The document discusses cyber fraud and identity theft. It provides examples of common types of cyber fraud like internet fraud, phishing, and man-in-the-middle attacks. It emphasizes that identity loss from cybercrime can damage finances and reputation. The document also recommends ways to protect against cybercrime like using digital signature certificates, which provide authentication and security for electronic transactions. Victims of cybercrime can report incidents to local cyber crime police stations.
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
This project concentrates on the area of internet fraud called “Identity Theft”. It focuses on the responsibility of the individual cardholder in preventing or reducing fraud. It is based upon a belief that educating and empowering consumers has the ability to decrease internet/e-Commerce fraud by way of reducing identity theft.
With the outbreak of Covid-19, technological innovations are surfacing at a fast pace. One such prominent technology is eSign or electronic signature. This technology has now started to get attention due to increased digitalization.
What is Digital Signature, Digital Signature FAQ - eMudhraeMudhra dsc
eMudhra is one of the leading provider of Digital Signature Certificates and is a Licensed Certifying Authority(CA) authorized by the Controller of Certifying Authorities (CCA) and Ministry of Information Technology to issue digital signature Certificates in India.
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
This project concentrates on the area of internet fraud called “Identity Theft”. It focuses on the responsibility of the individual cardholder in preventing or reducing fraud. It is based upon a belief that educating and empowering consumers has the ability to decrease internet/e-Commerce fraud by way of reducing identity theft.
With the outbreak of Covid-19, technological innovations are surfacing at a fast pace. One such prominent technology is eSign or electronic signature. This technology has now started to get attention due to increased digitalization.
What is Digital Signature, Digital Signature FAQ - eMudhraeMudhra dsc
eMudhra is one of the leading provider of Digital Signature Certificates and is a Licensed Certifying Authority(CA) authorized by the Controller of Certifying Authorities (CCA) and Ministry of Information Technology to issue digital signature Certificates in India.
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
As the nation and the world adapted to the coronavirus pandemic, businesses became accustomed to employees working from home. Even as the states reopened from the mandated “lockdown”, many companies and employees alike found advantages to working remotely. Today, we live in a world where the hybrid of in-office work and remote work from home is the “new” normal. Home computers or other remote locations are more vulnerable than ever to cyber-attacks. Organizations need to build people-centric cybersecurity strategies to protect against business email compromises or email account compromises. Increasingly risky websites are being transmitted through corporate emails. The speaker will discuss some of the newest trends in cyberattacks which are continually evolving and growing. Ransomware can hit in seconds. Credit card use is higher than ever, and some cyber-crime groups live to target payment card information. This program has been designed to offer real-life examples and practical steps which may be taken to thwart business-fraud and cyber-crime.
Here in this blog forum, I am going to confer about the need for shifting from manual signature to digital signature through digital signature certificate.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
As the nation and the world adapted to the coronavirus pandemic, businesses became accustomed to employees working from home. Even as the states reopened from the mandated “lockdown”, many companies and employees alike found advantages to working remotely. Today, we live in a world where the hybrid of in-office work and remote work from home is the “new” normal. Home computers or other remote locations are more vulnerable than ever to cyber-attacks. Organizations need to build people-centric cybersecurity strategies to protect against business email compromises or email account compromises. Increasingly risky websites are being transmitted through corporate emails. The speaker will discuss some of the newest trends in cyberattacks which are continually evolving and growing. Ransomware can hit in seconds. Credit card use is higher than ever, and some cyber-crime groups live to target payment card information. This program has been designed to offer real-life examples and practical steps which may be taken to thwart business-fraud and cyber-crime.
Here in this blog forum, I am going to confer about the need for shifting from manual signature to digital signature through digital signature certificate.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
Tools for Foot and Mouth Disease Managers: The West Eurasia FMD Database FAO
Explanation of the empres-i tool, rationale behind its development and purpose of the database.
Dr. Klaas Dietze (EMPRES Animal Health Officer, Animal Production and Health Division Food and Agriculture Organization of the UN)
2ª parte del artículo "Relato de una CoP" escrito por José A. Latorre y Antonio Calvo y que recoge la experiencia de la comunidad de aprendizaje "Liderazgo de Proyectos" impulsada por el departamento de formación de la Diputación de Alicante. Se ha publicado en el nº de Abril de 2013 de la revista Observatorio de RR.HH y RR.LL.
This presentation contains the total understanging of Digital Certificate ,What is the need and what are the main types of Digital certificates available.
A digital signature serves as an electronic signature that helps authorise and authenticate the identity of the individual signing a document. The signature helps to establish that the message within the document is genuine and has not been tampered with by someone else. These signatures are easily transportable and are immutable, making them resistant to imitation and forgery. As a result, digital signatures ensure that the signed message has the authority and validation of the person who has signed it, making it impossible to disclaim later.
https://vakilsearch.com/digital-signature
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdfDrysign By Exela
Discover the significance of secure digital signatures in preventing fraud during online transactions with authentication, data integrity, and non-repudiation.
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
SACIS Conference 2002. Istanbul, Turkey
E- and M-Business are mega-trends that create new business opportunities and provide potentials to optimize existing processes. These prominent notions stand for the digital representation of business processes.
Organizations that implement such electronic business processes want to enable ubiquitous access to their services for suppliers, partners, and customers. To achieve this goal, public network infrastructure, e.g. the Internet and wireless networks, are integrated.
Business is based on the principle of trust. Trust services such as authentication, authorization, non-repudiation, and privacy are well established in traditional business. The implementation of digitalized business processes over public network infrastructure requires to adequately transform such trust services into the digital world.
This presentation examines IT-security technologies to achieve digital trust services that are required for E-/M-Business.
Signing an e-mail message means that you attach your Digital Certificate to it so that the recipient knows it came from you and was not tampered with en-route to their inbox
Disgital Signature Algorithm which is used Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document.
Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document.
As the public key of the signer is known, anybody can verify the message and the digital signature.
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
Public Key Infrastructure is a widely deployed security technology for handling key distribution and validation in computer security. Despite PKI’s popularity as a security solution, Phishing and other Man-in-the-Middle related attacks are accomplished with ease throughout our computer networks. The major problems with PKI come down to trust, and largely, how much faith we must place in cryptographic keys alone to establish authenticity and identity.
In this paper, we look at a novel biometric solution that mitigates this problem at both the user and certificate authority levels. More importantly, we examine the trouble with the application of unprotected biometric features directly into PKI, and propose the integration of a secure, revocable biometric template protection technology that supports transactional key release. A detailed explanation of this new Biometric application is provided, including composition, enrollment, authentication, and revocation details. The Biometric provides a new paradigm for blending elements of physical and virtual security to address pesky network attacks that more conventional approaches have not been able to stop.
1. Protection on Cyber Fraud
Cyber Fraud – Why worry?
Because, Cyber Crime usually has an impact on three things close to us – Identity, Privacy and
Finances. A unique feature of cybercrime is that the consequences aren’t ‘visible’
instantaneously as with other forms of crimes like murder, burglary, kidnapping, etc. Also, the
time interval between the occurrence of the crime and the victim’s realization can sometimes be
so long as to eliminate all possibilities of collecting appropriate evidence.
Identity loss can be extremely damaging to one’s finances and reputation. Fraudsters wait for
those moments when there is a compromise in basic security precautions while negotiating
electronic identity and steal the identity. The victims could be individuals as well as institutions
that handle internet money transactions.
Types of Cyber Fraud
Internet Fraud
A very common form of Internet fraud is the distribution of rogue security software. Internet
services can be used to present fraudulent solicitations to prospective victims, to conduct
fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others
connected with the scheme.
Phishing Identity Theft
Identity theft is a form of stealing someone's identity in which someone pretends to be someone
else by assuming that person's identity, typically in order to access resources or obtain credit and
other benefits in that person's name. Identity theft occurs when someone uses your personally
identifying information, like your name, user id or credit card number, without your permission,
to commit fraud or other crimes.
Phishing
Phishing refers to the process of imitating legitimate companies in emails or creating fake Web
sites designed to look like a legitimate Web site in order to entice users to share their passwords,
credit card numbers, and other personal information. The perpetrator then uses the information to
steal the target's identity or to sell that identity to others. Users need to be educated not to give
away personal information in response to an unsolicited email.
2. Man-in-the-Middle Attack
The phrase "Man-in-the-Middle Attack" is used to describe a computer attack during which the
cybercriminal funnels communication between a consumer and a legitimate organization through
a fake Web site. In these attacks, neither the consumer nor the organization is aware that the
communication is being illegally monitored. The criminal is, in effect, in the middle of a
transaction between the consumer and his or her bank, credit-card Company, or retailer.
The man-in-the-middle server electronically “eavesdrops” on every keystroke, giving the
criminal username, password, and account information. They employ Spyware and other
Malware that when loaded on the consumer’s computer redirects the Web browser to the fake
site. The most technically competent manipulate the real Web site so that visitors are directed to
the fake site.
Protection against Cyber Frauds
Digital Signature Certificates (DSC) is considered to be one of the strongest tools to Cyber
Security.
DSC uses a very complex algorithm to generate a pair of asymmetric keys – Public and Private
Key, wherein the private key is held securely by the user and public key is available publicly.
When a user appends DSC to an electronic document or electronic transaction, the private key
hashes the content of the document or transaction and uses the private information of the user in
the private key to sign the document or transaction and this document or transaction is encrypted
at the signor’s end. This signed document or transaction is verified with the corresponding public
key and decrypted by the authorized person.
• DSCs is issued to an individual through an identity verification process as stipulated by
Information Technology Act in India and hence acts as an authenticating tool. For
example in the case of electronic banking and statutory efilings.
• DSCs are given a legal sanctity in India under the Information Technology Act and hence
it serves as an evidence under the law and the signor cannot repudiate his / her act at a
later stage.
• The digitally signed document or transaction is encrypted at the signor’s end and gives
the protection against hacking or man-in-the-middle attacks. The signature will become
invalid if there is any change to the content and thereby ensures integrity and
confidentiality of the content.
DSCs are issued by licensed Certifying Authorities under the Ministry of Information
Technology, Government of India as per the Information Technology Act.
3. Recourse
If you feel that you are the victim of a cybercrime, as per the amendments to the Information
Technology Act 2000, the minimum rank of investigation of cybercrimes is POLICE
INSPECTOR and any jurisdictional police station can register and investigate.
You could also contact your nearest Cyber Crime Police Station.
Bangalore: Cyber Crime Police Station,
CID Annexe Building, Carlton House,
# 1, Palace Road, Bangalore - 560001.
Telephone: 080 - 22942475, 080- 22943050
E-Mail: cybercrimeps@ksp.gov.in
Chennai: Assistant Commissioner of Police
Cyber Crime Cell
Commissioner office Campus
Egmore, Chennai- 600008
Telephone: +91-40-5549 8211
E-mail id: s.balu@nic.in
Delhi:CBI Cyber Crime Cell:
Superintendent of Police,
Cyber Crime Investigation Cell
Central Bureau of Investigation,
5th Floor, Block No.3,
CGO Complex, Lodhi Road, New Delhi – 3
Telephone: 011-4362203, 011-4392424
E-Mail: cbiccic@bol.net.in
Hyderabad:Cyber Crime Police Station
Crime Investigation Department,
3rd Floor, D.G.P. Pffice
Lakdikapool, Hyderabad – 500004
Telephone: 040-2324 0663, 040-2785 2274
E-mail id: cidap@cidap.gov.in, info@cidap.gov.in
Kolkata: Public Grievance Cell 2250-5134 / 5340
E-Mail: grievance@kolkatapolice.gov.in
Cyber Police Station
Telephone: 2214-3000 / 3004 / 1420
E-Mail: cyberps@kolkatapolice.gov.in
4. Mumbai: Cyber Crime Investigation cell,
Annex III, 1st floor, Office of the Commissioner of Police,
D.N.Road, Mumbai - 400001
Telephone: 022 - 24691233
Email: cybercell.mumbai@mahapolice.gov.in
Easier e-Filing of Income Tax with Digital Signature Certificate.
A Digital Signature Certificate lets you file your Tax Returns the easy and secure way. e-Filing is
mandatory as per the latest notifications for Hindu Undivided Families that come under the purview of
Audit Provision u/s 44AB, business houses with receipts exceeding Rs. 60 lakhs, and professionals whose
annual income exceeds 15 lakhs.
Digital Signature Certificate and e-Filing of Incomes Taxes
Use of a Digital Signature Certificate is mandatory for e-filing by a certain section of businesses, families,
and individuals. For individuals businesses not covered by the latest mandate, a Digital Signature
Certificate assures greater convenience while filing tax returns, and greater security during any
electronic transactions.
Click here to download your Digital Signature Certificate
Why do I need a Digital Signature Certificate?
A Digital Signature Certificate authenticates your identity electronically. It also provides you with a high
level of security for your online transactions by ensuring absolute privacy of the information exchanged
using a digital certificate. You can use certificates to encrypt information such that only the intended
recipient can read it. You can digitally sign information to assure the recipient that it has not been
changed in transit, and also verify your identity as the sender of the message.
Click here to get your Digital Signature Certificate
Where can I use Digital Signature Certificates?
You can use Digital Signature Certificates for the following:
For secure email and web-based transactions, or to identify other participants of web-based
transactions.
5. To prove ownership of a domain name and establish SSL/ TLS encrypted secured sessions between
your website and the user for web based transactions.
As a developer, for proving authorship of a code and retaining integrity of the distributed software
programs.
For signing web forms, e-tendering documents, filing income tax returns, to access membership-based
websites automatically without entering a user name and password etc.
Digital Signature Certificate for smoother transactions with the Ministry of Corporate Affairs or Registrar
of Companies.
A Digital Signature Certificate helps make light work of various transactions related to the Ministry of
Corporate Affairs, or Registrar of Companies. In addition to saving time, a Digital Signature Certificate
also helps secure data. Read on to know more about the benefits of buying a Digital Signature Certificate
from eMudhra.
Any organization or firm can apply for a Digital Signature Certificate (DSC) for transactions involving the
Ministry of Corporate Affairs. However, business houses that exceed revenues of over INR 60 lakhs have
to mandatorily use a Digital Signature Certificate while filing returns. Under the provisions of law, a
Digital Signature is considered as a legally admissible instruments.
There are various types of Digital Signature Certificates that cater to specific needs. While eFiling on the
Ministry of Corporate Affairs portal, a Digital Signature Certificate of Class 2 and Class 3 category is
required.
A Class 2 Digital Signature Certificate is available for download after verification based on a trusted and
pre-verified database.
A Class 3 Digital Signature Certificate, on the other hand, is of a higher level as it is issued only after the
registrant’s identity verification has been done by a Registration Authority.
Digital Signature Certificates and Registrar of Companies
Under provisions of the Information Technology Act, 2000, usage of Digital Signatures on documents
submitted in electronic form ensures security and authenticity. Furthermore, companies that file under
MCA21 e-Governance program have to use a Digital Signature that identifies the authorized signatory of
the company.
Why do I need a Digital Signature Certificate?
6. A Digital Signature Certificate authenticates your identity electronically. It also provides you with a high
level of security for your online transactions by ensuring absolute privacy of the information exchanged
using a digital certificate. You can use certificates to encrypt information such that only the intended
recipient can read it. You can digitally sign information to assure the recipient that it has not been
changed in transit, and also verify your identity as the sender of the message.
Where can I use Digital Signature Certificates?
You can use Digital Signature Certificates for the following:
For secure email and web-based transactions, or to identify other participants of web-based
transactions.
To prove ownership of a domain name and establish SSL/ TLS encrypted secured sessions between your
website and the user for web based transactions.
As a developer, for proving authorship of a code and retaining integrity of the distributed software
programs.
For signing web forms, e-tendering documents, filing income tax returns, to access membership-based
websites automatically without entering a user name and password etc.
eTendering made possible with Digital Signature Certificate.
A Digital Signature Certificate (DSC) is essential for companies and organizations that take part or intend
to take part in eTendering processes on various Government sites. Besides enabling eTendering which is
extremely convenient and transparent, a Digital Signature Certificate also ensure greater security in
other online transactions.
Digital Signature Certificate and e-Tendering
e-Procurement facilitates, integrates, and streamlines procurement processes. From buyer to supplier
and even back. Approved under the Information Technology Act, and with legal status, a Digital
Signature Certificate is essential for all e-Procurement processes.
Applying for a government tender online has many advantages. Since documents are uploaded to a
central site, acknowledgements and receipts are provided immediately. Which is not the case with
paper documents that need to be scanned and verified before being processed.
e-Procurement has gained significant popularity and acceptance as it brings greater transparency to the
whole system. Among other benefits, it helps buyers and bidders overcome geographical limitations,
reduce procurement cycles, and overall helps keep pace with present technology.
7. Any organisation that is looking to apply for any Government eTender needs to have a Class 3 Digital
Signature Certificate registered in the name of a representative who is authorised to submit online
offers for e-Tendering applications.
Why do I need a Digital Signature Certificate?
A Digital Signature Certificate authenticates your identity electronically. It also provides you with a high
level of security for your online transactions by ensuring absolute privacy of the information exchanged
using a digital certificate. You can use certificates to encrypt information such that only the intended
recipient can read it. You can digitally sign information to assure the recipient that it has not been
changed in transit, and also verify your identity as the sender of the message.
Where can I use Digital Signature Certificates?
You can use Digital Signature Certificates for the following:
For secure email and web-based transactions, or to identify other participants of web-based
transactions.
To prove ownership of a domain name and establish SSL/ TLS encrypted secured sessions between your
website and the user for web based transactions.
As a developer, for proving authorship of a code and retaining integrity of the distributed software
programs.
For signing web forms, e-tendering documents, filing income tax returns, to access membership-based
websites automatically without entering a user name and password etc.
8. Foreign Trade made possible with Digital Signature Certificate.
Foreign Trade and Digital Signature Certificates
Export and Import Organizations (EXIM organizations) can apply for licenses online which means that
they can also file accompanying documents electronically on the DGFT website. Since a Digital Signature
Certificate ensures authenticity of the document, DGFT has mandated use of Digital Signature
Certificates with all electronic documents uploaded on the DGFT site. This means that every EXIM
Organisation needs to necessarily have a Digital Signature Certificate for transactions related to the
DGFT website. On validating the identity of the sender, authenticity of the documents and validity of the
DSC, DGFT then processes the documents for licence issuance. In addition to convenience, online
submission of applications on the DGFT website also mean a 50% reduction in licence fee for EXIM
Organisations.
Organisations can prevent fraudulent practices such as identity thefts by filing bills of entry using a
Digital Signature Certificate. If an organisation is filing documents through Custom House Agents, it is
important that all documents filed are accompanied by a DSC.
A Class 3 Digital Signature Certificate is essential for any organisation seeking an Import or an Export
Licence that needs to be registered in the name of one representative authorised to represent the
organisation.
Since a Digital Signature Certificate is recognised by the legal system, all documents submitted using a
Digital Signature Certificate is considered on par with physically signed documents, and also attract
benefits endowed upon them through the Indian Information Technology Act 2000.
Why do I need a Digital Signature Certificate?
A Digital Signature Certificate authenticates your identity electronically. It also provides you with a high
level of security for your online transactions by ensuring absolute privacy of the information exchanged
using a digital certificate. You can use certificates to encrypt information such that only the intended
recipient can read it. You can digitally sign information to assure the recipient that it has not been
changed in transit, and also verify your identity as the sender of the message.
9. Where can I use Digital Signature Certificates?
For secure email and web-based transactions, or to identify other participants of web-based
transactions.
To prove ownership of a domain name and establish SSL/ TLS encrypted secured sessions between your
website and the user for web based transactions.
As a developer, for proving authorship of a code and retaining integrity of the distributed software
programs.
For signing web forms, e-tendering documents, filing income tax returns, to access membership-based
websites automatically without entering a user name and password etc.