SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Cyber Security Awareness Session
Copyright By Kapil Mehrotra
Date : 1/06/2021
About Myself
• Name : Kapil Mehrotra
• Experience : 24Yrs (Time files ☺ )
• Mostly worked in BFSI & Healthcare domain
• Having little learning curve & patience listener.
• Like to buy books a lot.. ☺ slow reader but try to complete one book at least
in a month.
• Like too much adventures in the life. (From where people say “Hum se na ho
payega” from there I start to search for “Hum se ho payega”) (+V)
• Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket
etc.)
• Die hard animal lover.
• Very active in few government communities for drafting Cloud and Cyber
security skill development policies since 2015.
Type of cyber threats
• “Phishing Attacks” to steal the User ID and Passwords and to gain
the access of the server, laptop or desktop.
• “Fake Link” Through this hacker gain the remote control of the
victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts,
Images, Videos and documents. (anydesk, teamviewer, logmein,
Ammyy)
• Social media scams (Twitter, Facebook, Instagram)
• SQL injection, Virus, Malware and Ransomware
• Fake websites that steal data.
• DDOS & Network attacks
• Insider attacks
What are the consequences of a cyber attack?
Cyber attacks can disrupt and cause considerable
financial and reputational damage to even the most
resilient organization. If you suffer a cyber attack, you
stand to lose Data, reputation and business, and
potentially face regulatory fines and litigation – as well
as the costs of remediation.
Why do we need Cyber Security
• In 2020 we must secure 300 billion passwords globally.
• There are 111 billion lines of new software code being produced each year,
• The world’s digital content is expected to grow 96 zettabytes by 2020
• Dark Web is 5000 times larger than the surface web.
• 20 million connected cars will ship with built-in software-based security
technology by 2020
• 1 Cr 80L Daily Images getting uploaded on the internet
• 50 billion devices connected to the Internet by 2020
Cybercrime Market FY 2020-2021
• Cybercrime costed businesses over $4 trillion total in
2020.
• Cybercrime will cost the world $6 trillion by 2021.
• The average cost of a data breach in 2020 will exceed
between $4million to $150 million
• Approximately $6 trillion is expected to be spent
globally on cybersecurity by 2021
Look at the Hackers Roadmap
• On average 30,000 new websites are getting hacked every day.
• Hackers create 300,000 new pieces of malware daily.
• There is a hacker attack every 39 seconds
• 62% people are experiencing phishing attacks
• 64% of companies have experienced web-based attacks
• Distributed denial-of-service (DDoS) attack grew to more than
1.44TB, increasing in size by 500%.
• 41% ransomware attacks are rising year on year.
Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of
every day
Few Use Cases of
Cyber Security
Ashley Madison – Hack (Lawsuit $30 million)
Ashley Madison
37Million (9.8GB data) hacked and dumped on DW(PII)
Sony Hack
Sony Hack costed $15 Million
Reason : North Korea warns Sony before the launch of
move because it was related with “Kim Jong Un”
Interview and assassination conspiracy & making fun for
their president.
Sony has not taken it seriously.
Hacker hacked 47,000 current and formers employee
data, HR Data, User Ids & Passwords, Clinical Information,
SSO No, All emails and 100TB data including (Movies i.e
Aaron and Dave’s - “The Interview”, Brad Pitt’s - “Fury”
Dominos
• Customers’ personal data include customers’ names,
email ids, mobile numbers, and locations related to 18
crore orders that are placed with Domino’s India are
made available online.
• “Domino’s India Data Breach includes 13TB employee
files and customer details,” shows the web page with a
query box to fetch the details by Hackers.
• https://slf2rrahypck3bwckpdohsnhpeqrb3nhvwznjmar
mweofwnptowe4mad.onion.ly/
Dominos
Dominos
Who was the first hacker?
Konrad Zuse
Do you know?
Kevin Mitnick is the biggest hacker in the world.
1. Mitnick Security Consulting
2. Security awareness training company “KnowBe4”
3. Board Of Director in “Zimperium”
4. Film : Track Down
5. An Author
IT Act & Data Privacy in India
1. Information Technology Act, 2000. (India)
2. IT Amendment Act 2000 to strengthen the cyber security
laws. (Section 43, 65 to 71). i.e. Hacking, fail in data
protection, using image, video or content without
permission etc.)
3. EU General Data Protection Regulation (GDPR)
4. The Personal Data Protection Bill, 2019 (PI & PII data
should be processed and stored)
Note:
Up to three years Imprisonment or/and fine up to 5L
Appointment of DPO (Data Protection Officer
WhatsApp Issue
1. WhatsApp took an objection to a traceability clause in the new IT
Rules that requires social media platforms to locate “the first
originator of the information” if required by the government.
2. Indian Rule 4(2) makes it mandatory for social media
intermediaries to trace the originator of a message or post on
their platform if required by a court or a competent authority
under Section 69A of the IT Act.
• Do not share your password
• Keep Changing your password frequently
• Do not click on the anonymous link from any laptop or mobile
• Don’t open any emails which comes from strangers. (It may be phishing email).
• Don’t download songs and movies
• Don’t use USB or any external devices from out sides.
• Don’t transfer data from mobile & In Mobile storage.
• “Be Aware” We monitor you through DLP and logs your daily activities.
• Apps should maintain user login and logout status as well.
Do’s & Don'ts
Is your email have been compromised ever
• https://haveibeenpwned.com/
• https://www.security.org/how-secure-is-my-password/
Practical
How to report a cyber crime in India?
https://cybercrime.gov.in/Default.aspx
For Women and Child :
complaint-mwcd@gov.in
Thank you
• Email ID : Kapil.Mehrotra@gmail.com
• Mobile No : 9811779881

Contenu connexe

Tendances

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
 

Tendances (20)

Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 

Similaire à Cyber Security work shop by Kapil Mehrotra

Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
Association for Project Management
 

Similaire à Cyber Security work shop by Kapil Mehrotra (20)

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 

Dernier

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Dernier (20)

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

Cyber Security work shop by Kapil Mehrotra

  • 1. Cyber Security Awareness Session Copyright By Kapil Mehrotra Date : 1/06/2021
  • 2. About Myself • Name : Kapil Mehrotra • Experience : 24Yrs (Time files ☺ ) • Mostly worked in BFSI & Healthcare domain • Having little learning curve & patience listener. • Like to buy books a lot.. ☺ slow reader but try to complete one book at least in a month. • Like too much adventures in the life. (From where people say “Hum se na ho payega” from there I start to search for “Hum se ho payega”) (+V) • Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket etc.) • Die hard animal lover. • Very active in few government communities for drafting Cloud and Cyber security skill development policies since 2015.
  • 3. Type of cyber threats • “Phishing Attacks” to steal the User ID and Passwords and to gain the access of the server, laptop or desktop. • “Fake Link” Through this hacker gain the remote control of the victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts, Images, Videos and documents. (anydesk, teamviewer, logmein, Ammyy) • Social media scams (Twitter, Facebook, Instagram) • SQL injection, Virus, Malware and Ransomware • Fake websites that steal data. • DDOS & Network attacks • Insider attacks
  • 4. What are the consequences of a cyber attack? Cyber attacks can disrupt and cause considerable financial and reputational damage to even the most resilient organization. If you suffer a cyber attack, you stand to lose Data, reputation and business, and potentially face regulatory fines and litigation – as well as the costs of remediation.
  • 5. Why do we need Cyber Security • In 2020 we must secure 300 billion passwords globally. • There are 111 billion lines of new software code being produced each year, • The world’s digital content is expected to grow 96 zettabytes by 2020 • Dark Web is 5000 times larger than the surface web. • 20 million connected cars will ship with built-in software-based security technology by 2020 • 1 Cr 80L Daily Images getting uploaded on the internet • 50 billion devices connected to the Internet by 2020
  • 6. Cybercrime Market FY 2020-2021 • Cybercrime costed businesses over $4 trillion total in 2020. • Cybercrime will cost the world $6 trillion by 2021. • The average cost of a data breach in 2020 will exceed between $4million to $150 million • Approximately $6 trillion is expected to be spent globally on cybersecurity by 2021
  • 7. Look at the Hackers Roadmap • On average 30,000 new websites are getting hacked every day. • Hackers create 300,000 new pieces of malware daily. • There is a hacker attack every 39 seconds • 62% people are experiencing phishing attacks • 64% of companies have experienced web-based attacks • Distributed denial-of-service (DDoS) attack grew to more than 1.44TB, increasing in size by 500%. • 41% ransomware attacks are rising year on year. Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of every day
  • 8. Few Use Cases of Cyber Security
  • 9. Ashley Madison – Hack (Lawsuit $30 million)
  • 11. 37Million (9.8GB data) hacked and dumped on DW(PII)
  • 13. Sony Hack costed $15 Million Reason : North Korea warns Sony before the launch of move because it was related with “Kim Jong Un” Interview and assassination conspiracy & making fun for their president. Sony has not taken it seriously. Hacker hacked 47,000 current and formers employee data, HR Data, User Ids & Passwords, Clinical Information, SSO No, All emails and 100TB data including (Movies i.e Aaron and Dave’s - “The Interview”, Brad Pitt’s - “Fury”
  • 14. Dominos • Customers’ personal data include customers’ names, email ids, mobile numbers, and locations related to 18 crore orders that are placed with Domino’s India are made available online. • “Domino’s India Data Breach includes 13TB employee files and customer details,” shows the web page with a query box to fetch the details by Hackers. • https://slf2rrahypck3bwckpdohsnhpeqrb3nhvwznjmar mweofwnptowe4mad.onion.ly/
  • 17. Who was the first hacker? Konrad Zuse
  • 18. Do you know? Kevin Mitnick is the biggest hacker in the world. 1. Mitnick Security Consulting 2. Security awareness training company “KnowBe4” 3. Board Of Director in “Zimperium” 4. Film : Track Down 5. An Author
  • 19. IT Act & Data Privacy in India 1. Information Technology Act, 2000. (India) 2. IT Amendment Act 2000 to strengthen the cyber security laws. (Section 43, 65 to 71). i.e. Hacking, fail in data protection, using image, video or content without permission etc.) 3. EU General Data Protection Regulation (GDPR) 4. The Personal Data Protection Bill, 2019 (PI & PII data should be processed and stored) Note: Up to three years Imprisonment or/and fine up to 5L Appointment of DPO (Data Protection Officer
  • 20. WhatsApp Issue 1. WhatsApp took an objection to a traceability clause in the new IT Rules that requires social media platforms to locate “the first originator of the information” if required by the government. 2. Indian Rule 4(2) makes it mandatory for social media intermediaries to trace the originator of a message or post on their platform if required by a court or a competent authority under Section 69A of the IT Act.
  • 21. • Do not share your password • Keep Changing your password frequently • Do not click on the anonymous link from any laptop or mobile • Don’t open any emails which comes from strangers. (It may be phishing email). • Don’t download songs and movies • Don’t use USB or any external devices from out sides. • Don’t transfer data from mobile & In Mobile storage. • “Be Aware” We monitor you through DLP and logs your daily activities. • Apps should maintain user login and logout status as well. Do’s & Don'ts
  • 22. Is your email have been compromised ever • https://haveibeenpwned.com/ • https://www.security.org/how-secure-is-my-password/ Practical
  • 23. How to report a cyber crime in India? https://cybercrime.gov.in/Default.aspx For Women and Child : complaint-mwcd@gov.in
  • 24. Thank you • Email ID : Kapil.Mehrotra@gmail.com • Mobile No : 9811779881