SlideShare a Scribd company logo
1 of 58
Download to read offline
Arjun Chetry
Cyber Crime Awareness
Agenda
Cyber crime in brief
Mode of operation
Internet safety measures
Banking precautions
Mobile Apps or software precautions
Cyber safety – precautions
Cyber crime overview
The twentieth century has brought to reality the idea of a global village, where
digital technology has interconnected and enmeshed the world economies, cultures
and populations.
Cyber crimes know no borders and evolve at a pace at par with emerging
technologies.
Cyber crime is increasing exponentially – Why?
List of countries by number of mobile phones in use
Phishing
Malware
Social Media
Platform
Social
Engineering
Mode of Operation
MALicious softWARE
Safety tips to protect your Computer from
Key loggers, Trojans, and Spy
As a common practice do not open suspicious or unsolicited emails (spam
emails). Delete them from your Inbox.
Even if you do open a spam email, under any circumstances do not click on any
links, or open/download any files attached to them.
If possible, scan your suspected downloaded files in website
www.virustotal.com
Cyber crime cases
Cyber crime cases
Cyber crime cases
Cyber crime cases
Cyber crime cases
Protect your communication devices
•Prevent others from accessing your
devices by providing password, PIN,
Pattern or biometric information.
•Always install applications to your mobile
phones, computers, etc. from a trusted
source only e.g. Play store, App store or
from official company websites
Software
Never trust the
stranger
Checksum
verification
techniques
Read the license
agreement – I
AGREE
Mobile Phone - Precautions
Record the unique 15
digit IMEI number.
In case Mobile phone is
stolen/lost, this IMEI
number is required for
registering complaint at
Police station and may
help in tracking your
mobile phone through
service provider.
Report lost or stolen
devices:
• Report lost or stolen devices
immediately to the nearest
Police Station and concerned
service provider.
• Use mobile tracking feature.
WIFI
Mobile
Hotspot
Safety tips to avoid Online Shopping Frauds
Verify that you are receiving emails from the correct source and that you are logging in at
the correct website.
Check for feedback and rating of the buyer, which most online auction website provide.
Check if the product you are purchasing has appropriate warranty and documentation with it. If not,
make sure that you intend to purchase it without that protection. Check if shipping and delivery is
covered by the seller or if you have to bear those costs.
DO NOT respond to emails that ask for your personal information, such as your log in
details or credit card details.
How can you protect yourself in Social Networking sites?
Limit the amount of personal information you post
Remember that the internet is a public
Beware of strangers - The internet makes it easy for people to misrepresent their
identities and motives
Identify the Real group/page of organization
Be skeptical - Don't believe everything you read online
Check privacy policies for your account including mobile apps
How can we protect children in Social Networking sites?
Help your kids understand what information should be private.
Explain that kids should post only information that you – and they – are comfortable with others seeing.
Use privacy settings to restrict who can access and post on your child’s website.
Remind your kids that once they post information online, they can’t take it back.
Talk to your kids about avoiding sex talk online.
If they ever feel uncomfortable or threatened by anything online, encourage them to tell you.
Review your kid’s friends list frequently
Keep the computer in open area in the home so that you can see what your children are surfing.
Cyber awareness and hygiene for parents
Talk to your children about the potential online threats such as grooming, bullying, and stalking, keep track
of their online activities.
Notice indicators of change in behavior: If your child begins to spend more time onlinTalk to your child and
engage him/ her in other activitiese and starts being defensive or secretive about their online activities, it
may be an indicator of cyber grooming..
Protect your child from Cyber Grooming:Grooming is a practice where someone builds an emotional bond
with a child through social media or chat window with an objective of gaining their trust for sexual
exploitation.
Children may remove privacy settings on social media to make more friends. Parents should discuss
responsible use of social media. Also, they should educate and help them in selecting strong privacy settings.
Cover your webcams: A web camera (default in laptops) if hacked/compromised can be leveraged as a
medium to observe/watch and record day to day activities. It is a recommended to cover webcam when not
in use.
Cyber awareness and hygiene for young adults
Secure your online presence just like you secure yourself - If you have not selected
the right settings on your social media accounts, then photos and videos posted can
be viewed, downloaded and used by others without your knowledge.
Select the right privacy settings and content sharing filters on social media so that
you are sharing your information, photos and videos only with your trusted ones.
Be selective about accepting friend request of strangers on social media
If you notice your fake account has been created, you can immediately inform social
media service provider so that the account can be blocked
Cyber awareness and hygiene for young adults
Be mindful of your appearance on video chat & video calls
Your video chats on social media sites can be recorded
by the person on the other side
There have been instances where video chats which were supposed to be private in
nature have been recorded and shared on social media groups and websites
Be careful while accepting chat requests from strangers
Cyber awareness and hygiene for young adults
Beware of fake social media accounts- Not all the accounts are
real and not all information provided on accounts are true
Be cautious while accepting friend requests from strangers.
Be cautious with sensitive Browsing
One should browse shopping or banking websites or apps only on a device that
belongs to him/ her or on a trusted network.
Avoid using friend’s phone, public computer, cyber cafe or free Wi-Fi for sensitive
browsing as data can be stolen or copied.
Cyber awareness and hygiene for young adults
Protect yourself from Cyber stalking
They use internet, email, social media or any other form of electronic
communication for stalking
Disable location services for social media sites, mobile devices etc.
Refrain from sharing your personal information like Phone number, e-mail
address, photographs with unknown persons
Consult your relatives and friends, if you think you are a victim of Cyber stalking
Cyber awareness and hygiene for young adults
Do not use Smartphone for taking sensitive personal
photographs and videos
Do not use Smartphone for taking sensitive personal photographs and videos. Most of the smartphones
are connected to internet and cloud storage. If a picture or video has been clicked/ recorded by using
smartphone connected with the cloud, it may get saved automatically into the cloud.
Even if users delete their photos or videos from their phone, the same photo or video can be recovered
from the cloud account or any other device/ PC connected to the cloud using same account.
If someone has taken such photograph using Smartphone, then take it seriously and make sure to get it
deleted from their smartphone, the cloud and any other device connected using the same account.
The deleted data on your
communication devices
can be recovered
Cyber crime awareness

More Related Content

What's hot

Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescentsTreesa Lobo
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Nigel D'souza
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?DionShawMSPM
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 

What's hot (20)

Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 

Similar to Cyber crime awareness

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 

Similar to Cyber crime awareness (20)

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
My protection plan
My protection planMy protection plan
My protection plan
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
E safety
E safetyE safety
E safety
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Online safety
Online safetyOnline safety
Online safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Cyber Contacts
Cyber ContactsCyber Contacts
Cyber Contacts
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 

Recently uploaded

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 

Cyber crime awareness

  • 2. Agenda Cyber crime in brief Mode of operation Internet safety measures Banking precautions Mobile Apps or software precautions Cyber safety – precautions
  • 3. Cyber crime overview The twentieth century has brought to reality the idea of a global village, where digital technology has interconnected and enmeshed the world economies, cultures and populations. Cyber crimes know no borders and evolve at a pace at par with emerging technologies. Cyber crime is increasing exponentially – Why?
  • 4. List of countries by number of mobile phones in use
  • 5.
  • 6.
  • 7.
  • 10.
  • 11. Safety tips to protect your Computer from Key loggers, Trojans, and Spy As a common practice do not open suspicious or unsolicited emails (spam emails). Delete them from your Inbox. Even if you do open a spam email, under any circumstances do not click on any links, or open/download any files attached to them. If possible, scan your suspected downloaded files in website www.virustotal.com
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 21.
  • 22.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Protect your communication devices •Prevent others from accessing your devices by providing password, PIN, Pattern or biometric information. •Always install applications to your mobile phones, computers, etc. from a trusted source only e.g. Play store, App store or from official company websites
  • 36.
  • 37.
  • 38.
  • 39. Mobile Phone - Precautions Record the unique 15 digit IMEI number. In case Mobile phone is stolen/lost, this IMEI number is required for registering complaint at Police station and may help in tracking your mobile phone through service provider. Report lost or stolen devices: • Report lost or stolen devices immediately to the nearest Police Station and concerned service provider. • Use mobile tracking feature.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 48. Safety tips to avoid Online Shopping Frauds Verify that you are receiving emails from the correct source and that you are logging in at the correct website. Check for feedback and rating of the buyer, which most online auction website provide. Check if the product you are purchasing has appropriate warranty and documentation with it. If not, make sure that you intend to purchase it without that protection. Check if shipping and delivery is covered by the seller or if you have to bear those costs. DO NOT respond to emails that ask for your personal information, such as your log in details or credit card details.
  • 49. How can you protect yourself in Social Networking sites? Limit the amount of personal information you post Remember that the internet is a public Beware of strangers - The internet makes it easy for people to misrepresent their identities and motives Identify the Real group/page of organization Be skeptical - Don't believe everything you read online Check privacy policies for your account including mobile apps
  • 50. How can we protect children in Social Networking sites? Help your kids understand what information should be private. Explain that kids should post only information that you – and they – are comfortable with others seeing. Use privacy settings to restrict who can access and post on your child’s website. Remind your kids that once they post information online, they can’t take it back. Talk to your kids about avoiding sex talk online. If they ever feel uncomfortable or threatened by anything online, encourage them to tell you. Review your kid’s friends list frequently Keep the computer in open area in the home so that you can see what your children are surfing.
  • 51. Cyber awareness and hygiene for parents Talk to your children about the potential online threats such as grooming, bullying, and stalking, keep track of their online activities. Notice indicators of change in behavior: If your child begins to spend more time onlinTalk to your child and engage him/ her in other activitiese and starts being defensive or secretive about their online activities, it may be an indicator of cyber grooming.. Protect your child from Cyber Grooming:Grooming is a practice where someone builds an emotional bond with a child through social media or chat window with an objective of gaining their trust for sexual exploitation. Children may remove privacy settings on social media to make more friends. Parents should discuss responsible use of social media. Also, they should educate and help them in selecting strong privacy settings. Cover your webcams: A web camera (default in laptops) if hacked/compromised can be leveraged as a medium to observe/watch and record day to day activities. It is a recommended to cover webcam when not in use.
  • 52. Cyber awareness and hygiene for young adults Secure your online presence just like you secure yourself - If you have not selected the right settings on your social media accounts, then photos and videos posted can be viewed, downloaded and used by others without your knowledge. Select the right privacy settings and content sharing filters on social media so that you are sharing your information, photos and videos only with your trusted ones. Be selective about accepting friend request of strangers on social media If you notice your fake account has been created, you can immediately inform social media service provider so that the account can be blocked
  • 53. Cyber awareness and hygiene for young adults Be mindful of your appearance on video chat & video calls Your video chats on social media sites can be recorded by the person on the other side There have been instances where video chats which were supposed to be private in nature have been recorded and shared on social media groups and websites Be careful while accepting chat requests from strangers
  • 54. Cyber awareness and hygiene for young adults Beware of fake social media accounts- Not all the accounts are real and not all information provided on accounts are true Be cautious while accepting friend requests from strangers. Be cautious with sensitive Browsing One should browse shopping or banking websites or apps only on a device that belongs to him/ her or on a trusted network. Avoid using friend’s phone, public computer, cyber cafe or free Wi-Fi for sensitive browsing as data can be stolen or copied.
  • 55. Cyber awareness and hygiene for young adults Protect yourself from Cyber stalking They use internet, email, social media or any other form of electronic communication for stalking Disable location services for social media sites, mobile devices etc. Refrain from sharing your personal information like Phone number, e-mail address, photographs with unknown persons Consult your relatives and friends, if you think you are a victim of Cyber stalking
  • 56. Cyber awareness and hygiene for young adults Do not use Smartphone for taking sensitive personal photographs and videos Do not use Smartphone for taking sensitive personal photographs and videos. Most of the smartphones are connected to internet and cloud storage. If a picture or video has been clicked/ recorded by using smartphone connected with the cloud, it may get saved automatically into the cloud. Even if users delete their photos or videos from their phone, the same photo or video can be recovered from the cloud account or any other device/ PC connected to the cloud using same account. If someone has taken such photograph using Smartphone, then take it seriously and make sure to get it deleted from their smartphone, the cloud and any other device connected using the same account.
  • 57. The deleted data on your communication devices can be recovered