Cyber Security
Cyber Security
IT CELL,
FTR HQR SSB, SILIGURI
C
ORGANIZE Y
BY B
IT CELL, FTR HQR SSB SILIGURI E
R
Workshop on :- Cyber Security Awareness Program
S
E
C
U
R
I
T
Y
Contents of workshop :-
IMPORTANCE OF CYBER SECURITY C
Y
TYPES OF CYBER CRIME B
E
IDENTITY THEFT
R
PSYCHOLOGICAL TRICKS
S
SOCIAL MEDIA FRAUDS E
C
DIGITAL BANKING FRAUDS
U
MOBILE APP FRAUDS R
I
VIRUS ATTACKS ON COMPUTER SYSTEMS T
GENERAL TIPS TO MAINTAIN THE CYBER HYGIENE Y
Identity theft can have many adverse effects. The fraudster can use stolen personal
information and identity proofs to :-
• Gain access to your bank accounts
• Apply for loans and credit cards or open insurance accounts
• File a tax refund in your name and get your refund
• Obtain a driver’s license, passport or immigration papers
• Create new utility accounts
• Get medical treatment on your health insurance
• Assume your identity on social media
• Give your name to the police during an arrest etc.
Tips to Protect yourself from IDENTITY THEFT
Do not close the browser window without logging out of the account.
Use 2-step verification such as one-time password (OTP) while using someone
else’s computer.
Do not save your username and password in the web browser.
Register your mobile number and working e-Mail with social networking sites
to get alerts in the event of un-authorized access.
Permanently delete all documents downloaded on computers in cybercafé.
Never provide details or copy of identity proofs (e.g. PAN Card, Aadhaar
Card, Voter Card, Driving License, Address Proof) to unknown
person/organization.
Tips to Protect yourself from IDENTITY THEFT
Never share your PIN with anybody, however close they might be.
Do not respond to messages from unknown source requesting personal or financial
details even if it assures credit of money into your bank account.
Do not respond to suspicious e-mails or click on suspicious links.
Do not transfer money to any un-trusted unknown account.
Remember you can never win a lottery if you have not participated in it.
Always verify the correctness of the domain of the e-mail ID, for example, all
government websites have “.gov.in” or “.nic.in” as part of their web address.
Have proper spam filters enabled in your e-mail account.
PSYCHOLOGICAL TRICKS
C
Y
Psychological tricks are where attackers play with the minds B
of the user to trap them with lucrative offers. Once trapped, E
R
the attackers can exploit the victim by either stealing money
or stealing sensitive personal information (name, Aadhaar S
details, bank account details etc.) or harm the victim in any E
other way. The entire basis of this kind of attack is to make C
U
the victim fall into their trap by sending fake e-mails, calls or R
SMSs. I
T
Y
PSYCHOLOGICAL TRICKS
C
Y
In Psychological tricks the fraudster can use the following methods as B
under - E
R
Phishing is the act of sending fraudulent e-mail that appears to be from a
legitimate source, for example, a bank, a recruiter or a credit card company etc. S
E
Vishing is similar to phishing. But, instead of e-mail, in this type of crime, the C
fraudster uses telephone to obtain sensitive personal and financial information. U
R
Smishing is the SMS equivalent of phishing. It uses SMS to send fraudulent I
text messages. The SMS asks the recipient to visit a website/weblink or call a T
phone number. Y
PSYCHOLOGICAL TRICKS
Lottery Fraud - fraudster congratulates the victim for winning a handsome lottery
via e-mail/call/SMS. The victim is delighted and is eager to get the lottery money.
The fraudster asks the victim to transfer a token amount and share vital personal
information to get the lottery money. The victim loses his/her money and does not
get anything in return.
Credit/Debit Card Fraud - attacker tries to scare the victim by informing them
that their credit/debit card has been blocked.
Job Related Fraud - attacker sends a fake e-mail to the victim offering a job with
an attractive salary.
Tips to Protect yourself from PSYCHOLOGICAL TRICKS
Make your children aware that cyber bullying is a punishable crime so that S
neither do they indulge themselves in cyber bullying nor do they let anyone E
tease them.
C
Discuss safe internet practices with your friends and family regularly.
Monitor your kid’s activity on internet/social media. Enable parental controls on U
computer/mobile devices. R
Even if the children or students know about any friend who is a victim of cyber I
bullying, they should help the victim. Report the matter to parents or teachers T
immediately. Y
DIGITAL BANKING FRAUDS
C
In present scenario, all banking services are shifting online. Y
B
Services like retrieving account statement, funds transfer to other E
accounts, requesting a cheque book, preparing demand draft etc. can R
all be done online.
S
Most of these services can be done sitting at home without physically E
visiting the bank. C
As the services are shifting towards online platforms, cyber frauds U
R
related to banking are also increasing.
I
Protection of bank accounts with strong passwords becomes highly T
essential. Y
DIGITAL BANKING FRAUDS
C
In Digital Banking frauds , fraudster can use the following methods as Y
under – B
E
Digital Payments Applications related attacks :- Digital payments have become R
very common in today’s life. However, they do pose a threat if the account is
hacked. S
E
Hacking of Bank Account due to Weak Password :- In this type of attack, the C
attacker hacks into the victim’s account by using a program to guess commonly
U
used passwords. Once the account is hacked, the attacker can steal money or
perform an illegal transaction in order to defame or frame the victim. R
I
Hacking of Multiple Accounts due to same password :- If same password is T
used for multiple accounts, then hacking of one account may also lead to Y
hacking of other accounts.
Tips to Protect yourself from DIGITAL BANKING FRAUDS
C
Y
Create Strong password to your online banking account and the ttechniques for
strong password which are easy to remember : B
E
• For making unique passwords, create as many pass-phrases and words as R
possible (different passwords for different accounts) For example:
• shopping – $h0pp!n9 (S =$, i=!, g=9, o=0) S
• october – 0cT0b3r9! E
(one more alphabet/number ‘9’ is added as “october” is a 7 letter word) C
• Social Network – $0c!alNetw0rK U
• Windows – w!nD0W$9 R
• NULinux – 9NuL!NuX I
(one more alphabet/number ‘9’ is added as “NULinux” is a 7 letter word) T
Y
Tips to Protect yourself from DIGITAL BANKING FRAUDS
C
Y
B
• Set your passwords to be at least 8 characters long.
E
• Make the passwords stronger by combining letters, numbers and
R
special characters.
• Use a different password for each of your accounts and devices.
S
• Use 2-step verification (such as OTP) whenever possible.
E
• If one of your online accounts has been hacked, immediately log in
C
and change the password to a strong, unique password. U
• Do not share your passwords/PIN with anyone.
R
• Do not save your usernames and passwords in the web browser.
I
T
Y
MOBILE APP FRAUDS
C
Y
B
With the increase in the use of smart phones and the consequent E
rise in the use of mobile applications, associated security risks have R
also increased. The number of mobile transactions has increased
four times in the last couple of years, and now, cyber criminals are S
targeting mobile users to extract data and money. E
C
U
R
I
T
Y
MOBILE APPLICATIONS FRAUDS
C
In Mobile Applications frauds , fraudster can use the cyber attacks Y
using infected Mobile App :- B
People become habitual users of certain mobile applications. As a result, E
they ignore security warnings. R
Fraudsters use this to attack the victim by infiltrating through such
S
popular mobile applications.
E
They infect the applications with malicious software, called Trojan. C
This Trojan can get access to your messages, OTP, camera, contacts, e- U
mails, photos etc. for malicious activities. R
It can also show obscene advertisements, sign users up for paid I
subscriptions or steal personal sensitive information from the mobile etc. T
Y
Tips to Protect yourself from MOBILE APP FRAUDS
be Cyber Safe S
E
C
THANKS U
R
I
T
Y