| | Presents
-: Initiative Supported By :- | | Supported By: Information Security Council of India
| | Supported By: Information Security Council of India
AN INTRODUCTION ABOUT ME…… | | Supported By: Information Security Council of India
WHY WE ARE HERE……????? | | Supported By: Information Security Council of India
SOME FACTS ABOUT OUR DIGITAL WORLD…. | | Supported By: Information Security Council of India
FACTS ABOUT OUR DIGITAL WORLD AS PER OUR SURVEY IN BETWEEN TODAY, YOUTH SPEND 7.5 HOURS/DAY WITH TECHNOLOGY AND MEDIA 7 DAYS/WEEK THAT’S 52.5 HOURS/WEEK! OR… HOURS/MONTH | | Supported By: Information Security Council of India
FACTS ABOUT OUR DIGITAL WORLD….. 76 % Of Educators Have Placed CYBERBULLYING More Than SMOKING or ALCOHOIC DRUGS | | Supported By: Information Security Council of India
FACTS ABOUT OUR DIGITAL WORLD….. 95% of teens are online 80% of online teens use social media 88% of social media-using teens have witnessed cruelty on social network sites. 15% of social media-using teens have been the target of online meanness. 19% of teens have been bullied in the past year either in person, online, by text, or by phone. | | Supported By: Information Security Council of India
CYBER CRIMES IN INDIA….. India is the Third Most Targeted Country for Phishing Attacks after the US and UK. The Majority of Cyber Crimes are centered on Frauds & Phishing. Social Networks as well as ecommerce sites are major targets. 6.9 million bot infected systems in 14,348 websites defaced in | | Supported By: Information Security Council of India
CYBER CRIMES IN INDIA….. India is the No. 1 Country in the world for generating spams. 29.9 million people fell Victim of Cyber Crimes. $ 4 billion in direct financial loss. 4 in 5 online adults (80%) have been a victim of Cyber Crime. 17% of adults online have experienced cyber crime on their mobile phone. | | Supported By: Information Security Council of India
STATISTICS OF CYBER CRIME REGISTERED….. | | Supported By: Information Security Council of India
CRIME WISE – CYBER CRIME STATISTICS….. | | Supported By: Information Security Council of India
4 YEARS COMPARISON OF CYBER CRIMES….. | | Supported By: Information Security Council of India
CYBER CRIME : AN INTRODUCTION….. Cyber crime means any criminal activity in which a computer or network is the source, tool or target or place of crime Crimes committed with the use of computers or relating to computers, especially through internet. Crimes involving use of information or usage of electronic means in furtherance of crime are covered under the scope of cyber crime. Cyber Crimes may be committed against persons, property and government. | | Supported By: Information Security Council of India
TRADITIONAL CRIMES AND CYBER CRIMES….. | | Supported By: Information Security Council of India
TYPES OF CYBER CRIME….. Cyber crimes Hacking Information Theft bombing Salami attacks Web jacking Denial of Service attacks Trojan attacks | | Supported By: Information Security Council of India
ATM DEBIT/CREDIT CARD FRAUDS | | Supported By: Information Security Council of India
SOME NEWS ON ATM FRAUDS….. | | Supported By: Information Security Council of India
SOME NEWS ON ATM FRAUDS….. | | Supported By: Information Security Council of India
CREDIT/DEBIT CARD FRAUD….. You simply have to type credit card number into www page off the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner. | | Supported By: Information Security Council of India
DEBIT OR CREDIT CARD SKIMMER….. | | Supported By: Information Security Council of India
ATM MACHINE AS USUAL….. | | Supported By: Information Security Council of India
IS THERE ADDITIONAL SLOT….. | | Supported By: Information Security Council of India
A MONITOR AND PAMPLETTE HOLDER AT SIDE….. NOTHING WRONG….. RIGHT? | | Supported By: Information Security Council of India
FALSE PAMPLETTE BOX AFFIXED TO THE ATM CUBICLE SIDE….. | | Supported By: Information Security Council of India
INSIDE THE PAMPLETTE BOX….. | | Supported By: Information Security Council of India
TRAPPING COMMON PEOPLE GETTING ACCESS TO YOUR BANK/ ACCOUNTS | | Supported By: Information Security Council of India
ONLINE FRAUDS ARRESTED….. | | Supported By: Information Security Council of India
LOTTERY ….. | | Supported By: Information Security Council of India
TYPES OF SCAMS….. Mail claiming you will get money. Job offer – always double check before committing. Offering degrees and other educational certifications Prizes and Lottery Photos selected – send A/C details | | Supported By: Information Security Council of India
NIGERIAN SCAM….. This scam starts with a bulk mailing or bulk faxing of a bunch of identical letters to businessmen, professionals, and other persons who tend to be of greater-than-average Wealth. This scam is often referred to as the scam, ironically after section of the Nigerian Penal Code which relates to fraudulent schemes | | Supported By: Information Security Council of India
ANATOMY OF NIGERIAN LETTER….. My father left me $40 million in his will, but I have to bribe government officials to get it out The Nigerian National Petroleum Company has discovered oil, and we as officials of that company want to insider acquire the land, but we need an Indian front man to purchase it first for us We just sold a bunch of crude oil in Nigeria, but we have to bribe the banker to get it out The Nigerian government overpaid on some contract, and they need a front man to get it out of the country before the government discovers its error | | Supported By: Information Security Council of India
PHISHING ….. Phishing From: *****Bank Sent: 08 Jan :25 To: India Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been Randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity And access to your account will be denied. Please click On the link below to get to the bank secure page and verify your account details. Thank you. ****** Bank Limited | | Supported By: Information Security Council of India
ACTUAL ICICI BANK WEBPAGE….. | | Supported By: Information Security Council of India
PHISHING ICICI BANK LOGIN….. | | Supported By: Information Security Council of India
PHISHING YAHOO MAIL….. | | Supported By: Information Security Council of India
PHISHING YAHOO MAIL….. | | Supported By: Information Security Council of India
ACTUAL YAHOO LOGIN…... | | Supported By: Information Security Council of India
PHISHING PAGE….. | | Supported By: Information Security Council of India
SOCIAL NETWORKING THE BIGGEST CHALLENGE FOR POLICE OFFICIALS THE LOVE OF YOUTH & BUSINESSES | | Supported By: Information Security Council of India
INTRODUCTION TO SNS….. Social networking means grouping of individuals into specific groups, like small communities. Social networking is used to meet Internet users, to gather and share information or experiences about any number of topics, developing friendships, or to start a professional relationship. (Or)A simple Social Networking site is where different people keeping different information related to any particular thing at one place. For example Orkut, Facebook, etc. | | Supported By: Information Security Council of India
INTERNET SOCIAL NETWORKING…… Internet Social Networking sites Internet Dating Sites Scientists Strive to Map the Shape-Shifting Net Internet paradox: A social technology that reduces social involvement and psychological well-being? | | Supported By: Information Security Council of India
| | Supported By: Information Security Council of India
REPORT SOMETHING ON FACEBOOK….. Visit Click “Help” in Footer Click “Report Something” in Left Proper Link: | | Supported By: Information Security Council of India
RECOVER HACKED FACEBOOK PROFILE….. Visit Provide your “Username or ” Enter your “OLD PASSWORD” You Remember before hacking. Proper Link: | | Supported By: Information Security Council of India
FACEBOOK FAKE PROFILE CASE…… | | Supported By: Information Security Council of India
PORN VIDEO UPLOAD CASE….. | | Supported By: Information Security Council of India
SECURITY GUIDELINES THE STEPS FOR SAFE SURFING | | Supported By: Information Security Council of India
STRONG PASSWORDS….. Use at least 8 characters or more to create a password. The more number of characters we use, the more secure is our password. Use various combinations of characters while creating a password. For example, create a password consisting of a combination of lowercase, uppercase, numbers and special characters etc.. | | Supported By: Information Security Council of India
CHATTING ONLINE….. Never open, accept, or download a file in IM from someone you don't know. If the file comes from someone you don’t know, don't open it unless you know what the file is. Contact the sender by , phone, or some other method to confirm that what they sent was not a virus. | | Supported By: Information Security Council of India
INTERNET MESSANGERS….. Like viruses, instant message viruses are malicious programs that are designed to travel through IM. Antivirus software can help to detect and remove IM viruses from your computer, only if you keep the antivirus software up-to-date. If you've purchased a subscription from an antivirus software company, your antivirus software may update itself when you're connected to the Internet. | | Supported By: Information Security Council of India
SOCIAL NETWORKING ACTIVITIES….. Be careful about the information you put online, like if you put your photo or video or your account details will stay for a long time and who ever connected will see it. sometimes attackers may morph your photo and may misuse them. Generally, business people will see as part of hiring process to know about everyone views and interests. However bad people over internet will use these sites to collect the personal information and may misuse them. “Remember don’t put anything personal like sensitive information about your family details, addresses, personal photographs they might be misused” | | Supported By: Information Security Council of India
SOCIAL NETWORKING ACTIVITIES….. Most of the sites and services provide options for privacy settings and use them to prevent attackers to view your information. You can also set the privacy settings according to whom you want to allow seeing your information. If you want to meet a social networking friends in person, Think before you meet, it may not be true identity posted on a web site. If you are going to meet then inform to your parents and do it in a public place during the day. | | Supported By: Information Security Council of India
CYBER CRIMINALS THE REASONS OF CRIME & EFFECTS | | Supported By: Information Security Council of India
POSSIBLE SUSPECTS OF CYBER CRIME….. Internal x or present employees Visitors steel data using pen drives etc. External attackers Company associates | | Supported By: Information Security Council of India
PROFILE OF CYBER CRIMINALS….. X employees.. Teenagers.. Political Hacktivist.. Professional Hackers.. Business Rival.. Ex-Boy & Girl Friend.. Divorced Husband.. etc | | Supported By: Information Security Council of India
MOTIVE….. - Profit - Unhappy - Accidental - Blackmail | | Supported By: Information Security Council of India
MEDIUM OF ATTACK….. Internet Chat Internal Networks Phone/Fax | | Supported By: Information Security Council of India
CYBER LAWS ACCEPT IT OR RECEIVE FREE FOOD & STAY | | Supported By: Information Security Council of India
HDFC BANK LOAN FRAUD….. | | Supported By: Information Security Council of India
ONLINE RECHARGE FRAUD….. | | Supported By: Information Security Council of India
CYBER LAW: NEED TO KNOW MORE ABOUT IT….. | | Supported By: Information Security Council of India
CYBER LAW: NEED TO KNOW MORE ABOUT IT….. | | Supported By: Information Security Council of India
CYBER LAW: NEED TO KNOW MORE ABOUT IT….. | | Supported By: Information Security Council of India
CYBER LAW: NEED TO KNOW MORE ABOUT IT….. The purpose of the law is not to prevent a future offense, but to punish the one actually committed | | Supported By: Information Security Council of India
WHEN TO REPORT CYBER CELL….. Infected by virus, attacked by a hacker Spyware Phishing Spam Identity Theft Online Shopping Fraud Service Providers | | Supported By: Information Security Council of India
WHEN TO REPORT CYBER CELL….. INFECTED BY VIRUS, ATTACKED BY A HACKER: If your computer gets hacked or infected by a virus, disconnect from the Internet and scan it with a fully updated anti-virus software. Then notify your Internet Service Provider (ISP) and the hacker's ISP, if you can identify it. Finally, file a complaint with the Cyber Crime Cell. PHISHING: Store spam that phish for information about your company, bank, or organization. Forward this information to the local Cyber Crime Cell. IDENTITY THEFT: If your information has been misused, file a report about your identity theft. | | Supported By: Information Security Council of India
WHEN TO REPORT CYBER CELL….. SPAM: Should you receive an that you think may be fraudulent, forward it to the Cyber Crime Cell and to the Abuse Desk of the sender's ISP. Also, if the appears to be impersonating a bank or other company or organization, forward the message to the organization or business enterprise that the mail reportedly represents. ONLINE SHOPPING FRAUD: If you have problems during a transaction, try to work them out directly with the seller, buyer or the website operator. If that does fails, file a complaint with the Cyber Crime Cell in your state. | | Supported By: Information Security Council of India
WHEN IT COMES TO SECURITY, THERE IS NOTHING LIKE… “ABSOLUTE SECURITY” “WE ARE ONLY TRYING TO BUILD COMFORT LEVELS, BECAUSE SECURITY COSTS MONEY AND LACK OF IT COSTS MUCH MORE” | | Supported By: Information Security Council of India
| | Supported By: Information Security Council of India
-: FOR ANY QUERY :- CALL ME: ME: FB LINK: | | Supported By: Information Security Council of India