Cyber Safety Welcome To The Cyber World The
Cyber Safety
Welcome To The Cyber World
The Internet
BUT
CRIME, LAW, PRIVACY & SECURITY • Crime is an act committed or omitted, in violation of public law, either forbidding or commanding it. • Law is a body of rules and statutes that defines conduct prohibited by the government because it threatens and harms public safety and welfare and that establishes punishment to be imposed for the commission of such acts.
• Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. • Security is the protection of information assets through the use of technology, processes, and training.
CYBER CRIME • Cyber crime is an unlawful act wherein the computer is either a tool or a target or both. • Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
• Cyber crime can be categorized in two ways - The Computer as a Target : -Using a computer to attack other computers. e. g. Hacking, Virus/Worm attacks, DOS attack etc. - The computer as a weapon : -Using a computer to commit real world crimes. e. g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Technical Aspects Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as • Unauthorized access & Hacking: Unauthorized access would mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.
• Trojan Attack: The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. • Virus and Worm attack: A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
• E-mail & IRC related crimes: Email spoofing Email Spamming Sending malicious codes through email Email bombing Sending threatening emails Defamatory emails Email frauds IRC related
• Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Also impersonating another person is considered forgery. • Cyber Terrorism: Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc. How vulnerable are we ?
• Banking/Credit card Related crimes: In the corporate world, Internet hackers are continually looking for opportunities to compromise a company’s security in order to gain access to confidential banking and financial information. Use of stolen card information or fake credit/debit cards is common.
PRIVACY • Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. • Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records, sexual preferences, financial status etc. #Always keep the following data private Salaries Medical information Social security numbers Bank balances
• It means non disclosure of information to unauthorized or unwanted persons. • In addition to personal information some other type of information which are useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected.
PRIVACY – Protect Yourselves • Implement appropriate security measures • Get a copy of your credit report • Use: – Junk e-mail account – Anonymous remailer – Stealth surfing service(Incognito Mode) – Common sense • Deal with recognized, trusted e-retailers • Keep important numbers and passwords secret • Use strong passwords • If your computer acts strangely, find out why
Security Cyber security or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware , software or electronic data as well as from disruption or misdirection of the services they provide.
• Use system of safeguards designed to protect a computer system and data from deliberate or accidental damage like– Natural disasters – Fire – Accidents – Vandalism – Theft or destruction of data – Industrial espionage – Hackers
Keep data secure from • • Destruction Accidental damage Theft Espionage
Ways to secure data Protecting files with a strong password 1. Locked servers 2. Removable hard drives that are locked when not in use 3. Hard disk drives requiring special tools for detachment
SECURITY – Identification & Access • Provide access to authorized individuals only. • Uses one of more of the following systems – What you have – What you know – What you do – What you are Ø • • • What You Have Key Badge Token Plastic card – magnetized strip Active badge – signals wearer’s location using infrared signals
Ø What You Know • Password • Identification number • Combination Ø What You Do • Verify signature – software verifies scanned and online signatures Ø What You Are • Biometrics – science of measuring individual body characteristics • Fingerprints • Voice pattern • Retina of the eye • Entire face
How To Keep Your Personal Computers Secure ? • • Physical security with locks and cables Surge protector Uninterruptible power supply (UPS) Backup files regularly and systematically
Mobile Application Security • Do good research about apps and their developers by reading the reviews. • Use only official stores for downloading Apps. • Beware of apps that promise shopping discounts. • Always keep an updated anti virus security solution installed.
Follow these steps if you find an unauthorized transaction on your account. • Contact Your Bank. As per RBI regulations Illegal transaction if reported immediately bank will pay back the lost amount if bank finds there is no fault with the account holder. • File a Fraud or Police Report. • Block your current account and move your money to Your New Account or Card. • Monitor Your Account and Credit Closely
General Safety Instructions Be careful about what you put on the web. Even personal information on social networks can be easily recovered by anyone. Know that privacy is just an illusion. Don't open any links in emails or chat rooms that look suspicious or unfamiliar. Keep track of who you interact with on the internet. Some people may not be who they seem to be.
References • • • http: //en. wikipedia. org/ (for basic definitions) aahanfoundation. org images. google. com (for images) Compilation Notes opencolleges. edu. au
Presentation by RAMA NAIR LIBRARIAN KV NDA KHADAKWASLA PUNE
- Slides: 31