Www.appsoftinfosystem.com. www.appsoftinfosystem.com | | +91 77 22 075 447 Presents.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Safety Assessment Review
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Cyber Crimes Mumbai Police. Why do we need to know about this Everybody uses computers Crimes like forgery, extorion, kidnapping, are all being assisted.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Social impacts of the use of it By: Mohamed Abdalla.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Digital Citizenship Project
Cyber Crimes.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
CYBER CRIME.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Fraud Protection.
An Introduction to Phishing and Viruses
Misuses of ICT Malpractice and crime © Folens 2008.
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Digital Citizenship Middle School
Information Security.
Lesson 3 Safe Computing.
Lesson 2- Protecting Yourself Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

| | Presents

-: Initiative Supported By :- | | Supported By: Information Security Council of India

| | Supported By: Information Security Council of India

AN INTRODUCTION ABOUT ME…… | | Supported By: Information Security Council of India

WHY WE ARE HERE……????? | | Supported By: Information Security Council of India

SOME FACTS ABOUT OUR DIGITAL WORLD…. | | Supported By: Information Security Council of India

FACTS ABOUT OUR DIGITAL WORLD AS PER OUR SURVEY IN BETWEEN TODAY, YOUTH SPEND 7.5 HOURS/DAY WITH TECHNOLOGY AND MEDIA 7 DAYS/WEEK THAT’S 52.5 HOURS/WEEK! OR… HOURS/MONTH | | Supported By: Information Security Council of India

FACTS ABOUT OUR DIGITAL WORLD….. 76 % Of Educators Have Placed CYBERBULLYING More Than SMOKING or ALCOHOIC DRUGS | | Supported By: Information Security Council of India

FACTS ABOUT OUR DIGITAL WORLD…..  95% of teens are online  80% of online teens use social media  88% of social media-using teens have witnessed cruelty on social network sites.  15% of social media-using teens have been the target of online meanness.  19% of teens have been bullied in the past year either in person, online, by text, or by phone. | | Supported By: Information Security Council of India

CYBER CRIMES IN INDIA…..  India is the Third Most Targeted Country for Phishing Attacks after the US and UK.  The Majority of Cyber Crimes are centered on Frauds & Phishing.  Social Networks as well as ecommerce sites are major targets.  6.9 million bot infected systems in  14,348 websites defaced in | | Supported By: Information Security Council of India

CYBER CRIMES IN INDIA…..  India is the No. 1 Country in the world for generating spams.  29.9 million people fell Victim of Cyber Crimes.  $ 4 billion in direct financial loss.  4 in 5 online adults (80%) have been a victim of Cyber Crime.  17% of adults online have experienced cyber crime on their mobile phone. | | Supported By: Information Security Council of India

STATISTICS OF CYBER CRIME REGISTERED….. | | Supported By: Information Security Council of India

CRIME WISE – CYBER CRIME STATISTICS….. | | Supported By: Information Security Council of India

4 YEARS COMPARISON OF CYBER CRIMES….. | | Supported By: Information Security Council of India

CYBER CRIME : AN INTRODUCTION….. Cyber crime means any criminal activity in which a computer or network is the source, tool or target or place of crime Crimes committed with the use of computers or relating to computers, especially through internet. Crimes involving use of information or usage of electronic means in furtherance of crime are covered under the scope of cyber crime. Cyber Crimes may be committed against persons, property and government. | | Supported By: Information Security Council of India

TRADITIONAL CRIMES AND CYBER CRIMES….. | | Supported By: Information Security Council of India

TYPES OF CYBER CRIME….. Cyber crimes Hacking Information Theft bombing Salami attacks Web jacking Denial of Service attacks Trojan attacks | | Supported By: Information Security Council of India

ATM DEBIT/CREDIT CARD FRAUDS | | Supported By: Information Security Council of India

SOME NEWS ON ATM FRAUDS….. | | Supported By: Information Security Council of India

SOME NEWS ON ATM FRAUDS….. | | Supported By: Information Security Council of India

CREDIT/DEBIT CARD FRAUD…..  You simply have to type credit card number into www page off the vendor for online transaction.  If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner. | | Supported By: Information Security Council of India

DEBIT OR CREDIT CARD SKIMMER….. | | Supported By: Information Security Council of India

ATM MACHINE AS USUAL….. | | Supported By: Information Security Council of India

IS THERE ADDITIONAL SLOT….. | | Supported By: Information Security Council of India

A MONITOR AND PAMPLETTE HOLDER AT SIDE….. NOTHING WRONG….. RIGHT? | | Supported By: Information Security Council of India

FALSE PAMPLETTE BOX AFFIXED TO THE ATM CUBICLE SIDE….. | | Supported By: Information Security Council of India

INSIDE THE PAMPLETTE BOX….. | | Supported By: Information Security Council of India

TRAPPING COMMON PEOPLE GETTING ACCESS TO YOUR BANK/ ACCOUNTS | | Supported By: Information Security Council of India

ONLINE FRAUDS ARRESTED….. | | Supported By: Information Security Council of India

LOTTERY ….. | | Supported By: Information Security Council of India

TYPES OF SCAMS…..  Mail claiming you will get money.  Job offer – always double check before committing.  Offering degrees and other educational certifications  Prizes and Lottery  Photos selected – send A/C details | | Supported By: Information Security Council of India

NIGERIAN SCAM…..  This scam starts with a bulk mailing or bulk faxing of a bunch of identical letters to businessmen, professionals, and other persons who tend to be of greater-than-average Wealth.  This scam is often referred to as the scam, ironically after section of the Nigerian  Penal Code which relates to fraudulent schemes | | Supported By: Information Security Council of India

ANATOMY OF NIGERIAN LETTER…..  My father left me $40 million in his will, but I have to bribe government officials to get it out  The Nigerian National Petroleum Company has discovered oil, and we as officials of that company want to insider acquire the land, but we need an Indian front man to purchase it first for us  We just sold a bunch of crude oil in Nigeria, but we have to bribe the banker to get it out  The Nigerian government overpaid on some contract, and they need a front man to get it out of the country before the government discovers its error | | Supported By: Information Security Council of India

PHISHING ….. Phishing From: *****Bank Sent: 08 Jan :25 To: India Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been Randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity And access to your account will be denied. Please click On the link below to get to the bank secure page and verify your account details. Thank you. ****** Bank Limited | | Supported By: Information Security Council of India

ACTUAL ICICI BANK WEBPAGE….. | | Supported By: Information Security Council of India

PHISHING ICICI BANK LOGIN….. | | Supported By: Information Security Council of India

PHISHING YAHOO MAIL….. | | Supported By: Information Security Council of India

PHISHING YAHOO MAIL….. | | Supported By: Information Security Council of India

ACTUAL YAHOO LOGIN…... | | Supported By: Information Security Council of India

PHISHING PAGE….. | | Supported By: Information Security Council of India

SOCIAL NETWORKING THE BIGGEST CHALLENGE FOR POLICE OFFICIALS THE LOVE OF YOUTH & BUSINESSES | | Supported By: Information Security Council of India

INTRODUCTION TO SNS….. Social networking means grouping of individuals into specific groups, like small communities. Social networking is used to meet Internet users, to gather and share information or experiences about any number of topics, developing friendships, or to start a professional relationship. (Or)A simple Social Networking site is where different people keeping different information related to any particular thing at one place. For example Orkut, Facebook, etc. | | Supported By: Information Security Council of India

INTERNET SOCIAL NETWORKING……  Internet Social Networking sites  Internet Dating Sites  Scientists Strive to Map the Shape-Shifting Net  Internet paradox: A social technology that reduces social involvement and psychological well-being? | | Supported By: Information Security Council of India

| | Supported By: Information Security Council of India

REPORT SOMETHING ON FACEBOOK….. Visit Click “Help” in Footer Click “Report Something” in Left Proper Link: | | Supported By: Information Security Council of India

RECOVER HACKED FACEBOOK PROFILE….. Visit Provide your “Username or ” Enter your “OLD PASSWORD” You Remember before hacking. Proper Link: | | Supported By: Information Security Council of India

FACEBOOK FAKE PROFILE CASE…… | | Supported By: Information Security Council of India

PORN VIDEO UPLOAD CASE….. | | Supported By: Information Security Council of India

SECURITY GUIDELINES THE STEPS FOR SAFE SURFING | | Supported By: Information Security Council of India

STRONG PASSWORDS…..  Use at least 8 characters or more to create a password. The more number of characters we use, the more secure is our password.  Use various combinations of characters while creating a password. For example, create a password consisting of a combination of lowercase, uppercase, numbers and special characters etc.. | | Supported By: Information Security Council of India

CHATTING ONLINE…..  Never open, accept, or download a file in IM from someone you don't know.  If the file comes from someone you don’t know, don't open it unless you know what the file is.  Contact the sender by , phone, or some other method to confirm that what they sent was not a virus. | | Supported By: Information Security Council of India

INTERNET MESSANGERS…..  Like viruses, instant message viruses are malicious programs that are designed to travel through IM.  Antivirus software can help to detect and remove IM viruses from your computer, only if you keep the antivirus software up-to-date.  If you've purchased a subscription from an antivirus software company, your antivirus software may update itself when you're connected to the Internet. | | Supported By: Information Security Council of India

SOCIAL NETWORKING ACTIVITIES…..  Be careful about the information you put online, like if you put your photo or video or your account details will stay for a long time and who ever connected will see it. sometimes attackers may morph your photo and may misuse them.  Generally, business people will see as part of hiring process to know about everyone views and interests. However bad people over internet will use these sites to collect the personal information and may misuse them. “Remember don’t put anything personal like sensitive information about your family details, addresses, personal photographs they might be misused” | | Supported By: Information Security Council of India

SOCIAL NETWORKING ACTIVITIES…..  Most of the sites and services provide options for privacy settings and use them to prevent attackers to view your information.  You can also set the privacy settings according to whom you want to allow seeing your information.  If you want to meet a social networking friends in person, Think before you meet, it may not be true identity posted on a web site. If you are going to meet then inform to your parents and do it in a public place during the day. | | Supported By: Information Security Council of India

CYBER CRIMINALS THE REASONS OF CRIME & EFFECTS | | Supported By: Information Security Council of India

POSSIBLE SUSPECTS OF CYBER CRIME…..  Internal x or present employees  Visitors steel data using pen drives etc.  External attackers  Company associates | | Supported By: Information Security Council of India

PROFILE OF CYBER CRIMINALS…..  X employees..  Teenagers..  Political Hacktivist..  Professional Hackers..  Business Rival..  Ex-Boy & Girl Friend..  Divorced Husband.. etc | | Supported By: Information Security Council of India

MOTIVE…..  - Profit  - Unhappy  - Accidental  - Blackmail | | Supported By: Information Security Council of India

MEDIUM OF ATTACK…..  Internet  Chat  Internal Networks   Phone/Fax | | Supported By: Information Security Council of India

CYBER LAWS ACCEPT IT OR RECEIVE FREE FOOD & STAY | | Supported By: Information Security Council of India

HDFC BANK LOAN FRAUD….. | | Supported By: Information Security Council of India

ONLINE RECHARGE FRAUD….. | | Supported By: Information Security Council of India

CYBER LAW: NEED TO KNOW MORE ABOUT IT….. | | Supported By: Information Security Council of India

CYBER LAW: NEED TO KNOW MORE ABOUT IT….. | | Supported By: Information Security Council of India

CYBER LAW: NEED TO KNOW MORE ABOUT IT….. | | Supported By: Information Security Council of India

CYBER LAW: NEED TO KNOW MORE ABOUT IT….. The purpose of the law is not to prevent a future offense, but to punish the one actually committed | | Supported By: Information Security Council of India

WHEN TO REPORT CYBER CELL…..  Infected by virus, attacked by a hacker  Spyware  Phishing  Spam  Identity Theft  Online Shopping Fraud  Service Providers | | Supported By: Information Security Council of India

WHEN TO REPORT CYBER CELL…..  INFECTED BY VIRUS, ATTACKED BY A HACKER: If your computer gets hacked or infected by a virus, disconnect from the Internet and scan it with a fully updated anti-virus software. Then notify your Internet Service Provider (ISP) and the hacker's ISP, if you can identify it. Finally, file a complaint with the Cyber Crime Cell.  PHISHING: Store spam that phish for information about your company, bank, or organization. Forward this information to the local Cyber Crime Cell.  IDENTITY THEFT: If your information has been misused, file a report about your identity theft. | | Supported By: Information Security Council of India

WHEN TO REPORT CYBER CELL…..  SPAM: Should you receive an that you think may be fraudulent, forward it to the Cyber Crime Cell and to the Abuse Desk of the sender's ISP. Also, if the appears to be impersonating a bank or other company or organization, forward the message to the organization or business enterprise that the mail reportedly represents.  ONLINE SHOPPING FRAUD: If you have problems during a transaction, try to work them out directly with the seller, buyer or the website operator. If that does fails, file a complaint with the Cyber Crime Cell in your state. | | Supported By: Information Security Council of India

WHEN IT COMES TO SECURITY, THERE IS NOTHING LIKE… “ABSOLUTE SECURITY” “WE ARE ONLY TRYING TO BUILD COMFORT LEVELS, BECAUSE SECURITY COSTS MONEY AND LACK OF IT COSTS MUCH MORE” | | Supported By: Information Security Council of India

| | Supported By: Information Security Council of India

-: FOR ANY QUERY :- CALL ME: ME: FB LINK: | | Supported By: Information Security Council of India