0% found this document useful (0 votes)
29 views58 pages

Utkrisht Report File

Kffififi

Uploaded by

utkrisht dwivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views58 pages

Utkrisht Report File

Kffififi

Uploaded by

utkrisht dwivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

UNITED COLLEGE OF EDUCATION

( AFFILIATED TO GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY )

SUMMER TRAINING REPORT ON


“CYBER SECURITY”
(BATCH 2022-2025 )
SUBMITTED IN PARTIAL FULFILLMENT FOR THE AWARD OF DEGREE
OF
BACHELOR OF COMPUTER APPLICATION (BCA)

TO

GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY

UNDER THE GUIDANCE OF SUBMITTED BY


MS BABITA UTKRISHT DWIVEDI
(ASS. PROFESSOR) ROLL NO.
01827102022
UNITED COLLEGE OF EDUCATION
( Affiliated To Guru Gobind Singh Indraprastha University )

SUMMER TRAINING REPORT ON


“CYBER SECURITY”
( BATCH 2022-2025 )

Submitted in partial fulfillment for the award of degree of


Bachelor Of Computer Application (BCA)
To

GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY

UNDER THE GUIDANCE OF SUBMITTED BY-

MS BABITA UTKRISHT DWIVDEI


(ASS. PROFESSOR) ROLL NO.
01827102022
CERTIFICATE

This is to certify that UTKRISHT DWIVEDI of BCA 5th


SEMESTER from UNITED COLLEGE OF
EDUCATION, has presented this project work entitled
CYBER SECURITY in partial fulfillments of the
requirements for the award of the degree of Bachelor of
Computer Application under our supervision and guidance.

Ms. Babita
(Course Coordinator)
DECLARATION

I hereby declare that the project “CYBER SECURITY” is


submitted by me for the summer internship training report
during the Bachelor Of Computer Application (BCA) at
United College Of Education, Greater Noida.

This is my own original work and has not been submitted


earlier United College Of Education or to any other institution for
the fulfilment of the requirement of any course of study.

I also declare that no part of this work has been incorporated for
any other report.

Name- UTKRISHT DWIVEDI


Enrollment No.- 01827102022
Date- 10 August , 2024
ACKNOWLEDGEMENT
I would like to sincerely thank United College of
Education Greater Noida for providing me an
opportunity to work on the internship which has
enhanced my knowledge on the area.

I take this opportunity to express my gratitude to the


people who have been instrumental in the successful
completion of my report.

I would also like to thank my faculty guide course


coordinator Ass. Professor Ms.Babita for their
suggestions & ideas to improve my work. Above all, I
would like to thank almighty god for his blessings and
my family who have been a constant source of support
& inspiration.

Name- UTKRISHT DWIVEDI


Enrollment No.- 01827102022
Declaration Of Originality of Work
I ANSH VISHWAKARMA, hereby declare that the work
presented in this project entitled “CYBER SECURITY”
is my original work and has been carried out
independently by me under the guidance of Ms. Babita
Kumari.

I confirm that:
The project is the result of my own independent work
and has not been submitted for any other degree or
qualification.
All sources of information used in the project have
been duly acknowledged and referenced in accordance
with the appropriate academic standards.
No part of this project has been copied or plagiarized
from any other work, and all external content is cited
where applicable.
I take full responsibility for the content, structure, and
conclusions of this project.

Name- UTKRISHT DWIVEDI


Enrollment No.- 01827102022
Date- 10 August, 2024
S.NO INDEX P.NO

1 Introduction: CYBER SECURITY

2 Digital and Online Banking Frauds


● Identity theft
● What is KYC?
● Modus Operandi - In case of fake
calls
● Safety tips for safeguarding against
such cyber frauds

3 Common Types of
Cybercrimes

● Types of Cybercrimes
● Malware?

4 Prevention and Legalities of Cybercrimes


● Prevention and Safeguards
● Legal Sections related to Cybercrimes in
India

5 CONCLUSION

6 REFERENCE
Introduction to Cybersecurity
What is Cybersecurity?
In our world today, where everything is connected through the internet,
it's really important to know about “Cybersecurity”. Think of
cybersecurity as a way to protect your computer, online accounts, and
all the personal and professional data you store on them from people
who want to steal or harm it. As we use the internet for chatting,
shopping, learning and so much more, there are also people out there
who try to scam us online.

These people, often called cybercriminals, are always looking for ways
to break into computer systems and steal information. If they succeed,
it can lead to serious problems, like losing money or having our
personal information exposed. It can even affect our country's security.

Learning about cybersecurity is not only important for these experts


but also for regular people and businesses. This is all about making
the internet a safer place for everyone. By following good practices in
cybersecurity, you can protect your data and keep it away from
cybercriminals. Strong cybersecurity helps safeguard your data and
networks from theft, fraud and unauthorized access by building
security into everything you do through the CIA Triad model
Components of CIA Triad Model

Confidentiality ensures that sensitive data remains private and is


not disclosed to unauthorized individuals, entities, or systems.
Integrity ensures that information has not been tampered with,
altered, or modified by unauthorized individuals or systems. It
ensures that data remains accurate and trustworthy throughout its
lifecycle. Availability ensures that systems can defend itself from
disruptions, including hardware failures, software glitches, and
cyberattacks. Components of CIA Triad Model C

● Confidentiality ensures that sensitive data remains private and


is not disclosed to unauthorized individuals, entities, or systems.

● Integrity ensures that information has not been tampered with,


altered, or modified by unauthorized individuals or systems. It
ensures that data remains accurate and trustworthy throughout its
lifecycle.

● Availability ensures that systems can defend itself from


disruptions, including hardware failures, software glitches, and
cyberattacks. Components of CIA Triad Model C
In the upcoming modules, we will learn more about each of these
different types of cybercrimes, the way these crimes are
committed (also called Modus Operandi). We’ll also learn how to
be cautious and prevent these crimes along with taking proper
legal steps in case we or someone else has been affected by this
Digital and Online Banking Frauds
Digital banking fraud in India refers to fraudulent activities or scams
that target mobile banking users, leading to financial losses and
potential compromise of personal and financial information. Mobile
banking frauds are a significant concern due to the widespread
adoption of mobile banking services in India
Identity theft

Identity theft involves stealing of personal information, such as


Aadhar card, PAN card, Voter card no. and/or bank account
details, to commit fraud or other crimes in the victim's name.
Identity theft can occur through.

● Stolen personal documents like passports, Aadhar card, voter


ID cards, or PAN cards.
● Impersonation: Perpetrators may pose as someone else,
often using forged documents, to gain access to services,
benefits, or financial accounts.

To understand how this works, it is important to understand about


the modus operandi of “KYC frauds”.

What is KYC?

Know Your Customer (KYC) is a process used by various businesses,


particularly financial institutions, to verify the identities of their
customers. KYC is important because it serves as a safeguard against
identity theft, terrorist financing, money laundering, and financial fraud.
Reserve Bank of India (RBI) has made KYC mandatory to ensure the
integrity and security of financial transactions. It helps businesses,
especially financial institutions like banks, to have a better
understanding of their customers

How is KYC done?

The following details of customers are collected to complete the KYC


process.

● Legal name
● Identity proof
● Correct permanent address as per identity proof
● The legal status of the entity or person.

How does KYC fraud happen (also linked to Identity theft)?

There are instances of fraud related to KYC where criminals exploit


this process. They use fake SMS messages or fraudulent calls to
impersonate bank representatives, with the aim of collecting personal
information from customers. The fraudsters may provide the customers
with the phishing link, or 10-digit mobile number or convince them to
give access to them digital device, through which they intend to get
hold of customer’s personal details to get unauthorized access to their
banking accounts to steal money. Many innocent people have lost their
hard-earned money to this fraud in recent times and still continuing.

What is KYC?

Know Your Customer (KYC) is a process used by various businesses,


particularly financial institutions, to verify the identities of their
customers. KYC is important because it serves as a safeguard against
identity theft, terrorist financing, money laundering, and financial fraud.
Reserve Bank of India (RBI) has made KYC mandatory to ensure the
integrity and security of financial transactions. It helps businesses,
especially financial institutions like banks, to have a better
understanding of their customers.

Modus Operandi - In case of fake calls

Here's how the fraud takes place in a series of steps:

● Fraudsters impersonate bank or e-wallet representatives and call


the victim, urging them to update their KYC immediately to
prevent account blockage.
● They claim that the KYC process can be completed online to
maintain an active account and request the victim to download a
specific mobile app onto their device.
● Once the app is installed, the fraudsters ask the victim to share a
code and grant certain permissions, granting them access to the
victim's digital device.
● The caller then instructs the victim to transfer a small sum of
money from their bank account, enabling them to access the
One-Time Password (OTP) sent to the victim's digital device.

● Sometimes, callers ask the victim to share their CVV (at the back
of their debit / credit card). This is the last security of our card. If
you give away this number publicly, you’ll lose all your money.

● After the victim transfers the money, the caller gains access to
their password and other critical details. This information is
exploited to conduct fraudulent transactions and deplete the
victim's bank account
Modus Operandi - In case of fake Messages

● Victims receive a message from a mobile number containing an


unknown link or a 10-digit mobile number, with the pretext of
updating their KYC.

● If the victim clicks on the provided link in the message, they are
directed to a fake website that mimics a legitimate bank's site.
● Here, they are prompted to enter their bank username, password,
One- Time Password (OTP), and other sensitive information.

● Alternatively, if the victim calls the number provided in the


message, they are encouraged to share personal details such as
their account username, password, account number, and OTP.

● The fraudster uses the acquired information to gain unauthorized


access to the victim's bank account and carries out fraudulent
activities.
Safety tips for safeguarding against such cyber frauds

● Avoid clicking on links from unknown or unverified sources. It's


safer not to interact with such links.
● Never share sensitive information like your mobile number,
account number, passwords, OTPs, CVV or ATM PIN with
anyone.
● Bank officials / financial institutions / any genuine entity never ask
customers to share confidential information such as username /
password / card details / CVV / OTP.
● Genuine institutions do not conduct KYC updates via phone calls
or by sending links to customers.
● Download only original apps from authorized app stores and
websites.
● Avoid downloading third-party apps.
● If you encounter any such issues, report them immediately to the
specific bank authorities.
● File an online complaint regarding any such fraud on the
government portal www.cybercrime.gov.in for further investigation
and action.
Phishing / Smishing / Vishing

Phishing is a type of hacking where attackers use fraudulent emails,


websites, or messages to deceive users into revealing sensitive
information like passwords or credit card details.

Phishing is mostly of the following types-

1. Email Phishing

2. Smishing

3. Vishing
Email Phishing: Attackers send deceptive emails that appear to be
from trusted sources, such as banks, government agencies, or popular
online services. These emails often contain links to fake websites that
request sensitive information.

Smishing: Phishing attacks conducted via text messages or SMS.


Scammers send text messages with links to malicious websites or
request sensitive information through SMS.

Vishing: This involves voice-based phishing, where scammers call


individuals and impersonate legitimate organizations to obtain personal
or financial information over the phone.

Modus Operandi- Phishing


Unified Payments Interface (UPI) / QR code scam

Scam Type 1

● Many of us sell products on online platforms.


● Fraudsters, pretending to be from the Army (so that you are
convinced that they are genuine) show interest in your product.
● Instead of “sending money” to you, they use “request money”
option through UPI app.
● Most of us fail to notice this and approve the request.
● Immediately the fraudsters are able to pull money out of our bank
account.
Scam Type 2

● Fraudsters usually register themselves on online selling sites and


develop a nice rapport with other users on the platform.
● Then they say they have a mobile phone to sell and post an
image and spell out a price.
● The buyer falls for it and is willing to take the item.
● The fraudster posing as an Army employee (they may even show
you a fake ID card) and will share a QR code to pay
advance/token amount, usually through GPay, PhonePe, PayTm
or other online sources.
● In return, you receive a courier receipt indicating that the mobile
has been couriered.
● At this stage, the connection goes cold and when the phone does
not arrive, the buyer tries to call the seller, there is no response.

Precautions
● Source Credit- CyberForensics- https://bit.ly/3SeJgqn
● One should be careful while making financial transactions for
online products.
● Always remember, to receive money there is no need to enter
your PIN / password anywhere.
● If UPI or any other app asks you to enter your PIN to complete
transaction, it means you will end up sending money instead of
receiving it.
● Be cautious while scanning any QR codes using payment apps
● Best option is to ask the buyer to meet you in person while picking
up the object and pay you then and there.
Fake Apps / Screen sharing app / Remote acces
● Fraudsters manage to access your mobile device, laptop, or
desktop when you download unfamiliar or unverified mobile
applications.
● Once this malicious application is downloaded, the fraudster can
gain full access to the device.
● In some cases, fraudsters convince individuals to download
screen- sharing apps, allowing them to watch or control your
mobile or laptop, ultimately obtaining access to your financial
credentials.
● Subsequently, they use this access to make payments using your
internet banking or payment apps, exploiting your financial
information for fraudulent purposes.
ATM card skimming

● Fraudsters install skimming devices within ATM machines to


illicitly capture data from your card as you use it.

● To obtain your Personal Identification Number (PIN), they may-

● Pre-install a dummy keypad or use small pinhole cameras that


are cleverly hidden from plain sight or

● Pretend to be other customers standing nearby & gain access to


your PIN as you enter it.

● The data collected, including your card information and PIN, is


then used to create a duplicate card, allowing the fraudsters to
withdraw funds from your account.
Precautions

Verify to ensure that there is no extra device attached near card


insertion slot or keypad of ATM machine while making transaction.

Cover the keypad with your hand while entering your PIN.

Do NOT enter the PIN in the presence of any other person standing
close to you or share the card with anyone.
SIM swap or SIM cloning

Since most of your account details and authentication are linked to


your registered mobile number, fraudsters target your SIM card. They
aim to either gain unauthorized access to your SIM card or obtain a
duplicate SIM card that allows them to conduct digital transactions
using One-Time Passwords (OTPs) received on the duplicate SIM.

Fraudsters often pose as telephone or mobile network staff, contacting


the customer under the disguise of offering a free upgrade from 3G to
4G or providing additional benefits for the SIM card.

By doing so, they aim to extract personal information and details from
the customer, which they can then use to either compromise the
original SIM card or facilitate fraudulent activities using a duplicate one.

Precautions

● Never share credentials pertaining to SIM card.


● You should immediately get suspicious, if you don’t have mobile
network in your phone for considerable time in a regular
environment
● Contact Mobile operator to ensure that no duplicate SIM is being
issued for your SIM.
Juice Jacking

In this type of cyber theft, when you connect your mobile to an


unknown or unverified charging port, it opens the door for unknown
apps or malware to be installed on your device.

These malicious apps or malware can grant fraudsters control over


your mobile, providing them with access to and the ability to steal
sensitive data, including emails, SMS messages, and saved
passwords.

This makes juice jacking a significant security risk when charging


devices in public places. Many times we connect to Airport or unknown
WiFi to save our mobile internet data pack and access the internet or
download videos. This is another way in which fraudsters may hack on
to our smartphones and steal private data

Precautions

● Always avoid using public / unknown charging ports / cables.


Avoid using Airport WiFi- use your mobile internet instead
Importance of Being Vigilant during banking / digital transactions

● Prevention: Being vigilant is the first line of defense against


banking frauds. Recognizing and avoiding potential threats can
help prevent financial losses.
● Protection of Personal Information: Vigilance helps protect your
personal and financial information from falling into the wrong
hands.
● Early Detection: Vigilance allows for the early detection of
fraudulent activities. Prompt reporting of suspicious incidents can
help authorities take action.
● Security Awareness: Staying vigilant enhances your awareness of
cybersecurity best practices. This knowledge can be applied to
protect your financial assets.
● Reducing the Impact: Vigilance can reduce the impact of banking
frauds by preventing them or limiting their consequences.
In conclusion, the impacts of banking frauds in India are significant,
and being vigilant is of utmost importance to prevent, detect, and
mitigate these risks. It's essential for individuals and businesses to
adopt strong cybersecurity practices and promptly report any
suspicious activities to protect their financial well-being and maintain
trust in the banking system.
Common Types of Cybercrimes

When cybercrimes happen, they


can affect people in more ways
than one. It's not just about losing
money; it can make you feel really
upset and stressed. Imagine if
someone took something of yours
and used it wrongly or to commit a
crime– it would make you feel
worried and not trust people
anymore.

Being a victim of cybercrimes can lead to a lot of emotional pain. You


might feel like you can't trust anyone, both online and in real life. You
might even start avoiding people and feeling really alone. These
feelings can make you angry, anxious, and even guilty, as if it's your
fault.

If you ever find yourself in this situation, remember that it's essential to
protect yourself better online. Talk to your friends and family about
what happened, and don't be afraid to seek help from experts who can
help you deal with the feelings and stress that come with cybercrimes.
You're not alone, and there are ways to get through it.
Types of Cybercrimes

Cyberstalking

Cyberstalking is a form of harassment or stalking that takes place


online through social media, email, text messages, and other online
platforms, to repeatedly harass, threaten, or intimidate someone.

Cyberstalkers may engage in various activities, including:

● Sending persistent and unwanted messages: Cyberstalkers may


flood their victims with emails, text messages, or social media
messages, often of a threatening or derogatory nature.

● Monitoring online activities: They may obsessively track a


person's online presence, such as monitoring their social media
profiles, tracking their location, or attempting to gain unauthorized
access to their accounts.

● Identity theft: Some cyberstalkers may steal the victim's personal


information or create fake profiles in their name to impersonate or
defame them.

● Doxing: Sharing someone's private or personal information (e.g.,


home address) online without their consent.
● Posting defamatory content: Cyberstalkers may publish false,
damaging, or humiliating information about their target online, with
the intent to harm their reputation or emotional well-being.

Cyberstalking can have serious consequences for the victim, including


emotional distress, loss of privacy, and even physical harm in extreme
cases. It is considered a criminal offense. and victims are encouraged
to report it to law enforcement. It's essential to take measures to
protect your online

presence and seek help if you believe you are a victim of cyberstalking

Being a victim of cybercrimes can lead to a lot of emotional pain. You


might feel like you can't trust anyone, both online and in real life. You
might even start avoiding people and feeling really alone. These
feelings can make you angry, anxious, and even guilty, as if it's your
fault.

If you ever find yourself in this situation, remember to talk to your


friends and family about what happened, and don't be afraid to seek
help from experts who can help you deal with the feelings and stress
that come with cybercrimes. You're not alone, and there are ways to
get through it.
Reasons for Cyberstalking

Cyberstalking, like traditional stalking, involves a pattern of unwanted


and often threatening behaviours carried out online. Some possible
reasons for cyberstalking (although these reasons can never be an
excuse, but it is important to know the reasons to understand the
possible mentality of the criminal) include obsession, revenge or anger,
trying to show power, jealousy, insecurity, harassment and intimidation.

Cyberstalking can be a form of harassment and intimidation, aimed at


causing emotional distress or fear in the victim. It's essential to
remember that victims should seek help and report such incidents to
law enforcement authorities. Online safety measures, such as setting
privacy settings, not sharing personal information online, and reporting
abusive behaviour, can help individuals protect themselves from
potential cyberstalkers.
Types of Cybercrimes

Cyberbullying

Cyberbullying is bullying that takes place on social media, messaging


platforms, gaming platforms and mobile phones through SMS, Text
and comments. Cyberbullying includes sending, posting, or sharing
negative, harmful, false, hate speech or mean content about someone
else. It can include sharing personal or private information about
someone else causing embarrassment or humiliation
Reasons for Cyberbullying

Some possible reasons for cyberbullying (although these reasons can


never be an excuse, but it is important to know the reasons to
understand the possible mentality of the criminal) include-

● Low Self-esteem- People who don’t have courage to do good to


others or have low self-esteem often feel as though they have to
bully others to give themselves more power.

● For Revenge- There are bullies out there who have been bullied
themselves. They may feel that the only way to stop others from
bullying them is for them to bully others. They want others to feel
the way they felt after being bullied.

● They don’t have any Empathy for the victim- Often, a person will
bully because they believe the victim deserves it in some way.

● Perhaps a victim will be bullied because others perceive them as


weak, or even if they’re academically better than the bully and the
bully is jealous of them

● They think they won’t get caught- Cyberbullies use fake names,
photos and IDs, and think that they won’t be caught. Additionally,
since they’re not bullying another person face to face, they can
say and do things that they would not do in real life.
Types of Cybercrimes

Online Sex Racket

It refers to illegal activities conducted through the internet or online


platforms where vulnerable individuals are forced, coerced or lured
into engaging in sexual activities.

Here are some common tactics that sex rackets may use to lure
innocent victims digitally-

Online dating and romance scams: Sex traffickers may create fake
profiles on dating websites or social media platforms to develop
romantic relationships with potential victims. Once you believe them,
they exploit victims by coercing them into sexual acts.

Promise of travel or a better life: Traffickers may promise victims a


better life, such as overseas travel, education, or a chance to escape
difficult circumstances. These promises are often used to manipulate
individuals into exploitative situations.

False job offers: Traffickers may pose as real employers offering


lucrative job opportunities, especially targeting vulnerable individuals
looking for employment. They may promise high-paying jobs in
different industries/countries to entice victims.

Fake modelling or talent agencies: Traffickers might create fake


modelling or talent agencies and contact aspiring models or performers
online, promising them fame and fortune in exchange for explicit
photos or videos.

Sextortion: This involves threatening victims in return of money; with


the release of explicit photos or videos they have obtained from the
victims.
Types of Cybercrimes

Gaming and Shopping Scams

Gaming and Shopping scams are a significant concern, with scammers


using a variety of deceptive tactics to exploit individuals and trick them
into sending money or sharing sensitive personal information. These
scams can take various forms, and they often prey on people's trust,
ignorance, or vulnerability. Several types of such scams are prevalent-

Lottery Scams: Scammers inform victims that they have won a lottery
or prize and request an upfront fee or personal information to claim the
prize. Often, these lotteries do not exist. Once you pay the money, it’s
lost forever.

Shopping Fraud: Fraudulent online shopping websites offer attractive


deals or discounts to lure customers. After receiving payment, the
scammers may not deliver the promised goods or services.

Gaming scams: This is a growing concern, especially among students


and young gamers. These scams involve fraudulent activities related to
in-game purchases, account theft, or fake gaming platforms.
Types of Cybercrimes

Hacking

Hacking refers to the act of gaining


unauthorized access to computer
systems, networks, or digital devices
with the intent to manipulate, steal data,
disrupt operations, or perform other
malicious activities. There are different
types of hacking, including:

Ethical Hacking (White Hat Hacking): Ethical hackers are authorized


to test the security of computer systems, networks, or software with the
permission of the owner, usually to identify and fix vulnerabilities. They
use their skills to strengthen security.

Malicious Hacking (Black Hat Hacking): Malicious hackers engage


in hacking for illegal or unethical purposes, such as stealing sensitive
information, compromising systems, or causing harm. They are
typically the ones associated with cybercrimes.

Grey Hat Hacking: Grey hat hackers operate in a morally ambiguous


space, where they may find and exploit vulnerabilities without
permission but do so with a stated intent to help the affected party or
disclose the vulnerability after discovery.

Hacktivism: Hacktivists are individuals or groups who use hacking


techniques to promote social or political causes, often defacing
websites or leaking sensitive information to raise awareness or make a
statement.
What is Malware?

Malware, also called "malicious


software," refers to any type of software
or program specifically designed to
disrupt, damage, steal,

or gain unauthorized access to


computer systems, networks, or digital
devices. Malware is created and
deployed with the intent to harm
individuals, organizations, or computer systems. There are various
types of malware, each with its own specific purpose and functionality.

Some common types of malware include:

Viruses: Viruses are self-replicating programs that attach themselves


to legitimate files or programs and spread when those files are
executed. They can corrupt or delete data, steal information, or cause
other forms of damage.

Worms: Worms are similar to viruses but can spread independently,


without the need to attach themselves to other files or programs. They
often exploit vulnerabilities in networks or software to propagate
rapidly.

Trojans (Trojan Horses): Trojans disguise themselves as legitimate


software but contain malicious code. When executed, they can give
attackers unauthorized access to a computer or network, steal data, or
perform other harmful actions.
Ransomware: Ransomware encrypts a victim's files or entire system,
making them inaccessible. Attackers demand a ransom in exchange
for the decryption key needed to regain access to the files or system.

What is the difference between Hacking and Malware

“Hacking” is the broader activity of attempting to compromise the


security of computer systems or networks, while “Malware” is a specific
type of software or program used within the context of hacking to carry
out malicious actions. In many hacking incidents, malware is employed
as a tool to facilitate unauthorized access or to execute specific
malicious tasks, but not all hacking involves the use of malware
Types of Cybercrimes

Copyright Infringement

Copyright Infringement refers to the unauthorized use, reproduction,


distribution, or public display of someone's creative work. This
encompasses actions like incorporating a portion of their work into your
own creation, duplicating their work, or disseminating it to others
without obtaining the necessary permissions.

Copyright laws are in place to safeguard various forms of artistic


expression, including literature, music, films, visual art, photographs,
and software.

To stay compliant with these laws, it's essential to seek permission


from the copyright holder before using their work for your purposes.
Engaging in copyright infringement can lead to severe consequences,
including fines and legal actions. Therefore, it's crucial to understand
what actions constitute copyright infringement and take proactive
measures to prevent it.

Copyright Infringement Cases in India

Bata India Ltd vs. Pyare Lal & Anr. (1985)- In this case, Bata India
Ltd filed a lawsuit against Pyare Lal & Anr. for copying its design of
shoes. The court ruled in favour of Bata India and held that the design
of the shoes was unique and original, and therefore entitled to
copyright protection.

Delhi Public School Society vs. D.A.V. Public School (2019)- In this
case, the Delhi Public School Society sued D.A.V. Public School for
infringing on its copyright by using its logo and name without
permission. The court ruled in favour of the Delhi Public School Society
and held that the use of the logo and name without permission
amounted to copyright infringement.

YRF vs Sri Sai Ganesh Productions- In this case, Yash Raj Films
(YRF) sued Sri Sai Ganesh Productions for infringing on the copyright
of the film 'Dhoom 3' by making and distributing a pirated copy of the
film.

The court ruled in favour of YRF and ordered Sri Sai Ganesh
Productions to pay damages.

Super Cassettes Industries Limited vs YouTube and Google- In this


case, Super Cassettes Industries Limited (SCIL) sued YouTube and
Google for infringing on the copyright of music videos by uploading and
hosting them on YouTube without permission. The court ruled in favour
of SCIL and ordered YouTube and Google to remove the infringing
music videos and pay damages.
Prevention and Legalities of Cybercrime

Cybersecurity is of paramount importance for us as it plays a critical


role in safeguarding our personal information, academic records, and
digital lives. In an increasingly interconnected world, where we rely on
the internet for education, communication, and entertainment, the need
to protect ourselves from cyber threats cannot be overstated.
Without proper cybersecurity practices, we risk falling victim to identity
theft, data breaches, and cyberbullying, which can have far-reaching
consequences. By understanding the significance of cybersecurity,
students can not only protect their own digital assets but also
contribute to a safer online environment for everyone, ensuring that
their academic achievements and personal information remain secure
in the digital age.

Cybercrimes can have severe consequences for individuals and


organizations, including:

● Financial Loss: Victims may suffer financial losses due to


unauthorized transactions, loans taken in their name, or stolen
savings.
● Emotional and Psychological Distress: Being a victim of an
online scam can result in stress, anxiety, and emotional trauma.
● Credit Damage: Identity theft can ruin a victim's credit history,
making it difficult to obtain loans or credit in the future.
● Legal Consequences: In some cases, victims may inadvertently
become involved in illegal activities, for crimes they didn't commit.
Prevention and Safeguards

Cyber awareness and hygiene for teens and young adults

Never click suspicious links or attachments: Never click on links or


files received in e-mail, text message or social media from unknown
person. This may be an attempt to infect computer with a malware.

Install anti-virus

Review and adjust your social media privacy settings. Limit the
information visible to the public and only accept friend/follower
requests from people you know.

If you have not selected the right settings on your social media
accounts, then photos and videos posted can be viewed, downloaded
and used by others without your knowledge.

Strong Passwords: Use strong and unique passwords for your online
accounts. Combine upper and lower-case letters, numbers, and
special characters. Avoid using easily guessable information like
birthdays or common words.

Multi-Factor Authentication (MFA): Enable MFA wherever possible.


This adds an extra layer of security by requiring you to provide two or
more authentication factors to access your accounts.
Be selective about accepting friend / chat request of strangers on
social media.

Learn how to block/remove someone who is making you


uncomfortable.

● Remember to logout from social media websites after use.


● If you notice your fake account has been created, you can
immediately inform social media service provider so that the
account can be blocked.
● Refrain from sharing your personal information like Phone
number, e- mail address, photographs with unknown persons.
● Beware of fake social media accounts- Not all the accounts are
real and not all information provided on accounts are true.
● Avoid using friend’s phone, public computer, cyber cafe or free
Wi-Fi for sensitive browsing as data can be stolen or copied.
● Delete all private information, WhatsApp and Gallery before
sending it for repairing, servicing or selling.
● Prevent others from accessing your smartphones / laptop by
providing
● password, PIN, Pattern or biometric information.
● Always install applications to your mobile phones, computers, etc.
from a trusted source only e.g. Play store, App store or from
official company websites.
● Use Reliable Websites: Only use trusted and secure websites for
online shopping, banking, and sharing personal information. Look
for "https://" in the URL and a padlock icon in the address bar.
● Source Credit- National Cyber Crime Reporting Portal-
https://bit.ly/3QxsgdL

Legal Agencies related to Cybercrimes in India

1. National Cyber Crime Reporting Portal- https://bit.ly/47bfYgV

This portal is an initiative of Government of India to facilitate


victims/complainants to report cybercrime complaints online. This
portal caters to complaints pertaining to cybercrimes only with special
focus on cybercrimes against women and children. Complaints
reported on this portal are dealt by law enforcement agencies/ police
based on the information available in the complaints. It is imperative to
provide correct and accurate details while filing complaints for prompt
action.

Please contact local police in case of an emergency or for reporting


crimes other than cybercrimes. National police helpline number is 112.
National women helpline number is 181 and Cyber Crime Helpline is
1930.

2. CYBER B.A.A.P.- https://bit.ly/3QbGQGI

CYBER B.A.A.P. an acronym for Cyberbullying Awareness, Action and


Prevention, is committed to combat the menace of Cyberbullying by
creating awareness and prevention
Legal Sections related to Cybercrimes in India

Section 354D- Anyone who tries to keep tabs on a woman’s internet


life is committing stalking, as the Section makes clear.

Section 292- sending of sexually explicit messages or images to a


victim through a social networking site, email, or text message with the
intent that the target would read, see, or hear it.

Section 507- This section of IPC provides that if anyone receives


criminal intimidation through anonymous communication then the
person giving threats shall be punished with imprisonment which may
extend upto two years.

Section 509- This clause may be used in the event of a man’s violation
of a woman’s right to privacy, such as by sending her unwelcome
electronic communications or making derogatory remarks about her
online.

Section 66 E of IT Act- This section provides punishment for violation


of privacy. It states that any person who intentionally violates the
privacy by transmitting, capturing or publishing private pictures of
anyone shall be punished with imprisonment which may extend upto
three years or with fine which may extend upto Rs. 3 Lac.

Section 67 of the IT Act- If stalkers use social media or other electronic


means to broadcast obscene information about the victim with the
intent to harass or intimidate that person.

Section 67A of the IT Act- It also makes it illegal for a stalker to


distribute “sexually explicit” information electronically (including through
email, text message, or social networking site).
Section 67B of the IT Act- This section is dedicated to the topic of
stalkers who prey on people under the age of 18 by spreading
information showing minors engaged in sexual behaviour for the
express purpose of frightening them.

We hope that this course has been able to ignite your passion about
Cybercrimes and the importance of Cybersecurity. This course is
designed to provide you with a comprehensive understanding of the
principles, strategies, and tools needed to protect digital systems and
sensitive information from cyber threats and attacks.

In this course, you learnt how to identify vulnerabilities, assess risks,


and implement countermeasures to secure computer systems and
networks. Assignments with real-world scenarios were also included to
give you practical experience in combating cyber threats.

You are now equipped with the knowledge and skills necessary to
prevent and if necessary, address cybercrimes faced by you or others
around you in an increasingly interconnected world.
CONCLUSION
Cybersecurity is a dynamic and critical field dedicated to protecting systems, networks,
and data from malicious attacks and unauthorized access. As technology evolves, so
do the threats, making cybersecurity a continually developing discipline. Here are some
key takeaways for a conclusion on cybersecurity:

1. Importance of Vigilance**: Cybersecurity is not a one-time effort but a continuous


process. Vigilance is crucial as new vulnerabilities and attack methods emerge
regularly. Organizations must stay updated with the latest threats and adapt their
defenses accordingly.

2. Layered Defense Strategy**: Effective cybersecurity relies on a multi-layered


approach. This includes using firewalls, intrusion detection systems, encryption, and
regular security updates. A single layer of protection is not sufficient to defend against
sophisticated attacks.

3. Human Factor**: People are often the weakest link in cybersecurity. Training and
awareness programs are essential to help users recognize and avoid phishing scams,
secure their credentials, and understand their role in maintaining security.

4. Compliance and Best Practices**: Adhering to industry standards and regulations,


such as GDPR, HIPAA, or NIST guidelines, helps ensure a baseline level of security
and can protect organizations from legal and financial repercussions.

5. Incident Response and Recovery**: Preparedness for potential breaches is vital.


Organizations should have incident response plans in place to quickly address and
mitigate the impact of security incidents. Regularly testing and updating these plans is
crucial.

In conclusion, cybersecurity is an ever-evolving field that demands ongoing


attention, adaptation, and collaboration. By adopting a proactive and layered
security approach, focusing on education, and staying informed about new
threats and technologies, individuals and organizations can better protect
themselves in an increasingly digital world.
REFERENCE

WWW.GOOGLE.COM
HTTP://www.w3schools.com
https://chatgpt.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy