Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
A Step Into The Computer Underground “By Understanding The Enemy We Are Better Prepared To Defend Ourselves” 1 INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal information and computer from cyber-attacks. Cyber-safety topics covered include: What is Cyber-safety? Consequences of Inaction Cyber-safety Threats Cyber-safety Actions at Home 2 WHAT IS CYBER SAFETY Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks. 3 Security -The new face of Information Technology Services 4 WHAT DO YOU DO ONLINE? Cybercrime : Top 20 Countries India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime. 6 WHY INDIA? A rapidly growing online user base 121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages. Source: IAMAI; Juxt; wearesocial 2011 7 CYBER CRIMES We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. 8 WHAT ARE CYBER SAFETY THREATS Viruses Viruses infect computers through email attachments and file sharing. They delete files, attack other computers, and make your computer run slowly and can cause problem for the whole network.. Hackers Hackers are people who “trespass” into your computer from a remote location. They may use your computer to send spam or viruses, host a Web site and cause computer malfunctions. Identity Thieves Spyware People who obtain unauthorized access to your personal information, such as Social Security and financial account numbers. They then use this information to commit crimes such as fraud or theft. Spyware is software that “piggybacks” on programs you download, gathers information about your online habits, and transmits personal information without your knowledge. These cyber-safety threats are responsible for various Cyber Crimes 9 Internet Safety Risks • Cyberbullying • Posting personal /inappropriate information • Online Predators • Sexting • Phishing • Cyber terrorism • Defamation • Sale of illegal articles • Online gambling (Lottery) • Email spoofing • Email Bombing • Email spamming • Financial Frauds • Exposure to inappropriate content 10