Cyber Security Handbook
Cyber Security Handbook
Types of Hacking:
Some main types of hacking are mentioned below:
1. Web Application Hacking
Web application hacking type is the process of exploiting security vulnerabilities or
weaknesses in web-based applications. Web applications are typically written in languages
like HTML, CSS, and JavaScript, but they can also be written in other languages like PHP
and Ruby on Rails. Because of the nature of these languages and how web browsers interpret
them, it is possible to perform specific actions on a website without actually being authorized.
One example of this would be cross-site scripting (XSS), which involves injecting malicious
code into a website's HTML. If you can craft an XSS attack properly, you can hijack the
browser's session with the server without ever having access to their username or password.
2. Hacking Wireless Networks
Hacking wireless networks is a hacking type that involves accessing a computer network
without authorization, typically by exploiting weak points in the system's security.
An excellent example of this is the practice of wardriving, where an attacker drives around
with a laptop or other device capable of picking up wireless signals, looking for unprotected
or poorly protected networks.
3. System Hacking
System hacking is the sacrifice of computer software to access the targeted computer to steal
their sensitive data. The hacker takes advantage of the weaknesses in a computer system to
get the information and data and takes unfair advantage. System hacking aims to gain access,
escalate privileges, and hide files.
4. Web Server Hacking
Web content is generated as a software application on the server side in real-time. This allows
the hackers to attack the webserver to steal private information, data, passwords, and business
information by using DoS attacks, port scans, SYN floods, and Sniffing. Hackers hack web
servers to gain financial gain from theft, sabotage, blackmail, extortion, etc.
5. Network Hacking
Network hacking refers to the act of gaining unauthorized access to a computer network and
its infrastructure resources, such as devices, servers, software, and other services by using
DoS attacks, MitM attacks, IP spoofing and ARP spoofing.
Network hacking involves gathering information about a target network, identifying
vulnerabilities, and exploiting them to gain access. A variety of tools and techniques are used
to identify potential security threats in computer networks.
Hacker:
A hacker is a person who breaks into a computer system. The reasons for hacking can be
many: installing malware, stealing or destroying data, disrupting service, and more. Hacking
can also be done for ethical reasons, such as trying to find software vulnerabilities so they can
be fixed.
Types of Hackers:
Computers and the Internet have changed the work environment of the world beyond
imagination. Computers on taking over a major part of our lives, all our data has got
transferred from records and ledgers to computers. Though this kind of shift in working has
reduced the physical burden on workers it has also increased the chances of data theft. People
involved in stealing data or harming the systems are knowledgeable people with wrong
intentions known as Hackers. There are different types of hackers. Let’s take a look at how
many types of hackers are there and the types of hacker attacks and techniques.
1. White Hat / Ethical Hackers
2. Black Hat Hackers
3. Gray Hat Hackers
4. Script Kiddies
5. Green Hat Hackers
6. Blue Hat Hackers
7. Red Hat Hackers
8. State/Nation Sponsored Hackers
9. Hacktivist
10. Malicious insider or Whistleblower etc.
1. White Hat Hackers
White hat hackers are types of hackers who’re professionals with expertise in cybersecurity.
They are authorized or certified to hack the systems. These White Hat Hackers work for
governments or organizations by getting into the system. They hack the system from the
loopholes in the cybersecurity of the organization. This hacking is done to test the level of
cybersecurity in the organization. By doing so, they identify the weak points and fix them to
avoid attacks from external sources. White hat hackers work per the rules and regulations the
government sets. White hat hackers are also known as ethical hackers.
2. Black Hat Hackers
Black hat hackers are also knowledgeable computer experts but with the wrong intention.
They attack other systems to get access to systems where they do not have authorized entry.
On gaining entry they might steal the data or destroy the system. The hacking practices these
types of hackers’ use depend on the individual’s hacking capacity and knowledge. As the
intentions of the hacker make the hacker a criminal. The malicious action intent of the
individual cannot be gauged either can the extent of the breach while hacking. Ex: Lulzsec,
Lizard Squad, The Shadow Brokers.
Note: LulzSec was a black hat computer hacking group that claimed responsibility for
several high-profile attacks, including the compromise of user accounts from PlayStation
Network in 2011. The group also claimed responsibility for taking the CIA website offline.
Lizard Squad was a black hat hacking group and is proud to proclaim itself as the “King of
DDoS attacks.” Over time, Lizard Squad has been held responsible for some of the most
potent hacking attacks and has become genuinely notorious for its actions.
Initially, the Lizard Squad came into public view around 2014. Lizard Squad hackers
launched their DDoS assault first on the League of Legends servers, then on the PlayStation
Network, and then on servers run by Blizzard. The attacks devastated networks for at least a
day and seemed to shut down all gaming activity.
Lizard Squad was also responsible for Christmas attacks(2014), Tor sybil attack(2014),
Malaysia Airlines website attack(2015), Daybreak Games DDoS(2015) etc.
The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016.
They published several leaks containing hacking tools, including several zero-day exploits,
from the "Equation Group" who are widely suspected to be a branch of the National Security
Agency (NSA) of the United States. Specifically, these exploits and vulnerabilities targeted
enterprise firewalls, antivirus software, and Microsoft products. The Shadow Brokers
originally attributed the leaks to the Equation Group threat actor, who have been tied to the
NSA's Tailored Access Operations unit.
3. Gray Hat Hackers
The intention behind the hacking is considered while categorizing the hacker. The Gray hat
hacker falls between the black and white hat hackers. They are not certified, hackers. These
types of hackers work with either good or bad intentions. The hacking might be for their gain.
The intention behind hacking decides the type of hacker. If the intention is for personal gain,
the hacker is considered a gray hat hacker. Ex: The Jester.
Note: The Jester (also known by the leetspeak handle th3j3st3r) is a self-identified grey hat
hacktivist. He claims to be responsible for attacks on WikiLeaks and Islamist websites. He
claims to be acting out of American patriotism.
4. Script Kiddies
It is a known fact that half knowledge is always dangerous. The Script Kiddies are amateurs’
types of hackers in the field of hacking. They try to hack the system with scripts from other
fellow hackers. They try to hack the systems, networks, or websites. The intention behind the
hacking is just to get the attention of their peers. Script Kiddies are juveniles who do not have
complete knowledge of the hacking process.
5. Green Hat Hackers
Green hat hackers are types of hackers who learn the ropes of hacking. They are slightly
different from the Script Kiddies due to their intention. The intent is to strive and learn to
become full-fledged hackers. They are looking for opportunities to learn from experienced
hackers.
6. Blue Hat Hackers
Blue Hat Hackers are types of hackers who’re similar to Script Kiddies. The intent to learn is
missing. They use hacking as a weapon to gain popularity among their fellow beings. They
use hacking to settle scores with their adversaries. Blue Hat Hackers is dangerous due to the
intent behind the hacking rather than their knowledge.
7. Red Hat Hackers
Red Hat Hackers is synonymous with Eagle-Eyed Hackers. They are the types of hackers
who’re similar to white hackers. The red hat hackers intend to stop the attack of black hat
hackers. The difference between red hat hackers and white hat hackers is that the process of
hacking through intention remains the same. Red hat hackers are quite ruthless when dealing
with black hat hackers or counteracting malware. The red hat hackers continue to attack and
may end up having to replace the entire system setup.
8. State/Nation Sponsored Hackers
Government appoints hackers to gain information about other countries. These types of
hackers are known as State/Nation sponsored hackers. They use their knowledge to gain
confidential information from other countries to be well prepared for any upcoming danger to
their country. The sensitive information aids in being on top of every situation but also in
avoiding upcoming danger. They report only to their governments. Ex: Fancy Bear.
Note: Fancy Bear is a Russian cyber espionage group. Cybersecurity firm CrowdStrike has
said that Fancy Bear is associated with the Russian military intelligence agency GRU.
9. Hacktivist
These types of hackers intend to hack government websites. They pose themselves as
activists, so known as a hacktivist. Hacktivists can be an individual or a bunch of nameless
hackers whose intent is to gain access to government websites and networks. The data gained
from government files accessed are used for personal political or social gain. Ex:Anonymous.
Note: Anonymous is a decentralized international activist and hacktivist collective and
movement primarily known for its various cyberattacks against several governments,
government institutions and government agencies, corporations and the Church of
Scientology.
Anonymous originated in 2003 on the imageboard 4chan representing the concept of many
online and offline community users simultaneously existing as an "anarchic", digitized
"global brain" or "hivemind". Anonymous members (known as anons) can sometimes be
distinguished in public by the wearing of Guy Fawkes masks in the style portrayed in the
graphic novel and film V for Vendetta. Some anons also opt to mask their voices through
voice changers or text-to-speech programs.
10. Malicious insider or Whistleblower
These types of hackers include individuals working in an organization who can expose
confidential information. The intent behind the exposure might be a personal grudge against
the organization, or the individual might have come across illegal activities within the
organization. The reason for exposure defines the intent behind the exposure. These
individuals are known as whistleblowers. Ex: Edward Snowden (whistleblower).
Note: Edward Joseph Snowden (born June 21, 1983) is an American and naturalized
Russian former computer intelligence consultant and whistleblower who leaked highly
classified information from the National Security Agency (NSA) in 2013, when he was an
employee and subcontractor. His disclosures revealed numerous global surveillance
programs, many run by the NSA and the Five Eyes intelligence alliance with the cooperation
of telecommunication companies and European governments and prompted a cultural
discussion about national security and individual privacy.
Note: WikiLeaks is a publisher and media organisation founded in 2006. It operates as a
non-profit and is funded by donations and media partnerships. It has published classified
documents and other media provided by anonymous sources. It was founded by Julian
Assange, an Australian editor, publisher, and activist.
“The Fifth Estate” is a 2013 biographical thriller film directed by Bill Condon about the
news-leaking website WikiLeaks.
Example 2: In July 2015, a hacktivist group calling themselves the “Impact Team” hacked the online cheating
website Ashley Madison. The result? The personal data of 32 million members was published publicly. They
released the members’ data to teach the members a lesson and make the owner shut down the site.
Ethical Hacking:
Ethical hacking is an authorized practice of detecting vulnerabilities in an application,
system, or organization's infrastructure and bypassing system security to identify potential
data breaches and threats in a network.
Hacking is the practice of accessing data stored privately by experts. When programmers did
some mistakes, those mistakes make the system vulnerable and these vulnerabilities are being
picked by hackers to hack the system. The hackers who don’t work on principles of ethical
hacking are known as unethical hackers. Hackers are well aware that their activities are
illegal and thus criminal activity which is why they are trying to close their tracks. In other
words, we can say that – an effort to attack a computer system or a private network inside a
computer is known as hacking.
Ethical Hacking is legal access to information that is unauthorized for the rest of the world.
This type of hacking is done to protect the system or websites from malicious hackers and
viruses. The hackers who work on principles of ethical hacking are known as ethical hackers.
While Hackers may be highly skilled at braking system programs, professional ethical
hackers can restore the security of a compromised system and catch the criminal with their
skills and abilities.
Differences Between Hacking and Ethical Hacking:
4. Such hackers try to access restricted Such hackers create firewalls and security
networks through illegal practices and protocols.
reduce the security of data.
5. They work for themselves for dirty They work with different government
money. agencies and big tech companies.
Whether it be a white-hat hacker or black or grey they use the same tools for hacking.
All the hackers have in-depth and strong knowledge of networks, operating system,
computer fundamentals.
They all try to find vulnerabilities by zero-day attack initially.
Things to be done when you think you are hacked:
Turn off your internet connection: If you suspect theft, the first thing you should do
is disconnect the internet from your system in order to stop further interference.
Open Firewall: Sometimes we close firewall windows to install specific software.
From a protection perspective, we should consistently be available firewalls. A
hardware firewall is another excellent installation alternative. It acts as a partition
between the External Network and your internal systems.
Change your passwords: For accounts or devices that contain sensitive information,
make sure your password is strong, unique, and not easily guessed.
Note: A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. A firewall typically
establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Cyber Terrorism:
Cyber terrorism is often defined as any premeditated, politically motivated attack against
information systems, programs and data that threatens violence or results in violence. The
definition is sometimes expanded to include any cyber-attack that intimidates or generates
fear in the target population.
Cyber terrorism involves the same techniques as traditional cyberattacks. Cyber terrorists can
use DDoS attacks, various forms of malware, social engineering strategies, phishing
campaigns and more to reach their targets.
The CRS(Congressional Research Service) categorizes different types of cyber terrorism and
cyber warfare by purpose instead of techniques that are used.
Cyber Terrorists:
Cyber terrorists are state-sponsored and non-state actors who use cyberattacks to achieve
their objectives. Actors such as transnational terrorist organizations, insurgents and jihadists
have used the internet for planning attacks, radicalization and recruitment, propaganda
distribution, a means of communication and for disruptive purposes.
Cyber Spies:
Cyber spies steal classified or proprietary information from governments or private
corporations to gain a strategic, security, financial or political advantage. They often take
directions from foreign government entities and target government networks, cleared defense
contractors and private companies.
Cyber Thieves:
Cyber thieves engage in illegal cyberattacks for monetary gain. An example is an
organization or individual who accesses a system to steal and sell credit card numbers.
Cyber Warriors:
Cyber warriors are agents or quasi-agents of nation-states who develop capabilities and
undertake cyberattacks to support a country’s strategic objectives. Entities may or may not be
acting on behalf of the government in terms of the target, timing of the attack and type(s) of
cyberattack — and they are often blamed by the host country when accusations result from
the attacked nation.
Cyber Activists:
Cyber activists perform cyberattacks for pleasure or philosophical, political or other
nonmonetary reasons. Examples include an individual who hacks a system for a personal
challenge or a “hacktivist” like a member of the cyber-group Anonymous.
Cyber Forensics:
Cyber forensics is a process of extracting data as proof for a crime (that involves electronic
devices) while following proper investigation rules to nab the culprit by presenting the
evidence to the court. Cyber forensics is also known as computer forensics. The main aim of
cyber forensics is to maintain the thread of evidence and documentation to find out who did
the crime digitally. Cyber forensics can do the following:
It can recover deleted files, chat logs, emails, etc
It can also get deleted SMS, Phone calls.
It can get recorded audio of phone conversations.
It can determine which user used which system and for how much time.
It can identify which user ran which program.
Why is cyber forensics important?
In today’s technology driven generation, the importance of cyber forensics is immense.
Technology combined with forensic forensics paves the way for quicker investigations and
accurate results. Below are the points depicting the importance of cyber forensics:
Cyber forensics helps in collecting important digital evidence to trace the criminal.
Electronic equipment stores massive amounts of data that a normal person fails to see.
For example: in a smart house, for every word we speak, actions performed by smart
devices, collect huge data which is crucial in cyber forensics.
It is also helpful for innocent people to prove their innocence via the evidence
collected online.
It is not only used to solve digital crimes but also used to solve real-world crimes like
theft cases, murder, etc.
Businesses are equally benefitted from cyber forensics in tracking system breaches
and finding the attackers.
Types of cyber forensics
There are multiple types of cyber forensics depending on the field in which digital
investigation is needed. The fields are:
Network forensics: This involves monitoring and analysing the network traffic to and
from the criminal’s network. The tools used here are network intrusion detection
systems and other automated tools.
Email forensics: In this type of forensics, the experts check the email of the criminal
and recover deleted email threads to extract out crucial information related to the case.
Malware forensics: This branch of forensics involves hacking related crimes. Here,
the forensics expert examines the malware, trojans to identify the hacker involved
behind this.
Memory forensics: This branch of forensics deals with collecting data from the
memory(like cache, RAM, etc.) in raw and then retrieve information from that data.
Mobile Phone forensics: This branch of forensics generally deals with mobile
phones. They examine and analyse data from the mobile phone.
Database forensics: This branch of forensics examines and analyses the data from
databases and their related metadata.
Disk forensics: This branch of forensics extracts data from storage media by
searching modified, active, or deleted files.
Regulation of Cyberspace:
In India, Information Technology Act, 2000 is the legislation which covers the domain of
cyber law. The main objective of the Act is to provide legal recognition for transactions
carried out by means of electronic data interchange and other means of electronic
communication, commonly referred to as ecommerce, which involve the use of alternatives to
paper-based methods of communication and storage of information to facilitate electronic
filing of documents with the Government agencies.
Electronic Signatures:
Any subscriber (i.e., a person in whose name the Digital Signature Certificate is issued) may
authenticate electronic record by affixing his Digital Signature. Electronic record means data
record or data generated image or sound, stored, received or sent in an electronic form or
microfilm or computer-generated microfiche.
Electronic Governance:
Where any law provides submission of information in writing or in the typewritten or printed
form, it will be sufficient compliance of law, if the same is sent in an electronic form. Further,
if any statute provides for affixation of signature in any document, the same can be done by
means of Digital Signature.
Similarly, the filing of any form, application or any other documents with the Government
Authorities and issue or grant of any licence, permit, sanction or approval and any receipt
acknowledging payment can be done by the Government offices by means of electronic form.
Retention of documents, records, or information as provided in any law, can be done by
maintaining electronic records. Any rule, regulation, order, by-law or notification can be
published in the Official Gazette or Electronic Gazette.
However, no Ministry or Department of Central Government or the state Government or any
Authority established under any law can be insisted upon acceptance of a document only in
the form of electronic record.
Regulation of Certifying Authorities:
The Central Government may appoint a Controller of Certifying Authority who shall exercise
supervision over the activities of Certifying Authorities.
Digital Signature Certificate:
Any person may make an application to the Certifying Authority for issue of Digital
Signature Certificate. The Certifying Authority while issuing such certificate shall certify that
it has complied with the provisions of the Act.
Penalties and Adjudication:
If any person without the permission of the owner, accesses the owner’s computer, computer
system or computer net-work or downloads copies or any extract or introduces any computer
virus or damages computer, computer system or computer network data etc. he/she shall be
liable to pay damage by way of compensation not exceeding Rupees One Crore to the person
so effected.
The Appellate Tribunal:
The section 48 of IT Act provides ‘that The Telecom Disputes Settlement and Appellate
Tribunal established under section 14 of the Telecom Regulatory Authority of India Act, 1997
shall, on and from the commencement of Part XIV of Chapter VI of the Finance Act, 2017,
be the Appellate Tribunal for the purposes of this Act and the said Appellate Tribunal shall
exercise the jurisdiction, powers and authority conferred on it by or under this Act. However,
the Central Government shall specify, by notification, the matters and places in relation to
which the Appellate Tribunal, may exercise jurisdiction’.
Under the act, the Central Government has the power to establish the Cyber Regulations
Appellate Tribunal having power to entertain the cases of any person aggrieved by the Order
made by the Controller of Certifying Authority or the Adjudicating Officer.
Offences:
Tampering with computer source documents or hacking with computer system entails
punishment with imprisonment up to three years or with fine up to Rs. 2 lakhs or with both.
Publishing of information, which is obscene, in electronic form, shall be punishable with
imprisonment up to five years or with fine up to Rs. 10 lakh and for second conviction with
imprisonment up to ten years and with fine up to Rs. 2 lakhs.
The Information Technology Act, 2000 was amended in 2015 wherein the Supreme Court in
the case of Shreya Singhal v. Union of India had struck Section 66A of Information
Technology Act, 2000 as it violates the freedom of speech and expression provided under
Article 19(1)(a) of the Constitution of India.
Communication Technology:
Communication is the exchange of information through different mediums.
It is an activity that started even before the civilization of human beings; however, over a
period of time, as technology advanced, accordingly different modes of communications also
developed including telecommunication and wireless communication. In today’s world,
information and communication technology play an important role in almost every activity
that we perform.
Types of Communication
1. Telecommunication
2. Wireless Communication
Telecommunication
Telecommunication is a technique of transmission of information from one location to
another by electromagnetic means.
Different types of information can be transferred through a telecommunication system, such
as voice, text, pictures, etc.
Modern Telecommunication System
The modern form of telecommunication involves computer technology and it is capable of
transferring wide range of data including audio, video, textual, many other computer files.
Major components of modern telecommunication are:
Internet:
The Internet is the foremost important tool and the prominent resource that is being used by
almost every person across the globe. It connects millions of computers, webpages, websites,
and servers. Using the internet we can send emails, photos, videos, and messages to our loved
ones. Or in other words, the Internet is a widespread interconnected network of computers
and electronic devices(that support Internet). It creates a communication medium to share and
get information online. If your device is connected to the Internet then only you will be able
to access all the applications, websites, social media apps, and many more services. The
Internet nowadays is considered the fastest medium for sending and receiving information.
History of the Internet
The Internet came in the year 1960 with the creation of the first working model called
ARPANET (Advanced Research Projects Agency). It allowed multiple computers to work on
a single network which was their biggest achievement at that time. ARPANET uses packet
switching to communicate multiple computer systems under a single network. In October
1969, using ARPANET first message was transferred from one computer to another. After
that technology continues to grow.
Online Banking and Transaction: The Internet allows us to transfer money online
through the net banking system. Money can be credited or debited from one account
to the other.
Education, Online Jobs, Freelancing: Through the Internet, we are able to get more
jobs via online platforms like LinkedIn and to reach more job providers. Freelancing
on the other hand has helped the youth to earn a side income and the best part is all
this can be done via the INTERNET.
Entertainment: There are numerous options for entertainment online we can listen to
music, play games can watch movies, and web series, and listen to podcasts, YouTube
itself is a hub of knowledge as well as entertainment.
New Job Roles: The Internet has given us access to social media, and digital products
so we are having numerous new job opportunities like digital marketing and social
media marketing online businesses are earning huge amounts of money just because
the Internet is the medium to help us to do so.
Best Communication Medium: The communication barrier has been removed from
the Internet. You can send messages via email, WhatsApp, and Facebook. Voice
chatting and video conferencing are also available to help you to do important
meetings online.
Comfort to humans: Without putting any physical effort you can do so many things
like shopping online it can be anything from stationeries to clothes, books to personal
items, etc. You can book train and plane tickets online.
GPS Tracking and google maps: Yet another advantage of the internet is that you are
able to find any road in any direction, and areas with less traffic with the help of GPS
on your mobile.
Disadvantages of the Internet:
Time Wastage: Wasting too much time on the internet surfing social media apps and
doing nothing decreases your productivity rather than wasting time on scrolling social
media apps one should utilize that time in doing something skilful and even more
productive.
Bad Impacts on Health: Spending too much time on the internet causes bad impacts
on your health physical body needs some outdoor games exercise and many more
things. Looking at the screen for a longer duration causes serious impacts on the eyes.
Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are some of
the crimes which are on the verge these days. Your system which contains all the
confidential data can be easily hacked by cybercriminals.
Effects on Children: Small children are heavily addicted to the Internet watching
movies, and games all the time is not good for their overall personality as well as
social development.
Bullying and Spreading Negativity: The Internet has given a free tool in the form of
social media apps to all those people who always try to spread negativity with very
revolting and shameful messages and try to bully each other which is wrong.
Internet Governance:
Internet governance refers to the rules, policies, standards and practices that coordinate and
shape global cyberspace.
The Internet is a vast network of independently-managed networks, woven together by
globally standardized data communication protocols (primarily, Internet Protocol, TCP, UDP,
DNS and BGP). The common adoption and use of these protocols unified the world of
information and communications like never before. Millions of digital devices and massive
amounts of data, software applications, and electronic services became compatible and
interoperable. The Internet created a new environment, a complex and dynamic “cyberspace.”
While Internet connectivity generated innovative new services, capabilities and
unprecedented forms of sharing and cooperation, it also created new forms of crime, abuse,
surveillance and social conflict. Internet governance is the process whereby cyberspace
participants resolve conflicts over these problems and develop a workable order.
Policy Topics in Internet Governance:
The term “Internet governance” first started to be used in connection with the governance of
Internet identifiers such as domain names and IP addresses, which led to the formation of
ICANN(Internet Corporation for Assigned Names and Numbers). Since then, the economic,
political, social and military implications of Internet governance have expanded to embrace a
number of other areas of policy:
1. Cybersecurity: Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These cyberattacks are usually aimed at accessing, changing,
or destroying sensitive information; extorting money from users; or interrupting normal
business processes.
2. Digital Trade: Digital trade refers to commerce enabled by electronic means – by
telecommunications and/or ICT services – and covers trade in both goods and services.
3. Freedom of Expression Online: Freedom of expression is the right to express and receive
opinions, ideas and information. Expression and exchanges of views increasingly take place
online, including through social media platforms, websites and search engines.
4. Privacy & Surveillance: At the most basic level, surveillance is a way of accessing data.
Surveillance, implies an agent who accesses (whether through discovery tools, rules or
physical/logistical settings) personal data. Privacy, in contrast, involves a subject who
restricts access to personal data through the same means.
5. Internet Of Things: The Internet of things describes physical objects with sensors,
processing ability, software, and other technologies that connect and exchange data with other
devices and systems over the Internet or other communications networks.
6. IG Institutions: Internet Governance Institute (IGI) is an initiative established for
strengthening Internet Governance at the grass-root level through research, capacity building,
awareness, debates and policy intervention across the Asia Pacific. IGI believes in
collaboration and operates through the participation of IG related institutions.
The main objective of IGI is to contribute to strengthening grass root level stakeholders
through research, capacity building, awareness, debates, and policy intervention.
Major objectives of IGI are as follows:
Research and development on Internet Governance issues
Conduct short and long academic and non-academic online and offline course on
Internet Governance
Conduct lectures, symposia, international meetings, conferences, and workshops on
Internet Governance
Exchange of researchers and students working in the area of Internet Governance
Do advocacy and promotional activities on Internet Governance related issues and
others
Design, develop, distribution and sales of digital and nondigital content on Internet
Governance issues
7. Internet Identifiers: Internet identifiers means an electronic mail address, instant message
address or identifier, or any other designation or moniker used for self-identification during
internet communication or posting, including all designations used for the purpose of routing
or self-identification in internet communications or postings.
8. Geopolitics of IG: Geopolitics is the study of the effects of Earth's geography on politics
and international relations. Geopolitical examples may include trade agreements, war treaties,
border or territorial acknowledgements, climate agreements, and more. Two recent examples
are NAFTA and the Kyoto protocol.
Note:
1. NAFTA - The North American Free Trade Agreement (NAFTA), which was enacted
in 1994 and created a free trade zone for Mexico, Canada, and the United States, is
the most important feature in the U.S.-Mexico bilateral commercial relationship.
2. Kyoto Protocol: The Kyoto Protocol was an international treaty which extended the
1992 United Nations Framework Convention on Climate Change that commits state
parties to reduce greenhouse gas emissions, based on the scientific consensus that
global warming is occurring and that human-made CO₂ emissions are driving it.
Note: For more information visit this site - https://www.internetgovernance.org/what-is-
internet-governance/.
Common Cybercrimes:
Common forms of cybercrime include:
1. cybercrime targeting computers and mobiles;
2. cybercrime against women and children;
3. financial frauds;
4. social engineering attacks;
5. malware and ransomware attacks;
6. zero day and zero click attacks.
Cyber Stalking: It includes attempting to contact the women via social networking
sites without any legitimate purpose, putting threatening messages on the chat page,
and constantly disturbing the victims with objectionable emails and messages to
create mental distress.
Cyber Defamation: This activity involves defaming the victim through blackmailing
and disclosing their details or modified pictures. It often involves extorting and
seeking sexual favors from the victim.
Cyber Hacking: When asked to click on unauthorised URLs or download apps that
leak all their personal information on their phones, the women became victims of
cyber hacking. The criminals utilise these details for unauthorised monetary
transactions and other unlawful activities.
Cyber Bullying: It is an act of regular harassment and bullying of the victim through
the digital communication device by posting abusive and misleading content, pictures,
or videos and sending rape and death threats.
Pornography: This criminal activity involves posting morphed images of victims and
using them for pornographic purposes, sometimes demanding money to remove them
from social networking sites.
Cyber Grooming: In this case, a person builds a relationship with a woman through
an online platform and pressurizes her for undue favors or doing sexual acts.
Legal Provisions Related to Cyber Crime Against Women:
All users of cyberspace are subject to specific laws applicable worldwide. Cyber laws deal
with legal issues arising from networked computer technology and digital platforms. These
laws protect the victims against cybercrimes and help them address the issues and get justice.
The following acts under the Indian Penal Code (IPC, 1860) section 354 mention the
following crimes as punishable under the law with rigorous imprisonment and fines.
Section 354A: Demand for sexual favors or displaying objectionable pictures against
a woman’s consent or making sexual remarks and sexual harassment will cause the
imprisonment of up to 3 years with fines.
Section 354C: An act of photographing or publishing a picture of a woman engaged
in a private act without her consent will lead to imprisonment of 3 to 7 years.
Section 354D: Contacting a woman online and sending irrelevant emails/messages
despite the woman’s evident disinterest will cause the imprisonment of 5 years with
fines.
The Information Technology Act, 2000 also has provisions for punishment under the
following sections:
Section 66C: Identify cyber hacking is a punishable offense with imprisonment of 3
years and fines of Rs. 1 lakh.
Section 66E: Deals with the offense of capturing, publishing, or sending pictures of
women in circumstances that violate privacy. This causes imprisonment of 3 years.
Section 67A: Makes it illegal to publish and transmit sexually explicit content and is
punishable with imprisonment of up to 5 to 7 years.
The Cyber-crime Prevention Act of 2012 focuses on preventing and prosecuting offenders
involved in cybercrimes like violating privacy, confidentiality, and integrity of information
through computer-related criminal activities.
The Indecent Representation of Women (Prohibition) Act regulates and prohibits the indecent
representation of women through the media and publications, which also includes the audio-
visual media, the content in electronic form, and distribution of material on the Internet, and
the portrayal of women over the web.
Cybercrimes against Children:
Criminals also engage in child abuse online, such as child exploitation, cyberbullying,
possession of child pornography, exposure to harmful content, and many more. Also, it has
been observed that young children or teenagers are the primary and easy targets for criminal
activity as they are trusting, naive, adventurous, and eager for attention and affection. For
instance, the predator might approach a young individual online and form an online
friendship based on the same likes, interests, and activities. Gifts and photos could be
exchanged as a result of this. The predator tries to gain the child’s trust to get what they want
from the child. And this is why the government is dedicated to laws, initiatives, and policies
to ensure all Indians always have access to an open, trusted, and accountable internet.
Protection Of Children from Sexual Offenses Act (POCSO):
The Act mandates reporting, including kid-friendly tools for capturing testimony and
evidence, and ensures that cases are heard fast. It provides a strict legal framework for
protecting children from sexual offenses while preserving the best interests of the kid
throughout the whole legal process. It includes a child-friendly system for recording
evidence, conducting investigations, and expediting criminal cases via specified Special
Courts. Additionally, it contains the legal framework for combating cybercrime, such as child
pornography, adultery, cyberstalking, cyberbullying, defamation against children, sexual
harassment, grooming, hacking, identity theft, child trafficking online, online extortion, and
violation of privacy.
Section 14(1): Use of a child for pornography : Upon the first conviction, 5 years of
imprisonment will be given. However, upon further convictions, the jail time can go
up to 7 years + fine.
Section 14(2): Use of a child for pornography while committing an offence under
Section 3 : A minimum of 10 years of imprisonment that may extend up to
imprisonment for life + fine.
Section 14(3): Use of a child for pornography while committing an offence under
Section 5 : A rigorous imprisonment term for life + fine.
Section 14(4): Use of a child for pornographic purposes while committing an
offence under Section 7 : A 6 to 8 years of imprisonment term + fine.
Section 14(5): Use of a child for pornographic purposes while committing an
offence under Section 9 : An 8 to 10 years of imprisonment term + fine.
Section 15: The offence of storing pornographic material involving a child for
commercial purposes : A term of imprisonment that may extend up to 3 years + fine
or both.
Government Initiatives To Enhance Cyber-Security In India:
The Cyber Crime Prevention against Women and Children (CCPWC) scheme is introduced to
develop effective measures to handle cybercrimes against women and children in India. It
allows a cyber-crime victim to file a complaint through an online cybercrime reporting
platform. The platform also provides details of law enforcement and regulatory agencies at
the local and national levels. The CCPWC also conducts awareness programs starting from
the school level as a proactive measure to mitigate cyber-crimes.
Financial Frauds:
It is difficult to give one exhaustive definition of financial fraud. One may define financial
fraud as an illegal act intended to deprive you of your money for personal gains. Financial
fraud means:
The intentional act of deception involving financial transactions for personal gains.
Taking money/other assets from someone through deception.
Illegal and unethical management of financial resources.
Manipulation, falsification alteration of accounting records.
Misrepresentation or intentional omission of amounts, misapplication of accounting
principles, and marking misleading or false disclosures.
Typically, there exists an element of deceit, subterfuge, or abuse of a position of trust in cases
of financial fraud.
Common types of financial frauds:
Ponzi schemes:
A Ponzi scheme is an investment fraud that generates returns for earlier investors with money
taken from later investors. In this type of fraud, the clients are promised huge profits with
little to no risk. The focus of the fraudster companies is on attracting new clients whose
investments are then used to pay off earlier investors. Once the flow of money by way of
investments from new clients stops, the whole scheme falls apart.
For instance, in 1920, Charles Ponzi made approximately $15 million in about 8 months by
convincing lenders that he could make them rich with investments in international postal
reply coupons.
Pyramid schemes:
Also known as a chain referral scheme, a pyramid scheme is a fraudulent business model
wherein members are recruited with their payments tied to their ability to enrol new
members. As the membership expands, there comes a point where further recruitment
becomes impossible which consequently makes the whole thing unsustainable. A pyramid
scheme might appear as legitimate multi-level marketing (MLM) practice. But the scheme
involves no legitimate sales as the earlier investors are paid from the funds received from
new investors. There is no product sold and there are no true profits.
The SpeakAsia Scam is one example of the fraud committed through a pyramid scheme. A
Singapore based company SpeakAsia Online Ltd. asked investors to pay Rs. 11,000 and fill
up online surveys to earn Rs. 52,000 a year. The company promised additional rewards for
those who enrolled other people into the scheme. The fraudsters made away with Rs. 2,276
crores from 24 lakh investors.
Identity theft and identity fraud:
In simple terms, identity theft is the use of someone’s identifying information without their
permission. Identity theft occurs when someone steals your personal financial information
such as your bank account number by way of deception and uses that information for
economic gain. This can happen in a number of ways, say in a public place via shoulder-
surfing wherein a fraudster catches you typing your CVV code into your phone, etc., or when
you opt to reply to a spam email that promises you a reward but first asks for identifying
information and personal details. Identity theft can be committed simply by guessing your
passwords or accessing your details from your social media or it might involve complex
methods such as installing malware, etc. Your personal data such as bank account number or
credit card number is then used to make fraudulent withdrawals from your account.
Fraudsters might use your information to open a credit account in your name leaving you
liable for the charges. Identity theft leads to identity fraud when the fraudster impersonates
you using your stolen information in order to access accounts and obtain financial services.
Examples of identity theft include theft of ATM card, stealing your bank information and
example of identity fraud includes making fake ID, passport, false credit card etc. and using it
for personal unlawful gains.
Embezzlement:
Embezzlement refers to the act of stealing, misappropriation, or retention of funds by a
person who has been entrusted with those funds by an employer or an organisation. Typically,
the person who embezzles money is the one who has legal access to another person’s money
or funds such as an employee. This white-collar crime is seen as a form of property theft.
Examples of embezzlement can be overbilling of customers, forging of cheques, refusal of
the conductor to issue tickets to customers after collecting the fare etc.
Tax fraud:
Tax fraud refers to the falsification of tax returns in order to evade the payment of tax to the
government. For example, claiming false deductions by classifying personal expenditure as
business expenditure or non-disclosure of income. When you pay less tax than what is due by
hiding or understating or false reporting of your income, you are committing tax fraud.
Credit card fraud:
Credit card fraud is the unauthorised use of someone’s credit card. Credit card numbers can
be obtained through credit card theft or unsecured internet connections or by hacking into
your system etc. It is advised that in case you lose your credit card or debit card, you should
get your card cancelled immediately. Examples of credit card fraud include counterfeit and
skimming frauds, card not received frauds, lost and stolen credit card fraud and incorrect card
application fraud etc.
Insurance fraud:
Insurance fraud occurs when a claimant wrongfully tries to obtain a claim from the insurance
company that he is not entitled to or when the insurance company deliberately denies the
claim legally due to the claimant. Insurance fraud can also occur in other forms such as
selling policies from fake insurance companies, falsifying the medical history, impersonating
other people for claims, cause of death being changed for accidental claims, etc.
KYC fraud:
In this type of fraud, fraudsters usually send you an unsolicited SMS saying that your card or
account will be blocked. The customer in a state of panic ends up responding to the message
without considering its legitimacy. Now when you/customer calls that number given in the
message, the fraudster pretends to be speaking from your bank and entices you to give your
personal details such as debit card information, bank account details, OTP, etc. under the
pretext of KYC verification. Sometimes, the fraudster might ask you to install some app on
your phone which will give him full access to your phone. Before you know, withdrawals are
made from your account and you will get a message that such and such amount has been
debited from your account.
Phishing:
This is an online scam wherein the users/customers receive tricky emails or pop-ups that
appear to be from a legitimate source, say a bank or an insurance company or an internet
service provider, etc. The fraudster will ask for your personal information through these
emails and thereafter use that information for their unlawful gains. Phishing attacks include
phishing emails, link manipulation, session hijacking, smishing, vishing, installing malware
etc.
Advance fee scams:
In advance fee scams, the fraudster will ask you to make an advance payment or upfront
payment for goods and services that do not materialise. This includes career opportunity
fraud, loan scams, lottery scams, work-from-home opportunity scams, etc.
Mortgage fraud:
Mortgage fraud is any sort of material misstatement, misrepresentation, or omission relating
to the property or potential mortgage relied on by an underwriter or lender to fund, purchase,
or insure a loan. For example, intentionally falsifying the particulars on mortgage
applications.
Mass marketing fraud:
In this, mass mailing, calls, spam emails are resorted to for stealing the personal financial
information of the target. This type of fraud targets multiple victims from different
jurisdictions. Mass marketing fraud schemes typically fall into two classes, schemes that
defraud numerous victims out of comparatively small amounts, and schemes that defraud
comparatively less numerous victims out of large amounts. One example of mass marketing
fraud can be ‘too good to be true payment schemes.
Bank fraud:
Banking fraud is an attempt to syphon or take funds or other assets from a financial
institution. RBI defines fraud as, “A deliberate act of omission or commission by any person,
carried out in the course of a banking transaction or the books of accounts maintained
manually or under computer system in banks, resulting into wrongful gain to any person for a
temporary period or otherwise, with or without any monetary loss to the bank”. Some of the
famous bank fraud cases are the PNB-Nirav Modi Scam, ABG Shipyard Fraud, Vijay Mallya
scam etc.
UPI-related frauds:
About 80,000 UPI frauds occur in India, every month. Fraudsters send you a ‘request money’
link and once you click on it and authorise the transaction, money gets deducted from your
account. Also, sometimes the fraudsters will send you a fake URL and once you click on it, it
infects your phone with malware designed to steal all your financial information. UPI-related
frauds can occur in forms of phishing attacks, screen mirroring tools and through deceptive
UPI handles.
SIM swap fraud:
Sim swapping is when you make a request to your service provider to swap your sim, who
deactivates your old sim and gives you a new one. For example, when you want to upgrade
your 3G sim card to a 4G one. This is a legitimate sim swap transaction.
However, in the case of sim swap frauds, the fraudster makes a sim swap request to the
service provider using fake papers and pretends to be a genuine cardholder. The service
provider deactivates your old sim and the fraudster gets a new sim card. He is then able to
access all your financial information such as OTPS, card alerts, etc., and can manipulate the
same in innumerable ways. For instance, in August 2021, a man lost Rs. 84 lakhs due to SIM
swap fraud committed by some unidentified cyber criminals who cloned the victim’s sim
card to get his bank details.
Corporate fraud:
Corporate fraud involves falsification or misrepresentation or hiding of a company’s financial
information and accounts to make profits illegally and to mislead the public. For example,
insider trading, falsification of accounts to show a healthy picture in order to attract lenders
and investors, misappropriation of assets, etc.
Tips to protect yourself from financial frauds:
Avail of the facility of setting and modifying your transaction limits on your cards and
account.
Create a separate user account when you are using a personal laptop for work.
Keep your systems and software updated.
Do Not share personal information relating to your finances on social media.
Do Not respond to calls that ask for sensitive information. Don’t give them your
details.
Keep your PINs secret.
Don’t give your account details to a person or fill them on some website unless their
identity can be verified.
Place your money in an authorised financial institution. Don’t give your money to
someone who offers to place it in the bank on your behalf in return for a higher rate of
interest.
Be vigilant. Read about the newer and most common types of fraud happening around
you.
If you noticed some suspicious activity in your bank account or while using your card,
report it.
Check your monthly credit card statements carefully.
Be careful while you make payments on the internet. Enter your Card Verification
Value(CVV) only on secure payment websites.
Be careful when signing any financial contract and always read the small print
carefully.
Do not reply to spam or unsolicited emails that promise you some reward.
Don’t fall into the trap of fake lotteries scams. No one can win a lottery in which they
have not participated.
Install a trusted antivirus on all your devices.
Do Not share your OTP with anyone. Make sure that the OTP generated is for the
transaction initiated by you.
Note: Beware of shoulder surfing:
Shoulder surfing refers to watching over someone’s shoulder while they are using an ATM or
filling in personal details in the phone etc. to steal their data. It is the most common danger
associated with using ATMs. While you are using the ATM, ensure that no one is trying to
shoulder surf you by standing too close to you. The fraudsters attempt to see your
identification number(PIN) and once that PIN reaches into the hands of a fraudster, they can
use it in numerous illegal ways. So, the next time, you go to an ATM, make sure to cover
your hand while punching your PIN.
Robust passwords, safe clicking:
The most basic thing that you must do to avoid being a victim of financial fraud is to use a
strong password with multi-factor authentication. Also, do not click on every pop-up or link.
Note: Visit this website for more information (Like, Legal provisions relating to financial
fraud under various laws and punishment prescribed for such frauds):
https://blog.ipleaders.in/financial-frauds-in-india-all-you-need-to-know/.
Project Raven, 2016: Project Raven refers to the UAE’s offensive cyber operations unit,
which comprises Emirati security officials and former US intelligence operators working as
contractors. Reportedly, they used a tool known as Karma to take advantage of a flaw in
iMessage. Karma used specially crafted text messages to hack into the iPhones of activists,
diplomats, and rival foreign leaders to obtain photos, emails, text messages, and location
information.
The act was enacted to give legal sanction to electronic commerce and electronic
transactions, to enable e-governance, and also to prevent cybercrime.
Under this law, for any crime involving a computer or a network located in India,
foreign nationals can also be charged.
The law prescribes penalties for various cybercrimes and fraud through
digital/electronic format.
It also gives legal recognition to digital signatures.
The IT Act also amended certain provisions of the Indian Penal Code (IPC), the
Banker’s Book Evidence Act, 1891, the Indian Evidence Act, 1872 and the Reserve
Bank of India Act, 1934 to modify these laws to make them compliant with new
digital technologies.
Note: In the wake of the recent Indo-China border clash, the Government of India banned
various Chinese apps under the Information Technology Act. Read more about this in an
RSTV titled, ‘TikTok, Other Chinese Apps Banned’.
Offences and their punishments under Information Technology Act, 2000:
Section 43A - Data protection at corporate level - If a body corporate is negligent in
implementing reasonable security practices which causes wrongful loss or gain to any
person, such body corporate shall be liable to pay damages to the affection person.
Section 65 – Tampering with computer Source Documents - A person who
intentionally conceals, destroys or alters any computer source code (such as
programmes, computer commands, design and layout), when it is required to be
maintained by law commits an offence and can be punished with 3 years’
imprisonment or a fine of 2 Lakhs INR or both.
Section 66 - Using password of another person - If a person fraudulently uses the
password, digital signature or other unique identification of another person, he/she
can face imprisonment up to 3 years or/and a fine of 1 Lakh INR.
Section 66B - Receiving a stolen computer source or device dishonestly - Whoever
dishonestly received or retains any stolen computer resource or communication device
knowing or having reason to believe the same to be stolen computer resource or
communication device, shall be punished with imprisonment of either description for
a term which may extend to 3 years or with fine which may extend to rupees 1 lakh or
with both.
Section 66C - Identity theft - Whoever, frequently or dishonestly make use of the
electronic signature, password or any other unique identification feature of any other
person shall be punished with imprisonment of either description for a term which
may extended to 3 years and shall also be liable to fine with may extend to rupees 1
lakh.
Section 66D - Cheating Using computer resource - If a person cheats someone using a
computer resource or a communication device, he/she could face imprisonment up to
3 years or/and fine up to 1 Lakh INR.
Section 66E - Publishing private images of others - If a person captures, transmits or
publishes images of a person’s private parts without his/her consent or knowledge, the
person is entitled to imprisonment up to 3 years of fine up to 2 Lakhs INR or both.
Section 66F - Acts of Cyber-Terrorism - A person can face life imprisonment if he/she
denies an authorized person the access to the computer resource or attempts to
penetrate/access a computer resource without authorization, with an aim to threaten
the unity, integrity, security or sovereignty of the nation. This is a non-bailable
offence.
Section 67 - Transmitting obscene material in electronic form - If a person captures,
publishes or transmits images of a child in a sexually explicit act or induces anyone
under the age of 18 into a sexual act, then the person can face imprisonment up to 7
years or fine up to 10 lakhs INR or both.
Section 69 - Govt.'s Power to block websites - If the government feel it necessary in
the interest of sovereignty and integrity of India, it can intercept, monitor or decrypt
any information generated, transmitted, received or stored in any computer resource.
The power is subject to compliance of procedure. Under section 69A, the central
government can also block any information from public access.
Amendments to Information Technology Act, 2000:
With the advancement of time and technology, it was necessary to bring some changes to the
Act to meet the needs of society, and so it was amended.
Amendment of 2008 :
The amendment in 2008 brought changes to Section 66A of the Act. This was the most
controversial section as it provided the punishment for sending any offensive messages
through electronic mode. Any message or information that created hatred or hampered the
integrity and security of the country was prohibited. However, it had not defined the word
‘offensive’ and what constitutes such messages, because of which many people were arrested
on this ground. This section was further struck down by the Supreme Court in the case of
Shreya Singhal v. Union of India (2015).
Another amendment was made in Section 69A of the Act, which empowered the government
to block internet sites for national security and integrity. The authorities or intermediaries
could monitor or decrypt the personal information stored with them.
The 2015 Amendment Bill
The bill was initiated to make amendments to the Act for the protection of fundamental rights
guaranteed by the Constitution of the country to its citizens. The bill made an attempt to
make changes to Section 66A, which provides the punishment for sending offensive
messages through electronic means. The section did not define what amounts to offensive
messages and what acts would constitute the offence. It was further struck down by the
Supreme Court in the case of Shreya Singhal declaring it as violative of Article 19.
For more details, please visit this website: https://www.meity.gov.in/content/information-
technology-act-2000-0.
Social share of voice (i.e., what percentage of the conversation is about them, as
opposed to being about their competitors)
Social sentiment analysis (i.e., what’s the mood of the conversation)
Social ROI (i.e., how much their money investment in social is paying off)
Relevant hashtags and keywords (i.e., which Instagram hashtags or YouTube
keywords they might want to use in the future to expand their reach)
Trends (i.e., what is their audience talking about, what new ideas, aesthetics or
memes are popping up, are the platforms offering new tools and services, etc.)
For brands, social monitoring is an essential part of being a good social citizen, and
succeeding on social, period. For instance, you wouldn’t launch into a high-pressure sales
pitch (or informative lecture, or even a standup routine) to a new customer who’s just walked
in the door. You’d listen first, and at least figure out what they’re looking for or why they’re
in your office.
Likewise, on social media, paying attention to what people are saying is necessary to be
relevant, engaging, and to prevent themself from making off-key blunders.
They use different tools to monitor their customers. Examples for social media monitoring
tools are, Hootsuite, Nexalogy, Mentionlytics, Reputology etc.
Hashtag:
A hashtag is a metadata tag that is prefaced by the hash symbol, #. On social media, hashtags
are used on microblogging and photo-sharing services such as X (formerly Twitter) or Tumblr
as a form of user-generated tagging that enables cross-referencing of content by topic or
theme. For example, a search within Instagram for the hashtag #bluesky returns all posts that
have been tagged with that term. After the initial hash symbol, a hashtag may include letters,
numerals, or underscores.
The use of hashtags was first proposed by American blogger and product consultant Chris
Messina in a 2007 tweet. Messina made no attempt to patent the use because he felt that "they
were born of the internet, and owned by no one". Hashtags became entrenched in the culture
of Twitter and soon emerged across Instagram, Facebook, and YouTube. In June 2014,
hashtag was added to the Oxford English Dictionary as "a word or phrase with the symbol #
in front of it, used on social media websites and apps so that you can search for all messages
with the same subject".
Viral Content:
Viral content is online content that achieves a high level of awareness due to shares and
exposure on social media networks, news websites, aggregators, email newsletters and search
engines.
A single piece of viral content can generate significant amounts of brand awareness and
traffic to a website. And because most of the traffic that comes from social shares, viral
content is relatively cheap compared to paid ads.
Articles, images, videos, audio or any other types of digital files may all come under the
category of viral content, if they gain popularity in a short span of time. The content which
has a high acceptance rate on the internet and is shared by many users usually goes viral
quickly.
The purpose behind viral content is to connect with others outside of your target audience.
Viral content marketing is a form of online advertising that uses viral techniques to get your
brand noticed by as many people, as fast as possible, through various content channels.
Social media marketing uses social media and social networks like Facebook, X
platform (formerly Twitter), and Instagram to market products and services, engage
with existing customers, and reach new ones.
The power of social media marketing comes from the unparalleled capacity of social
media in three core marketing areas: connection, interaction, and customer data.
Social media marketing has transformed the way businesses are able to influence
consumer behaviour from promoting content that drives engagement to extracting
personal data that makes messaging resonate with users.
Because social media today is so ubiquitous, marketing techniques using these
platforms are extremely important for businesses.
Social media marketing is often more cost-effective with great exposure, though it
requires ongoing maintenance and might have unintended negative feedback
consequences.
Advantages and Disadvantages of Social Media Marketing (SMM):
Advantages:
The introduction of social media marketing has introduced a new suite of benefits.
Social media platforms provide a powerful channel for reaching and engaging with a
large audience, which can help increase brand awareness and recognition.
Engaging with customers through social media channels can help build stronger
relationships and foster customer loyalty. It's often a less expensive option than
traditional advertising methods, making it more appealing for smaller or start-up
businesses.
The nature of social media marketing also has plenty of benefits. Sharing links to your
website or blog on social media can help drive more traffic to your website and
increase the likelihood of conversions. In addition, social media provides a way to
gather feedback from customers in real-time, allowing for instant interaction and
simplicity in communication.
Social media marketing also has the benefit of being broad but also targeted. Social
media can help businesses reach a wider audience and increase engagement through
shares, likes, comments, and other forms of interaction. This is especially true
considering when customers forward content along to non-customers. On the other
hand, social media platforms offer a range of targeting options, meaning companies
can pinpoint specific demographics, interests, and behaviours, and deliver
personalized content to those audiences.
Disadvantages:
Though riddled with benefits, there are some downsides and complications to social
media marketing. Building a strong social media presence takes time and effort, and
business owners must often consistently engage and create content.
Effective social media marketing requires a deep understanding of the various
platforms, as well as the ability to create engaging content, analyse data, and make
data-driven decisions. Each platform is often specialized and requires its own
understanding. In addition, social media platforms are constantly changing their
algorithms and policies which can make it difficult to predict and maintain success.
Though social media makes it easy to communicate with customers, it also provides a
platform for customers to voice their complaints and grievances publicly. This may
have the unintended consequence of creating a public forum which can damage a
company's reputation if not handled properly.
Last, it may be difficult to clearly understand the return on social media marketing.
Measuring the effectiveness and ROI of social media marketing can be challenging as
it often involves tracking multiple metrics, analysing complex data sets, and making
assumptions on why consumers may have acted in various ways.
E-Commerce Threats:
E-commerce businesses face many threats, including:
Phishing: Hackers send fake messages to customers asking them to take action, such as
providing login information.
Denial-of-service attacks: Hackers use malicious programs to crash servers by sending an
overwhelming number of requests from various IP addresses.
Malware: Malicious programs, such as ransomware, spyware, and trojans, are designed to
steal data and send spam.
Brute-force attacks: Fraudulent programs try thousands of combinations to obtain passwords.
Internet bots: Cybercriminals use bots to scrape websites for pricing and inventory, which can
hurt sales.
Man-in-the-middle attacks: Hackers trick users into using a public wireless network so they
can access their devices and browsing history.
Credit card fraud: Cybercriminals introduce code onto payment processing pages to capture
credit card data.
Other threats to e-commerce include: Fraud, Data breaches, Identity theft, Payment fraud,
Financial fraud.
User Interface (UI): The front-end component that allows users to interact with the
digital payment system. This could be a mobile app, website, or other interfaces.
Payment Gateway: A software application that facilitates the transfer of payment
information between the user interface and the payment processor.
Payment Processor: Responsible for validating and executing transactions. It
communicates with the issuing and acquiring banks to ensure funds are transferred
securely.
Authentication and Security: Various methods, such as passwords, PINs,
biometrics, and encryption, are used to ensure the security of transactions and protect
user information.
Mobile Wallets: Applications that store digital versions of credit/debit cards,
allowing users to make payments using their mobile devices.
Tokenization: A security feature that replaces sensitive card information with a
unique identifier (token) to protect user data during transactions.
APIs (Application Programming Interfaces): Interfaces that allow different
components of the digital payment ecosystem to communicate with each other.
Stakeholders in Digital Payment:
Consumers: Individuals or businesses making payments using digital methods.
Merchants: Businesses or individuals receiving payments for goods or services.
Banks: Financial institutions that provide accounts, issue payment cards, and
facilitate transactions.
Payment Service Providers (PSPs): Companies that offer services facilitating
electronic payments. They may include payment gateways, processors, and
aggregators.
Card Networks: Companies like Visa, MasterCard, and American Express that
provide the infrastructure for card-based transactions.
Regulatory Authorities: Government bodies that regulate and oversee digital
payment systems to ensure compliance with laws and standards.
Technology Providers: Companies that develop and provide the technology
infrastructure for digital payment systems, including software, hardware, and security
solutions.
Central Banks: In some cases, central banks play a role in overseeing and regulating
digital payments within a country.
Mobile Network Operators (MNOs): In regions where mobile payments are
prevalent, MNOs may be involved in facilitating transactions through mobile devices.
Third-Party Providers: Entities that offer additional services, such as fraud
detection, analytics, or loyalty programs, within the digital payment ecosystem.
Understanding the interactions among these components and stakeholders is crucial for the
efficient functioning and security of digital payment systems.
Modes of Digital Payments:
Digital payments encompass a variety of modes that enable electronic transactions, providing
convenient and efficient alternatives to traditional cash and check payments. Here are some
common modes of digital payments:
Banking cards
Unstructured Supplementary Service Data (USSD)
Aadhaar Enabled Payment System (AEPS)
Digital wallets (e-Wallets or Mobile wallets)
Bank prepaid cards
PoS terminals
Micro ATMs
Internet banking
Digital payment apps
Unified Payments Interface (UPI) service, etc.
Banking cards play a crucial role in modern financial transactions, providing individuals and
businesses with convenient and secure ways to access and manage their funds. Here are the
main types of banking cards:
Note: Visit this website for more details http://cashlessindia.gov.in/.
Banking Cards:
Debit Cards: Linked to a user's bank account, debit cards allow cardholders to make
purchases and withdraw cash from ATMs. Transactions are directly debited from the user's
checking account. Debit card transactions often require a Personal Identification Number
(PIN) for security.
Credit Cards: Credit cards provide a line of credit to the cardholder, allowing them to make
purchases up to a predefined credit limit. Cardholders must repay the borrowed amount,
either in full or through monthly instalments. If the full balance is not paid by the due date,
interest is charged on the remaining amount.
Prepaid Cards: Prepaid cards are loaded with a predetermined amount of funds. Users can
make purchases and withdrawals until the card's balance is depleted. Some prepaid cards are
reloadable, allowing users to add funds as needed.
ATM Cards: Similar to debit cards, ATM cards allow users to withdraw cash from ATMs
and, in some cases, make point-of-sale transactions. They may have limited functionality
compared to debit cards.
Charge Cards: Similar to credit cards, charge cards allow cardholders to make purchases up
to a specified credit limit. However, the full balance must be paid by the end of the billing
cycle.
Contactless Cards: These cards come with Near Field Communication (NFC) technology,
enabling contactless payments by tapping the card near a compatible terminal. It enhances
convenience and speed of transactions.
EMV Chip Cards: EMV (Europay, Mastercard, Visa) chip cards have a microchip that
provides enhanced security compared to magnetic stripe cards. The chip generates a unique
code for each transaction, reducing the risk of fraud.
Affinity Cards: Affinity cards are co-branded with a particular organization, such as a
university or charity. Cardholders may receive benefits or rewards related to the affiliated
organization.
Business Cards: Designed for business use, these cards help manage business expenses.
They may offer features such as expense tracking, employee card controls, and rewards
tailored for business needs.
Virtual Cards: Virtual cards exist in digital form and are used primarily for online
transactions. They provide an added layer of security and are often linked to a physical card.
Smart Cards: Smart cards incorporate a microprocessor or memory chip, enabling multiple
applications such as banking, transportation, and identification on a single card.
Banking cards have evolved to incorporate various technologies and features to enhance
security, convenience, and versatility in financial transactions. Users should be aware of the
specific terms, fees, and security measures associated with their cards to use them effectively.
e-Wallets:
Electronic wallets, commonly known as e-wallets or digital wallets or mobile wallets, are
digital versions of traditional wallets that allow users to store and manage their financial
information securely on electronic devices. E-wallets facilitate various financial transactions,
including online purchases, mobile recharges, bill payments, and peer-to-peer transfers. Here
are key features and aspects of e-wallets:
Mobile-Centric: E-wallets are primarily designed for use on mobile devices, and
users can access their digital wallets through dedicated mobile applications.
Digital Storage of Payment Information: E-wallets store information such as
credit/debit card details, bank account information, and even loyalty cards digitally.
This eliminates the need to carry physical cards or cash.
Top-Up and Funding: Users can fund their e-wallets by linking them to their bank
accounts, credit/debit cards, or by using other funding methods specified by the e-
wallet provider.
Security Measures: E-wallets employ security features such as PIN codes,
passwords, biometric authentication, and encryption to protect users' financial
information and transactions.
Peer-to-Peer (P2P) Transfers: E-wallets enable users to send and receive money
directly to and from other users. This feature is often used for splitting bills, repaying
loans, or sending gifts.
Contactless and NFC Payments: Many e-wallets support contactless payments,
allowing users to make transactions by tapping their mobile devices on point-of-sale
(POS) terminals equipped with Near Field Communication (NFC) technology.
QR Code Payments: E-wallets often support QR code payments. Users can scan
merchant QR codes to make payments or generate their own QR codes for receiving
payments.
In-App and Online Purchases: Users can make purchases within mobile apps or
websites using their linked e-wallets, providing a seamless and convenient checkout
experience.
Bill Payments and Recharges: E-wallets offer the ability to pay utility bills, recharge
mobile phone plans, and settle other recurring payments directly through the app.
Rewards and Loyalty Programs: Some e-wallets incorporate rewards and loyalty
programs, offering users cashback, discounts, or points for using the wallet for
transactions.
Multi-Currency Support: Some e-wallets support transactions in multiple
currencies, making them useful for international travellers.
Offline Transactions: Certain e-wallets provide the capability to make transactions
even when there is no internet connectivity, leveraging technologies like Near Sound
Data Transfer (NSDT).
Virtual Cards: Some e-wallets issue virtual cards that users can use for online
transactions without revealing their actual card details.
Integration with Other Services: E-wallets may integrate with various services,
including ride-sharing, food delivery, and online marketplaces, providing users with a
comprehensive digital payment solution.
Popular examples of e-wallets include PayPal, Apple Pay, Google Pay, Samsung Pay, Alipay,
PhonePe, and Paytm, among others. The adoption of e-wallets has grown significantly as they
offer a convenient and secure way for users to manage their financial transactions in the
digital age.
Remember that security is an ongoing process, and regularly reassessing and updating
security measures is essential to stay ahead of evolving threats. Additionally, organizations
should implement a comprehensive cyber security strategy that includes endpoint protection
as part of a broader security framework.
Password Policy:
A password policy is a set of rules and requirements that dictate the criteria for creating and
managing passwords within an organization or system. The primary goal of a password
policy is to enhance security by promoting the use of strong, unique passwords and
minimizing the risk of unauthorized access. Here are some common elements found in
password policies:
Password Length: Specifies the minimum and maximum number of characters a password
must have. Longer passwords are generally more secure.
Complexity Requirements: Requires the use of a combination of uppercase and lowercase
letters, numbers, and special characters. This helps create stronger passwords that are harder
to guess.
Password History: Prevents users from reusing a certain number of previous passwords. This
helps ensure that users regularly update their passwords and don't revert to old, potentially
compromised passwords.
Expiration: Sets a time limit for how long a password is valid before it must be changed. This
is another measure to ensure that passwords are regularly updated.
Account Lockout Policy: Specifies the number of unsuccessful login attempts allowed before
an account is temporarily or permanently locked. This helps prevent brute force attacks.
Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA): Encourages or
requires the use of additional authentication methods, such as a code sent to a mobile device,
in addition to a password.
User Education: Provides guidelines for users on creating and maintaining secure passwords.
This may include tips on avoiding common passwords, not sharing passwords, and
recognizing phishing attempts.
Monitoring and Auditing: Outlines procedures for monitoring and auditing password-related
activities for security compliance. This includes reviewing logs and taking action in response
to suspicious activities.
Password Storage: Specifies how passwords should be stored. Ideally, passwords should be
hashed and salted to enhance security.
Password Recovery: Defines the process for users to recover or reset their passwords
securely.
Third-Party Integration: Considers how the password policy integrates with third-party
applications or services, especially if they have their own authentication mechanisms.
Compliance: Ensures that the password policy aligns with relevant industry regulations and
standards, such as GDPR, HIPAA, or PCI DSS.
It's important to regularly review and update the password policy to adapt to evolving
security threats and best practices. Additionally, organizations should provide training and
awareness programs to ensure that users understand and follow the password policy.
Data Backup:
Data backup is a fundamental component of any robust data management and cybersecurity
strategy. It involves creating and storing copies of important data to protect against data loss,
whether due to accidental deletion, hardware failure, software issues, or security breaches.
Here are key considerations and best practices for data backup:
Identify Critical Data: Determine which data is critical for your business operations. This
may include customer information, financial records, intellectual property, and other essential
data.
Backup Frequency: Establish a backup frequency based on the criticality of the data and the
rate at which it changes. For critical data, frequent backups (e.g., daily or more often) may be
necessary.
Automated Backup Systems: Use automated backup systems to ensure regular and consistent
backups. Automated processes reduce the risk of human error and ensure that backups are
performed according to schedule.
Onsite and Offsite Backups: Implement a combination of onsite and offsite backups. Onsite
backups provide quick access to data, while offsite backups protect against events like natural
disasters, theft, or other incidents that could affect the physical location of the data.
Cloud Backup: Consider using cloud backup solutions for offsite storage. Cloud backups
provide scalability, accessibility, and often include built-in redundancy and security features.
Versioning: Enable versioning in your backup system to keep multiple versions of files. This
allows you to restore data to a specific point in time, which can be crucial in case of data
corruption or ransomware attacks.
Encryption: Encrypt the data during both the backup process and storage. Encryption helps
protect sensitive information from unauthorized access, especially when data is in transit or
stored in the cloud.
Regular Testing: Periodically test your backup and recovery processes to ensure that data can
be restored successfully. This testing helps identify any issues with the backup system or
processes before a critical situation arises.
Documentation: Maintain documentation that outlines the backup procedures, including the
types of data being backed up, the backup schedule, and the recovery process. This
documentation is valuable for training new staff and troubleshooting.
Monitoring and Alerts: Implement monitoring systems that can alert administrators to any
issues with the backup process. This includes failed backups, storage capacity issues, and
other potential problems.
Compliance: Ensure that your backup strategy complies with any relevant industry
regulations and standards. Some industries have specific requirements for data protection and
retention.
Redundancy: Consider redundancy in your backup strategy. Having multiple copies of
backups in different locations or on different types of media can provide an extra layer of
protection.
User Education: Educate employees about the importance of data backup and their role in
protecting critical information. Encourage them to save files in designated locations and
follow best practices for data management.
Regular Review and Updates: Regularly review and update your backup strategy to
accommodate changes in your IT infrastructure, business processes, and evolving
cybersecurity threats.
By implementing a comprehensive and well-executed data backup strategy, organizations can
significantly reduce the risk of data loss and ensure business continuity in the face of
unforeseen events.
Wi-Fi Security:
Wi-Fi security is crucial to protect your network and data from unauthorized access, attacks,
and potential threats. Here are some key aspects of Wi-Fi security:
Encryption: Use WPA3 (Wi-Fi Protected Access 3) or, at a minimum, WPA2 to secure your
Wi-Fi network. These are the latest and most secure encryption protocols available. Avoid
using WEP (Wired Equivalent Privacy) as it is outdated and easily cracked.
Network Name (SSID) Security: Change the default SSID (Service Set Identifier) of your
Wi-Fi network to something unique. Avoid using easily identifiable information, such as your
name or address.
Disable SSID broadcasting to make your network less visible to potential attackers. However,
note that this doesn't provide foolproof security, as determined attackers can still discover
hidden SSIDs.
Strong Passwords: Use a strong, unique password for your Wi-Fi network. A strong password
includes a combination of uppercase and lowercase letters, numbers, and special characters.
Change your Wi-Fi password regularly, and avoid using easily guessable passwords, such as
"password" or "123456."
Network Authentication: Use WPA3-PSK (Pre-Shared Key) or WPA2-PSK with a strong
password for home networks. For enterprise environments, consider using WPA3-Enterprise
or WPA2-Enterprise with a RADIUS (Remote Authentication Dial-In User Service) server
for more robust authentication.
Guest Network: If your router supports it, set up a separate guest network with a different
password. This helps isolate guest devices from your main network, adding an extra layer of
security.
Firewall and Router Settings: Enable the built-in firewall on your router to filter incoming
and outgoing traffic. Regularly update your router's firmware to patch any security
vulnerabilities.
MAC Address Filtering: Enable MAC address filtering to only allow specific devices to
connect to your Wi-Fi network. Keep in mind that this can be bypassed by determined
attackers, as MAC addresses can be spoofed.
VPN (Virtual Private Network): Consider using a VPN to encrypt your internet connection,
adding an extra layer of security, especially when connecting to public Wi-Fi networks.
Regular Security Audits: Periodically review and update your security settings. Check for
new firmware updates for your router, and ensure that your security configurations are up to
date.
Physical Security: Physically secure your router in a location that is not easily accessible to
unauthorized individuals. This helps prevent someone from gaining physical access to your
router and making unauthorized changes.
By implementing these Wi-Fi security best practices, you can significantly reduce the risk of
unauthorized access and protect your network and data from potential threats.
Assign the principle of least privilege (PoLP): Only grant users the minimum level
of access required to perform their job functions.
Regularly review and audit user permissions to ensure they align with job roles and
responsibilities.
Network Security:
Install and regularly update antivirus and anti-malware software on all devices.
Configure endpoint protection settings to perform regular scans and updates.
Implement device encryption to protect data in case of device theft or loss.
Data Backup and Recovery:
Regularly back up critical data, and ensure backups are stored in a secure location.
Test data restoration processes to verify the reliability of backups.
Software Updates and Patch Management:
Enable automatic updates for operating systems and applications.
Regularly check for and apply security patches and updates.
Security Policies:
Develop and enforce security policies that outline acceptable use, data handling, and
incident response procedures.
Provide security awareness training to users to educate them about security best
practices.
Physical Security:
Restrict physical access to servers, network equipment, and other critical
infrastructure.
Implement security measures such as surveillance cameras and access control
systems.
Logging and Monitoring:
Enable logging for critical systems and applications.
Regularly review logs for suspicious activities.
Implement real-time monitoring solutions for immediate threat detection.
Incident Response Plan:
Develop an incident response plan that outlines steps to be taken in the event of a
security incident.
Regularly test the incident response plan through simulations and drills.
Encryption:
Use encryption for sensitive data both in transit (e.g., SSL/TLS for web traffic) and at
rest (e.g., encrypting files and databases).
Vendor Security:
Evaluate and monitor the security practices of third-party vendors, especially those
who have access to your systems or data.
Regular Audits and Assessments:
Ensure that security policies and practices align with legal and regulatory
requirements applicable to your organization.
Regular Security Reviews:
Conduct regular reviews of security policies, procedures, and configurations to ensure
they remain effective and up-to-date.
These guidelines provide a broad overview, and the specific steps will depend on the
technology stack and infrastructure in use. Regularly reassess and update security policies to
adapt to evolving threats and technology changes.
Bottom line – Don’t open email from people you don’t know
Know which links are safe and which are not – hover over a link to discover where it
directs to
Be suspicious of the emails sent to you in general – look and see where it came from
and if there are grammatical errors
Malicious links can come from friends who have been infected too. So, be extra
careful!
6. Use Your Mobile Devices Securely
According to McAfee Labs, your mobile device is now a target to more than 1.5 million new
incidents of mobile malware. Here are some quick tips for mobile device security:
Create a Difficult Mobile Passcode – Not Your Birthdate or Bank PIN
Install Apps from Trusted Sources
Keep Your Device Updated – Hackers Use Vulnerabilities in Unpatched Older
Operating Systems
Avoid sending PII or sensitive information over text message or email
Leverage Find my iPhone or the Android Device Manager to prevent loss or theft
Perform regular mobile backups using iCloud or Enabling Backup & Sync from
Android
7. Backup Your Data Regularly
Backing up your data regularly is an overlooked step in personal online security. The top IT
and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will
keep three copies of your data on two different types of media (local and external hard drive)
and one copy in an off-site location (cloud storage).
If you become a victim of ransomware or malware, the only way to restore your data is to
erase your systems and restore with a recently performed backup.
8. Don’t Use Public Wi-Fi
Don’t use a public Wi-Fi without using a Virtual Private Network (VPN). By using VPN
software, the traffic between your device and the VPN server is encrypted. This means it’s
much more difficult for a cybercriminal to obtain access to your data on your device. Use
your cell network if you don’t have a VPN when security is important.
Prepared by:
A Madhu Sir
Assistant Professor, MREC(A).