2. What is Cyber Safety?
•The act of protecting networks, computers,
servers, mobile devices, electronic systems, and
data against malicious attacks is known as cyber
safety.
•It is the mindful and secure use of the internet to
protect the privacy of personal data.
3. Identity Theft:- It occurs when someone impersonates
another using their personal information to commit
fraud.
Identity
Theft
Financial
Identity used
for getting
financial gain
Criminal
Identity used
to commit
crimes freely
Medical
Identity used
to obtain
medical
drugs
4. Ways in which websites track us
•IP address:- An IP address is a unique address which
identifies a device on the internet or a local network.
These are available to websites we visit and also
contain information about our rough location.
•Cookies:- They are small pieces of information stored
in the browser, which track, personalize, and save
information about each user’s session. Websites use
cookies to streamline your web experiences.
5. HTTP referrer:- It contains the address of the previous
web page from which a link to the currently requested
page was followed.
Super cookie:- They are a type of cookie which are
more persistent. These cookies are stored often in
multiple locations and are repopulated through
other locations when deleted from a particular
part. They are harder to get rid of.
User agent:- It tells the websites we visit about our
browser and operating system.
6. How to protect ourselves:- Anonymous and
Private browsing
• Anonymous browsers:- They are used by journalists governments etc.
which let the user access the internet without revealing personal
information such as IP address. For e.g. Tor browser
Private Browsing can be achieved through the following ways:-
Incognito Browsing
Proxy
VPNs
7. • Incognito browsing:- This is a version of the browser which
simply keeps your browsing activity private. It does not,
however, keep your ISP from seeing the sites you visit. For
e.g. Incognito mode in Chrome, private browsing in Firefox.
• Proxy:- A proxy site serves as an intermediate between the
user and the desired website. Instead of the user, the
trackers receive data about the proxy site.
• VPN:- A virtual private network, or VPN, is an encrypted
connection via internet from a device to a network. It can be
installed as a plugin too. It tunnels your connection through
a private server.
8. Need for confidentiality
The internet is a necessary tool in our day to day life.
There are multiple ways in which our data can be used
against us.
In order to avoid these mishappenings, there are a few
measures we need to take while browsing the
internet:-
9. Use a firewall whenever possible:-
A firewall is a barrier which
monitors and filters incoming and
outgoing network traffic based on
given guidelines. It keeps
unauthorized traffic out.
Control browser settings:-
Browsers track user data and share
information with websites you
might not approve of. Disable 3rd
party cookies to prevent tracking.
Use private browsing:- Using
methods such as the ones
mentioned previously, keep your
personal information and browsing
data safe.
Be careful with url:- It is better to
type it in yourself instead of
clicking on a link and making sure
that the connection is secure with
https and a padlock sign.
10. Be careful about what you’re
posting on the internet:- While
posting on social media sites like
Facebook, it should be ensured
that no personal information like
residential addresses are divulged.
Handle emails with care:- Be
cautious with how much you trust
emails, especially ones from
illegitimate looking sources. Do not
open attachments in this case, nor
click on any links.
Avoid dealing with sensitive
information while using public
connections:- Public WIFI's are
often unencrypted and are thus
easy to gain access to which can be
used to commit fraudulent
activities.
Avoid using public computers:-
Ensure your login information and
passwords are not getting saved.
Avoid putting sensitive data in and
make sure the computer is not left
unattended if you do. Delete
cookies and log out when you are
done.
13. What is a Cybercrime?
Cybercrime is any criminal offense that
is facilitated by or involves electronic
communications or information systems,
including any electronic device, computer,
or the internet.
It is a general term that covers
crimes like phishing, credit card fraud,
illegal downloading, child pornography,
cyberbullying, and so on.
14. Common Cybercrimes
1. Cyber Trolls- A person who purposely posts
sarcastic, demeaning, or insulting comments
about someone.
2. Cyber Bullying- When someone uses the
internet, any electronic device, and social media
network to harass, embarrass or intimidate
someone else.
• Criminal charges such as harassment, libel,
assault, and even terrorism can be charged on
the criminal.
• According to the civil lawsuit they may be asked
to compensate for the damage caused.
15. 3. Cyber Stalking- This is a kind of online harassment wherein the victim
is subjected to a barrage of online messages and emails.
• They collect all personal information.
• They may post the information online on any filthy/obscene sites
posing as if the victim is posting this information.
• People of all kinds, from all over the world, who come across this
information, start calling the victim at his/her residence for many
filthy/obscene reasons.
• Some stalkers subscribe the e-mail account of the victim to
innumerable obscene or illegal sites because of which the victim
starts receiving unsolicited e-mails.
• Some stalkers send repeated e-mails to ask for favours or threaten
them.
16. 4. Spreading rumors online- When people
indulge in posting false information on social
media, or comments that could hurt or
spread rumors that could hurt others, may
trigger panic, or hurt the religious sentiments
of people resulting in clashes or even riots.
• As per the Information Technology Act of
India, publishing/circulation of rumors,
especially hurting religious sentiments is a
cybercrime and it may invite a fine with
imprisonment extendable upto 3 years.
17. 5. Information Theft- Stealing of personal
information through ways such as-
• Phishing- It is a practice of attempting to
acquire sensitive information from
individuals over the internet, by means
of deception.
• Social engineering/pretexting- posing as
a legitimate business or government
official to obtain personal information.
18. 6. Online Fraud- Fraud committed using the internet is called Online
Fraud.
7. Scam- Fraudulent business practice that extracts money.
Measures-
• Never enter any financial information on unsecure websites.
• Never answer e-mails from any unreliable source.
• Never click on links received in emails rather type the URL yourself.
• Never respond to an e-mail claiming you won something.
Non-delivered goods Non- existent companies
Stealing information Fraudulent Payments
Ways in which
it may occur
Strong
security
mechanism
Measures
19. 8. Illegal Downloads- Illegal downloading refers to obtaining files for
which we don’t have the right to use on download from the internet. It
is downloading a paid item, without making any payment.
9. Child Pornography- Child Pornography is defined as any visual or
written representation that depicts or advocates the sexual activity of
anyone under the age of 18.
• The law also includes some child nudity, simulated sex involving
children, and any material that is computer-doctored to look like
child porn.
• Information Technology Act, 2000 & Indian Penal Code, 1860
provides protection from child pornography to a child below the age
of 18.
• According to the amended Information Technology Bill, Section 67
has been amended that not only creating and transmitting obscene
material in electronic form but also browsing such sites is an
offense.
20. Reporting Cybercrime
If any cyber crime happens, one must report it firstly to parents, school
authorities, and then to the police.
To report a cybercrime:
The Information technology Act provides that a cybercrime may be
reported in the Cyber Crime Units of any city, irrespective of the place
where the crime is committed.
The local police could be
approached for filing
complaints
Provisions have now
been made to file ‘E-FIR’
Complains can also be
filed on a website for
registering crimes against
women and children.
21. Computer Forensics
• Digital Forensics or computer forensics refers to methods used for
the interpretation of computer media for digital evidence.
Data
identification
Project
Planning
Data capture
Data
processing
Data analysis Data display
Data
processing
Important Practices of Computer Forensics:
• Acquire the evidence without damaging or altering the original.
• Authenticate that your recovered evidence is the same as the
originally seized data.
• Analyze the data without modifying it.
22. Cyber Law and IT Act
• Cyber law is a generic term that refers to
all legal and regulatory aspects of the
Internet and the World Wide Web.
• Cyber law is important because it touches
almost all aspects of transactions and
activities on and concerning the Internet,
the World Wide Web and Cyberspace.
23. India’s IT act and IT (Amendment) Act, 2008
• In India Cyber Laws are enforced through Information Technology
Act, 2000 (IT Act 2000).
• IT ACT 2000’s prime purpose was to provide legal recognition to
electronic commerce.
• IT (Amendment) Act, 2008 added several new sections of offenses
including Cyber Terrorism and Data Protection.
• Major amendments of IT ACT (2008)-
Digital Signatures
• Authentication of
electronic records
Electronic Governance
• E-Documents get legal
recognition
• Legal documents can be
supplied in electronic
form
Offences and Penalties
• Penalty upto INR 1
crore
Amendments to other
laws
• Indian Penal Code, 1860
• The Indian Evidence
Act, 1872
• The Banker’s book
evidence Act, 1891 and
many more