SlideShare a Scribd company logo
1 of 21
Download to read offline
CYBER CRIME AWARENESS &
PREVENTION
(UNDER CYBER JAGROKTA DIWAS)
14-12-2021
Prof. Nisar Ahmad Kangoo
Department of Computer Applications
1
Govt. Degree College Handwara
Introduction
2
 Information and communication technology has
become an integral part of our day-to-day
life.
 It has just transformed the way we
communicate, make friends, share
updates, play games, and do shopping and so
on.
 The technology has impacted most aspects of
our day-to-day life.
Introduction… cont
3
 Our new generation is getting exposure to
cyber space at a very young age. More and
more youngsters invest time online to play
games, make friends, and use social
networking sites and so on.
 In fact with smart phones access to social
networking, online games, shopping, etc. has
increased significantly.
 The cyber space connects us virtually with
millions of online users from across the globe.
Introduction… cont
4
 with increasing use of cyberspace, cyber crimes have
also increasing rapidly.
 Youngsters are highly vulnerable as they are exposed
to cyber space with limited understanding of cyber
threats and safeguards.
 Youngsters are in experimental age group: They like
to experiment, learn new things and use new
technologies. While experimenting is a good way to
learn, it is equally important that proper guidance is
provided to them so that they can protect themselves
from adverse impact of cyber technology.
WHAT ARE CYBER CRIMES?
5
 Cybercrimes are offences that may be committed
against individuals, institutions or companies using
computers, internet or mobile technology.
 Cybercriminals use platforms such social networking
sites, emails, chat rooms, pirated
software, websites, etc., to attack victims.
 According to the Indian Computer Emergency
Response Team (CERT In), over 1158208 cases of
cyber security incidents were reported in 2020 in
India’
Increasing trend in Cyber Crimes
6
1158208
394499
208456
53117 50362 49455
0
200000
400000
600000
800000
1000000
1200000
1400000
2020 2019 2018 2017 2016 2015
Year
Incidents Handled
Indian Computer Emergency
Response Team (CERT In)
Some common ways used by cyber
criminals
7
 Cyber criminals want to get unauthorized access
to our sensitive information.
 In majority of cases, the cyber criminals would
attack with a clear cut objective, for that they use
some of the most effective methods.
 Email Spoofing: Sending out e-mails to you that
look like genuine and from a trusted e-mail ID but
actually, they're not.
common ways used by cyber criminals
8
 Malicious Files Applications: Sending you malicious
and bad applications and files through direct
messaging, gaming, emails or websites etc, in order
to get access to your smart phone and personal data.
 Social Engineering: Social Engineering is a technique
used by cyber criminals to gain your confidence to
get information from you. Depending on what you
like to do most, a cybercriminal may try to interact
with you to mine for information and/or commit
some harm to you.
common ways used by cyber criminals
9
 Cyber Bullying: A form of harassment or bullying
inflicted through the use of electronic or
communication devices such as computer, mobile
phone, laptop, etc.
 Identity Theft: Deliberate use of someone's
identity to gain financial advantage or to obtain
credit and other benefits in the other person's
name/ for counterparts disadvantage or loss.
common ways used by cyber criminals
10
 Banking Frauds: Fraudulently obtaining money
from depositors by posing as a bank or other
financial institution.
 Cyber Grooming: It is a practice where someone
builds an emotional bond with children or
teenagers through social media or messaging
platforms with an objective of gaining their trust
for sexually abusing or exploiting them.
common ways used by cyber criminals
11
 Online Gaming: The gaming consoles operate like
a computer where you need to create your
account, login, put a headset, use webcam or
other devices, You not only play games with
millions of users online but also talk to them, share
your views, become friends, join
groups, teams, etc. Cyber Criminals can use this
information and behavior for their malicious
intends.
CYBER BULLYING
12
 Cyber bullying is one of the common cyber
threats being faced by children and young
people.
 Cyber bullying means using Internet or mobile
technology to intentionally harass or bully
someone by sending rude, mean or hurtful
messages, comments and images/videos.
 A cyber bully can use text messages, email, social
media platforms, web pages, chat rooms, etc, to
bully others.
Cyber Bullying … cont.
13
 The consequences of cyber bullying on children
and young persons are manifold.
 There can be physical, emotional and
psychological consequences that con not only
impact the academic performance of students but
affect their daily life to a great extent.
Cyber Grooming
14
 Cyber grooming is also growing as one of the major
cyber threats faced by children and teenagers.
 It is a practice where someone builds an emotional
bond with children or teenagers through social media
or messaging platforms with an objective of gaining
their trust for sexually abusing or exploiting them.
 Initially, the cyber groomer can give you
compliments, gifts, modeling job offer and later they
can start sending obscene messages, photographs or
videos and will ask you to share your sexually
explicit images or videos with them.
Cyber Grooming
15
 The online groomer mostly target teenagers as in
adolescence they face immense
biological, personal and social changes.
 The impulsive and curious nature of adolescents
encourages them to engage in online activities
which makes them vulnerable to online
grooming.
Prevention
16
 Don't accept friend request from unknown people
on social medic platforms. Cyber criminal can
even create a fake account to befriend a victim.
 Don't share your personal information like date
of birth, address, phone number, Credit/debit
card number and college name on social media
or other online platforms. You can go to privacy
settings on social media platforms to select who
can access your posts online, Try to restrict access
of your profile to your friends only.
Prevention …
17
 Remember what you post online remains there so it
is important to be careful and not to share your
phone number and other personal details in
comments or posts on social media platforms.
 Never install unwanted Software and Apps like
online games, etc, from unknown sources.
 You should be very careful while chatting in the chat
rooms. Never share personal details in the chat room
and limit your identity.
 If you feel hurt after reading a post from a friend or a
stranger, don't react with aggressive reply.
Prevention …
18
 Inform your parents/elders if you feel someone is
bullying you.
 Avoid talking to people who asks you questions
related to your physical or sexual experiences.
 Do not go to meet a person whom you met online
alone. Always take a -friend or an elder person
with you.
 If groomer/bully is using social media platforms
to groom or bully you, you can block him or her.
Prevention …
19
 Save messages, pictures or videos shared with
you by the groomer or bully, Such
messages, pictures or videos can be used as an
evidence to take a legal action against them
 Never use voice chat or web cam while playing
online gaming.
 Always install a good antivirus software on your
computer, Smartphone or other handheld devices.
Regularly update the antivirus and other
applications.
Prevention …
20
 Use strong passwords.
 Change your passwords frequently.
 Never open attachments in spam emails.
 Do not click on links in spam emails or untrusted
websites.
 Do not give out personal information unless secure.
 Be mindful of which website URLs you visit, when
dealing with financial transaction check for HTTPS.
 Lock or log off your computer when you step away.
 Think twice about using public Wi-Fi.
21
Thank You

More Related Content

Similar to Cyber Crime Awareness and Prevension.pdf

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingKatie_Waters
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital PlaygroundKim Cofino
 

Similar to Cyber Crime Awareness and Prevension.pdf (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Facebook
FacebookFacebook
Facebook
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
123.pptx
123.pptx123.pptx
123.pptx
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Cyber Crime Awareness and Prevension.pdf

  • 1. CYBER CRIME AWARENESS & PREVENTION (UNDER CYBER JAGROKTA DIWAS) 14-12-2021 Prof. Nisar Ahmad Kangoo Department of Computer Applications 1 Govt. Degree College Handwara
  • 2. Introduction 2  Information and communication technology has become an integral part of our day-to-day life.  It has just transformed the way we communicate, make friends, share updates, play games, and do shopping and so on.  The technology has impacted most aspects of our day-to-day life.
  • 3. Introduction… cont 3  Our new generation is getting exposure to cyber space at a very young age. More and more youngsters invest time online to play games, make friends, and use social networking sites and so on.  In fact with smart phones access to social networking, online games, shopping, etc. has increased significantly.  The cyber space connects us virtually with millions of online users from across the globe.
  • 4. Introduction… cont 4  with increasing use of cyberspace, cyber crimes have also increasing rapidly.  Youngsters are highly vulnerable as they are exposed to cyber space with limited understanding of cyber threats and safeguards.  Youngsters are in experimental age group: They like to experiment, learn new things and use new technologies. While experimenting is a good way to learn, it is equally important that proper guidance is provided to them so that they can protect themselves from adverse impact of cyber technology.
  • 5. WHAT ARE CYBER CRIMES? 5  Cybercrimes are offences that may be committed against individuals, institutions or companies using computers, internet or mobile technology.  Cybercriminals use platforms such social networking sites, emails, chat rooms, pirated software, websites, etc., to attack victims.  According to the Indian Computer Emergency Response Team (CERT In), over 1158208 cases of cyber security incidents were reported in 2020 in India’
  • 6. Increasing trend in Cyber Crimes 6 1158208 394499 208456 53117 50362 49455 0 200000 400000 600000 800000 1000000 1200000 1400000 2020 2019 2018 2017 2016 2015 Year Incidents Handled Indian Computer Emergency Response Team (CERT In)
  • 7. Some common ways used by cyber criminals 7  Cyber criminals want to get unauthorized access to our sensitive information.  In majority of cases, the cyber criminals would attack with a clear cut objective, for that they use some of the most effective methods.  Email Spoofing: Sending out e-mails to you that look like genuine and from a trusted e-mail ID but actually, they're not.
  • 8. common ways used by cyber criminals 8  Malicious Files Applications: Sending you malicious and bad applications and files through direct messaging, gaming, emails or websites etc, in order to get access to your smart phone and personal data.  Social Engineering: Social Engineering is a technique used by cyber criminals to gain your confidence to get information from you. Depending on what you like to do most, a cybercriminal may try to interact with you to mine for information and/or commit some harm to you.
  • 9. common ways used by cyber criminals 9  Cyber Bullying: A form of harassment or bullying inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop, etc.  Identity Theft: Deliberate use of someone's identity to gain financial advantage or to obtain credit and other benefits in the other person's name/ for counterparts disadvantage or loss.
  • 10. common ways used by cyber criminals 10  Banking Frauds: Fraudulently obtaining money from depositors by posing as a bank or other financial institution.  Cyber Grooming: It is a practice where someone builds an emotional bond with children or teenagers through social media or messaging platforms with an objective of gaining their trust for sexually abusing or exploiting them.
  • 11. common ways used by cyber criminals 11  Online Gaming: The gaming consoles operate like a computer where you need to create your account, login, put a headset, use webcam or other devices, You not only play games with millions of users online but also talk to them, share your views, become friends, join groups, teams, etc. Cyber Criminals can use this information and behavior for their malicious intends.
  • 12. CYBER BULLYING 12  Cyber bullying is one of the common cyber threats being faced by children and young people.  Cyber bullying means using Internet or mobile technology to intentionally harass or bully someone by sending rude, mean or hurtful messages, comments and images/videos.  A cyber bully can use text messages, email, social media platforms, web pages, chat rooms, etc, to bully others.
  • 13. Cyber Bullying … cont. 13  The consequences of cyber bullying on children and young persons are manifold.  There can be physical, emotional and psychological consequences that con not only impact the academic performance of students but affect their daily life to a great extent.
  • 14. Cyber Grooming 14  Cyber grooming is also growing as one of the major cyber threats faced by children and teenagers.  It is a practice where someone builds an emotional bond with children or teenagers through social media or messaging platforms with an objective of gaining their trust for sexually abusing or exploiting them.  Initially, the cyber groomer can give you compliments, gifts, modeling job offer and later they can start sending obscene messages, photographs or videos and will ask you to share your sexually explicit images or videos with them.
  • 15. Cyber Grooming 15  The online groomer mostly target teenagers as in adolescence they face immense biological, personal and social changes.  The impulsive and curious nature of adolescents encourages them to engage in online activities which makes them vulnerable to online grooming.
  • 16. Prevention 16  Don't accept friend request from unknown people on social medic platforms. Cyber criminal can even create a fake account to befriend a victim.  Don't share your personal information like date of birth, address, phone number, Credit/debit card number and college name on social media or other online platforms. You can go to privacy settings on social media platforms to select who can access your posts online, Try to restrict access of your profile to your friends only.
  • 17. Prevention … 17  Remember what you post online remains there so it is important to be careful and not to share your phone number and other personal details in comments or posts on social media platforms.  Never install unwanted Software and Apps like online games, etc, from unknown sources.  You should be very careful while chatting in the chat rooms. Never share personal details in the chat room and limit your identity.  If you feel hurt after reading a post from a friend or a stranger, don't react with aggressive reply.
  • 18. Prevention … 18  Inform your parents/elders if you feel someone is bullying you.  Avoid talking to people who asks you questions related to your physical or sexual experiences.  Do not go to meet a person whom you met online alone. Always take a -friend or an elder person with you.  If groomer/bully is using social media platforms to groom or bully you, you can block him or her.
  • 19. Prevention … 19  Save messages, pictures or videos shared with you by the groomer or bully, Such messages, pictures or videos can be used as an evidence to take a legal action against them  Never use voice chat or web cam while playing online gaming.  Always install a good antivirus software on your computer, Smartphone or other handheld devices. Regularly update the antivirus and other applications.
  • 20. Prevention … 20  Use strong passwords.  Change your passwords frequently.  Never open attachments in spam emails.  Do not click on links in spam emails or untrusted websites.  Do not give out personal information unless secure.  Be mindful of which website URLs you visit, when dealing with financial transaction check for HTTPS.  Lock or log off your computer when you step away.  Think twice about using public Wi-Fi.