This document provides an overview of cyber space and the opportunities and threats it presents. It discusses the evolution of cyber space and the internet. It defines internet of things (IoT) and provides examples of how IoT is used in daily life like e-governance services, social media, and mobile apps. It also outlines some of the threats in cyber space like cyber crimes, financial fraud, hacking, and piracy. It emphasizes that awareness is the best tool to avoid becoming a victim of cyber crimes.
4. • The Internet of Things (IoT) is the network of physical
objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and
network connectivity—that enables these objects to
collect and exchange data.
What is IoT?
IOT?
In simple words, Internet of Things (IoT) is
an ecosystem of connected physical objects
that are accessible through the internet.
5. • 1969 – Jan 2 – ARPANET – Four centers
• India joined in the year 1995 –Aug 15
• Instant Communications, News Reference, Resea
Entertainment, Shopping, etc, etc..
• 1972 Ray Tomlinson invents eMail.
• 1983 Invents Internet Protocol
• 1989 first World Wide Web Developed
• 1994 First G-Web Browser Developed (Mosaic).
• 1995 Internet open for commercial purpose.
The Internet is a Great Place
13. • eGovernance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites
– hate sites pirated software, music, movies
– viruses and malicious downloads, spyware
– scams and data collection sites
• Harassment and legal/financial risks
Things Around Us!!!
19. • www.classmates.com – 1995 Randy Conrads
• Facebook & Orkut in the year 2004
• Twitter in the year 2006
• Google plus in the year 2011
20. 1. Information Technology Act
2000
2. Indian Penal Code – 1860
3. Indian Copyright Act – 1957
• IT Act Applicable to all states of
India including Jammu & Kashmir
• It is applicable to any violation of the
provisions of this Act done by any
person anywhere in the world.
28. Mobile phone harrassment is also called
BULLYING, which is a general term to describe any
type of unwanted telephone calls or messages, or
picture messages, intended to cause upset and
grief !!! – Sec 499, 509 of IPC and 120(o) KP Act .
✓Word, gesture or act intended to insult the modesty of a
woman.
✓Shall be punished with simple imprisonment for a term
which may extend to one year, or with fine, or with both
31. Similarly, Section 419 of the IPC could also be
applied with the same qualification that it must
be making a pecuniary(financial) benefit to it.
Under Section 465 of the Act, a person committing
forgery shall be imprisoned for up to two years
and shall also liable to pay fine
➢ Section 499/500 IPC: When fake profile is posted with defamatory
content with an intention to defame other, the offence punishable
under Section 499/500 IPC (defamation) is attracted.
Details Required
➢ URL of the Suspect FB Account
➢ Screen Shot of FB Account – Two or more
➢ ID Proof & Photo of the Complainant
➢ URL & Screen Shot of the any post related with the
Social Media – Fake Profile
32. Making a fake account of another person
Section 66-D of Information Technology Act 2000, which was
subsequently amended in 2008, states that “whoever by
means of any communication device or computer
resource cheats by personating, shall be punished with
imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which
may extend to one lakh rupees.”[1]
. The real face behind the fake profile can be traced through
IP address. Internet Protocol address (IP address) is a
numeric label – a set of four numbers (Eg. 202.54.30.1) –
that is assigned to every device (e.g., computer, printer)
participating on the internet
Social Media – Fake Account
33. Online Game
❖Addiction
❖Loss of interest
❖Underdeveloped physical condition
❖Decline in personal hygiene
❖Declining social activity
34. Roblox - popular with kids, teens and even adults, which allows users
to interact with one another in this virtual world, play games and also
engage in role play.
My Friend Cayla - smart toy looks like an innocent baby doll with
pretty features, lovely hair, a sweet smile, and an equally adorable outfit.
Blue Whale -This social media game dares its players to also
participate in a series of tasks which are detrimental to their health and can
also cause them great harm.
Fire Fairy - This online prank targets younger children and is
modelled after the animated series, It gives dangerous instructions to
unsuspecting kids on how they can become a magical “fire fairy”.
Cloud Pets -These innocent-looking smart toys which come as a
cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio
messages via a mobile app and replay them for your child’s entertainment.
The Pass Out Challenge. The Salt and Ice Challenge
The Fire Challenge The Cutting Challenge
Dangerous Online Games
36. Details Required
❖ Card No (Credit/Debit)
❖ Bank & Account No
❖ Suspect Mobile Number (Call Received)
❖ Transaction details (Date, Time)
❖ Transaction ID(SMS), Amount, Wallet, Bank, etc.
Collect above details at the earliest and forward to
Cyber Cell
❖ Whatsapp 9497976000,9497981288,9847435193
❖ We can Collect, KYC, Mobile SDR & CDR, CAF
Online Financial Fradus
37.
38.
39.
40.
41. Unauthorized access of
❑Computer & Its resources
❑Telecommunication devices
❑Telecommunication media, etc.
Section 65 Tampering with computer Source
document.
Section 66 – Hacking with computer systems –
including all activities mentioned in the sec 43
Imprisonment up to three years, or with
fine which may extend up to two lakh
rupees, or with both
41
42. 42
Hacking : - Hacker can be used to denote a
computer expert engaged in solving complex
problems on computers or persons securing
unauthorized access, looks around , collects
information and leaves without a trace. Hacking
done with malicious intention is called cracker.
Phreaker:- is a person who manipulates and
disrupts telecomm systems. Today
telecommunication systems has also been
computerized.
43. 43
❖ The worst passwords to use are the ones
that come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
❖ The best passwords mix numbers with upper
and lowercase letters.
❖ A password that is not found in the dictionary
is even better. There are programs that will try
every word in the dictionary in an effort to crack
your security. Changing passwords regularly
❖
45. Trusted Friends
Trusted friends are friends you can reach out to if you
ever get locked out of your Facebook account .
Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
Login Notifications
Login Notifications are an opt-in security feature where
alerts are sent to you each time your account is
accessed from a new device. Add a Mobile Number.
Login Approvals : Similar to Login Notifications , but
need security code to login.
Password, Message & Links, Personal Information, Browser
Security & Computer Security
46. 1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail
settings tab.
3. Update your secondary email address and your
security question, and provide a mobile phone for SMS-
based account recovery
4. Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail).
Password, Message & Links, Personal Information, Browser
Security & Computer Security
49. A person following another especially women and
continuously harassing through online
Cyber Stalking is generally considered as use of the
Internet, e-mail or other electronic communications
device to stalk or harass a person.
Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
Punishable with simple imprisonment for a term which may extend to two
years, or with fine, or with both.
Sec 503 IPC Sending threatening messages by e-
mail
Sec 499 IPC Sending defamatory messages by e-
mail
50. • Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
➢Their main targets are the mostly females,
children, emotionally weak or unstable, etc. It is
believed that Over 75% of the victims are female
51. • Publishing sexual activities in the form of
visuals, audio or through text to raise
erotic feelings rather than aesthetic.
✓ New concept called as SEXTING
✓ Sending sexually explicit pictures by cell phone or
Email
51
52. 52
Section 67 – Publishing of information which
is obscene in electronic form. 3 years or with fine
not exceeding 5 lakh
Sec 67 A - Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic
form. five years and with fine which may extend to ten lakh
rupees
Sec 119 of KP Act - Punishment for atrocities against
women. – (1) Any person who,—
(a) performs, in public places, any sexual gestures or acts
degrading the dignity of women; or
24(b) takes photographs or records videos or propagates them at
any place in a manner affecting the reasonable privacy of women.
Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc.
3 yrs imprisonment & Fine
53. • Put utmost care in selecting friends – All kinds of
Criminals are in this Social media.
• Don’t post family information publicly
• Don’t post, share and like defamatory comments
and contents.
• Don’t post dirty videos
• Don’t post live pictures while u r travelling.
• Note : Once u posted something, it will not taken
back from the Cyber World.
• Founders: Larry Page, Sergey Brin – 1998, 2004 -
Mark Zuckerberg, Dustin Moskovitz, W3C-Tim
Berners-Lee
54. • Fake Profiles – 499,500,509 IPC– 3 yrs + 2
lakhs.
• Defamatory posting – 3 yrs + Fine.
• Posting private parts of a person – Sec 66E -3
yrs. + 2 lakhs.
• Sexual messages & Audios – Sec 67 -3 yrs + 5
lakhs.
• Posting Sexual videos – Sec 67 A – 5 yrs + 10
lakh ( 7 yrs + 10 lakhs).
• Posting and downloading sexual videos of
children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs +
10 lakhs).
55.
56.
57. Publishing statements lowering the
reputation of persons.
When someone publishes defamatory
matter about someone on a website or
sends e-mails, pictures, etc. containing
defamatory information to all of that
person's friends or on the internet.
Sec 499,500,503.
In case of sexual abuse against
women. Sec 509 & 354(a) IPC
63. ➢Criminal creates a “mirror” website that
looks like a legitimate website
➢They fool people into going to that site,
which transmits your username or
password to the them
➢Using pop-up windows to conceal the
real address in the victim’s address bar
➢“Pharming” victim redirected to a scam
website when the victim types in the
real address
71. Section 468. Forgery for purpose of cheating
Whoever commits forgery, intending that the
document or Electronic Record forged shall be used
for the purpose of cheating, shall be punished with
imprisonment of either description for a term which
may extend to seven years, and shall also be liable to
fine.
Section 420. Cheating and dishonestly inducing
delivery of property
shall be punished with imprisonment of either
description for a term which may extend to seven
years, and shall also be liable to fine.
72. ➢ Cyber Piracy is defined as art of making illegal
copies of Music, Books, software etc for the
purpose of sale.
➢ The major form of piracy on the net is violation
of copyrights and trade marks. A part of this piracy
had also been cyber squatting of domain names.
➢ Shall be punishable under section. 51, 63, 63B
of Indian Copyright Act.
73. • Where we stand
– Twentieth in top 20 pirating countries
– At 73%, behind China (92%), Vietnam (92%),
Indonesia (88%) and Russia (87%)
– Losses at $367 million
• Benefits of piracy control
– Reduction of piracy by 10% will
• Promote innovation
• Add $1.2 billion to GDP
• Create 48,000 jobs
• Add $92 million to tax revenues
75. Threat vs. Opportunity
• If misunderstood and misconfigured,
misused Technology poses risk to our data,
privacy, and safety
• If understood , secured, efficient use of
Technology will enhance communications,
lifestyle, and delivery of services
76. The Biggest Investment is
“Investment in as much of yourself as you can, you are
your own biggest by far.
✓ Are you wiser to day than yesterday, or last day , or last
year , or five years ago
✓ Are you taking good care to be physically and mentally
fit.
78. 78
“Awareness about Cyber-crime threats is the best
tool to avoid of being a victim”.
Jayakumar PP
9847435193
jkambala@gmail.com
https://www.facebook.com/jayakumar.purushan
https://www.linkedin.com/pub/jayakumar-pp/65/59b/773
http://www.slideshare.net/jayakumarpurushan