0% found this document useful (0 votes)
14 views

cyber_security_jagrukta_2022

The document discusses various types of cybercrimes, including phishing, identity theft, cyberstalking, obscenity, computer vandalism, and ransomware, highlighting their definitions and impacts. It provides examples and preventive measures for each type of crime to enhance cyber awareness. The document emphasizes the importance of staying safe both online and offline.

Uploaded by

Rithesh kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

cyber_security_jagrukta_2022

The document discusses various types of cybercrimes, including phishing, identity theft, cyberstalking, obscenity, computer vandalism, and ransomware, highlighting their definitions and impacts. It provides examples and preventive measures for each type of crime to enhance cyber awareness. The document emphasizes the importance of staying safe both online and offline.

Uploaded by

Rithesh kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Cyber Awareness

साइबर
जागरूकता
(6.10.2022)
By-Prem Kumar Singh, PGT CS KV DGQA Chennai
Cybercrime- Any criminal activity which takes place on
or over the medium of computers or internet or other
technology recognised by the Information Technology Act.

Cyber crime is the most prevalent crime playing a devastating


role in Modern India.
Kinds of cybercrimes
1.Phishing-using fake email messages to get personal
information from internet users.
Phishing more examples…
2. Identity theft-all types of crime in which someone wrongfully
obtains and uses another person's personal data in some way
that involves fraud or deception, typically for economic gain.

Identity theft in other words…


Identity theft- The crime of obtaining the personal or financial information of another person to use
their identity to commit fraud, such as making unauthorized transactions or purchases.

Examples of identity theft and solution:


Stolen Checks
If you have had checks stolen or bank accounts set up fraudulently, report it to the check verification
companies. Close your checking and savings accounts and obtain new account numbers. Give the bank a secret
password for your account (not your mother’s maiden name).

ATM Cards lost or stolen


If your ATM card has been stolen or is compromised, get a new card, account number and password. Do not
use your old password. When creating a password, don’t use common numbers like the last four digits of your
Social Security number or your birth date.

Fraudulent Change of Address


Notify the local postal inspector if you suspect an identity theft has filed a change of address with the post
office or has used the mail to commit credit or bank fraud. Find out where the fraudulent credit cards were
sent. Notify the local postmaster for the address to forward all mail in your name to your own address. You
may also need to talk to the mail carrier.
Cyberstalking:

Cyberstalking is a crime in which someone harasses or


stalks a victim using electronic or digital means, such as
social media, email, instant messaging (IM), or messages
posted to a discussion group or forum.

Cyberstalkers take advantage of the anonymity afforded by


the internet to stalk or harass their victims, sometimes
without being caught, punished or even detected.

Reasons:
In many cases, especially when both the harasser and victim are individuals,
the motive may be the following:

•monitor the victim's online -- and, in some cases, offline -- activities;

•track the victim's locations and follow them online or offline;

•annoy the victim;

•intimidate, frighten, control or blackmail the victim;


Ways to guard against cyberstalking :

•update all software to prevent information leaks;


•mask your Internet Protocol address with a virtual private network;
•strengthen privacy settings on social media;
•strengthen all devices with strong passwords or, better, use multifactor
authentication;
•avoid using public Wi-Fi networks;
•send private information via private messages, not by posting on public forums;
•safeguard mobile devices by using password protection and never leave devices
unattended;
•disable geolocation settings on devices;
•install antivirus software on devices to detect malicious software;
•always log out of all accounts at the end of a session; and
•beware of installing apps that ask to access your personal information.
Cyber obscenity :

It includes pornographic websites, pornographic online magazines


and the internet to download and transmit pornographic pictures,
photos and writing.
Obscenity is additionally an offense under the Information
Technology Act 2000. Section 67 of the Information Technology Act
sets out the law that obscenity is an offense when it is published
or transmitted in any electronic form
Computer vandalism:
It is a process wherein there is a program that performs malicious
function such as extracting a user's password or other data or erasing the
hard disk. A vandal differs from a virus.
How to prevent it:
When you shop online, you make certain you’re using secure shopping sites that start
with https:// and have a picture of a padlock on the page.

You need to be careful to not post personal information on social websites, or to save
your passwords in a document on a public computer.
Keeping your computer clean, optimized and with all security systems running at full
capacity is a great start to securing your computer system.

Ransomware:
It is a type of malware from cryptovirology that threatens to publish the victim's personal data or
perpetually block access to it unless a ransom is paid.

Well-known examples…
Locky.- A ransomware that was first used for an attack in 2016 by a group of organized hackers.

•WannaCry. ...
•Bad Rabbit.
•Jigsaw. ...
•CryptoLocker. ...
•Petya.

Remedy??
1. Back up your data 2. Change your credentials 3. Browse safely online 4. Only use secure networks 5. Never pay
the ransom 6. Use a comprehensive security solution
Cyber Awareness
साइबर जागरूकता

Stay safe…online and offline..

Thank You

You might also like