You are on page 1of 5

CYBER CRIME:

PREVENTION
BY YUGANTAR RANA, SRINIDHI DULAM, SUSHANT
SUBRAMANIAN, SUHANI BHARTIYA.
PREVENTION METHODS OF
IDENTITY THEFT
•Our personal data is everywhere and providing information
like passwords and account numbers to access online accounts
is something many of us do daily. Unfortunately, whenever we
supply our PII(Personal Identifiable Information), we are taking
some level of risk that a criminal could steal and misuse it. But
there are ways to reduce the likelihood of identity theft.
•These are some prevention methods of identity theft:
•sign up for an identity theft protection service.
•Don’t access personal or financial data with public Wi-Fi
•Use a password, lock code or encryption
•If you’re not sure about the source, don’t use the link or open
the attachment.
•Use an up-to-date Security Software
BIOMETRICS
Enter biometrics—a new way of verifying your identity that uses
physical and behavioral traits, not easily hackable passwords.
• A step beyond two-factor authorization—which uses a
password and secondary confirmation—biometric
authorization uses things like fingerprints, facial recognition
or voice recognition to verify your identity.
• But even biometrics have their cons: -
- It’s not foolproof
- Biometric Data can be stolen
- It requires high security standards
- There can be legal limitations
• How to prevent theft of Biometric Data
- Keep your software updated
- Always be aware of who is collecting your biometric data
- Opt out if you don't want to use biometrics
Cyber Forensics
Cyber forensics is the practise of gathering, retaining and analysing computer-related data for
investigative purposes in a manner that maintains the integrity of the data.
Through the digital forensics investigation process including : Identification, Preservation,
Analysis and Presentation (IPAP) it is used in criminal investigations to identify what happened,
how it happened, when it happened and the people involved.

In todays technology driven generation, the importance


of cyber forensics is immense. Technology combined
with forensic forensics paves the way for quicker
investigations and accurate results.
Advantages of Cyber Forensics
• Cyber forensics ensures the integrity of the computer. Through cyber
forensics, many people, companies, etc get to know about such crimes, thus
taking proper measures to avoid them.
• Cyber forensics find evidence from digital devices and then present them in
court, which can lead to the punishment of the culprit.
IT ACT 2000
•THE GOVERNMENT OF INDIA’S INFORMATION TECHNOLOGY
ACT, 2000 (ALSO KNOWN AS THE IT ACT), AMENDED IN 2008,
PROVIDES GUIDELINES TO THE USER ON THE PROCESSING,
STORAGE AND TRANSMISSION OF SENSITIVE INFORMATION.
• THE ACT ALSO PROVIDES LEGAL RECOGNITION TO
TRANSACTIONS INVOLVING ELECTRONIC COMMUNICATION,
DATA EXCHANGE AND COMMERCE.

• THE ACT IS ALSO AN ATTEMPT AT PREVENTION OF CYBER


CRIMES AS IT PROVIDES A LEGAL FRAMEWORK FOR
ELECTRONIC GOVERNANCE BY RECOGNIZING ELECTRONIC
RECORDS AND DIGITAL SIGNATURES AND OUTLINES CYBER
CRIMES AND PENALTIES FOR ACTIONS SUCH AS INTERNET
FRAUD, SOURCE CODE TAMPERING, HACKING, IDENTITY
THEFT, CYBERTERRORISM, BREACH OF CONFIDENTIALITY,
PRIVACY OR LAWFUL CONTRACT ETC.

You might also like