, worm, trojan,bug,backdoor,rootkit etc are
introduced in any computer system or if any alteration ,
deletion of data or unauthorized copying or erasing are
made.
Provisions Applicable:- Punishable under section 66 of IT
Act
14. Cyber Terrorism
• If with intent to threaten the unity , integrity , security or
sovereignty of country or to strike terror in the people or
for any act which may cause denial of services of computer
system
• Punishable u/s 66F of IT act
15. Online sale of illegal Articles
• Where sale of narcotics, drugs weapons and wildlife is
facilitated by the Internet
Provisions Applicable:- Generally conventional laws are
applied in these cases.
16. Phishing and Email Scams
• Phishing involves fraudulently acquiring sensitive
information through masquerading a site as a trusted
entity. (E.g. Passwords, credit card information)
Provisions Applicable:- section 66D of IT Act and Section
419/420 of IPC
17. Theft of Confidential Information (
Data Theft)
• Many business organizations store their confidential
information in computer systems. This informations are
targeted by rivals, criminals and disgruntled employees.
Provisions Applicable:- Sections 72/72A of IT Act and
406/408 of Indian Penal Code
18. Source Code Theft
• Source code generally is the most coveted and important
“crown jewel” asset of a company. If intentionally destroys
or alteration of source of code is committed which is
punishable under the following section of law.
• Provisions applicable:- Section 65 of IT Act and Section 63
of Copyright Act.
19. Uploading of videos/pictures having
sexual/pornographic contents
• Whoever publishes or transmits or causes to be published in the
electronic form, any material which is lascivious or appeals to
the prurient interest and for defamation of woman/girl.
• It is punishable u/s 67/67A/67B of IT Act and 354D/500/509 IPC
which may extent to more than 7 years.
• If morphing is made in the sexual material then sections
67/67A/67B of IT Act and 465/469/471/354D/500/509 IPC
20. Cyber Crime
• Curiosity and Revenge may be
primary reasons for a perpetrator
to get motivated for a cyber crime.
• Most of the times, people are not
aware about the implications of
cyber crimes/laws
• Girls are the most found victims of
a cyber crimes
• Monetary un-lawful or quick
Gain/profit
21. Common Scenarios – Defamatory Post
It is usually found that a victim shares photographs and personal videos in
good faith at the time of good relationship but the same photographs and
videos can be edited and uploaded in different social media sites and bad
websites in the pretext of revenge, defame, blackmail etc.
“Dos and don'ts"
Do not share your personal photographs and videos to
anyone,
Always secure your Profile picture in the social media, do
not accept friend requests from un-known persons.
22. Vishing calls (BANKING FRAUD)
IT IS ALSO COMMON THAT ONE RECEIVES FRAUD CALL FROM
UNKNOWN MOBILE NUMBERS REVEALING THEMSELVES AS BANK
MANAGERS OF REPUTED BANK AND IN THE NAME OF GIVING
SERVICE MANAGES TO COLLECT THE DEBIT CARD DETAILS AND
OTP’S, EVENTUALLY SYPHONING THE AMOUNT FROM THE
VICTIMS’ BANK ACCOUNT.
"Dos and Don'ts"
DO NOT ENTERTAIN ANY CALL WHO POSES AS CALLING FROM
BANK AUTHORITIES
DO NOT AT ANY CONDITION SHARE YOUR OTP’S TO ANY ONE
DO NOT SHARE YOUR “BANKING “SECURE PIN”
BANK NEVER ASK FOR ANY CARD NO OR OTP’S OR PIN NO. ETC
23. FACEBOOK RELATED FRAUD
Fraudsters these days use face book as the platform to cheat
innocent people, the fraudster creates an fancy face book
profile (foreigners) and sends friend requests which gets
accepted by common victims. Over a period of time and several
conversations once the fraudster has relevant information
about the victim (birthdays, anniversary, etc) he poses to have
sent gifts from abroad having high values, the victim then gets
call of confirmation from airport customs that a gift has come
which has high value and needs payment for clearance, the
victim pays the initial amount and there on keeps on receiving
call demanding money for more clearance and at the day gets
cheated.
"Dos and Don'ts"
DO NOT ACCEPT FRIEND REQUEST FROM UNKNOWN
PERSONS ON FACEBOOK OR ANY SOCIAL MEDIA.
DO NOT PAY FOR ANY GIFTS
24. Fake website related recruitment fraud:
A fraudster creates alike website copying the entire
details from the Original Organisation and they
upload the false results containing the name of the
candidates (victims), charges money from innocent
youths pursuing a career. Who pay them in the
belief of getting Job? But later finds out at the time
of Joining that the entire process was a fraud.
Dos & Don’ts
Do not believe in touts as there are no ways
they can land you to a Job.
Look the URL of the website carefully. Contact
with the admin (contact details are available in
google) of the website before believing it.
25. Insurance Fraud:
Fraudster mainly targets senior citizens and generally
contact them during the noon hours, in the name of
reopening the lapsed Insurance, they also visit their houses
and convinces the victim to issue cheques or and at times
provides an erasing pen to sign the cheque which they later
encash, thereby cheating the elderly people of huge fund.
They also issues new insurances in the name of the victim
as they get a majority of the commission for this.
"Dos and Don'ts"
Do not allow insurance agents to your house in
respect this sort of call.
26. Retired Servicemen Fraud:
Fraudster mainly posing as to be calling from the central
team calls retired persons and informs them that they have
sum of money which is due as arrear which will be credited
to the their account. But in order to avail the same the
victim needs to pay processing fees to different bank
accounts. At the end after paying the processing fees the
amount never gets credited to the victims account and
thereby gets cheated.
"Dos and Don'ts"
Do not entertain such type of calls, verify from
your former department about any increment or
arrears.
Departments never says to pay processing fees
into personal bank account
27. Other Common Cyber Crimes
Cyber crimes can be categorized and listed in multiple ways,
however some of the other common cyber crimes observed
are as below but not limited to :
• Cyber stalking
• Cyber Bullying
• Installing Key loggers
• Cyber Terrorism
• Email based Frauds
• Web jacking
• Online Gambling
• DoS Attacks
29. Security Awareness
• Passwords are the only and/OR the primary option to
ensure privacy of your information
• Ensure Passwords are complex in nature
•Do not write passwords
•Do Not Keep your Display Pic (DP) in Whatsapp open
to everyone
• Do Not Accept friend request from unknown person.
• Keep your photos in Facebook secured
• Log- out from all devices after completing your work.
30. Security Awareness – Social Media
Social Media (FB, twitter, etc) is now an integral part of
our daily life
Be sensitive in what you upload on your social
networking account (status, pics, etc)
Use security and privacy options provided by social
media sites
SMS based second factor authentication
Access control (who can see what)
Browser /machine mapping to your social media profile
Block
Keep your personal details, personal.
31. Security Awareness – Smart mobile devices
• Connect to ONLY authorized wifi access
• Use auto lock features
• Download apps from authorized app stores ONLY
• Use Privacy options provided by various mobile
Operating system
• Do NOT accept calls from weird numbers OR do not
give a call back