Utkrisht Report File
Utkrisht Report File
TO
Ms. Babita
(Course Coordinator)
DECLARATION
I also declare that no part of this work has been incorporated for
any other report.
I confirm that:
The project is the result of my own independent work
and has not been submitted for any other degree or
qualification.
All sources of information used in the project have
been duly acknowledged and referenced in accordance
with the appropriate academic standards.
No part of this project has been copied or plagiarized
from any other work, and all external content is cited
where applicable.
I take full responsibility for the content, structure, and
conclusions of this project.
3 Common Types of
Cybercrimes
● Types of Cybercrimes
● Malware?
5 CONCLUSION
6 REFERENCE
Introduction to Cybersecurity
What is Cybersecurity?
In our world today, where everything is connected through the internet,
it's really important to know about “Cybersecurity”. Think of
cybersecurity as a way to protect your computer, online accounts, and
all the personal and professional data you store on them from people
who want to steal or harm it. As we use the internet for chatting,
shopping, learning and so much more, there are also people out there
who try to scam us online.
These people, often called cybercriminals, are always looking for ways
to break into computer systems and steal information. If they succeed,
it can lead to serious problems, like losing money or having our
personal information exposed. It can even affect our country's security.
What is KYC?
● Legal name
● Identity proof
● Correct permanent address as per identity proof
● The legal status of the entity or person.
What is KYC?
● Sometimes, callers ask the victim to share their CVV (at the back
of their debit / credit card). This is the last security of our card. If
you give away this number publicly, you’ll lose all your money.
● After the victim transfers the money, the caller gains access to
their password and other critical details. This information is
exploited to conduct fraudulent transactions and deplete the
victim's bank account
Modus Operandi - In case of fake Messages
● If the victim clicks on the provided link in the message, they are
directed to a fake website that mimics a legitimate bank's site.
● Here, they are prompted to enter their bank username, password,
One- Time Password (OTP), and other sensitive information.
1. Email Phishing
2. Smishing
3. Vishing
Email Phishing: Attackers send deceptive emails that appear to be
from trusted sources, such as banks, government agencies, or popular
online services. These emails often contain links to fake websites that
request sensitive information.
Scam Type 1
Precautions
● Source Credit- CyberForensics- https://bit.ly/3SeJgqn
● One should be careful while making financial transactions for
online products.
● Always remember, to receive money there is no need to enter
your PIN / password anywhere.
● If UPI or any other app asks you to enter your PIN to complete
transaction, it means you will end up sending money instead of
receiving it.
● Be cautious while scanning any QR codes using payment apps
● Best option is to ask the buyer to meet you in person while picking
up the object and pay you then and there.
Fake Apps / Screen sharing app / Remote acces
● Fraudsters manage to access your mobile device, laptop, or
desktop when you download unfamiliar or unverified mobile
applications.
● Once this malicious application is downloaded, the fraudster can
gain full access to the device.
● In some cases, fraudsters convince individuals to download
screen- sharing apps, allowing them to watch or control your
mobile or laptop, ultimately obtaining access to your financial
credentials.
● Subsequently, they use this access to make payments using your
internet banking or payment apps, exploiting your financial
information for fraudulent purposes.
ATM card skimming
Cover the keypad with your hand while entering your PIN.
Do NOT enter the PIN in the presence of any other person standing
close to you or share the card with anyone.
SIM swap or SIM cloning
By doing so, they aim to extract personal information and details from
the customer, which they can then use to either compromise the
original SIM card or facilitate fraudulent activities using a duplicate one.
Precautions
Precautions
If you ever find yourself in this situation, remember that it's essential to
protect yourself better online. Talk to your friends and family about
what happened, and don't be afraid to seek help from experts who can
help you deal with the feelings and stress that come with cybercrimes.
You're not alone, and there are ways to get through it.
Types of Cybercrimes
Cyberstalking
presence and seek help if you believe you are a victim of cyberstalking
Cyberbullying
● For Revenge- There are bullies out there who have been bullied
themselves. They may feel that the only way to stop others from
bullying them is for them to bully others. They want others to feel
the way they felt after being bullied.
● They don’t have any Empathy for the victim- Often, a person will
bully because they believe the victim deserves it in some way.
● They think they won’t get caught- Cyberbullies use fake names,
photos and IDs, and think that they won’t be caught. Additionally,
since they’re not bullying another person face to face, they can
say and do things that they would not do in real life.
Types of Cybercrimes
Here are some common tactics that sex rackets may use to lure
innocent victims digitally-
Online dating and romance scams: Sex traffickers may create fake
profiles on dating websites or social media platforms to develop
romantic relationships with potential victims. Once you believe them,
they exploit victims by coercing them into sexual acts.
Lottery Scams: Scammers inform victims that they have won a lottery
or prize and request an upfront fee or personal information to claim the
prize. Often, these lotteries do not exist. Once you pay the money, it’s
lost forever.
Hacking
Copyright Infringement
Bata India Ltd vs. Pyare Lal & Anr. (1985)- In this case, Bata India
Ltd filed a lawsuit against Pyare Lal & Anr. for copying its design of
shoes. The court ruled in favour of Bata India and held that the design
of the shoes was unique and original, and therefore entitled to
copyright protection.
Delhi Public School Society vs. D.A.V. Public School (2019)- In this
case, the Delhi Public School Society sued D.A.V. Public School for
infringing on its copyright by using its logo and name without
permission. The court ruled in favour of the Delhi Public School Society
and held that the use of the logo and name without permission
amounted to copyright infringement.
YRF vs Sri Sai Ganesh Productions- In this case, Yash Raj Films
(YRF) sued Sri Sai Ganesh Productions for infringing on the copyright
of the film 'Dhoom 3' by making and distributing a pirated copy of the
film.
The court ruled in favour of YRF and ordered Sri Sai Ganesh
Productions to pay damages.
Install anti-virus
Review and adjust your social media privacy settings. Limit the
information visible to the public and only accept friend/follower
requests from people you know.
If you have not selected the right settings on your social media
accounts, then photos and videos posted can be viewed, downloaded
and used by others without your knowledge.
Strong Passwords: Use strong and unique passwords for your online
accounts. Combine upper and lower-case letters, numbers, and
special characters. Avoid using easily guessable information like
birthdays or common words.
Section 509- This clause may be used in the event of a man’s violation
of a woman’s right to privacy, such as by sending her unwelcome
electronic communications or making derogatory remarks about her
online.
We hope that this course has been able to ignite your passion about
Cybercrimes and the importance of Cybersecurity. This course is
designed to provide you with a comprehensive understanding of the
principles, strategies, and tools needed to protect digital systems and
sensitive information from cyber threats and attacks.
You are now equipped with the knowledge and skills necessary to
prevent and if necessary, address cybercrimes faced by you or others
around you in an increasingly interconnected world.
CONCLUSION
Cybersecurity is a dynamic and critical field dedicated to protecting systems, networks,
and data from malicious attacks and unauthorized access. As technology evolves, so
do the threats, making cybersecurity a continually developing discipline. Here are some
key takeaways for a conclusion on cybersecurity:
3. Human Factor**: People are often the weakest link in cybersecurity. Training and
awareness programs are essential to help users recognize and avoid phishing scams,
secure their credentials, and understand their role in maintaining security.
WWW.GOOGLE.COM
HTTP://www.w3schools.com
https://chatgpt.com