You are on page 1of 8

NJBSPM’s

Shantiniketan Polytechnic New Panvel

Name: - Paramvir Birbhadra Thakur


Roll No: - 1303
Subject: - Management (MAN)
Subject code: - 22509
Micro Project Topic: - Study of Measures to be Taken for Ensuring Cyber Security
Subject Teacher: - Mrs. Seema Kumbhar

Sr. Names Roll No Enrollment No. Remark


No.

01 Thakur Paramvir Birbhadra 1303 1715090006

Guided By: - Mrs. Seema Kumbhar Madam


INTRODUCTION
Today man is able to send and receive any form of data may be an e-mail
or an audio or video just by the click of a button but did he ever think how securely
his data id being transmitted or sent to the other person safely without any leakage of
information?? The answer lies in cyber security. Today Internet is the fastest growing
infrastructure in everyday life. In today’s technical environment many latest
technologies are changing the face of the mankind. But due to these emerging
technologies we are unable to safeguard our private information in a very effective
way and hence these days cyber-crimes are increasing day by day. Today more than
60 percent of total commercial transactions are done online, so this field required a
high quality of security for transparent and best transactions. Hence cyber security has
become a latest issue. The scope of cyber security is not just limited to securing the
information in IT industry but also to various other fields like cyber space etc.
Even the latest technologies like cloud computing, mobile computing, E-
commerce, net banking etc also needs high level of security. Since these technologies
hold some important information regarding a person their security has become a must
thing. Enhancing cyber security and protecting critical information infrastructures are
essential to each nation's security and economic wellbeing. Making the Internet safer
(and protecting Internet users) has become integral to the development of new services
as well as governmental policy. The fight against cyber-crime needs a comprehensive
and a safer approach. Given that technical measures alone cannot prevent any crime, it
is critical that law enforcement agencies are allowed to investigate and prosecute
cyber-crime effectively. Today many nations and governments are imposing strict
laws on cyber securities in order to prevent the loss of some important information.
Every individual must also be trained on this cyber security and save themselves from
these increasing cyber-crimes.
Cyber Security plays an important role in the field of information
technology. Securing the information have become one of the biggest challenges in
the present day. Whenever we think about the cyber security the first thing that comes
to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various
Governments and companies are taking many measures in order to prevent these
cyber-crimes. Besides various measures cyber security is still a very big concern to
many. This paper mainly focuses on challenges faced by cyber security on the latest
technologies. It also focuses on latest about the cyber security techniques, ethics and
the trends changing the face of cyber security.
Cyber Crime: How You Can Prevent It!

Your company is not a Fortune 100 company (you are not Target nor Home
Depot), you work hard every day and have above average intelligence—so what could
possibly go wrong?
According to the National Crime Prevention Council:
“A crime committed or facilitated via the Internet is a Cyber Crime. Cyber Crime is
any criminal activity involving computers and networks.”
It can range from fraud to unsolicited emails (SPAM). It can include the distant theft
of government or corporate secrets through criminal trespass into remote systems
around the globe. Cyber Crime incorporates anything from downloading illegal music
files to stealing millions of dollars from online bank accounts. Cyber Crime also
includes non-money offenses, such as creating viruses on other computers or posting
confidential business information on the Internet.

Are you a victim or a perpetrator?


By virtue of the tools being used today to commit Cyber Crimes, criminals
are now more anonymous and provided with a virtual market of available victims. The
responsibility falls on individuals to protect themselves and their families through safe
online practices.
“In 2011, the annual cost of identity theft alone was $37 billion dollars….
Identity Theft made up only 9.8 of all Cyber Crime in 2010.” (Gordon M. Snow,
Assistant Director, Cyber Division, Federal Bureau of Investigation, Statement before
the Senate Judiciary Committee.)
The Internet Crime Complaint Center (IC3) compiles and releases annual
reports on the statistics and Cyber Crime facts,
What type of Cyber Crime makes up the largest percentage? Take a look…
In 2010, the top ten reported Cyber Crimes to the IC3, courtesy of the 2010 Internet
Crime Report, were:
Non-Delivery of Payment/Merchandise—14.4% of the sellers/purchasers did not
receive payment/merchandise.
FBI Related Scams—13.2% of criminals pose as the FBI to defraud victims.
Identity Theft—9.8% were unauthorized use of personal identifying information to
commit crimes.
Computer Crimes—9.1% were crimes that target a computer or were facilitated by a
computer.
Miscellaneous Fraud—8.6% of scams and fraud included sweepstakes and work-
from-home scams.
Advance Fee Fraud—7.6% were the Nigerian letter scam.
Spam—6.9% of users received unsolicited, mass produced bulk messages.
Auction Fraud—5.9% was fraudulent or misleading information in the context of an
online auction site.
Credit Card Fraud—5.3% was fraudulent charging of goods and/or services to a
victim’s account.
Overpayment Fraud—5.3% of victims deposited bad checks for payment and sent
the excess funds to sender.
This is just a partial list of all the crimes that are committed. Knowledge is power —
so what can you do to prevent Cyber Crime? And are you as vigilant at home as you
are at work?

The following ten tips are basic ways that Cyber Crime can be prevented

Tip #1 - You are a target to hackers


Don't ever say "It won't happen to me". We are all at risk and the stakes are high - to
your personal and financial well-being, and to the University's standing and
reputation.
 Keeping campus computing resources secure is everyone's responsibility.
 By following the tips below and remaining vigilant, you are doing your part to
protect yourself and others.

Tip #2 - Keep software up to date


Installing software updates for your operating system and programs is critical. Always
install the latest security updates for your devices:
 Turn on Automatic Updates for your operating system.
 Use web browsers such as Chrome or Firefox that receive frequent, automatic
security updates.
 Make sure to keep browser plug-ins (Flash, Java, etc.) up to date.
 Utilize Secunia PSI (free) to find other software on your computer that needs to
be updated.
Tip #3 - Avoid Phishing scams - beware of suspicious
emails and phone calls
Phishing scams are a constant threat - using various social engineering(link is
external) ploys, cyber-criminals will attempt to trick you into divulging personal
information such as your login ID and password, banking or credit card information.
 Phishing scams can be carried out by phone, text, or through social networking
sites - but most commonly by email.
 Be suspicious of any official-looking email message or phone call that asks for
personal or financial information.

Tip #4 - Practice good password management


We all have too many passwords to manage - and it's easy to take short-cuts, like
reusing the same password. A password management program(link is external) can
help you to maintain strong unique passwords for all of your accounts. These
programs can generate strong passwords for you, enter credentials automatically, and
remind you to update your passwords periodically.
There are several online password management services that offer free versions,
and KeePass(link is external) is a free application for Mac and Windows.
Here are some general password tips to keep in mind:
 Use long passwords - 20 characters or more is recommended.
 Use a strong mix of characters, and never use the same password for multiple
sites.
 Don't share your passwords and don't write them down (especially not on a
post-it note attached to your monitor).
 Update your passwords periodically, at least once every 6 months (90 days is
better).

Tip #5 - Be careful what you click


Avoid visiting unknown websites or downloading software from untrusted
sources. These sites often host malware that will automatically, and often silently,
compromise your computer.
If attachments or links in the email are unexpected or suspicious for any reason, don't
click on it.
ISO recommends using Click-to-Play or NoScript(link is external), browser add-on
features that prevent the automatic download of plug-in content (e.g., Java, Flash) and
scripts that can harbor malicious code.

Tip #6 - Never leave devices unattended


The physical security of your devices is just as important as their technical security.
 If you need to leave your laptop, phone, or tablet for any length of time - lock it
up so no one else can use it.
 If you keep sensitive information on a flash drive or external hard drive, make
sure to keep these locked as well.
 For desktop computers, shut-down the system when not in use - or lock your
screen.

Tip #7 - Protect sensitive data


Be aware of sensitive data that you come into contact with, and associated restrictions
- review the UCB Data Classification Standard to understand data protection level
requirements. In general:
 Keep sensitive data (e.g., SSN's, credit card information, student records,
health information, etc.) off of your workstation, laptop, or mobile devices.
 Securely remove sensitive data files from your system when they are no longer
needed.
 Always use encryption when storing or transmitting sensitive data.

Tip #8 - Use mobile devices safely


Considering how much we rely on our mobile devices, and how susceptible they are
to attack, you'll want to make sure you are protected:
 Lock your device with a PIN or password - and never leave it unprotected in
public.
 Only install apps from trusted sources.
 Keep your device's operating system updated.
 Don't click on links or attachments from unsolicited emails or texts.
 Avoid transmitting or storing personal information on the device.
 Most handheld devices are capable of employing data encryption - consult your
device's documentation for available options.
 Use Apple's Find my iPhone(link is external) or the Android Device
Manager(link is external) tools to help prevent loss or theft.
 Backup your data.

Tip #9 - Install anti-virus protection


Only install an anti-virus program from a known and trusted source. Keep virus
definitions, engines and software up to date to ensure your anti-virus program remains
effective.
For personally-owned systems and unmanaged UCB owned computers, the campus
offers free anti-virus software, available for Windows and Mac, to current faculty,
staff, and students.

Tip #10 - Back up your data


Back up regularly - if you are a victim of a security incident, the only guaranteed way
to repair your computer is to erase and re-install the system.

Here are some additional tips to help keep you safe and
secure online:
 Use a firewall - Mac and Windows have basic desktop firewalls as part of their
operating system that can help protect your computer from external attacks.
 Use public wireless hot-spots wisely - follow these tips(link is external) for
staying safe.
 Be conscientious of what you plug into your computer (flash drives and
even smartphones can contain malware).
 Be careful of what you share on social networking sites.
 Monitor your accounts for suspicious activity.
 Bank or shop online only on trusted devices and networks - and logout of
these sites when you've completed your transactions.
Conclusion and Suggestions
The cyber-crime is a new invention of crimes made by a class of intellectual,
sophisticated criminals. Since long time the criminal jurisprudence was totally
ignorant of such types of crimes, although these were committed in different forms
during early development of crimes and criminology. One can say that the cyber-
crimes started to operate when technology reaches its peak and took new tum to
satisfy human needs and desires.
Because such comes being committed with the help of machines and on
arithmetical formulation, are different types in nature from that of ordinary types of
crimes. These crimes contain the elements of blue colour and white colour crimes.
These are blue colour crimes because these are not very different from other prototype
crimes, though recognized by various names. These are also white colour in nature
because crimes are usually committed by a class of criminals who are having
knowledge about science and technologies. For this reason, I dare to say that cyber-
crimes are an amalgamation of blue colour and white colour crimes. In the selected
subject of work, I made a thorough study on the new forms of crimes. The criminals
of this advanced age endeavour to commit this new crime with the help of computers
through Internet by exploiting cyber space. This is a new subject and the world facing
problem to tackle the situation.

You might also like