0% found this document useful (0 votes)
52 views22 pages

POORNA CSP PROJECT - Docx-2

The document is a project report on 'Cyber Crime Awareness' submitted by V. Poorna Chandra Reddy as part of the Bachelor of Technology program in Computer Science and Engineering. It covers various aspects of cybercrime, including definitions, types, and the impact of technology on criminal activities, emphasizing the need for awareness and legal frameworks. The report also acknowledges the guidance and support received during the project and outlines its structure with topics related to online safety, data privacy, and cyber laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views22 pages

POORNA CSP PROJECT - Docx-2

The document is a project report on 'Cyber Crime Awareness' submitted by V. Poorna Chandra Reddy as part of the Bachelor of Technology program in Computer Science and Engineering. It covers various aspects of cybercrime, including definitions, types, and the impact of technology on criminal activities, emphasizing the need for awareness and legal frameworks. The report also acknowledges the guidance and support received during the project and outlines its structure with topics related to online safety, data privacy, and cyber laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Societal Internship project

ON

“CYBER CRIME AWARENESS”


A report Submitted in partial fulfillment of the academic Requirement for the II B. Tech II
Sem

BACHELOR OF TECHNOLOGY
IN

COMPUTER SCIENCE AND ENGINEERINGYour paragraph text

Submitted By

V.POORNA CHANDRA REDDY

2341A3204

Under the Guidance of


Mrs.A.Mamatha

Assistant Professor, Department of CSE


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING (AIML)
SREE DATTHA INSTITUTE OF ENGINEERING AND SCIENCE

(AUTONOMOUS)
(Accredited by NAAC, Affiliated to JNTUH, Approved by AICTE, New Delhi),
Recognized Under Section 2(f) of the UGC Act.1956, Sheriguda (V), Ibrahimpatnam (M),
Rang Reddy – 501510.

www.Sreedattha.ac.in
2023-27

SREE DATTHA INSTITUTE OF ENGINEERING AND SCIENCE


(AUTONOMOUS)

(Accredited by NAAC, Affiliated to JNTUH, Approved by AICTE, New Delhi), Recognized Under Section 2(f) of the
UGC Act.1956, Sheriguda (V), Ibrahimpatnam (M), Rang Reddy –501510.

SREE DATTHA INSTITUTE OF ENGINEERING AND SCIENCE

(AUTONOMOUS)

(Accredited by NAAC, Affiliated to JNTUH, Approved by AICTE, New Delhi), Recognized Under
Section 2(f) of the UGC Act.1956, Sheriguda (V), Ibrahimpatnam (M), Rang Reddy –501510.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING (AIML)


CERTIFICATE

This is to certify that the project entitled “CYBER CRIME AWARENESS” is being
submitted by SOMARAJU SRIKAR 23E41A6631, in partial fulfilment of the requirements for the B.Tech
II-II Semester in ARTIFICAL INTELLIGENCE AND MACHINE LEARNING to the Jawaharlal Nehru
Technological University Hyderabad, is a record of bonafide work carried out by him/her under my
guidance and supervision during the year 2023-24.

The results embodied in this are have not been submitted to any other University or Institute for the
award of any degree or diploma.

PROJECT GUIDE HOD


(Mrs.A.Mamatha) ()

Submitted for viva voce Examination held on_________________________


SREE DATTHA INSTITUTE OF ENGINEERING AND SCIENCE
(AUTONOMOUS)
(Accredited by NAAC, Affiliated to JNTUH, Approved by AICTE, New Delhi), Recognized Under
Section 2(f) of the UGC Act.1956, Sheriguda (V), Ibrahimpatnam (M), Rang Reddy –501510.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING (AIML)

DECLARATION

I am here by declaring that the project report titled “CYBER CRIME AWARENESS” under the
guidance of B. Manisha, SREE DATTHA INSTITUTE OF ENGINEERING AND
SCIENCE, IBRAHIMPATNAM is submitted in partial fulfilment of the requirement for the award
of the degree of B. Tech. In Computer Science and Engineering (AIML) is a record of bonafide work
carried out by me and the results embodied in this project have not been reproduced or copied from any
source.

The results embodied in this project report have not been submitted to any other University or Institute
for the award of any Degree or Diploma.

NAME OF THE STUDENT


Name: V.POORNA CHANDRA REDDY

Ht.No: 2E41A3204

ACKNOWLEDGEMENT

Apart from our efforts, the success of our project depends largely on the encouragement and guidelines of
Sree Dattha Team.We take this opportunity to express our gratitude to the people who have been
instrumental in the successful completion of this project.

We would like to express our sincere gratitude to Sri. G. Panduranga Reddy, Chairman and Dr. GNV
Vibhav Reddy, Vice-Chairman for providing excellent infrastructure and a nice atmosphere throughout
this project. We are obliged to Dr. S.Venkateshwarlu, Principal for being cooperative throughout this
project.

We are also thankful to Dr. S.Venkata Achuta Rao, Professor CSE & Dean Academics, Department of
Computer Science and Engineering for providing encouragement and support for completing this project
successfully.

We take this opportunity to express my profound gratitude and deep regard for my HOD Dr.Sk.
Mahaboob Basha & internal guide Miss.B.Manisha, Assistant Professor for his/her exemplary guidance,
monitoring and constant encouragement throughout the project work. The blessing, help and guidance
given by him/her shall carry us a long way in the journey of life on which we are about to embark.

The guidance and support were received from all the members of Sree Dattha Institute of Engineering
and Science who contributed to the completion of the project. We are grateful for their constant support
and help.

Finally, we would like to take this opportunity to thank our family for their constant encouragement,
without which this assignment would not be completed. We sincerely acknowledge and thank all those
who gave support directly and indirectly in the completion of this project.
CYBER CRIME
AWARENESS

Project Report
S NO TOPIC PAGE NO
1. Introduction 7-10

1. Social Media Safety 11-14

1. Protecting Children Online 14-15

1. Password Safety and Authentication 15-16

1. Data Privacy and Protection 17

b d lA
1. Cyber Laws and Legal Awareness 17

1. Digital Responsibility and Ethics 18

1. Introduction
Definition of Cyber Crime:

New technologies create new criminal opportunities but few new types of crime. What distinguishes
cybercrime from traditional criminal activity? Obviously, one difference is the use of the digital computer, but
technology alone is insufficient for any distinction that might exist between different realms of criminal activity.
Criminals do not need a computer to commit fraud, traffic in child pornography and intellectual property, steal
an identity, or violate someone’s privacy. All those activities existed before the “cyber” prefix
became ubiquitous. Cybercrime, especially involving the Internet, represents an extension of existing criminal
behaviour alongside some novel illegal activities.

Most cybercrime is an attack on information about individuals, corporations, or governments. Although the
attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which
is the set of informational attributes that define people and institutions on the Internet. In other words, in the
digital age our virtual identities are essential elements of everyday life: we are a bundle of numbers and
identifiers in multiple computer databases owned by governments and corporations. Cybercrime highlights the
centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual
identity.

An important aspect of cybercrime is its nonlocal character: actions can occur in jurisdictions separated by vast
distances. This poses severe problems for law enforcement since previously local or even national crimes now
require international cooperation. For example, if a person accesses child pornography located on a computer
in a country that does not ban child pornography, is that individual committing a crime in a nation where such
materials are illegal? Where exactly does cybercrime take place? Cyberspace is simply a richer version of the
space where a telephone conversation takes place, somewhere between the two people having the conversation.
As a planet-spanning network, the Internet offers criminals multiple hiding places in the real world as well as
in the network itself. However, just as individuals walking on the ground leave marks that a skilled tracker can
follow, cybercriminals leave clues as to their identity and location, despite their best efforts to cover their
tracks. In order to follow such clues across national boundaries, though, international cybercrime treaties must
be ratified.

In 1996 the Council of Europe, together with government representatives from the United States, Canada, and
Japan, drafted a preliminary international treaty covering computer crime. Around the world, civil libertarian
groups immediately protested provisions in the treaty requiring Internet service providers (ISPs) to store
information on their customers’ transactions and to turn this information over on demand. Work on the treaty
proceeded nevertheless, and on November 23, 2001, the Council of Europe Convention on Cybercrime was
signed by 30 states. The convention came into effect in 2004. Additional protocols, covering terrorist activities
and racist and xenophobic cybercrimes, were proposed in 2002 and came into effect in 2006. In addition,
various national laws, such as the USA PATRIOT Act of 2001, have expanded law enforcement’s power to
monitor and protect computer networks.

TYPES OF CYBER CRIME:

Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of
personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and
the use of illegally obtained digital information to harass, harm, or blackmail a firm or individual. These new
cyber capabilities have caused intense debate. Pegasus spyware, for instance, according to its creator, the
Israeli cyber-intelligence firm NSO Group, is sold exclusively to government security and law enforcement
agencies and only for the purpose of aiding rescue operations and battling criminals, such as money launderers,
sex- and drug-traffickers, and terrorists. Yet, the smartphone-attached spyware, which can steal private data
without leaving an obvious trace of its activities, has been widely used covertly by governments to track
politicians, government leaders, human rights activists, dissidents, and journalists. It was even used to track
Saudi journalist and U.S. resident Jamal Khashoggi months before his murder and dismemberment by Saudi
agents in October 2018. Also at this end of the spectrum is the growing crime of identity theft.

Internet fraud

Schemes to defraud consumers abound on the Internet. Among the most famous is the Nigerian, or “419,”
scam; the number is a reference to the section of Nigerian law that the scam violates. Although this con has
been used with both fax and traditional mail, it has been given new life by the Internet. In the scheme, an
individual receives an e-mail asserting that the sender requires help in transferring a large sum of money out of
Nigeria or another distant country. Usually, this money is in the form of an asset that is going to be sold, such
as oil, or a large amount of cash that requires “laundering” to conceal its source; the variations are endless, and
new specifics are constantly being developed. The message asks the recipient to cover some cost of moving the
funds out of the country in return for receiving a much larger sum of money in the near future. Should the
recipient respond with a check or money order, he is told that complications have developed; more money is
required. Over time, victims can lose thousands of dollars that are utterly unrecoverable.

In 2002 the newly formed U.S. Internet Crime Complaint Center (IC3) reported that more than $54 million
dollars had been lost through a variety of fraud schemes; this represented a threefold increase over estimated
losses of $17 million in 2001. The annual losses grew in subsequent years, reaching $125 million in 2003,
about $200 million in 2006, close to $250 million in 2008, and over $1 billion in 2015. In the United States the
largest source of fraud is what IC3 calls “non-payment/non-delivery,” in which goods and services either are
delivered but not paid for or are paid for but not delivered. Unlike identity theft, where the theft occurs without
the victim’s knowledge, these more traditional forms of fraud occur in plain sight. The victim willingly provides
private information that enables the crime; hence, these are transactional crimes. Few people would believe
someone who walked up to them on the street and promised them easy riches; however, receiving an
unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their
wallets. Despite a vast amount of consumer education, Internet fraud remains a growth industry for criminals
and prosecutors. Europe and the United States are far from the only sites of cybercrime. South Korea is among
the most wired countries in the world, and its cybercrime fraud statistics are growing at an alarming
rate. Japan has also experienced a rapid growth in similar crimes.

ATM fraud

Computers also make more mundane types of fraud possible. Take the automated teller machine (ATM)
through which many people now get cash. In order to access an account, a user supplies a card and personal
identification number (PIN). Criminals have developed means to intercept both the data on the card’s magnetic
strip as well as the user’s PIN. In turn, the information is used to create fake cards that are then used to
withdraw funds from the unsuspecting individual’s account. For example, in 2002 the New York
Times reported that more than 21,000 American bank accounts had been skimmed by a single group engaged
in acquiring ATM information illegally. A particularly effective form of fraud has involved the use of ATMs in
shopping centres and convenience stores. These machines are free-standing and not physically part of a bank.
Criminals can easily set up a machine that looks like a legitimate machine; instead of dispensing money,
however, the machine gathers information on users and only tells them that the machine is out of order after
they have typed in their PINs. Given that ATMs are the preferred method for dispensing currency all over the
world, ATM fraud has become an international problem.
Wire fraud

The international nature of cybercrime is particularly evident with wire fraud. One of the largest and best-
organized wire fraud schemes was orchestrated by Vladimir Levin, a Russian programmer with a computer
software firm in St. Petersburg. In 1994, with the aid of dozens of confederates, Levin began transferring some
$10 million from subsidiaries of Citibank, N.A., in Argentina and Indonesia to bank accounts in San
Francisco, Tel Aviv, Amsterdam, Germany, and Finland. According to Citibank, all but $400,000 was eventually
recovered as Levin’s accomplices attempted to withdraw the funds. Levin himself was arrested in 1995 while in
transit through London’s Heathrow Airport (at the time, Russia had no extradition treaty for cybercrime). In
1998 Levin was finally extradited to the United States, where he was sentenced to three years in jail and
ordered to reimburse Citibank $240,015. Exactly how Levin obtained the necessary account names and
passwords has never been disclosed, but no Citibank employee has ever been charged in connection with the
case. Because a sense of security and privacy are paramount to financial institutions, the exact extent of wire
fraud is difficult to ascertain. In the early 21st century, wire fraud remained a worldwide problem.

Spam, steganography, and e-mail hacking


E-mail has spawned one of the most significant forms of cybercrime—spam, or unsolicited advertisements for
products and services, which experts estimate to comprise roughly 50 percent of the e-mail circulating on
the Internet. Spam is a crime against all users of the Internet since it wastes both the storage and network
capacities of ISPs, as well as often simply being offensive. Yet, despite various attempts to legislate it out of
existence, it remains unclear how spam can be eliminated without violating the freedom of speech in a liberal
democratic polity. Unlike junk mail, which has a postage cost associated with it, spam is nearly free for
perpetrators—it typically costs the same to send 10 messages as it does to send 10 million.

One of the most significant problems in shutting down spammers involves their use of other individuals’
personal computers. Typically, numerous machines connected to the Internet are first infected with a virus
or Trojan horse that gives the spammer secret control. Such machines are known as zombie computers, and
networks of them, often involving thousands of infected computers, can be activated to flood the Internet with
spam or to institute DoS attacks. While the former may be almost benign, including solicitations to
purchase legitimate goods, DoS attacks have been deployed in efforts to blackmail Web sites by threatening to
shut them down. Cyberexperts estimate that the United States accounts for about one-fourth of the 4–8 million
zombie computers in the world and is the origin of nearly one-third of all spam.

E-mail also serves as an instrument for both traditional criminals and terrorists. While libertarians laud the use
of cryptography to ensure privacy in communications, criminals and terrorists may also use cryptographic
means to conceal their plans. Law-enforcement officials report that some terrorist groups embed instructions
and information in images via a process known as steganography, a sophisticated method of hiding information
in plain sight. Even recognizing that something is concealed in this fashion often requires considerable
amounts of computing power; actually decoding the information is nearly impossible if one does not have the
key to separate the hidden data.

In a type of scam called business e-mail compromise (BEC), an e-mail sent to a business appears to be from an
executive at another company with which the business is working. In the e-mail, the “executive” asks for money
to be transferred into a certain account. The FBI has estimated that BEC scams have cost American businesses
about $750 million.

Sometimes e-mail that an organization would wish to keep secret is obtained and released. In 2014 hackers
calling themselves “Guardians of Peace” released e-mail from executives at the motion picture company Sony
Pictures Entertainment, as well as other confidential company information. The hackers demanded that Sony
Pictures not release The Interview, a comedy about a CIA plot to assassinate North Korean leader Kim Jong-
Un, and threatened to attack theatres that showed the movie. After American movie theatre chains canceled
screenings, Sony released the movie online and in limited theatrical release. E-mail hacking has even affected
politics. In 2016, e-mail at the Democratic National Committee (DNC) was obtained by hackers believed to be
in Russia. Just before the Democratic National Convention, the media organization WikiLeaks released the e-
mail, which showed a marked preference of DNC officials for the presidential campaign of Hillary Clinton over
that of her challenger Bernie Sanders. DNC chairperson Debbie Wasserman Schultz resigned, and some
American commentators speculated that the release of the e-mail showed the preference of the Russian
government for Republican nominee Donald Trump.

2.Social Media Safety:


To enhance social media safety and awareness of cybercrime, users should prioritize strong privacy settings,
avoid sharing sensitive personal information, and be cautious about suspicious links and
attachments. Additionally, staying informed about cybercrime trends and using antivirus protection can help
mitigate risks.

1. Cyber awareness and hygiene for parents

Talk to your children about the potential online threats such as grooming, bullying, and stalking, keep track of
their online activities. Set clear guidelines for internet and online games usage.

Notice indicators of change in behaviour: If your child begins to spend more time online and starts being
defensive or secretive about their online activities, it may be an indicator of cyber grooming. Talk to your child
and engage him/ her in other activities.

Protect your child from Cyber Grooming:Grooming is a practice where someone builds an emotional bond
with a child through social media or chat window with an objective of gaining their trust for sexual exploitation.
Children may remove privacy settings on social media to make more friends. Parents should discuss
responsible use of social media. Also, they should educate and help them in selecting strong privacy settings.

Never click suspicious links or attachments: Never click on links or files received in e-mail, text message or
social media from unknown person. This may be an attempt to infect computer with a malware.

Cover your webcams:A web camera (default in laptops) if hacked/compromised can be leveraged as a
medium to observe/watch and record day to day activities. It is a recommended to cover webcam when not in
use.

Install anti-virus software’s with parental control functionality or parental control software’s on the devices
used by children and review there privacy settings of social media sites used by them.

Keep software updated:Keep your software and Operating system up-to-date. Hackers target software
vulnerabilities to access private information and putting you at risk, so make sure to update all your software
with the latest security patches. Never install software, games, music and apps from trusted sources.

Set Secure browser settings:Always choose updated version of the browser and install safe browsing tools
for protection yourself from hackers and malware.

2. Cyber awareness and hygiene for teens and young adults

Secure your online presence just like you secure yourself:If you have not selected the right settings on
your social media accounts, then photos and videos posted can be viewed, downloaded and used by others
without your knowledge.

Select the right privacy settings and content sharing filters on social media so that you are sharing your
information, photos and videos only with your trusted ones.

Be selective about accepting friend request of strangers on social media

Learn how to block someone who is making you uncomfortable

Learn how to remove someone from your friends list

Remember to logout from social media websites after use

Secure your phone with password

If you notice your fake account has been created, you can immediately inform social media service provider so
that the account can be blocked

Be mindful of your appearance on video chat & video calls

Your video chats on social media sites can be recorded by the person on the other side

There have been instances where video chats which were supposed to be private in nature have been
recorded and shared on social media groups and websites

Be careful while accepting chat requests from strangers

Do not use Smartphone for taking sensitive personal photographs and videos
Do not use Smartphone for taking sensitive personal photographs and videos. Most of the smartphones are
connected to internet and cloud storage. If a picture or video has been clicked/ recorded by using smartphone
connected with the cloud, it may get saved automatically into the cloud. Even if users delete their photos or
videos from their phone, the same photo or video can be recovered from the cloud account or any other device/
PC connected to the cloud using same account.

If someone has taken such photograph using Smartphone, then take it seriously and make sure to get it
deleted from their smartphone, the cloud and any other device connected using the same account.

Protect yourself from Cyber stalking:Cyber stalkers show advances on a person repeatedly despite clear
indication of disinterest by such person. They use internet, email, social media or any other form of electronic
communication for stalking

Disable location services for social media sites, mobile devices etc.

Refrain from sharing your personal information like Phone number, e-mail address, photographs with unknown
persons

Consult your relatives and friends, if you think you are a victim of Cyber stalking

Beware of fake social media accounts- Not all the accounts are real and not all information provided on
accounts are true

Be cautious while accepting friend requests from strangers.

Be cautious with sensitive Browsing

One should browse shopping or banking websites or apps only on a device that belongs to him/ her or on a
trusted network. Avoid using friend’s phone, public computer, cyber cafe or free Wi-Fi for sensitive browsing as
data can be stolen or copied.

The deleted data on your communication devices can be recovered

Be careful while you give your mobile devices, PC’s for servicing/repairing/selling:Personal commuters
and mobile devices consists private information’s which needs to be erased before sending it for repairing,
servicing or selling.

Protect your communication devices:Prevent others from accessing your devices by providing password,
PIN, Pattern or biometric information. Always install applications to your mobile phones, computers, etc. from a
trusted source only e.g. Play store, App store or from official company websites
Report if you find content related to of Child Pornography (CP)/Child Sexual Abuse Material (CSAM) or
sexually explicit material

Any content related to of Child Pornography (CP)/ Child Sexual Abuse Material (CSAM) or sexually explicit
material such as Rape/ Gang Rape (CP/RGR) content should be report to the concerned social media website

If anybody of your acquaintance shares Child Pornography (CP)/ Child Sexual Abuse Material (CSAM) or
sexually explicit material with you, it is your duty as a responsible citizen to inform the concerned person that
publication, collection and distribution of Child Pornography (CP)/ Child Sexual Abuse Material (CSAM) or
sexually explicit material is illegal and he should refrain from doing such activities.

You can also report it on National Cyber Crime Reporting Portal (www.cybercrime.gov.in).

Online Scams and Phishing

🎯 Topic: Online Scams and Phishing


🔍 1. What is Phishing?
A method cybercriminals use to trick people into giving away sensitive information.
Often disguised as emails, messages, or websites from trusted sources.

📧 2. Common Phishing Techniques


Email Phishing: Fake emails that look official (banks, companies).
Spear Phishing: Personalized phishing targeting specific individuals.
Smishing: Phishing via SMS/text messages.
Vishing: Voice calls pretending to be tech support, banks, etc.
Clone Phishing: Duplicating legitimate emails with malicious links or attachments.

⚠️ 3. Signs of a Phishing Scam

Urgent language like “Your account will be locked!”


Unusual sender addresses
Spelling errors or weird grammar
Suspicious links (hover before clicking)
Requests for personal or financial info

💳 4. Online Scams to Watch For


Fake Online Stores: Look real, steal card details or never deliver goods.
Job Offer Scams: Ask for fees or sensitive info.
Lottery or Prize Scams: “You won!” but need to pay a fee.
Romance Scams: Emotional manipulation for money.
Tech Support Scams: Fake popups or calls claiming your device is infected.

🛡️ 5. How to Protect Yourself


Don’t click links from unknown sources
Verify sender details before responding
Never share passwords or OTPs
Use multi-factor authentication (MFA)
Keep software and browsers updated
Use spam filters and antivirus software
🚨 6. What to Do If You Get Scammed
Change your passwords immediately
Report the incident (to bank, IT, or authorities)

📧 🛡️ cybercrime.gov.in (India)Or local cybercrime portals


Monitor your accounts for unusual activity
Report phishing to: phishing-report@us-cert.gov (US)

3.Protecting Children Online

To protect children online from cybercrime, focus on strong passwords, updated software,
open communication, and parental controls. Encourage children to be aware of potential
dangers, like cyberbullying and cyberstalking, and teach them to report any suspicious
activities. Regularly review privacy settings on devices and social media platforms. Also,
install antivirus software with parental controls or use dedicated parental control software.

Here's a more detailed look at how to protect children online:

1. Communication and Awareness:

Open Dialogue:

Talk to children about online risks, including cyberbullying, grooming, and stalking.

Encourage Reporting:

Teach children to report any suspicious activity, uncomfortable situations, or content that makes them feel
unsafe.

Be a Role Model:

Demonstrate safe online practices, like strong passwords and privacy settings.

Monitor Activities:

Keep track of their online activities, including social media, and have access to their passwords if necessary.

2. Security and Privacy:

Strong Passwords:

Help children create strong, unique passwords for all their online accounts.

Update Software:

Ensure all devices and software are up-to-date to patch security vulnerabilities.

Privacy Settings:

Regularly review and adjust privacy settings on social media and other online platforms.

Secure Browsing:

Use secure browsers and extensions to block trackers and malicious websites.
Limit Sharing:

Teach children to be cautious about sharing personal information online, such as their full name, address, or
school.

3. Technology and Tools:

Parental Controls:

Utilize parental control software or features on devices to limit access to age-inappropriate content and
monitor online activity.

Antivirus Software:

Install antivirus software with parental control functionality or use dedicated parental control software.

Webcam Protection:

Cover webcams when not in use to prevent unauthorized access and surveillance.

4. Reporting and Resources:

National Cyber Crime Reporting Portal: Use the National Cyber Crime Reporting Portal for reporting
cybercrimes, including those against children.
CHILDLINE 1098: Refer children to CHILDLINE India for support and reporting cyberbullying.
Police Helpline 1930: In Telangana, use the 1930 helpline to report cybercrimes and connect with the
Telangana Cyber Crimes Co-ordination Centre.

4. Password Safety and Authentication

To enhance password safety and authentication for cybercrime awareness, individuals


should use strong, unique, and long passwords that incorporate a mix of uppercase,
lowercase, numbers, and symbols. It's crucial to enable two-factor authentication (2FA)
and consider using a password manager to store and generate passwords, especially for
online accounts. Regularly changing passwords, especially for sensitive accounts, and
being cautious when entering personal information online are also important steps.

Elaboration:

Strong Passwords:

A strong password should be at least 16 characters long and include a mix of uppercase and lowercase
letters, numbers, and symbols. Avoid using easily guessable words, names, or dates.

Unique Passwords:

Use a different password for each online account. If a password is compromised on one site, it could
potentially compromise multiple accounts if the same password is used elsewhere.
Password Managers:

Password managers can generate, store, and automatically fill in passwords, eliminating the need for users
to remember and type complex passwords. They can also help identify weak or reused passwords.

Two-Factor Authentication (2FA):

2FA adds an extra layer of security by requiring a second form of verification, such as a code sent to your
phone, in addition to your password. This makes it much harder for unauthorized users to access your
account even if they have your password.

Password Security:
Avoid sharing passwords: Never share your passwords with anyone, even with family.
Change passwords regularly: Regularly change passwords, especially for sensitive accounts like
financial accounts or email accounts.
Be cautious online: Be careful when clicking on links or entering personal information online, as
these can be used in phishing scams to steal your credentials.
Log out: Always log out of accounts when you are finished using them

5. Data Privacy and Protection


Data privacy and protection are crucial for cybercrime awareness. Data privacy focuses on
how personal data is collected, shared, and used, while data protection ensures data
integrity and confidentiality. Understanding these concepts and implementing best
practices can help individuals and organizations mitigate cybercrime risks.

6. Cyber Laws and Legal Awareness

Cybercrime awareness and understanding of cyber laws are crucial for navigating the
digital world safely. Cybercrime refers to any criminal activity carried out using computers
and networks, while cyber laws provide the legal framework for addressing these
crimes. The Indian Information Technology Act, 2000 (IT Act) serves as the primary
legislation for cybercrime in India, addressing various aspects like identity theft,
unauthorized access, and data protection.

Key Takeaways:

Cybercrime is a growing threat, and awareness of cybercrime and cyber laws is essential for
staying safe online.
The IT Act, 2000, provides the legal framework for addressing cybercrime in India.
Individuals should be aware of common cybercrimes and take steps to protect their personal
information.
Understanding cyber laws empowers individuals to understand their rights and responsibilities in
the digital world.
7. Digital Responsibility and Ethics
Cyber ethics emphasizes the importance of ensuring the security and integrity of digital systems or
programs. They implement diverse security systems. The robust systems or programs ensure strong
authentication measures and safeguarding against potential threats.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy