CYBER IN THE DIGITAL AGE SECURITY VINEETA MUNGALI DAV CENTENARY PUBLIC SCHOOL, HALDWANI
Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It is a crucial aspect of modern technology, ensuring that our digital lives remain safe and secure.
CYBER THREATS Phishing attacks PHISHING ATTACKS Email Phishing Spear Phishing Vishing Smishing Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
CYBER THREATS Phishing attacks IDENTITY/ CREDENTIAL THEFT Shoulder surfing Identity frauds Spoofing Digital Arrest Identity theft occurs when someone uses your personal information, like your name, Social Security number, or credit card number, without your permission. Credential Theft involves stealing login information, such as usernames and passwords, to gain unauthorized access to accounts.
CYBER THREATS Phishing attacks DIGITAL ARREST Fraudsters impersonate police, CBI, or other government officials and falsely accuse victims of serious crimes, such as financial fraud, drug trafficking, or tax evasion. This scam typically starts with an unexpected phone call finally leading to a video call from someone posing as an official from a government agency. The criminals threaten immediate arrest to instill fear and compel the victim to act quickly. The victim is kept on the call for an extended period to prevent them from seeking help or verifying the information. The ultimate goal of the scam is to extort money from the victim.
Phishing attacks SOCIAL MEDIA CRIMES Trolling Trolling involves posting inflammatory, offensive, or off-topic messages online to provoke others and create disruption. Examples : Posting rude comments, starting arguments, spreading misinformation, making offensive jokes. Cyber Bullying Cyberbullying involves using digital platforms to harass, threaten, or humiliate someone. This can happen through social media, text messages, emails, or other online communication. Examples : Spreading rumour, sending threatening messages, sharing embarrassing photos or videos without consent. Cyber Stalking Stalking involves repeatedly following, harassing, or threatening someone, causing them to feel unsafe. Examples : Sending excessive messages, tracking someone's online activity, hacking into personal accounts, using GPS to track someone's location.
CYBER LAWS No hacking No cyber bullying No sharing of obscene content No identity theft No stealing of personal information No piracy Availability Ensuring systems and data are accessible when needed.
BEST PRACTICES FOR INDIVIDUALS Use strong, unique passwords. Enable multi-factor authentication (MFA). Be cautious with emails and links. Keep software and systems updated. Regularly back up important data. Not sharing personal information on social media . Avoid using public wi-fi . Consciously check & configure app privacy settings . Be mindful of eaves droppers when shopping via your mobile. Dispose old documents statements, data no longer needed & electronic devices with great caution. Logout from every personal account used even on personal device Avoid using social media credentials to register for or sign in on third party sites.
REPORTING A CYBER CRIME The government of India has provided cyber-cells in almost all the states (list available at https://cybercrime.gov.in/Webform/Crime_NodalGrievanceList.aspx). The victim could lodge a cyber-complaint on the national portal "cybercrime.gov.in". You can call the National Helpline number '1930' (24x7) for immediate reporting of Cyber Financial Frauds
ESTABLISHING A CYBER CONGRESS Cyber congress to be formed consisting of Senior teachers, ICT staff, senior students, Parents who are tech savy . Cyber Safety policy to be framed. Identify suspicious activities or student behaviour indicating cyber issues ROLE OF ICT TEACHER CYBER WEEK TO BE CELEBRATED CYBER GRIEVANCE BOX Cyber Grievance box should be available in school at strategic location & checked at regular intervals. Talk show by an expert Group discussion Assembly (thought of the day, Role play, Nukkad Natak) , Slogan writing/ Poster making/ Quiz
STEPS FOR HANDLING CYBER ISSUES Any incident must be reported to Cyber Safety Committee. Cyber Congress must conduct a preliminary investigation to determine the severity and nature of the incident, Identify involved parties (victim, witness) Document all evidence (screen shots, messages, written statements) Identify the severity and then take action Low Severity (minor cyber bullying) High Severity Issues (Hacking , Online threats) Action : Mediate between affected parties. Counselling of involved students. Notify parents if required Involve local cyber crime authorities or police if required.
REPORTING AND RECORD KEEPING Maintain a record for all cyber issues : Date and Time of Incident Nature of Issue Detailed Description with evidences Actions Taken Follow up Measures