This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
2. Arjun Chetry
Assistant Director (IT)
North Eastern Police Academy
MHA, Govt. of India.
International Certification
Cellebrite certified Operator & Cellebrite Certified Physical Analyser
Computer Hacking Forensics Investigator from EC-Council, US
Red Hat Certified System Administrator from Red Hat Linux
Red Hat Certified Engineer from Red Hat Linux
Cisco Certified Network Associate from Cisco Academy
Certified Information Security Expert from Innobuzz
Main Courses/Training Attended:
Digital Evidence & Digital forensics Training under FBI during ATA Course
Cyber crime Training under Computer Emergency Response Team of India
Memory forensics training from Data Security Council of India
Resource Person
Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc.
Research Publication
Published national & international research papers
B.Sc. M.C.A, Research Scholar in Digital Forensics
3. Points to cover in this Session
Cyberspace – WHY important to understand cybersafety
Why phone is termed SMARTPHONE
How attackers working ?
BE SMART – HOW to Handle SMARTPHONE
Cyber Safety Settings by SMARTPHONE Users
Be aware – website/portal for reference
4. Cyberspace facts – India
The twentieth century has brought to reality the idea of a global village, where
digital technology has interconnected and enmeshed the world economies, cultures
and populations.
India is no exception, with over 400 million internet users as of 2018, making it
the second-largest internet population in the world.
While greater connectivity via the world wide web promises large-scale progress, it
also leaves our digital societies open to new vulnerabilities.
Cyber crimes know no borders and evolve at a pace at par with emerging
technologies.
5. • Source : https://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use
List of countries by number of mobile phones in use
6.
7.
8.
9.
10.
11. Just my Guess – believe or not
• Every Activity in cyberspace (Education,
Celebration, Motivation, Imagination)
• Every place you’ve ever been
• Everything you’ve told to Siri/HelloGoogle
• All of Your personal IDs or Your passwords
• Every message/emails you send/receive
• All the information you've given to Google
(Search/watch/played/speak)
• How fast you’re traveling/Running/Eating?
• How long you are sleeping?
• Everything that you want to purchase or sell
SmartPhone
knows
12. Let’s See – How we handling such smart device till date...
13. “Data = information =Power”
Entertainment Travelling Publication Advertisement – Many more
16. High
Low
1980 1985 1990 1995 2000+
password guessing
self-replicating code
password cracking
exploiting known vulnerabilities
disabling audits
back doors
hijacking
sessions
sweepers
sniffers
packet spoofing
GUI
automated probes/scans
denial of service
www attacks
Tools
Attackers
Intruder
Knowledge
“stealth” / advanced
scanning techniques
burglaries
network mgmt. diagnostics
distributed
attack tools
Cross site scripting
Staged
attack
bots
Source: CERT
Progress
Cyber Attack Sophistication Continues To Evolve
17.
18.
19.
20. Metasploit – hacking / pentesting platform
The world's most widely used hacking /
pen testing platform, Metasploit, has
capabilities to exploit just about any
system including Android mobile devices.
29. How ----- SMART?
Strong passwords or separate password for
each account
ENABLE MULTIFACTOR AUTHENTICATION
Talk to your children/friends about
the internet or cyber crime
Small Steps make a Big Difference
33. Encrypt your phone
Be Cautious with your LOCATION data
Keep BACK UP DATA safe
Turn off any UNNECESSARY APP permissions
Be wary of third-party app stores
How ----- SMART?