This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
2. Agenda
Cyber crime in brief
Mode of operation
Internet safety measures
Banking precautions
Mobile Apps or software precautions
Cyber safety – precautions
3. Cyber crime overview
The twentieth century has brought to reality the idea of a global village, where
digital technology has interconnected and enmeshed the world economies, cultures
and populations.
Cyber crimes know no borders and evolve at a pace at par with emerging
technologies.
Cyber crime is increasing exponentially – Why?
11. Safety tips to protect your Computer from
Key loggers, Trojans, and Spy
As a common practice do not open suspicious or unsolicited emails (spam
emails). Delete them from your Inbox.
Even if you do open a spam email, under any circumstances do not click on any
links, or open/download any files attached to them.
If possible, scan your suspected downloaded files in website
www.virustotal.com
34. Protect your communication devices
•Prevent others from accessing your
devices by providing password, PIN,
Pattern or biometric information.
•Always install applications to your mobile
phones, computers, etc. from a trusted
source only e.g. Play store, App store or
from official company websites
39. Mobile Phone - Precautions
Record the unique 15
digit IMEI number.
In case Mobile phone is
stolen/lost, this IMEI
number is required for
registering complaint at
Police station and may
help in tracking your
mobile phone through
service provider.
Report lost or stolen
devices:
• Report lost or stolen devices
immediately to the nearest
Police Station and concerned
service provider.
• Use mobile tracking feature.
48. Safety tips to avoid Online Shopping Frauds
Verify that you are receiving emails from the correct source and that you are logging in at
the correct website.
Check for feedback and rating of the buyer, which most online auction website provide.
Check if the product you are purchasing has appropriate warranty and documentation with it. If not,
make sure that you intend to purchase it without that protection. Check if shipping and delivery is
covered by the seller or if you have to bear those costs.
DO NOT respond to emails that ask for your personal information, such as your log in
details or credit card details.
49. How can you protect yourself in Social Networking sites?
Limit the amount of personal information you post
Remember that the internet is a public
Beware of strangers - The internet makes it easy for people to misrepresent their
identities and motives
Identify the Real group/page of organization
Be skeptical - Don't believe everything you read online
Check privacy policies for your account including mobile apps
50. How can we protect children in Social Networking sites?
Help your kids understand what information should be private.
Explain that kids should post only information that you – and they – are comfortable with others seeing.
Use privacy settings to restrict who can access and post on your child’s website.
Remind your kids that once they post information online, they can’t take it back.
Talk to your kids about avoiding sex talk online.
If they ever feel uncomfortable or threatened by anything online, encourage them to tell you.
Review your kid’s friends list frequently
Keep the computer in open area in the home so that you can see what your children are surfing.
51. Cyber awareness and hygiene for parents
Talk to your children about the potential online threats such as grooming, bullying, and stalking, keep track
of their online activities.
Notice indicators of change in behavior: If your child begins to spend more time onlinTalk to your child and
engage him/ her in other activitiese and starts being defensive or secretive about their online activities, it
may be an indicator of cyber grooming..
Protect your child from Cyber Grooming:Grooming is a practice where someone builds an emotional bond
with a child through social media or chat window with an objective of gaining their trust for sexual
exploitation.
Children may remove privacy settings on social media to make more friends. Parents should discuss
responsible use of social media. Also, they should educate and help them in selecting strong privacy settings.
Cover your webcams: A web camera (default in laptops) if hacked/compromised can be leveraged as a
medium to observe/watch and record day to day activities. It is a recommended to cover webcam when not
in use.
52. Cyber awareness and hygiene for young adults
Secure your online presence just like you secure yourself - If you have not selected
the right settings on your social media accounts, then photos and videos posted can
be viewed, downloaded and used by others without your knowledge.
Select the right privacy settings and content sharing filters on social media so that
you are sharing your information, photos and videos only with your trusted ones.
Be selective about accepting friend request of strangers on social media
If you notice your fake account has been created, you can immediately inform social
media service provider so that the account can be blocked
53. Cyber awareness and hygiene for young adults
Be mindful of your appearance on video chat & video calls
Your video chats on social media sites can be recorded
by the person on the other side
There have been instances where video chats which were supposed to be private in
nature have been recorded and shared on social media groups and websites
Be careful while accepting chat requests from strangers
54. Cyber awareness and hygiene for young adults
Beware of fake social media accounts- Not all the accounts are
real and not all information provided on accounts are true
Be cautious while accepting friend requests from strangers.
Be cautious with sensitive Browsing
One should browse shopping or banking websites or apps only on a device that
belongs to him/ her or on a trusted network.
Avoid using friend’s phone, public computer, cyber cafe or free Wi-Fi for sensitive
browsing as data can be stolen or copied.
55. Cyber awareness and hygiene for young adults
Protect yourself from Cyber stalking
They use internet, email, social media or any other form of electronic
communication for stalking
Disable location services for social media sites, mobile devices etc.
Refrain from sharing your personal information like Phone number, e-mail
address, photographs with unknown persons
Consult your relatives and friends, if you think you are a victim of Cyber stalking
56. Cyber awareness and hygiene for young adults
Do not use Smartphone for taking sensitive personal
photographs and videos
Do not use Smartphone for taking sensitive personal photographs and videos. Most of the smartphones
are connected to internet and cloud storage. If a picture or video has been clicked/ recorded by using
smartphone connected with the cloud, it may get saved automatically into the cloud.
Even if users delete their photos or videos from their phone, the same photo or video can be recovered
from the cloud account or any other device/ PC connected to the cloud using same account.
If someone has taken such photograph using Smartphone, then take it seriously and make sure to get it
deleted from their smartphone, the cloud and any other device connected using the same account.