You are on page 1of 47

Cyber Awareness During

Covid-19
Overview

• Objective
• Introduction To Cyber Crime
• Cyber Attack Motives
• Type of Attacks
• Security Awareness
• Ethics to follow
• Conclusion
Objective

• To educate and create awareness amongst the community on use


of Technology, Internet media and its implications on possible
cyber crimes.
• To give some of the possible preventive measures, one can take to
avoid getting victimized for a cyber crime.
Few Years Ago
Few Years Ago
Introduction

• Internet has become one of the integral part of our daily life. It
has transformed the way we communicate, make friends, share
updates, play games, and shop. They are impacting most aspects
of our day-to-day life.
• Cyberspace connects us virtually with crores of online users across
the globe. With increasing use of cyberspace, cybercrimes such as
cyber stalking, cyber theft, cyber bullying, cyber harassment,
cyber defamation, etc. are also increasing rapidly.
Motives of Cyber Crime

• Money
• Curiosity
• Revenge
• Fun
• Praise Seekers
Identity Theft

• All your personal information like your name, address, email id


etc., which relates to you and through which you can be identified
and tracked in cyber space is your identity in digital world.
• Stealing or misuse of your personal or social identifying
information like : Name, Phone Number, School details, Email-ID,
Date of birth, Address, Identity card number, Aadhaar card
details, Passport details, Travel details, Bank account details,
Fingerprints, Voice sample etc., is identity theft.
How do they get your identity?

• Data entered in survey forms given in restaurants, lucky draw


coupons, at shopping malls/movie theatres requesting personal
information.
• By social engineering
• From online shopping portals, e-commerce sites.
• Data in government registers or public records which are
improperly handled.
• Criminals try to retrieve information from computer servers that is
not secured or monitored properly.
Phishing Attack

• Phishing attacks is a social engineering attack attempt


to gain sensitive, confidential information such as
usernames, passwords, credit card information,
network credentials, and more.
• Hackers and cyber scammers are taking advantage of the
coronavirus disease (COVID-19) pandemic by sending
fraudulent email and WhatsApp messages that attempt to
trick you into clicking on malicious links or opening
attachments.
Tricks used by Attacker

• Cyber criminals send socially engineered emails seemingly coming


from direct managers, friends and even spouses all with the goal
of convincing the target to click on a link or open an attachment.
• It also involves calling a person and gathering all information
about the person and fool them.
• Attach malicious documents or links.
• Uses double extension
• Uses the words like “URGENT, LOTTERY, CONGRATULATIONS YOU
HAVE WON WEBCAM, DIGITAL CAMERA, ETC.”
Precautions you should take to avoid phishing
attack

• Never respond to e-mail or SMS on mobile from strangers regarding


online lottery or bumper festival bonanza.
• Avoid filling forms that come via e-Mail asking for your personal
information. And do not click on links that come via e-mail. Use e-
mail filtering software to avoid spam so that only messages from
authorized users are received. Most e-Mail providers offer filtering
services.
• Be careful while downloading attachments from e-Mails into your
hard disk. Scan the attachment with updated antivirus software
before saving it.
Precautions you should take to avoid phishing
attack

• Do not click on the e-Mails that you receive from un trusted users
as clicking itself may execute some malicious code and spread into
your system.
Vishing

• Vishing (also known as Voice phishing) is a form of phishing attack


in which the attacker (Visher) calls a bank customer (Victim),
claims to represent the bank and lures the victim to provide
personal banking details like Customer ID, password, Credit Card
Number, ATM PIN, OTP, CVV or other sensitive information by
creating a sense of urgency in the victim’s mind.
• The phone call can be a recorded message enticing users to
respond.
Tips to protect from vishing
Tips to protect from vishing
Cyber Bullying

• Harming or harassing via computers, mobiles and other


information technology device.
• Forwarding gossip mails or spoofed mails to spread rumours or hurt
another person.
• Sending hateful threatening message to other person
• Insulting other person on social media or any other digital
platform.
• Stealing password and blackmailing other person
SECURITY AWARENESS
Safe Downloads

• Make sure that you are downloading


anything from trusted sources.
• Do not click no any link to download any
file.
• Use secure browser
• Check the size of the file before you
download, sometimes it shows a very
small size but after you click it increases
the size of the file.
Password Policies

• Attacker can apply following methods to steal your password:


• Shoulder surfing - Do not reveal your passwords in front of others or
type your usernames and passwords before the unauthorized persons.
• Brute force - You should not use a password that represents their
personal information like nicknames, phone numbers, date of birth
etc.
• Dictionary attack - You should not use dictionary words (like animal,
plants, birds or meanings) while creating the passwords for login
accounts.
• Phishing attack - You must not share passwords with unknown persons
(strangers)
Password Policies

• Use at least 8 characters or more to create a password. The more number of special characters we use, the more secure is our password.
• Create a password consisting of a combination of lowercase, uppercase, numbers and special characters etc.
• Use different passwords for different accounts.
• Use passphrase, a string of related words, to easily remember your password.
• Avoid using the words from dictionary. They can be cracked easily.
• Create a password such that it can be remembered. This avoids the need to write passwords somewhere, which is not advisable.
• Make sure the password must be difficult to guess.
• Change the password frequently at least 2 weeks once.
• Be careful while entering a password when someone is sitting beside you
• When changing a password ensure that you are not using a password that was used earlier.
• Ensure that you don’t Store the passwords on computer without encryption utility.
• Ensure that you do not use the name of things located around you as passwords for your account.
• Ensure that you do not send your passwords through e-mail or as a message.
Debit card Safety

• Don’t accept the card received directly from bank in


case if it is damaged or seal is open.
• Don't write your PIN number on your credit card.
• Don’t disclose your Credit Card Number/ATM PIN to
anyone.
• Don’t hand over the card to anyone, even if he/she
claims to represent the Bank.
• Don’t transfer or share your account details with
unknown / non validated source.
Child Online Activity

• Create a family e-mail address for signing up for online games.


• Teach children to verify the authenticity and security of downloaded files and
new software.
• Make sure you configure your web browsers securely.
• Set up your user account and assign strong password.
• Set time limits for children.
• Avoid downloading software and games from unknown websites and teach the
same to children.
• Establish rules for online use with children.
• Review your children blogs regularly.
Fake News

• Do not share any untrusted message with anyone


• Do not open any link or file received from unknown sources.
• Some times strangers may offer free gifts through message with
false information.
Ethics To Follow

• One shall not use a computer to harm other people.


• One shall not interfere with other's computer work.
• One shall not snoop around in other 's computer files.
• One shall not use a computer to steal.
• One shall not copy or use proprietary software for which one have
not paid.
• One shall not use other's computer resources without authorization
or proper compensation.
Ethics To Follow

• Computer ethics are set of moral principles that govern the usage
of computers.
• One of the common issues of computer ethics is violation of
copyright issues.
• Improper use of computer resources
• Digital plagiarism
• Breaking copyright and software theft
Any Questions?
THANK YOU

You might also like