CYBER SECURITY
Module-I. Introduction to Cyber security: Defining Cyberspace and
Overview of Computer and Web-technology, Architecture of cyberspace,
Communication and web technology, Internet, World wide web, Advent
of internet, Internet infrastructure for data transfer and governance,
Internet society, Regulation of cyberspace, Concept of cyber security,
Issues and challenges of cyber security.
Module-II. Cyber-crime and Cyber law: Classification of cybercrime,
Common cybercrimes- cybercrime targeting computers and mobiles,
cyber crime against women and children, financial frauds, social
engineering attacks, malware and ransomware attacks, zero day and zero
click attacks, Cyber criminals modus-operandi, Reporting of cyber crimes,
Remedial and mitigation measures, Legal perspective of cyber crime, IT
Act 2000 and its amendments, Cyber-crime and offences, Organisations
dealing with Cybercrime and Cyber security in India, Case studies.
Module III. Social Media Overview and Security: Introduction to Social
networks. Types of Social media, Social media platforms, Social media
monitoring, Hashtag, Viral content, Social media marketing, Social media
privacy, Challenges, opportunities and pitfalls in online social network,
Security issues related to social media, Flagging and reporting of
inappropriate content, Laws regarding posting of inappropriate content,
Best practices for the use of Social media, Case studies.
Module IV. Definition of E- Commerce, Main components of E-
Commerce, Elements of E-Commerce security, E-Commerce threats, E-
Commerce security best practices, Advantage of e-commerce, Survey of
popular e-commerce sites. Introduction to digital payments, Components
of digital payment and stake holders, Modes of digital payments-
Banking Cards, Unified Payment Interface (UPI), e-Wallets, Unstructured
Supplementary Service Data (USSD), Aadhar enabled payments, Digital
payments related common frauds and preventive measures. RBI
guidelines on digital payments and customer protection in unauthorized
banking transactions. Relevant provisions of Payment Settlement
Act,2007.
Module V. End Point device and Mobile phone security, Password policy,
Security patch management, Data backup, Downloading and management
of third-party software, Device security policy, Cyber Security best
practices, Significance of host firewall and Ant-virus, Management of
host firewall and Anti-virus, Wi-Fi security, Configuration of basic
security policy and permissions.
Module-01.
Introduction to Cyber security:
What is Cyber Security?
"Cyber Security" is the protection of Internet-connected systems,
including hardware, software, and data from cyber attacks. The word
Cyber is related to the technology which contains systems, network and
programs or data whereas 'security' is related to protection which includes
systems security, network security and application, and information
security. It is the body of technologies, processes, and practices designed
to protect networks, devices, programs, and data from attack, theft,
damage. modification or unauthorized access. It may also be referred to
as information technology security.
"Cyber Security is the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack,
theft, damage, modification or unauthorized access."
"Cyber Security is the set of principles and practices designed to protect
our computing resources and online information against threats."
benefits of implementing and maintaining cybersecurity:
o Cyberattacks and data breach protection for businesses.
o Data and network security are both protected.
o Unauthorized user access is avoided.
o After a breach, there is a faster recovery time.
o End-user and endpoint device protection.
o Regulatory adherence.
o Continuity of operations.
o Developers, partners, consumers, stakeholders, and workers have
more faith in the company's reputation and trust.
Defining Cyberspace :
▪The term Cyberspace was first coined by William Gibson in the year
1984.
▪Cyberspace is the environment in which communication over computer
networks occurs.
▪Cyberspace is the virtual and dynamic space created by the machine
clones. Cyberspace mainly refers to the computer which is a virtual
network and is a medium electronically designed to help online
communications to occur.
▪The primary purpose of creating cyberspace is to share information and
communicate across the globe.
▪Cyberspace is that space in which users share information, interact with
each other; engage in discussions or social media platforms, and many
other activities.
▪The whole Cyberspace is composed of large computer networks which
have many sub-networks. These follow the TCP or IP protocol.
Overview of Computer and Web-technology :
Computer and web technology are integral parts of our modern world,
shaping how we communicate, work, learn, and entertain ourselves.
Computer Technology:
1. Hardware: Computers consist of physical components like the central
processing unit (CPU), memory (RAM), storage devices (HDD/SSD),
input/output devices (keyboard, mouse, monitor), and more. These
components work together to process and store data.
2. Software: Software includes the operating system (e.g., Windows,
macOS, Linux) and various applications (e.g., Microsoft Office, web
browsers, video games) that run on a computer. Operating systems
manage hardware resources and provide a user interface.
3. Networking: Computers can connect to each other and the internet via
wired (e.g.,Ethernet) or wireless (e.g., Wi-Fi) networks. Networking
enables data sharing, communication, and remote access.
4. Security: Computer security is crucial to protect data and systems
from threats like viruses, malware, and hackers. Antivirus software,
firewalls, and encryption are common security measures.
5. Processing Power: Moore's Law predicts that the processing power of
computers doubles approximately every two years. This constant
improvement drives innovations in various fields, including artificial
intelligence, scientific research, and data analysis.
Web Technology:
1. World Wide Web (WWW): The World Wide Web, commonly
referred to as the web, is a global system of interconnected documents
and resources linked through hyperlinks. It is accessed via web browsers.
2. Web Browsers: Web browsers like Google Chrome, Mozilla Firefox,
and Microsoft Edge allow users to access and interact with web content.
3. Web Development: Web development involves creating and
maintaining websites and web applications.
4. Web Servers: Web servers store and deliver web content to users'
browsers upon request. Popular web server software includes Apache,
Microsoft IIS.
5.Web Security: Ensuring web security is critical to protect data and user
privacy. Measures include SSL/TLS encryption, secure authentication,
and regular security audits.
6.Web Standards: Organizations like the World Wide Web Consortium
(W3C) establish web standards to ensure compatibility and accessibility
across different devices and browsers.
Architecture of cyberspace :
There isn't a single, specific architecture for cyberspace, as it
encompasses a wide range of technologies, protocols, and platforms.
Some key components and concepts related to the architecture of
cyberspace are:
1. Network Infrastructure: At the core of cyberspace is the global
network infrastructure,often referred to as the Internet. This infrastructure
comprises a vast array of interconnected physical and virtual components,
including routers, switches, data centers, and undersea cables. The
Internet's architecture is based on the Internet Protocol (IP), which allows
data packets to be routed across the network.
2. Protocols: Various communication protocols define how data is
transmitted and received in cyberspace. The Transmission Control
Protocol (TCP) and Internet Protocol (IP) are fundamental to the
functioning of the Internet. Other protocols like HTTP (Hypertext
Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and FTP
(File Transfer Protocol) govern specific types of data exchange.
3.Domain Name System (DNS): DNS is a crucial component of
cyberspace that translates human-readable domain names (e.g.,
www.example.com) into IP addresses. This system enables users to
access websites and resources by name rather than needing to remember
numeric IP addresses.
4.Data Centers: Data centers house the servers and storage infrastructure
that store and deliver digital content and services. They play a pivotal role
in hosting websites, applications, and cloud services.
5. Cybersecurity: The architecture of cyberspace includes various
security measures to protect data, networks, and users. Firewalls,
encryption, intrusion detection systems, and antivirus software are
examples of cybersecurity components.
6. Web and Application Servers: These servers host websites, web
applications, and other online services. They respond to user requests,
retrieve data from databases, and deliver content to users' devices.
7. User Devices: These are the various devices through which users
access cyberspace, including computers, smartphones, tablets, and IoT
devices. Each device has its own hardware and software components that
enable connectivity and interaction with cyberspace.
8. Cloud Computing: Cloud services and platforms are an integral part
of cyberspace architecture. Cloud providers offer scalable computing
resources, storage, and services, allowing organizations to leverage the
cloud for various purposes.
9.Social Media and Online Communities: Cyberspace also includes
virtual communities and social media platforms that enable users to
connect, share information, and collaborate online. These platforms have
their own architectures and algorithms for content delivery and
interaction.
10.Internet of Things (IoT): IoT devices are connected to cyberspace,
enabling them to collect and exchange data with other devices and
systems. They play a role in creating the "smart" aspect of cyberspace,
connecting physical objects to the digital realm.
11.Regulations and Governance: Various laws and regulations govern
cyberspace to ensure security, privacy, and fair use. Organizations like
ICANN (Internet Corporation for Assigned Names and Numbers) oversee
domain name management, while governments have jurisdiction over
aspects like data protection and cybersecurity. Cyberspace is a dynamic
and evolving environment, with new technologies and architectures
continually emerging. Its architecture is shaped by the needs of users,
businesses, governments, and the broader digital ecosystem. As such, it
remains a subject of ongoing development, discussion, and adaptation.
Communication and web technology :
Communication and web technology are integral components of the
modern digital landscape. They encompass a wide range of technologies
and tools that facilitate communication and the dissemination of
information over the internet. Some key aspects of communication and
web technology are:
1. Internet: The internet is the foundation of web technology. It is a
global network of interconnected computers and servers that allows for
the transfer of data and information across the world.
2. Web Browsers: Web browsers like Chrome, Firefox, Safari, and Edge
are software applications that enable users to access and interact with
websites and web-based applications.
3. Websites: Websites are collections of web pages that are hosted on
web servers and can be accessed through a web browser. They are created
using various web technologies such as HTML, CSS, and JavaScript.
4. Web Development: Web development involves designing, creating,
and maintaining websites. Web developers use various programming
languages and frameworks to build web applications and sites.
5. Web Standards and Protocols: Various standards and protocols
govern web technology, including HTTP/HTTPS (for data transfer),
HTML5, CSS3, and more
6.Mobile Web: Mobile web technology focuses on optimizing websites
and applications for mobile devices, ensuring a seamless user experience
on smartphones and tablets.
Internet :
▪The word Internet is derived from the word inter network, or the
connecting together two or more computer networks.
▪The Internet started in the 1960s as a way for government researchers to
share information.
▪Computers in the '60s were large and immobile and in order to make use
of information stored in any one computer, one had to either travel to the
site of the computer or have magnetic computer tapes sent through the
conventional postal system.
▪January 1, 1983 is considered the official birthday of the Internet. Prior
to this, the various computer networks did not have a standard way to
communicate with each other.
▪A new communications protocol was established called Transfer Control
Protocol/Internetwork Protocol (TCP/IP). This allowed different kinds of
computers on different networks to "talk" to each other.
▪Transmission Control Protocol/Internet Protocol (TCP/IP)
−TCP/IP is a suite of communication protocols used to interconnect
network devices on the Internet.
−TCP establishes the connections between sending and receiving
computers, and makes sure that packets sent by one computer are
received in the same sequence by the other, without any packets missing.
− IP provides the Internet’s addressing scheme and is responsible for the
actual delivery of the packets.
−TCP/IP is divided into four separate layers, with each layer handling a
different aspect of the communication problem.
World Wide Web (WWW) :
▪The World Wide Web was invented by a British scientist, Tim Berners-
Lee in 1989.
▪World Wide Web, which is also known as a Web, is a collection of
websites or web pages stored in web servers and connected to local
computers through the internet.
▪These websites contain text pages, digital images, audios, videos, etc.
Users can access the content of these sites from any part of the world over
the internet using their devices such as computers, laptops, cell phones,
etc.
▪The WWW, along with the internet, enables the retrieval and display of
text and media to your device.
▪The building blocks of the Web are web pages which are formatted in
HTML and connected by links called "hypertext" or hyperlinks and
accessed by HTTP.
Advent of internet :
▪The Internet started off with research into what was then known as
packet switching as early as the 1960s.
▪ARPANET is considered the first known group of interconnected
computers aka the internet.
This system was used to transfer confidential data between the Military.
▪This data-sharing technology was then opened to educational institutes
in the United States to allow them to access to government’s
supercomputer, first at 56 kbit/s, then at 1.5 Mbit/s, and then at 45 Mbit/s.
▪Internet service providers began to arise in the late 1980s and the
internet was fully commercialized in the US by 1995.
▪The history of the Internet can be segmented into three phases
1.Innovation Phase
2.Institutionalization Phase
3.Commercialization Phase
Innovation Phase (1961 to 1974):
−The fundamental building blocks of the Internet—packet-switching
hardware, a communications protocol called TCP/ IP, and client/server
computing were conceptualized and then implemented in actual hardware
and software .
Institutionalization Phase (1975 to 1995) :
−large institutions such as the U.S. Department of Defense (DoD) and the
National Science Foundation (NSF) provided funding and legitimization
for the fledging Internet.
Commercialization Phase (1995 to the present) :
−The U.S. government encouraged private corporations to take over and
expand the Internet backbone as well as local service beyond military
installations and college campuses to the rest of the population around the
world Institutionalization Phase (1975 to 1995) .
−large institutions such as the U.S. Department of Defense (DoD) and the
National Science Foundation (NSF) provided funding and legitimization
for the fledging Internet. Commercialization Phase (1995 to the present) .
−The U.S. government encouraged private corporations to take over and
expand the Internet backbone as well as local service beyond military
installations and college campuses to the rest of the population around the
world.
Internet infrastructure for data transfer and governance :
▪Internet infrastructure for data transfer and governance encompasses the
physical and virtual systems, protocols, and regulations that enable the
secure, efficient, and reliable exchange of data across the global network.
▪This infrastructure plays a critical role in ensuring data privacy, security,
and compliance with regulations.
▪Here are key components and considerations for internet infrastructure
related to data transfer:
1. Network Infrastructure
−Backbone Networks: High-speed, long-distance networks that form the
core of the internet, connecting major data centers and internet exchange
points (IXPs).
−Last-Mile Connectivity: The connection from service providers to end-
users, including wired (e.g., fiber-optic, DSL) and wireless (e.g., 5G, Wi-
Fi) technologies.
−Data Centers: Facilities that house servers and storage devices,
providing the infrastructure for web hosting, cloud computing, and data
storage.
2. Protocols and Standards
−Internet Protocol (IP): The foundation of internet communication,
ensuring data packets can be routed across networks.
−Transport Layer Security (TLS): Encryption protocol for securing data
in transit.
−Hypertext Transfer Protocol (HTTP) and HTTPS: Protocols for web
data transfer, with HTTPS adding a security layer.
−DNSSEC: Enhances the Domain Name System (DNS) by adding a layer
of security through digital signature and governance:
3.Data Centers and Cloud Services
−Major providers like Amazon Web Services (AWS), Microsoft Azure,
and Google Cloud offer robust infrastructure and tools for data storage
and processing.
4.Data Governance and Regulation
−Data Privacy Regulations: Compliance with laws like GDPR (in
Europe), CCPA (in California), and HIPAA (for healthcare data).
−Data Retention Policies: Guidelines for storing and managing data for
specific periods.
−Data Access Controls: Systems to restrict and monitor who can access
and modify data.
−Data Encryption: Ensuring data at rest and in transit is properly
encrypted to protect against unauthorized access.
5.Cybersecurity
−Robust security measures, including firewalls, intrusion detection
systems, and regular security audits, are essential to protect data during
transfer.
6. Internet Governance Bodies
−Organizations like ICANN (Internet Corporation for Assigned Names
and Numbers) oversee domain name system management and policy.
−Multistakeholder governance models involve various stakeholders,
including governments, businesses, and civil society, in shaping internet
governance.
7. Content Delivery Networks (CDNs)
−CDNs like Akamai and Cloudflare optimize data delivery by caching
content at various locations worldwide, reducing latency.
8. Quality of Service (QoS)
−Ensuring data transfer meets performance requirements, especially for
applications like video conferencing and online gaming.
9. International Collaboration
−Cooperation among nations is essential to establish international norms
and agreements related to data transfer and governance.
10. Data Transfer Agreements
−Agreements like Privacy Shield and Standard Contractual Clauses
facilitate the lawful transfer of data across borders.
Internet society :
▪Internet Society (ISOC) A professional membership society that
promotes the use and future development of the Internet. It has individual
and organization members all over the world and is governed by an
elected board of trustees. ISOC coordinates various groups responsible
for Internet infrastructure.
▪These include
1.The Internet Engineering Task Force (IETF),
2.The Internet Architecture Board (IAB), and
3.The Internet Engineering Steering Group (IESG).
▪The IETF develops technical standards for the Internet.
▪The IAB has overall responsibility for the architecture and adjudicates
on disputes about standards.
▪The IESG, along with the IAB, reviews standards proposed by the IETF.
Regulation of cyberspace :
▪Cyberspace spans worldwide, but it has no formal framework. The lack
of formal framework makes cyberspace nobody's domain .
▪No single individual, entity, or government owns or controls cyberspace.
▪Regulation in cyberspace is an emerging challenge .
▪The default in cyberspace is anonymity. Anonymity encourages and
enhances the exercise of freedom. A child too shy to express himself in
physical space can feign to be somebody else in virtual space, and
express himself freely.
▪Crimes of global repercussion are also committed with the use of the
internet. Trafficking of persons, child pornography, kidnapping for
ransom, and terrorism are perpetrated with the use of cyberspace.
Freedom thus in cyberspace should not be exercised without the
concomitant responsibility of its users.
▪Practical Problems In Extending The Traditional Laws To Cyberspace
1. Multiple Jurisdictions-Because of anonymity of the Internet user,
absence of geographical boundaries in the cyberspace, and the cross
border effect of Internet transactions, all legal systems face legal
uncertainty.
2. Problem of Policing-The lack of technical knowledge, non-co-
operation among different police organization etc., make the problem too
difficult to be solved.
3. Expensive Process-Training of law enforcement officers to solve the
issue of cybercrime is very expensive.
4.Obtaining Digital Evidence- Another instance where the policing of
cybercrime becomes difficult is with regard to obtaining the digital
evidence.
Concept of cyber security :
▪cybersecurity is the practice of protecting computer systems, networks,
and data from theft, damage, or unauthorized access.
▪ It encompasses a wide range of technologies, processes, and practices
designed to safeguard digital information and ensure the confidentiality,
integrity, and availability of data.
1. Confidentiality: This principle focuses on ensuring that sensitive
information is only accessible to authorized individuals or systems. It
involves encryption, access controls, and data classification to prevent
unauthorized access or disclosure.
2. Integrity: Integrity in cybersecurity means that data and systems are
accurate and trustworthy. Any unauthorized modification or tampering
with data or systems should be detected and prevented. Techniques like
checksum and digital signatures are used to maintain data integrity.
3. Availability: Availability ensures that systems and data are accessible
when needed. Cyberattacks can disrupt services or make them
unavailable, so cybersecurity measures aim to prevent or mitigate such
disruptions through redundancy, load balancing, and disaster recovery
planning.
4. Authentication: Authentication is the process of verifying the identity
of users, devices, or systems trying to access resources. This can be
achieved through passwords, biometric, two-factor authentication (2FA),
and multi-factor authentication (MFA).
Cyber Attacks :
▪A cyber-attack is an exploitation of computer systems and networks. It
uses malicious code to alter computer code, logic or data and lead to
cybercrime, such as information and identity theft.
▪Cyber-attacks can be classified into the following categories:
1.Web-based attacks
2.System-based attacks
Web-based attacks :
▪These are the attacks which occur on a website or web applications.
Some of the important web-based attacks are as follows-
I. Injection attacks :It is the attack in which some data will be injected
into a web application to manipulate the application and fetch the
required information.
II. Session Hijacking :It is a security attack on a user session over a
protected network. Web applications create cookies to store the state and
user sessions. By stealing the cookies, an attacker can have access to all
of the user data.
III. Phishing: Phishing is a type of attack which attempts to steal
sensitive information like user login credentials and credit card number. It
occurs when an attacker is masquerading as a trustworthy entity in
electronic communication.
IV. Denial of Service:It is an attack which meant to make a server or
network resource unavailable to the users. It accomplishes this by
flooding the target with traffic or sending it information that triggers a
crash.
System-based attacks:
▪These are the attacks which are intended to compromise a computer or a
computer network. Some of the important system-based attacks are as
follows-
I. Virus :It is a type of malicious software program that spread
throughout the computer files without the knowledge of a user. It is a
self-replicating malicious computer program that replicates by inserting
copies of itself into other computer programs when executed. It can also
execute instructions that cause harm to the system.
II. Worm :It is a type of malware whose primary function is to replicate
itself to spread to uninfected computers. It works same as the computer
virus. Worms often originate from email attachments that appear to be
from trusted senders.
III.Trojan horse : it is a malicious program that occurs unexpected
changes to computer setting and unusual activity, even when the
computer should be idle. It misleads the user of its true intent. It appears
to be a normal application but when opened/executed some malicious
code will run in the background.
Cyber Threat:
• A Cyber threat is any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners.
• It refers to the wide range of malicious activities that can damage or
disrupt a computer system, a network or the information it contain.
Issues and challenges of cyber security:
▪ Cybersecurity faces numerous issues and challenges due to the ever-
evolving nature of technology and the increasing sophistication of cyber
threats.
▪ Some of the key issues and challenges in cybersecurity include:
1. Cyber Attacks: The constant threat of Cyberattacks from various
actors, including hackers, cybercriminals, nation-states, and hacktivists,
is a significant challenge. These attacks can take various forms, such as
malware, ransomware, phishing, and distributed denial of service (DDoS)
attacks.
2. Data Breaches: Data breaches can have severe consequences for
organizations and individuals. The theft or exposure of sensitive data,
such as personal information, financial records, or intellectual property,
can lead to financial losses, reputational damage, and legal liabilities.
3. Security Vulnerabilities: Software and hardware vulnerabilities are
exploited by attackers to gain unauthorized access or control over
systems. Identifying and patching these vulnerabilities in a timely
manner is a constant challenge.
3. Insider Threats: Insider threats, where individuals within an
organization misuse their access and privileges, can be particularly
challenging to detect and prevent. This includes employees, contractors,
or partners who intentionally or unintentionally compromise security.
4. Lack of Cybersecurity Awareness: Many individuals and employees
lack awareness of cybersecurity best practices, making them susceptible
to social engineering attacks and other cyber threats.
5. Resource Constraints: Smaller organizations and even some larger
ones may lack the resources and expertise needed to implement robust
cybersecurity measures. This can leave them vulnerable to attacks.
6. Ransomware: Ransomware attacks have surged in recent years, with
cybercriminals encrypting data and demanding a ransom for decryption
keys. These attacks can disrupt critical operations and result in significant
financial losses.
Module-02.
Cyber-crime and Cyber law:
We can define “Cyber Crime” as any malefactor or other offences where
electronic communications or information systems, including any device
or the Internet or both or more of them are involved.
We can define “Cyber law” as the legal issues that are related to utilize
of communications technology, concretely "cyberspace", i.e. the Internet.
It is an endeavor to integrate the challenges presented by human action on
the Internet with legacy system of laws applicable to the physical world.
Classification of cyber crime:
Cyber Crime can be classified into four major categories. They are as
follows:
Cyber Crime against individuals:
Crimes that are committed by the cyber criminals against an individual or
a person. A few cyber crime against individuals are:
a) Email spoofing: This technique is a forgery of an email header. This
means that the message appears to have received from someone or
somewhere other than the genuine or actual source. These tactics are
usually used in spam campaigns or in phishing, because people are
probably going to open an electronic mail or an email when they think
that the email has been sent by a legitimate source .
b) Spamming: Email spam which is otherwise called as junk email. It is
unsought mass message sent through email. The uses of spam have
become popular in the mid 1990s and it is a problem faced by most email
users now a days. Recipient’s email addresses are obtained by spam bots,
which are automated programs that crawls the internet in search of email
addresses. The spammers use spam bots to create email distribution lists.
With the expectation of receiving a few number of respond a spammer
typically sends an email to millions of email addresses.
c) Cyber defamation: Cyber defamation means the harm that is brought
on the reputation of an individual in the eyes of other individual through
the cyber space . The purpose of making defamatory statement is to bring
down the reputation of the individual.
d) IRC Crime (Internet Relay Chat): IRC servers allow the people
around the world to come together under a single platform which is
sometime called as rooms and they chat to each other. Cyber Criminals
basically uses it for meeting. Hacker uses it for discussing their
techniques. Paedophiles use it to allure small children.
e) Phishing: In this type of crimes or fraud the attackers tries to gain
information such as login information or account’s information by
masquerading as a reputable individual or entity in various
communication channels or in email. Some other cyber crimes against
individuals includesNet extortion, Hacking, Indecent exposure,
Trafficking, Distribution, Posting, Credit Card, Malicious code etc. The
potential harm of such a malefaction to an individual person can scarcely
be bigger.
b) Cyber Crime against property:
These types of crimes includes vandalism of computers, Intellectual
(Copyright, patented, trademark etc) Property Crimes,Online threatening
etc. Intellectual property crime includes:
a) Software piracy: It can be describes as the copying of software
unauthorizedly.
b) Copyright infringement: It can be described as the infringements of
an individual or organization's copyright. In simple term it can also be
describes as the using of copyright materials unauthorizedly such as
music, software, text etc. Trademark infringement: It can be described
as the using of a service mark or trademark unauthorizedly.
c) Cyber Crime against organization:
Cyber Crimes against organization are as follows: Unauthorized
changing or deleting of data. Reading or copying of confidential
information unauthorizedly, but the data are neither being change nor
deleted.
a). DOS attack: In this attack, the attacker floods the servers, systems or
networks with traffic in order to overwhelm the victim resources and
make it infeasible or difficult for the users to use them .
b). Email bombing: It is a type of Net Abuse, where huge numbers of
emails are sent to an email address in order to overflow or flood the
mailbox with mails or to flood the server where the email address is.
c). Salami attack: The other name of Salami attack is Salami slicing. In
this attack, the attackers use an online database in order to seize the
customer’s information like bank details, credit card details etc. Attacker
deduces very little amounts from every account over a period of time. In
this attack, no complaint is file and the hackers remain free from
detection as the clients remain unaware of the slicing. Some other cyber
crimes against organization includes Logical bomb, Torjan horse, Data
diddling etc.
d) Cyber Crime against society:
Cyber Crime against society includes:
a) .Forgery: Forgery means making of false document, signature,
currency, revenue stamp etc.
b) .Web jacking: The term Web jacking has been derived from hi jacking.
In this offence the attacker creates a fake website and when the victim
opens the link a new page appears with the message and they need to
click another link. If the victim clicks the link that looks real he will
redirected to a fake page. These types of attacks are done to get entrance
or to get access and controls the site of another. The attacker may also
change the information of the victim’s webpage.
Cyber crime targeting computers and mobiles :
▪ Cybercrime targeting computers and mobile devices is a growing
concern in today's digital world.
▪ These crimes encompass a wide range of illegal activities conducted
using technology, often with the goal of financial gain, data theft, or
causing harm to individuals, organizations, or governments.
▪ Here are some common types of cybercrimes that target computers and
mobiles:
1. Malware Attacks: Malicious software (malware) is designed to infect
computers and mobile devices. This includes viruses, worms, Trojans,
ransomware, spyware, and adware. Malware can steal data, damage
systems, or hold data hostage for a ransom.
2. Phishing: Phishing attacks involve tricking individuals into revealing
sensitive information like passwords, credit card numbers, or personal
details by posing as a legitimate entity through email, text messages, or
fake websites.
3. Identity Theft: Cybercriminals can steal personal information, such as
Social Security numbers and financial data, to commit fraud, open
accounts in victims' names, or access their financial resources.
4. Online Scams: Various online scams target individuals, such as
advance-fee fraud, lottery scams, and romance scams. These scams
deceive people into sending money or personal information to fraudsters.
5. DDoS Attacks: Distributed Denial of Service (DDoS) attacks
overwhelm a target's computer or network with traffic, making it
unavailable to users. These attacks are often used to disrupt services or
extort money.
6. Data Breaches: Cybercriminals infiltrate organizations to steal
sensitive data like customer information, trade secrets, or financial
records. These breaches can result in significant financial losses and
reputational damage.
7. Cyber bullying: Cyber bullying involves the use of technology to
harass, threaten, or intimidate individuals. It can take place through social
media, messaging apps, or email.
8. Mobile Device Theft and Hacking: Criminals can steal mobile
devices for resale or hack into them to access personal data, financial
information, or install malware.
9. Cyber Extortion: Criminals may threaten to release sensitive or
embarrassing information unless a victim pays a ransom. This can
involve extortion (threatening to expose explicit content) or other forms
of extortion.
10. Insider Threats: Employees or individuals with insider access to
computer systems and data may misuse their privileges to steal or
manipulate information.
11. Cryptojacking: Cybercriminals use a victim's computer or mobile
device to mine cryptocurrency without their consent, which can slow
down the device and increase energy consumption.
▪ To protect against cybercrime targeting computers and mobiles,
individuals and organizations should implement robust cybersecurity
measures, regularly update software, use strong passwords, be cautious
when clicking on links or downloading files, and stay informed about the
latest cyber threats and best practices.
Cyber crime against women and children :
▪ Cybercrimes against women and children are particularly concerning
because they often involve harassment, exploitation, or abuse of
vulnerable individuals. Here are some common types of cybercrimes
targeted at women and children:
1. Cyber bullying: Both women and children can be victims of cyber
bullying, which includes online harassment, threats, and intimidation.
Perpetrators may use social media, messaging apps, or other digital
platforms to target their victims.
2.Online Harassment: This includes sending unsolicited, offensive, or
threatening messages, images, or videos to women or children. It can be a
form of cyber bullying and may have severe emotional and psychological
effects.
3.Revenge Porn: Perpetrators may share explicit or intimate images or
videos of women without their consent, often as an act of revenge. This is
a violation of privacy and can cause significant harm to victims.
4.Sexting Exploitation: In cases involving children, sexting can lead to
exploitation when someone coerces or blackmails minors into sharing
explicit images or videos. This can have legal and psychological
consequences for the child involved.
5.online Grooming: Predators may use online platforms to groom
children for sexual exploitation. They build trust with the child and
gradually manipulate them into sharing personal information or engaging
in inappropriate activities.
6. Child Pornography: The distribution, possession, or creation of child
pornography is illegal and exploits children. Criminals often use the
internet to share such material.
7. Online Trafficking: Human traffickers may use the internet to lure
and exploit women and children, including for purposes of forced labor or
sexual exploitation. Online platforms can be used to recruit victims.
8. Cyberstalking: This involves persistent and unwanted online attention,
often leading to fear or emotional distress. Women and children can be
targeted by cyber stalkers who may threaten or harass them through
digital means.
9. Financial Fraud: Women can also be victims of financial fraud,
including online scams targeting personal finances or online dating scams
where perpetrators exploit emotional connections for financial gain.
10. Privacy Violations: Privacy breaches can occur when personal
information or photographs are shared without consent, affecting both
women and children. This can lead to identity theft or other forms of
cybercrime.
▪ To combat cybercrimes against women and children, various
organizations and governments have implemented laws and initiatives
aimed at raising awareness, providing support to victims, and prosecuting
offenders.
Financial frauds :
▪ Financial frauds can have devastating consequences for individuals and
the economy as a whole. While digital payments have made life
convenient and easy In India, they have also made us prone to all kinds of
financial frauds.
▪ Ponzi Schemes: A Mirage of False Promises
• Ponzi schemes lure investors with promises of unusually high returns in
a short period. The fraudsters use funds from new investors to pay off
earlier investors, creating a false illusion of profitability.
• One infamous example is the Saradha chit fund scam, where millions
of investors lost their hard-earned money. The group, consisting of over
200 private companies, falsely portrayed its collective investment
schemes as chit funds.
• With an estimated collection of ₹200 to 300 billion (US$4–6 billion),
the scheme managed to attract deposits from more than 1.7 million
individuals before its eventual downfall.
▪ Identity fraud
• Identity fraud is common on Internet. Criminals have a few options
when it comes to stealing your sensitive information.
• They might target you with a phishing attack where they email, call, or
text pretending to be from your bank. Or, they could target you with a
cyber attack to get you to install malware on your devices that steals your
logins and passwords.
• How do you know you're being targeted?
− Unfamiliar transactions on your credit card.
− Strange charges on your bank statements.
− New credit cards or loans in your name.
− Missing or error-filled tax returns.
− Calls from debt collectors about purchases you didn’t make.
− A drop in credit score.
− Bounced checks.
▪ Fraudulent charities
• Scammers use philanthropy as fraud, too. Charity fraud entails creating
a fake charity and collecting “donations” that disappear along with the
thief
• How does charity fraud happen?
− Scammers create fake charities — like military veteran charities — that
sound like ones you know and trust. These scams are especially common
during natural disasters or international news events
• What are the warning signs?
− Claiming that you’re a previous donor when you know you’ve never
sent them money.
− Only accepting donations through cash, cryptocurrency, gift cards, or
wire transfers.
▪ Credit card fraud
• There are several ways that criminals can steal your credit card
information. They could steal your physical card, trick you into entering
information on a phishing website or email, buy your details on the Dark
Web, or use any number of other credit card scams.
• Hackers can also create a clone of your physical card using just your
credit card numbers.
• What are the warning signs?
− Suspicioustransactions on your credit card or bank statement.
− Small unfamiliar charges on your account. (Fraudsters use a scam
called carding to validate your credit card before making large purchases.)
− Fraud alertsfrom your bank, credit card issuer, or credit monitoring
service.
▪ Stock Market Manipulation
• Stock market manipulation includes activities like price
rigging,spreading false information, insider trading, and pump-and-dump
schemes. Fraudsters manipulate stock prices, deceiving investors and
causing significant financial losses.
• The Satyam Computer Services scandal is a prime example, where the
company’s promoters manipulated financial statements to inflate stock
prices.
▪ Bank Frauds
• Bank frauds encompass various fraudulent activities, including loan
frauds, cheque frauds, forged documents, and unauthorized transactions.
These frauds result in substantial financial losses for banks and
individuals.
• One notable case is the Nirav Modi-PNB scam, where fraudulent
Letters of Undertaking were issued, causing a massive loss to Punjab
National Bank.
▪ How to protect yourself against financial frauds
1. Protect your personal information
2. Monitor financial activities
3. Be cautious online
4. Use strong passwords and enable two-factor authentication
5. Stay informed aboutscams
6. Keep your devices secure
7. Exercise caution with public Wi-Fi
8. Verify before sharing information
Social Engineering Attacks :
Social Engineering
▪ It is the “technique to influence” & “persuasion to deceive” people to
obtain the information.
▪ It exploits the fact that people are the weak link in security.
▪ Social engineers build the trust with the victim/person to gain the
unauthorized information/access.
▪ Their goal is to fool someone into providing valuable information.
▪ Example: The attacker (social engineer) calling a user & pretending to
be a tech support person & ask questions about the confidential files,
passwords, etc.
Classification of Social Engineering
1. Human based Social Engineering:
▪ It refers to person to person interaction to get the unauthorized
information.
▪ The following are its different types.
i. Impersonating an employee or valid user: The attacker
impersonates/poses as an employee of the same organization to take the
advantage from the people who are helpful.
ii. Posing as important user: The attacker pretends to be a
CEO/Manager who intimidates lower level employee in order to gain
access to the system.
iii. Using a third person: The attacker pretends to have permission from
an authorized source/person (who cannot be contacted for verification) to
use a system.
iv. Calling technical support: Attacker calls help desk or tech support
personnel to obtain the information since they are trained to help users.
v. Shoulder surfing: It involves gathering information (usernames,
passwords, etc) by watching over a person’s shoulder while he/she logs
into the system.
vi. Dumpster diving (Scavenging/Binning): It involves looking in the
trash/dustbin for information written on pieces of paper, computer print
outs, etc.
3. Computer based Social Engineering
▪ It refers to the attempts made to get the unauthorized information by
using computer/software/internet.
▪ The following are its different types.
i. Fake emails: It involves the attacker sending fake emails (pretending as
a legitimate email) to a number of users in order to make the users to
reveal their sensitive information such as usernames, passwords, credit
card details, etc. It is also called as Phishing.
ii. Email attachments: It involves sending malicious codes to victim’s
system in the form of an email attachment. The virus, worms, etc which
will be present in the email attachment will be automatically executed if
the victim opens the attachment.
iii. Pop-up windows: They are used similar to email attachments but they
encourage the victim to click on special offers or free stuffs so that the
malicious code can be installed to the system.
Effects of Social Engineering:
▪ Loss/altering of medical& healthcare information, corporate financial
data, electronic funds transfers, etc.
▪ Loss of customers
▪ Loss of funds
▪ Loss of trust
▪ Collapse of the organization .
Counter measures (Security) against Social Engineering:
▪ Providing training/awareness to the potential victims at regular intervals
about the attacks .
▪ Creating awareness on how attackers gain the trust of the victims.
▪ Strict policies about service desk staff, not to ask for personal/sensitive
information .
▪ Educate potential victims to recognize social engineering attempt .
Malware and Ransomware attacks:
Malware Attacks
▪ Malware attacks are any type of malicious software designed to cause
harm or damage to a computer, server, client or computer network and/or
infrastructure without end-user knowledge .
▪ Cyber attackers create, use and sell malware for many different reasons,
but it is most frequently used to steal personal, financial or business
information.
Types of Malware
1. Adware: Display ads (sometimes malicious ads) to users as they work
on their computers or browse the web.
2. Viruses: A virus infects a computer and performs a variety of payloads.
It may corrupt files, destroy operating systems, delete or move files, or
deliver a payload at a specific date.
3. Worms: A worm is a self-replicating virus, but instead of affecting
local files, a worm spreads to other systems and exhausts resources.
4. Trojans: A Trojan is named after the Greek war strategy of using a
Trojan horse to enter the city of Troy. The malware masquerades as a
harmless program, but it runs in the background stealing data, allowing
remote control of the system, or waiting for a command from an attacker
to deliver a payload.
5. Bots: Infected computers can become a part of a botnet used to launch
a distributed denial of-service by sending extensive traffic to a specific
host.
6. Key-loggers: Capture keystrokes as users type in URLs, credentials,
and personal information and send it to an attacker.
7. RAT: “Remote access tools” enable attackers to access and control the
targeted device remotely.
8.Downloaders: Download other malware to install locally. The type of
malware depends on the attacker’s motives.
10. POS: Compromise a point-of-sale (PoS) device to steal credit card
numbers, debit card and PINs, transaction history, and contact
information.
How do I know I’ve been infected with malware?
▪ The most common signs that your computer has been compromised by
malware are:
▪ Slow computer performance
▪ Browser redirects, or when your web browser takes you to sites you did
not intend to visit .
▪ Infection warnings, frequently accompanied by solicitations to buy
something to fix them.
▪ Problems shutting down or starting up your computer .
▪ Frequent pop-up ads .
How can I protect myself from malware?
1. Protect your devices
▪ Keep your operating system and applications updated. Cybercriminals
look for vulnerabilities in old or outdated software, so make sure you
install updates as soon as they become available.
▪ Never click on a link in a popup. Simply close the message by clicking
on “X” in the upper corner and navigate away from the site that generated
it.
▪ Limit the number of apps on your devices. Only install apps you think
you need and will use regularly. And if you no longer use an app,
uninstall it.
2. Be careful online
▪ Avoid clicking on unknown links. Whether it comes via email, a social
networking site or a text message, if a link seems unfamiliar, keep away
from it.
▪ Be selective about which sites you visit. Do your best to only use known
and trusted sites,
▪ Beware of emails requesting personal information. If an email appears
to come from your bank and instructs you to click a link and reset your
password or access your account, don't click it. Go directly to your online
banking site and log in there.
▪ Avoid risky websites,such as those offering free screensavers.
3. Perform regular checks
▪ If you are concerned that your device may be infected, run a scan using
the security software you have installed on your device.
▪ Check your bank accounts and credit reports regularly.
Ransomware Attack
▪ A ransomware attack is a malware that encrypts personal information
and documents while demanding a ransom amount to decrypt them.
▪ Once the files are encrypted or locked behind a password, a text file is
available to the victim, explaining how to make the ransom payment and
unlock the files for it.
How Does a Ransomware Attack Work?
▪ The spread of ransomware mostly starts with phishing attacks. A
ransomware attack gains access to a victim's device through infected
emails, messages, and malicious sites and encrypts the data in that device.
▪ The ransomware uses simple asymmetric encryption algorithms, blocks
a user's files, and makes them difficult to decrypt without knowing the
key.
▪ Another way to breach a system with ransomware is by using the
Remote Desktop Protocol or RDP access. It can access remotely a
computer using this protocol, allowing a hacker to install malicious
software on the system with the owner, unaware of these developments.
▪ Ransomware adds instruction files describing the pay-for-decryption
process, then uses those files to present a ransom note to the user.
▪ Ransomware usually terminates and destroys itself by leaving only the
payment instruction
files.
Types of Ransomware
1. Locker ransomware
▪ It is a type of malware that blocks standard computer functions from
being accessed until the payment to the hackers is not complete.
▪ It shows a lock screen that doesn't allow the victim to use the computer
for primary purposes.
2. Crypto ransomware
▪ This ransomware encrypts the local files and documents on the
computers.
▪ Once the files are encrypted, finding the decryption key is impossible
unless the ransomware variant is old and the keys are already available on
the internet.
3. Scareware
▪ It is a fake software that claims to have detected a virus or other issue
on your computer and directs you to pay to resolve the problem.
▪ Some scareware locks the computer, while others flood the screen with
pop-up alerts without damaging files.
How to Prevent Ransomware Attacks?
▪ One must always have backups of their data. Cloud storage for backup
is easy, but a physical backup in a hard drive is always recommended.
▪ Keeping the system updated with the latest security patches is always a
good idea.
▪ Apart from system updates, one must always have reputed antivirus
software installed.
▪ If a system is infected with ransomware already, there is a website,
'nomoreransom.org.' It has a collection of decryption tools for most well-
known ransomware packages.
Zero day and Zero click attacks :
Zero day
▪ Software often has security vulnerabilities that hackers can exploit to
cause havoc.
▪ The term "zero-day" refers to the fact that the vendor or developer has
only just learned of the flaw – which means they have “zero days” to fix
it.
▪ A zero-day attack takes place when hackers exploit the flaw before
developers have a chance to address it.
▪ Zero-day attackers can steal data, corrupt files, take control of devices,
install malware or spyware, and more.
▪ Typical targetsfor a zero-day exploit include:
1. Government departments.
2. Large enterprises.
3. Individuals with accessto valuable business data,such asintellectual
property.
4. Hardware devices, firmware and Internet of Things (IoT).
Recent Examples of Zero Day Attacks
▪ In December 2021, Amazon Web Services, Microsoft, Cisco, Google
Cloud, and IBM were among the major tech players affected by the Log4j
vulnerability in an open-source logging library.
▪ In 2021, Google's Chrome suffered a series of zero-day threats, causing
Chrome to issue updates. The vulnerability stemmed from a bug in the
V8 JavaScript engine used in the web browser.
▪ Zoom was targeted in 2020. Hackers were able to remotely access users’
PCs if the video conferencing platform was running on an older version
of Windows.
▪ Apple's-iOS fell victim in 2020 to two sets of zero-day bugs that saw
attackers compromising i Phones remotely.
How to protect yourself againstzero-day attacks
1. Keep all software and operating systems up to date. This is because
the vendors include security patches to cover newly identified
vulnerabilities in new releases. Keeping up to date ensures you are more
secure.
2. Use only essential applications. The more software you have, the
more potential vulnerabilities you have. You can reduce the risk to your
network by using only the applications you need.
3. Use a firewall. A firewall plays an essential role in protecting your
system against zero-day threats. You can ensure maximum protection by
configuring it to allow only necessary transactions.
Zero click
▪ zero-click attacks require no action from the victim – meaning that even
the most advanced users can fall prey to serious cyber hacks and spyware
tools.
▪ also called interaction-less orfully remote attacks.
▪ spying software relies on convincing the targeted person to click on a
compromised link or file to install itself on their phone, tablet, or
computer.
▪ However, with a zero-click attack, the software can be installed on a
device without the victim clicking on any link. As a result, zero-click
malware or no-click malware is much more dangerous.
▪ The target of a zero-click attack can be anything from a smartphone to a
desktop computer and even an IoT device .
Examples of Zero-Click Attacks
1. Apple zero-click, forced entry, 2021: In 2021, a Bahraini human
rights activist had their iPhone hacked by powerful spyware sold to
nation-states.
2. Whats-app breach, 2019:This infamous breach was triggered by a
missed call, which exploited a flaw in the source code framework of
Whats App
.
How to protect yourself from zero-click exploits
▪ Keep your operating system, firmware, and apps on all your devices up
to date as prompted.
▪ Only download appsfrom official stores.
▪ Delete any apps you no longer use.
▪ Use your device password protection.
▪ Use strong authentication to access accounts, especially critical
networks.
▪ Use strong passwords – i.e., long and unique passwords.
Modus Operandi of Cyber Criminals :
▪ In general, modus operandi is the method acquired by any criminal for
the successful commission of a crime. At a minimum, every Modus
Operandi will contain three basic elements namely:
1. Ensure success of the crime
2. Protect identity
3. Facilitate effective escape
Common forms of modus operandi
1. Sending Annoying Messages
▪ Annoying, Insulting, Misleading, Defaming messages are often sent
using mobile phones in bulk. Hence the actual source could not be fixed.
▪ Such messages are often a cause of misperception among people of
different race, culture and tradition many a times often resulting in fights
or riots.
▪ Unaware and innocent people often fall in traps of cyber criminals for
SMS of lottery, Emails of prize money, false promise of jobs, and false
mail for admission in reputed colleges.
▪ Multimedia messages often defaming the identity of a person are
distributed among small groups using mobile phones.
▪ Pornography, Obscene messages and cyber bullying are becoming very
common and very popular, for e.g. Delhi MMS Scandal.
▪ Obscene videos are often captured in remote places unknowingly of the
victim for future exploitation.
2. Making Offensive Calls
▪ Offenders can also harass others by making offensive calls to them and
annoying them.
▪ Many a time anonymous calls are used by the criminals as an effective
tool in making extortion or threatening call. Females are often harassed
by stalkers by this means of communication.
▪ Landlines having no Caller Ids pose a problem for the quick analysis of
an incoming call, which is an undue advantage to the cyber stalkers,
cyber bullies, etc.
▪ Calls can be made by spoofing the mobile number using various sites.
Such calls are intended to hide the actual location of the caller and any
fake or annoying calls are made. Such calls are often used for terrorist
activity and for trafficking illegal goods or for any ransom or
blackmailing purposes.
▪ Cyber Criminals operating from overseas and indulged in forgery are
hard to trace without the co-operation of international agencies.
Reporting of cyber crimes :
▪ Reporting cybercrimes is essential to combat online threats and hold
perpetrators accountable. Here are the steps you can take to report
cybercrimes:
1. Contact Your Local Law Enforcement: If you believe you are a
victim of a cybercrime, you should report it to your local police
department or law enforcement agency. They can investigate the incident
and take appropriate action.
2. Report to a National Cybersecurity Agency: In many countries,
there are dedicated agencies responsible for handling cybercrimes. In the
United States, for example, you can report cybercrimes to the Federal
Bureau of Investigation (FBI) through their Internet Crime Complaint
Center (IC3). Check if your country has a similar agency and report the
incident to them.
3. Report to the Appropriate Online Platforms: If the cybercrime
occurred on a specific online platform, such as a social media site, email
service, or e-commerce website, report the incident to that platform. They
may have mechanisms in place to address various online abuses and can
take action against the responsible parties.
4. Report to Anti-Fraud Organizations: There are organizations like
the Anti-Phishing Working Group (APWG) and the Anti-Malware
Testing Standards Organization (AMTSO) that collect information about
cyber threats and work with law enforcement. Reporting incidents to
these organizations can help in identifying trends and patterns.
5. Report to Financial Institutions: If the cybercrime involves financial
fraud, contact your bank or financial institution immediately. They can
help you secure your accounts and investigate any unauthorized
transactions.
6. Report to Internet Service Providers (ISPs): If you have evidence of
cybercrimes, such as hacking or distribution of illegal content, involving
an IP address, contact the relevant Internet Service Provider (ISP). They
may take action against the offender or provide assistance to law
enforcement.
7. Document the Incident: Make sure to document all evidence related
to the cybercrime, including emails, messages, screenshots, IP addresses,
and any other relevant information. This documentation can be crucial for
investigations.
8.Use Online Reporting Portals: Many countries and regions have
online reporting portals where you can report cybercrimes. These portals
may be managed by government agencies or law enforcement. Check if
your region offers such a service.
9. Consider Legal Advice: In some cases, it may be necessary to seek
legal advice or consult with a cybersecurity expert to understand the best
course of action and to help with the investigation.
10. Protect Yourself: While reporting the cybercrime, take steps to
secure your online presence, change passwords, update security settings,
and install or update security software to prevent further incidents.
▪ Remember that reporting cybercrimes is essential for both your own
protection and the collective effort to combat online threats. The
information you provide can help authorities take action and prevent
future cybercrimes.
Remedial and mitigation measures:
Remedial Measures:
1. Incident Response: In the event of a cyber crime, organizations
should have an incident response plan in place to quickly identify, contain,
and mitigate the impact of the attack. This includes isolating affected
systems, restoring backups, and applying patches or security updates.
2. Forensic Investigation: Engaging professional forensic investigators
can help identify the source and extent of the cyber crime, gather
evidence, and aid in legal proceedings.
3. Data Recovery: If data is compromised or encrypted due to a cyber
attack, organizations should have backups in place to restore affected
systems and minimize data loss.
Mitigation Measures:
1. Strong Security Practices: Implement robustsecurity measures,such
as firewalls, antivirus software, and intrusion detection and prevention
systems, to protect against cyber threats.
2. Regular Updates and Patching: Keep software, operating systems,
and firmware up to date with the latest security patchestomitigate
vulnerabilities that cyber criminals may exploit.
3. Employee Education: Provide cybersecurity awareness and training
programs to employees to educate them about common cyber threats,
phishing techniques, and safe online practices.
4. Multi-factor Authentication (MFA): Implement MFA wherever
possible to add an extra layer of security, making it harder for cyber
criminals to gain unauthorized access to accounts or systems.
5. Data Encryption: Encrypt sensitive data, both in transit and at rest, to
ensure that even if it is intercepted or stolen, it remains unreadable and
unusable for unauthorized individuals.
6. Regular Security Audits: Conduct regular security audits and
vulnerability assessments to identify and address any weaknesses or
potential entry points for cyber criminals.
Legal perspective of cyber crime :
▪ In today’s techno-savvy environment, the world is becoming more and
more digitally sophisticated and so are the crimes.
▪ All legal issues related to internet crime are dealt with through cyber
laws.
▪ As the number of internet users is on the rise, the need for cyber laws
and their application has also gathered great momentum.
▪ Cyber law is a framework created to give legal recognition to all risks
arising out of the usage of computers and computer networks.
▪ Cyber law encompasses laws relating to:
1. Cyber crimes
2. Electronic and digital signatures
3. Intellectual property
4. Data protection and privacy
Legal perspective of cybercrime in India
▪ In India, cybercrime is primarily governed by the Information
Technology Act, 2000 (IT Act). This law was established to address
various cyber offenses and provide a legal framework for electronic
transactions, digital signatures, and data protection.
▪ The purpose of the Indian IT Act(ITA) was to amend the Indian Penal
Code(IPC).
IT ACT 2000 and its Amendments:
▪ The IT Act has undergone amendments over the years to address
emerging cyber threats and strengthen cybercrime provisions.
▪ For example, the Information Technology (Amendment) Act, 2008
introduced additional provisions to tackle cyber terrorism, data privacy,
and intermediary liability.
▪ It is important to consult with legal professionals or refer to official
sources for comprehensive and up-to-date information on the legal
aspects of cybercrime in India.
Amendments Brought in The Information Technology Act, 2000 The
Information Technology Act, 2000 has brought amendment in four
statutes vide section 91- 94. These changes have been provided in
schedule 1-4.
▪ The first schedule contains the amendments in the Penal Code. It has
widened the scope of the term “document” to bring within its ambit
electronic documents.
▪ The second schedule deals with amendments to the India Evidence Act.
It pertains to the inclusion of electronic document in the definition of
evidence.
▪ The third schedule amends the Banker’s Books Evidence Act. This
amendment brings about change in the definition of “Banker’s-book”. It
includes printouts of data stored in a floppy, disc, tape or any other form
of electromagnetic data storage device. Similar change has been brought
about in the expression “Certified-copy” to include such printouts within
its purview.
Objectives of the Amendments in The Information Technology Act, 2000:
▪ With proliferation of information technology enabled services such as e
governance, e-commerce and e-transactions, protection of personal data
and information and implementation of security practices and procedures
relating to these applications of electronic communications have assumed
greater importance and they require harmonization with the provisions of
the Information Technology Act. Further, protection of Critical
Information Infrastructure is pivotal to national security, economy, public
health and safety, so it has become necessary to declare such
infrastructure as a protected system so as to restrict its access.
▪ A rapid increase in the use of computer and internet has given rise to
new forms of crimes like publishing sexually explicit materials in
electronic form, video voyeurism and breach of confidentiality and
leakage of data by intermediary, e commerce frauds like personating
commonly known as Phishing, identity theft and offensive messages
through communication services. So, penal provisions are required to be
included in the Information Technology Act, the Indian Penal Code, the
Indian Evidence Act and the Code of Criminal Procedure to prevent such
crimes.
▪ The United Nations Commission on International Trade Law
(UNCITRAL) in the year 2001 adopted the Model Law on Electronic
Signatures. The General Assembly of the United Nations by its resolution
No. 56/80, dated 12th December, 2001, recommended that all States
accord favorable consideration to the said Model Law on Electronic
Signatures. Since the digital signatures are linked to a specific technology
under the existing provisions of the Information Technology Act, it has
become necessary to provide for alternate technology of electronic
signatures for bringing harmonization with the said Model Law.
▪ The service providers may be authorized by the Central Government or
the State Government to set up, maintain and upgrade the computerized
facilities and also collect, retain appropriate service charges for providing
such services at such scale as may be specified by the Central
Government or the State Government.
Cyber crime and offences :
▪ Cybercrime encompasses various illegal activities conducted through
digital means, often targeting individuals, organizations, or systems. Here
are some common cybercrimes and offenses:
1. Hacking: Unauthorized access to computer systems, networks, or
devices to manipulate, steal data, or disrupt operations.
2. Identity Theft: Stealing personal information (such as Social Security
numbers, credit card details) to impersonate someone else, commit fraud,
or gain access to financial resources.
3. Phishing and Spoofing: Sending deceptive emails or creating fake
websites to trick individuals into revealing sensitive information
(passwords, financial data) or downloading malware.
4. Cyber bullying: Harassment, threats, or intimidation using digital
platforms, often directed at individuals, which can have serious emotional
and psychological effects.
5. Online Fraud: Illegitimate schemes to deceive individuals or entities
for financial gain, including investment scams, online shopping fraud,
and auction fraud.
6. Distributed Denial of Service (DDoS) Attacks: Overloading servers
or networks with excessive traffic to disrupt access, making websites or
services unavailable to users.
7. Cyber Espionage: Unauthorized access to confidential information or
intellectual property of governments, organizations, or individuals, often
carried out by other governments or corporate entities.
8. Child Exploitation and Pornography: Using digital means to
produce, distribute, or possess child pornography or engage in illegal
activities involving minors.
9. Ransomware Attacks: Malicious software that encrypts files or
systems, demanding payment (usually in cryptocurrency) for decryption
or to avoid data exposure.
10. Cyberstalking: Persistent harassment or monitoring of an individual
online, causing fear or emotional distress.
Organizations dealing with Cybercrime and Cybersecurity in India, :
▪ In India, several organizations are involved in dealing with cybercrime
and cybersecurity at various levels, including law enforcement, regulatory
bodies, and agencies focused on awareness and prevention.
▪ Some prominent ones include:
1. National Cyber Security Coordinator (NCSC): The NCSC operates
under the Prime Minister's Office and is responsible for coordinating all
cybersecurity initiatives in the country.
2. Computer Emergency Response Team-India (CERT-In): CERT-In
is the national nodal agency under the Ministry of Electronics and
Information Technology that deals with cybersecurity incidents, response,
and related issues.
3. National Critical Information Infrastructure Protection Centre
(NCIIPC): NCIIPC is responsible for protecting critical information
infrastructure in the country and formulating policies and guidelines for
securing these assets.
4. State Police Cyber Cells: Many states have established specialized
cyber cells within their police departments to investigate and handle
cybercrimes at the state level.
5. National Investigation Agency (NIA): NIA deals with investigating
and prosecuting offenses affecting the sovereignty, security, and integrity
of India, including cybercrimes with national implications.
6. Cyber Appellate Tribunal (CAT): It hears appeals against any order
passed by CERT In or the Adjudicating Officer under the Information
Technology Act, 2000.
7. Banks and Financial Institutions: Regulatory bodies like the Reserve
Bank of India (RBI) and Securities and Exchange Board of India (SEBI)
have guidelines and teams dedicated to cybersecurity in the financial
sector.
7. Private Cybersecurity Firms: Several private cybersecurity
companies operate in India, offering services ranging from consulting and
risk assessment to incident response and security solutions.
▪ These organizations collaborate to address cyber threats, enforce
cybersecurity laws and regulations, provide guidelines and advisories,
conduct awareness programs, and investigate cybercrimes. They play a
crucial role in safeguarding digital infrastructure and combating cyber
threats in India.
MODULE 03
Social Media Overview and Security:
Introduction to Social networks
▪ Social networks are websites and apps that allow users and
organizations to connect, communicate, share information and form
relationships.
▪ People can connect with others in the same area, families, friends, and
those with the same interests.
▪ Social networks are one of the most important uses of the internet today.
▪ Social networking refers to using internet-based social media sites to
stay connected with friends, family, colleagues, or customers. Social
networking can have a social purpose, a business purpose, or both
through sites like Facebook, X (formerly Twitter), Instagram, and
Pinterest.
▪ Social networking is also a significant opportunity for marketers
seeking to engage customers. Facebook remains the largest and most
popular social network, with 2 billion people using the platform daily, as
of Feb 1, 2023.1 Other popular platforms in the U.S. are Instagram, X,
WhatsApp, TikTok, and Pinterest.
Types of Social media , Social media platforms :
▪ Social media comes in various forms, each with its unique features and
purposes. Here are some types
1. Social networking sites
▪ Social networking sites allow people to connect with each other through
a shared online space. Users can like, share, comment on posts and follow
other users and businesses.
▪ Examples: Facebook, LinkedIn, Instagram, Twitter, TikTok and
Snapchat .
2.Media Sharing Networks
▪ Media sharing types of Social Media are used to find and share
photographs, live video, video and other kinds of media on the web.
▪ They are also going to help you in brand building, lead generation,
targeting and so on.
▪ Examples: Instagram, Snapchat, YouTube.
3.Discussion Forums
▪ Discussion forums encourage people to answer each other's questions
and share ideas and news.
▪ Discussion forums are very essential because they allow users to ask
questions and get answers from different people.
▪ Examples: Quora, Reddit, Digg
4. Blogs and community platforms
▪ These social media networks give you a place to publish your thoughts
on your job,
current events, hobbies and more.
▪ Blogs are a great way for businesses and marketers to reach and provide
credible
information to their target audience.
▪ Examples: WordPress, Tumblr, Medium .
5. Bookmarking networks
▪ Bookmarking networks are platforms where users save different ideas,
articles, posts and other content for later use.
▪ Many people also share links to lists of online resources.
▪ The purpose of these websites is to discover new content based on
shared interests and to discuss trends.
▪ Examples: Feedly, Flipboard,Pocket,StumbleUpon, Pinterest .
6. Consumer Review Networks
▪ Using Customer Review networks will help you find out,share and
review different information about a variety of products, services or
brands.▪ When a business has positive reviews on these networks, their
claims turn more credible because reviews on these networks act as
Social Proof.
▪ Examples: Yelp, Zomato, TripAdvisor .
7. Social shopping networks
▪ These networks help people spot trends, share great finds, make
purchases and follow their favourite brands. They focus on e-commerce,
and the social element makes it engaging and entertaining.
▪ Examples: Polyvore, Etsy, Fancy .
These categories often overlap, and many social media platforms offer a
combination of functionalities to meet user needs and preferences.
Social media monitoring
It is the process of collecting social conversations and messages into a
database of useful information. Social media monitoring is the process of
identifying and determining what is being said about a brand, individual
or product through different social and online channels. Here are some
examples of what social media monitoring can help you achieve:
• Sentiment analysis: Understand how users feel about specific online
conversations (negative, positive, or neutral).
• ROI (return on investment): Identify if and how your money is paying
off.
• Hashtags and keywords: Find the right ones to improve your social
media strategies and attract new customers.
• Trends: Identify popular themes, memes, songs, and topics in real time
and how your brand could jump on some of them to attract business.
• Share of voice: Understand the percentage of online conversations that
are about your brand vs your competitors.
Top Social Media Monitoring Tools
1. Hoot-suite: Effectively track topics that matter—then respond quickly.
2. Sprout Social:Intelligent, real-time social media monitoring with
Sprout.
3.Agora Pulse: Discover what people are really saying about your
business .
4.Zoho Social: Get real-time updates from your audience .
5.Brand24: Smart social media monitoring for businesses of all sizes
6.Mention: Media monitoring made simple
7. Keyhole: Hashtag tracking for Twitter, Instagram, and Facebook
8. Iconosquare: Instagram analytics and management platform
9. Tailwind: Social media monitoring for Pinterest
10. Sendible: Seize opportunities via social listening
Benefits of Monitoring Social Media
1. Brand awareness: Social media monitoring is a great tool to protect
your brand reputation and improve brand awareness. It enables you to be
aware in real time of what customers think and say about your brand on
social media while allowing you to be able to reply to them on the spot.
2. Engage the right audience : Strong and meaningful relationships with
the audience lead to more engaged customers and create fidelity among
your online audience. Social media monitoring allows you to exchange
with them, identify topics and trends they are interested in, as well as
learn more in-depth about your audience’s needs.
3. Competitor analysis: Your competitors are a great source of
information and data to help your brand improve and stay on top. With
social monitoring, your brand is able to know what they are up to,
understand what works best for them to see what could work for your
brand, and learn from their mistakes.
4. Market research: Monitoring helps you stay on track of trends and
customers’ sentiments or experiences. Your brand is able to know what
your customer thinks and feels about your brand products or services,
which enables you to adjust at any moment according to how the data
changes to evolve with your market.
5. Receive better insights from your audience: Customers can offer
useful insights and feedback on social media directly by tagging your
brands or via hashtags. You can easily test out how your audience
responds to each message, product, or content to identify quickly what
works best to create more curated and efficient content, as well as high-
demand services or products.
Hashtag :
▪ When it comes to social media, the hashtag is used to draw attention,
organize, promote, and connect.
▪ Hashtags refer to the usage of the pound or number symbol, "#," to
mark a keyword or topic on social media.
▪ It's used within a post on social media to help those who may be
interested in your topic to be able to find it when they search for a
keyword or particular hashtag .
▪ It helps to draw attention to your posts and encourage interaction.
▪ The hashtag's use in social media is closely associated with micro
blogging site Twitter.
▪ Hashtags can be a fun way to enhance communication and connect
yourself to others discussing the same topic. They offer a shorthand way
of referring to a topic, providing context, or simply adding humor or
sarcasm to a message.
Viral content :
▪ To be “viral” on social media means that a piece of content, such as a
post, video, or image, has become extremely popular and is being shared
by a large number of people on various social media platforms.
▪ Viral content is online content that achieves a high level of awareness
due to shares and exposure on social media networks, news websites,
aggregators, email newsletters and search engines.
▪ Typically, viral content reaches a large number of people within a short
time frame by being frequently shared online. Some key indicators that a
piece of content has "gone viral" include:
− Millions of views/shares within days or weeks
− Getting shared exponentially through social platforms
− Sparking conversations, reactions, and engagement amongst a large
audience
− Getting picked up by mainstream media outlets
− Inspiring remixes, remakes, or spin-offs
Social Media Marketing :
▪ Social media marketing is a form of digital marketing that leverages the
power of popular social media networks to achieve your marketing and
branding goals.
▪ Social media marketing includes increasing website traffic, engagement,
brand awareness, and other marketing goals by designing various types of
content for different social media platforms. The content can be in the
form of videos, blogs, info graphics, or any other forms that have the
potential to go viral.
▪ If it’s done right, social media marketing can be beneficial to in several
ways:
− Increase brand awareness
− Boost conversions rates
− Improve search engine ratings
− Build top-funnel traffic
− Lower marketing campaign costs
▪ While Facebook, Instagram, Linked In, YouTube, and Twitter are the
most popular platforms, there are hundreds of others out there. They
come in many flavors, like — micro blogging, B2B networking, video
sharing, content sharing, bookmarking, Q&A, and so on
Pros and cons of Social media marketing
Pros
• May help companies enhance brand recognition easily
• Offers companies more cost-effective solutions with great exposure
• May be leveraged to increase website traffic and real-time feedback
• May be leveraged for targeted or specific engagements
Cons
• May be time-consuming to set up and maintain
• May be unpredictable, as different platforms may change algoriths
• May result in negative feedba ck displayed in a very public fashion
• May be difficult to fully understand the true ROI
Social media privacy :
▪ Social media privacy includes personal and sensitive information that
people can find out from user accounts. Some of this information is
shared voluntarily through posts and profile information.
▪ Information also may be released unknowingly through tracking cookies,
which track the information of a user's online activity, including webpage
views, social media sharing and purchase history.
▪ Social media privacy is a crucial aspect of online presence. It involves
controlling what information you share on social platforms and who can
access it.
▪ Here are some tips to enhance social media privacy:
1. Privacy Settings: Review and adjust your privacy settings regularly on
each platform. Limit who can see your posts, personal information, and
contact details.
2. Strong Passwords: Use strong, unique passwords for each social
media account. Consider using a password manager to generate and store
complex passwords securely.
3. Two-Factor Authentication (2FA): Enable 2FA wherever possible.
This adds an extra layer of security by requiring a second form of
verification, such as a text code or authentication app.
4. Be Mindful of Sharing: Think before posting. Avoid sharing sensitive
personal information, like your address or phone number, publicly. Be
cautious about sharing location-based information.
5. Regularly Review Permissions: Periodically review and revoke
access for third party apps that are connected to your social media
accounts. Some apps may have access to more of your data than
necessary.
6. Customize Audience: Use platform features that allow you to
customize the audience for each post. Not everything needs to be visible
to everyone on your friend list.
7. Limit Tagging and Geo-Tagging: Disable automatic tagging and Geo
tagging features. This prevents others from tagging you in posts without
your approval and sharing your location.
8. Update Privacy Policies: Stay informed about platform privacy
policies and adjust settings accordingly when policies change.
9. Regularly Audit Your Profile: Review your profile periodically to
remove old posts, photos, or information that you no longer want to be
public.
10. Educate Yourself: Keep yourself updated on common privacy
threats and tactics used by scammers or hackers. Awareness goes a long
way in protecting yourself.
▪ Remember, while social media is a fantastic tool for connecting and
sharing, it's crucial to balance sharing with safeguarding your privacy and
security.
Challenges, opportunities, and pitfalls in online social network :
▪ Online social networks present a myriad of challenges, opportunities,
and potential pitfalls that significantly impact individuals, societies, and
businesses.
▪ Challenges:
1. Privacy Concerns: Users often share personal information, leading to
privacy breaches, identity theft, and data misuse.
2. Cyber bullying and Harassment: Online platforms can become
breeding grounds for cyberbullying and harassment, affecting mental
health and well-being.
3. Fake News and Misinformation: Social networks propagate false
information rapidly, influencing opinions and behaviors.
4. Addiction and Mental Health: Excessive use of social media can
lead to addiction, affecting mental health, self-esteem, and real-life
relationships.
5. Filter Bubbles and Echo Chambers: Algorithms personalize content,
creating isolated echo chambers where users are exposed only to
viewpoints similar to their own, limiting diverse perspectives.
6.Online Disinformation Campaigns: Social networks are susceptible
to coordinated disinformation efforts that can manipulate public opinion,
influence elections, and sow societal discord.
6. Security Threats: Cyberattacks, phishing, and scams can exploit
vulnerabilities within networks, compromising user data and security.
▪ Opportunities:
1. Global Connectivity: Social networks enable people worldwide to
connect, communicate, and share ideas effortlessly.
2. Business and Marketing: Platforms offer businesses a vast audience
for advertising, customer engagement, and market research.
3. Information Dissemination: Social media facilitates the rapid spread
of information, raising awareness about various issues and causes.
4. Community Building: Users can find like-minded individuals, create
communities, and mobilize for social change.
5. Education and Learning: Social networks serve as platforms for
educational content, fostering learning communities and sharing
knowledge.
6. Career Networking: Professional networks assist in career growth,
job hunting, and industry connections.
▪ Pitfalls:
1. Over-reliance on Algorithms: Algorithms can reinforce biases, limit
exposure to diverse perspectives, and prioritize sensational content over
quality information.
2. Dependence on Engagement Metrics: Platforms often prioritize
engagement metrics (likes, shares) over content accuracy or depth,
encouraging click-bait and shallow content.
3. Lack of Regulation: The absence of robust regulations can lead to
unchecked spread of harmful content, misinformation, and exploitation of
user data.
4. Monetization vs. User Well-being: Business models focused on ad
revenue may conflict with user well-being, as platforms aim to maximize
user engagement.
5. Digital Divide: Not everyone has equal access to social networks due
to socioeconomic factors, creating a digital divide.
▪ Balancing these challenges and opportunities is crucial for harnessing
the positive aspects of online social networks while mitigating their
negative impacts. Strategies involving user education, platform
regulations, and responsible design can contribute to a healthier online
environment.
▪ Social media platforms have revolutionized communication, connecting
individuals globally. However, they also pose significant security risks.
Here are some key issues:
1. Privacy Concerns: Social media often requires personal information
for account creation. Users may unintentionally disclose sensitive data,
leading to identity theft, stalking, or harassment.
2. Data Breaches: Cyber attackers target social media platforms to
access user data, including login credentials, personal details, and private
messages. These breaches can result in widespread identity theft and
financial loss.
3. Phishing Attacks: Malicious actors use social media to execute
phishing attacks, tricking users into revealing personal information or
clicking on harmful links that install malware.
4. Fake Accounts and Impersonation: Fraudulent profiles
impersonating real users or organizations deceive individuals. This can
lead to reputational damage or financial scams.
5. Cyber bullying: Social media enables anonymous or semi-anonymous
communication, fostering cyberbullying, harassment, and hate speech.
6.
6. Misinformation and Fake News: False information can spread
rapidly on social media platforms, influencing opinions, and causing
societal discord.
7. Addiction and Mental Health: Excessive use of social media has
been linked to addiction and mental health issues, including anxiety,
depression, and low self-esteem.
8.Geo tagging and Location Tracking: Sharing location details on
social media can compromise personal safety and security, especially
when coupled with other personal information.
9. Third-party Apps and Permissions: Users often grant extensive
permissions to third party apps linked to their social media accounts,
risking data misuse and privacy breaches.
11. Employment and Reputation: Inappropriate content or behavior
shared on social media can negatively impact job prospects and personal
reputation.
▪ To mitigate these risks, users should regularly review and adjust privacy
settings, use strong and unique passwords, be cautious about sharing
personal information, verify sources before sharing news, and remain
vigilant against suspicious activities.
Security issues related to social media:
1. Please read Terms and Conditions carefully. I know it’s a bit
difficult and time-consuming task, but at least have a look. Go
through privacy settings in your account. Don’t rely on default
settings.
2. Please stop clicking on useless posts like “Check your death day”,
“Find which celebrity do you look like” and so on.
3.Install a good antivirus software in your laptop and phone.
4.Turn off your location. Some sites even keep track of your activities in
the offline world, but turning off location will at least do the leas
possible loss.
5.Don’t forget to set up Security Answers.
6.Never leave your account logged in. You are in a way inviting cyber
criminals to hack your account or act as an impostor.
7. Always Check and Analyse your post before posting. Try not to put
too much revealing photos online.
For example, I have once seen a person posting his daughter’s photo
online where the school name was clearly visible on the bus. Thus,
giving personal and private information to everyone. Try to blur such
minor but important details before posting a photo.
8.Always try to create strong password for a site and try to change it in
regular interval of time. Never ever set same passwords for multiple sites.
After having such a detailed discussion on Privacy issues in Online
Social Media, let’s have a look on security issues as well. As discussed,
it’s important for every person joining a social network to look beyond
default settings. Default setting are least secure.
Below is the list of few security threats that we might face in social
media accounts:
Most social networking sites have information like Birthday or
Email address. Hacker can hack your email account by using social
information and can have access to all the information he/she wants.
You don’t need to hide all information. You just need to take the
following precautions:
Always set strong passwords. Don’t go for the easy passwords built
using your Birthday or child’s name etc. i.e., from the information
that is easily accessible from the social media account.
Don’t reveal too much information in a post. Be careful with what
you post online. For example, if I write “Happy Mother’s Day
Mumma Richa Sahani”. Now you see one can guess an answer to
one of my security question “What is your Mother’s Maiden
Name?”. This how it works for the thieves to get information by just
analyzing your posts. They get so much information that they can
even compromise your account.
Don’t reveal your location. Try to keep the location section either
blank or set it to a false location.
Do not use social media accounts from untrusted devices and networks in
hotels, café s, hospitals etc.
Do not elect to remember passwords/passphrases for social media
accounts when offered by web browsers.
With the advent of Social Media like Twitter, there comes URL
Shorteners in picture. Twitter allows a post to be maximum of 280
characters. Thus limiting the size and amount of information that can
be shared. Shortened URLs can trick users into visiting harmful sites
since full URLs are not visible. It is best to keep following points in
mind before clicking on shortened URL to avoid being hacked.
Before clicking a link, place the cursor on the shortened URL. This
will show the complete URL and will give you an idea about where
the full URL actually points.
Check the shortened URL using the services that are available online
like Sucuri to check whether the link is secure or not.
Use services like URL Void or MyWOT to check the safety status of
the link.
Avoid posting too much details online. Will you ever stand in the
middle of the crowd and shout that you are going on a vacation to so
and so place? So why you post all the details of your trip on social
media, with every second detail like “Travelling to London, United
Kingdom from Air India Business Lounge New Delhi”. You are
clearly giving your house keys to burglars. Try to take following
precautions while posting any information online:
Avoid posting specific travel plans and itinerary. Never mention
exact date and time.
Never post photos during the trip. Try to post photos after your
return home from the vacation.Try to stay offline during vacation.
Use the highest privacy controls to let only selective groups like
family, selected friends to view your status updates and photos.
Have you ever wondered how we see a product on Flip-kart and
when we open another site, it will show the advertisement related to
the product that we earlier searched on Flip-kart. Every time we visit
a website, it put invisible marker which we call Cookies in technical
terms in our computer. Job of these cookies is to track the user
activity as we navigate from one site to another.
This is the reason we are able to see the advertisements of our
interest on the new page that we open. Cookies are the major
loophole in the entire secure scenario. Most sites provide a option to
opt out of the tracking feature, but if you don’t get that option,
Please be careful to clear the cache and the cookies on your browser
regularly.
Flagging and reporting of inappropriate content :
▪ Flagging and reporting inappropriate content on social media platforms
is crucial for maintaining a safe and respectful online environment.
▪ Here's a general guide on how it's typically done:
1. Identify the Content: When you come across something inappropriate
(e.g., hate speech, harassment, nudity, violence), take note of it.
2. Check Platform Policies: Review the platform's community
guidelines to ensure the content violates their rules. Different platforms
have different rules and definitions of what constitutes inappropriate
content.
3. Flag or Report: Most platforms have a "Report" or "Flag" option
directly on the post. Click on it, and you'll usually be prompted to choose
a reason for the report (e.g., spam, abusive behavior, nudity).
4. Provide Details: Some platforms allow you to provide additional
details or comments when reporting. Be specific about why you find the
content inappropriate and, if applicable, how it violates the platform's
guidelines.
5. Follow Platform Instructions: After reporting, the platform will
review the content based on its policies. They might take action by
removing the content, warning the user, or even suspending their account,
depending on the severity of the violation.
6. Monitor and Follow Up: While the process may vary, many platforms
send notifications about the actions taken or the status of the report. If
necessary, follow up or re-report if the content remains unresolved.
▪ Remember, while flagging content is essential, it's also important to
avoid engaging with or spreading inappropriate content further. If you
feel that content poses an immediate risk (like self-harm or danger to
others), consider contacting local authorities.
Laws regarding posting of inappropriate content :
▪ Laws around posting inappropriate content on social media can vary
widely by country and even within regions due to different legal systems
and cultural norms.
▪ However, there are some common principles and regulations that many
places uphold:
1. Hate Speech and Discrimination: Many countries have laws against
hate speech, which includes content that promotes violence or
discrimination against individuals or groups based on characteristics like
race, religion, ethnicity, gender, sexual orientation, or disability.
2. Defamation and Libel: Posting false information that harms
someone's reputation an lead to legal action for defamation or libel. This
includes both written and visual content that portrays someone in a false
and negative light.
3. Copyright Infringement: Using someone else content without
permission can violate copyright laws. This applies to images, videos,
music, and other creative works.
4. Privacy Violations: Sharing private information, such as someone's
address, personal details, or intimate media, without their consent can
violate privacy laws.
▪ In India, there are laws and regulations that address the posting of
inappropriate content on social media platforms.
▪ Some of the key laws and guidelines related to this include:
1. Information Technology (Intermediary Guidelines and Digital
Media Ethics Code) Rules, 2021:
These rules introduced various regulations for social media intermediaries
and digital platforms in India. They outline obligations for platforms to
remove specific types of content within a specified time frame. They
require platforms to appoint officers for grievance readdress and
compliance.
2. Indian Penal Code (IPC): Sections of the IPC deal with offenses
related to defamation (Section 499), obscenity (Section 292), and acts
intended to outrage religious feelings (Section 295A), among others.
These sections can be invoked for inappropriate content posted on social
media if it falls within the purview of these offenses.
3. The Information Technology Act, 2000: Section 67 of this act deals
with punishment for publishing or transmitting obscene material in
electronic form. It prohibits the publishing or transmitting of obscene
content in electronic form.
4. Defamation Laws: Both civil and criminal defamation laws exist in
India, which can be applied if someone posts defamatory content on
social media.
Best practices for the use of Social media :
▪ Here are some best practices for using social media effectively:
1. Define Your Goals: Determine what you want to achieve with your
social media presence. Whether it's brand awareness, lead generation,
customer engagement, or something else, having clear goals will guide
your strategy.
2. Know Your Audience: Understand your target audience's preferences,
behaviors, and demographics. Tailor your content to resonate with them.
3. Quality Content: Share valuable, relevant, and engaging content. This
could be in various formats like images, videos, articles, info graphics,
etc.
4. Use Hashtags Wisely: Research and use relevant hashtags to increase
the visibility of your posts. But don't overdo it; use them sparingly and
appropriately.
5. Post Regularly: Consistency is vital. Develop a content calendar to
maintain a steady posting schedule, but avoid over posting – quality over
quantity matters.
5. Stay Up-to-Date: Social media trends and algorithms change
frequently. Stay informed about platform updates and trends to adapt
your strategy accordingly.
6. Community Building: Create a sense of community around your
brand. Encourage user generated content, run contests, and involve your
audience in discussions.
7. Respect Privacy and Policies: Understand and comply with platform
guidelines, privacy policies, and copyright laws to avoid any issues.
Case studies:
Security Case Studies:
1. Facebook-Cambridge Analytica Scandal (2018): Cambridge
Analytica harvested data from millions of Facebook profiles without
users' consent. This breach raised concerns about data privacy and led to
investigations, changes in Facebook's policies, and CEO Mark
Zuckerberg's testimony in front of Congress.
2. Twitter Hacks (2020): Several high-profile Twitter accounts,
including those of Barack Obama, Elon Musk, and Bill Gates, were
compromised in a Bitcoin scam. Hackers gained access to accounts
through social engineering attacks on employees, highlighting the need
for robust internal security protocols.
3. LinkedIn Data Breach (2021): Personal data of around 500 million
LinkedIn users, including email addresses and phone numbers, was
scraped and put for sale online. It raised concerns about data scraping and
the vulnerability of personal information on professional networking sites.
4. TikTok's Privacy Concerns: TikTok faced scrutiny over its data
collection practices, especially given its Chinese ownership. Concerns
were raised about the potential misuse of user data and its handling,
leading to investigations and debates regarding national security risks.
5. WhatsApp Privacy Policy Update (2021): WhatsApp faced backlash
after announcing changes to its privacy policy, allowing greater data
sharing with its parent company, Facebook. This led to widespread
concern over user privacy and data sharing practices.
Security Measures:
▪ Two-Factor Authentication (2FA): Adding an extra layer of security
to accounts.
▪ Privacy Settings Review: Regularly reviewing and adjusting privacy
settings.
▪ Strong Passwords: Using complex and unique passwords for different
platforms.
▪ Regular Updates and clear cache.
MODULE -04
Definition of E- Commerce:
E-Commerce or Electronic Commerce means buying and selling of
goods, products,or services over the internet.
▪E-commerce is also known as electronic commerce or internet
commerce.
▪Transaction of money, funds, and data are also considered as E-
commerce.
▪These business transactions can be done in four ways: Business to
Business (B2B), Business to Customer (B2C), Customer to Customer
(C2C), Customer to Business (C2B).
Main components of E-Commerce
▪ The components of E-Commerce are as follows:
1. User: This may be individual / organization or anybody using the e-
commerce platforms.
2. E-commerce vendors: This is the organization/ entity providing the
user, goods/services.
E.g.: WWW.flipkart.com.E-commerce Vendors further needs to ensure
following for better, effective and efficient transaction.
− Suppliers and Supply Chain Management
− Warehouse operations
− Shipping and returns
− E-Commerce catalogue and product display
− Marketing and loyalty programs
3. Technology Infrastructure: This includes Server computers, apps etc.
These are the backbone for the success of the venture. They store the
data/program used to run the whole operation of the organization.
4. Internet/ Network: This is the key to success of e-commerce
transactions. Internet connectivity is important for any e-commerce
transaction to go through. The faster net connectivity leads to better e-
commerce.
5. Web Portal: This shall provide the interface through which an
individual/organization shall perform e-commerce transactions. These
web portals can be accessed through desktops/ laptops/PDA/hand- held
computing devices/ mobiles and now through smart TVs.
6. Payment Gateway: The payment mode through which customers shall
make payments. Payment gateway represents the way e-commerce
vendors collect their payments. Examples are Credit / Debit Card
Payments, Online bank payments, Vendors own payment wallet, Third
Party Payment wallets, like PAYTM and Unified Payments Interface
(UPI).
Elements of E-Commerce security :
▪ E-commerce security involves safeguarding online transactions and
protecting sensitive information during online purchases. Here are some
key elements:
1. Encryption: Encrypting data ensures that sensitive information like
credit card details, personal information, and transaction data is encoded
during transmission. Secure Sockets Layer (SSL) or Transport Layer
Security (TLS) protocols are commonly used to encrypt data.
2. Secure Payment Gateways: Using trusted and secure payment
gateways ensures that financial information is transmitted securely
between the customer, merchant, and financial institutions.
3. Firewalls and Security Software: Implementing firewalls and up-to-
date security software helps prevent unauthorized access to the e-
commerce website's network. This includes protection against malware,
viruses, and other cyber threats.
4. Authentication and Authorization: Employing strong user
authentication methods, such as two-factor authentication (2FA), helps
verify the identity of users, reducing the risk of unauthorized access.
5. Regular Updates and Patch Management: Ensuring that the e-
commerce platform and all
associated software are regularly updated with the latest security patches
helps mitigate vulnerabilities that could be exploited by attackers.
6. Data Privacy and Compliance: Adhering to data privacy regulations
(such as GDPR, CCPA) and implementing privacy policies that protect
customer data is crucial. This includes proper handling and storage of
personal information.
7. Risk Assessment and Monitoring: Conducting regular security audits
and risk assessments helps identify potential vulnerabilities and threats.
Continuous monitoring of systems for suspicious activities is vital to
detect and respond to any security breaches promptly.
8. Customer Education: Educating customers about safe online practices,
such as creating strong passwords, avoiding public Wi-Fi for sensitive
transactions, and being cautious of phishing attempts, can significantly
enhance overall e-commerce security.
9. Physical Security Measures: Ensuring physical security of servers
and data centers where customer information is stored is essential to
prevent unauthorized access to hardware and infrastructure.
10.Backup and Disaster Recovery: Implementing robust backup and
disaster recovery plans ensures that in case of a security breach or system
failure, data can be recovered without significant loss.
E-Commerce threats :
▪ E-commerce platforms face various threats that can compromise
security and disrupt operations. Here are some common threats:
1.Data Breaches: These occur when sensitive customer information,
such as credit card details or personal data, is accessed or stolen by
unauthorized individuals or cybercriminals. Breaches can happen through
hacking, phishing, or exploiting vulnerabilities in the system.
2.Phishing Attacks: Cybercriminals use deceptive emails, messages, or
websites that mimic legitimate sources to trick users into revealing
sensitive information like login credentials, credit card numbers, or
personal details.
3. Malware and Viruses: Malicious software can infect e-commerce
websites, compromising user data, stealing information, or disrupting
operations. Malware can be introduced through infected files, links, or
vulnerable software.
4.DDoS Attacks: Distributed Denial of Service attacks aim to overwhelm
a website's servers with excessive traffic, causing it to become slow or
unavailable, disrupting business operations and potentially leading to
financial losses.
5.SQL Injection: Attackers exploit vulnerabilities in the website's code
to insert malicious SQL queries, allowing them to access or manipulate
the database, compromising sensitive information.
6.Man-in-the-Middle (MITM) Attacks: Hackers intercept
communication between a user and an e-commerce website to eavesdrop,
steal information, or manipulate data during the transmission.
7.Identity Theft: Cybercriminals may steal user identities from e-
commerce platforms to make fraudulent purchases, access financial
accounts, or commit other forms of fraud.
8.Supply Chain Attacks: Hackers target weaknesses in the supply chain
to access the e-commerce platform, compromising the security of
transactions, customer data, or the overall system.
9.Payment Frauds: Fraudulent activities during payment transactions,
such as stolen credit card information or unauthorized transactions, pose a
significant threat to e-commerce platforms and customers.
E-Commerce security best practices :
▪ Ensuring security in e-commerce is crucial to protect both your business
and your customers' sensitive information. Here are some best practices:
1. Use Secure Sockets Layer (SSL) Encryption: Encrypt data
transmitted between your website and users' browsers. This prevents
interception of sensitive information like credit card details.
2. Implement Strong Password Policies: Encourage users to create
strong passwords and use multi-factor authentication (MFA) wherever
possible to add an extra layer of security.
3. Regularly Update Software and Security Patches: Keep your e-
commerce platform, plugins, and software updated to patch
vulnerabilities that attackers could exploit.
4. Secure Payment Gateways: Use reputable payment gateways that
comply with Payment Card Industry Data Security Standard (PCI DSS).
Avoid storing payment information on your servers.
5. Data Encryption: Encrypt sensitive data, including customer
information and payment details, when stored in databases or during
transmission.
6.Regular Security Audits and Testing: Conduct security audits and
penetration testing to identify vulnerabilities and weaknesses in your
system before attackers do.
7.Implement Firewalls and DDoS Protection: Install firewalls to
monitor and control incoming and outgoing traffic. Use DDoS
(Distributed Denial of Service) protection to prevent service disruption
due to attacks.
8.Train Employees: Educate your staff about security best practices,
phishing attacks, and how to handle sensitive information to prevent
internal security breaches.
9.Privacy Policies and Compliance: Comply with data protection
regulations (like GDPR, CCPA) and clearly communicate your privacy
policies to customers.
10.Monitor and Respond to Suspicious Activity: Implement
monitoring systems to detect unusual activity and respond promptly to
security incidents.
11.Backup Data Regularly: Keep regular backups of your e-commerce
data to ensure you can recover in case of a security breach or data loss.
12.Limit Access to Data: Restrict access to sensitive data. Only grant
access to those who need it for their specific roles.
Advantage of e-commerce
1. Reduced overhead costs: Running an e-commerce store is a lot more
cost-effective than running a physical store. You don’t have to rent
commercial real estate — instead, you can pay an affordable fee for web
hosting.
2. No need for a physical storefront: There are so many difficult aspects
to running a physical storefront and using e-commerce means you don’t
have to face most of those obstacles. Renting a commercial property can
be expensive. You also have to pay for electricity, water, and internet to
ensure your space is up to code and can handle your business. There’s
also security to consider; if you want your physical storefront to be secure,
you’ll need to invest in cameras and other surveillance equipment. With
an e-commerce store, you can simply build your website and start selling
your products online without worrying about setting up a physical
storefront and spending as much money.
3. Ability to reach a broader audience: Perhaps the biggest advantage
of e-commerce is the fact that it allows you to reach a massive audience.
Your physical storefront can only get so many visitors in a day, especially
if you live in a smaller town or a rural area. With an e-commerce store,
you can reach potential customers all throughout the world and show
them your products.
4. Scalability:. If you have a physical storefront, your business can only
grow so much before you have to move to a larger storefront. You also
have to move inventory and equipment from one location to another,
which makes it even harder to scale your store with the growth of your
business. With e-commerce, your website and store can grow as your
business does, and you don’t have to spend a fortune moving to a new
physical space.
5. Track logistics: Keeping track of logistics is an essential part of e-
commerce and retail marketing, and it’s significantly easier with e-
commerce than it is with a physical storefront. You can outsource
fulfillment logistics so your customers can enjoy benefits like 2-day
shipping and easy returns processing.
Survey of popular e-commerce sites :
▪ There are several popular e-commerce sites that cater to different
markets and needs.
▪ Some of the well-known ones globally include:
1. Amazon: One of the largest online retailers, offering a wide range of
products from electronics to books to household items.
2. eBay: Known for its auction-style selling and a vast array of products,
including both new and used items.
3. Ali baba: A Chinese e-commerce company specializing in wholesale
trading between businesses and consumers.
4. Walmart: A major retailer with a strong online presence, selling a
variety of products similar to its physical stores.
5. Etsy: Focused on handmade, vintage, and unique goods, often catering
to niche markets and creative products.
6. Target: Similar to Walmart, Target offers a diverse range of products
and has a significant online presence.
7. Best Buy: Specializes in electronics, offering a wide selection of tech-
related products.
8. Zappos: A popular online shoe and clothing retailer known for its
customer service and wide selection.
9. ASOS: Primarily focused on fashion and beauty products, targeting a
younger audience with trendy items.
10. Rakuten: A diverse marketplace offering various products and
services, often providing cashback rewards for purchases.
▪ Each of these platforms has its own strengths, unique selling points, and
target demographics, making them popular choices for different types of
consumers.
Introduction to Digital Payments :
▪ Digital payments are payments done through digital or online modes,
with no exchange of hard cash being involved. Such a payment,
sometimes also called an electronic payment (e-payment), is the transfer
of value from one payment account to another where both the payer and
the payee use a digital device such as a mobile phone, computer, or a
credit, debit, or prepaid card.
▪ The payer and payee could be either a business or an individual. This
means that for digital payments to take place, the payer and payee both
must have a bank account, an online banking method, a device from
which they can make the payment, and a medium of transmission,
meaning that either they should have signed up to a payment provider or
an intermediary such as a bank or a service provider.
Components of Digital Payment and Stake holders
▪ Digital payments involve several components and stakeholders that
collectively facilitate the transfer of money or transactions through
electronic means.
▪ Here are the key components and stakeholders:
▪ Components:
1.Payment Gateway: It's the technology that authorizes and facilitates
transactions by connecting merchants, banks, and customers. It encrypts
sensitive information and ensures secure transfer.
2.Payment Processor: Responsible for managing the transaction process
by transmitting data between the merchant's bank and the customer's bank.
It verifies transaction details and ensures funds are transferred.
3.Mobile Wallets: Apps or platforms that store payment information,
allowing users to make transactions through their smartphones. Examples
include Apple Pay, Google Pay, and PayPal.
4.Digital Currencies/Cryptocurrencies: These decentralized forms of
currency (like Bitcoin or Ethereum) facilitate peer-to-peer transactions
through blockchain technology.
5.Near Field Communication (NFC): Technology that enables contact-
less payments by allowing devices to communicate when in close
proximity.
6.QR Codes: Scan able codes that store payment information, enabling
easy transactions by simply scanning the code.
▪ Stakeholders:
1. Customers/Users: Individuals or entities making payments or
transactions using digital payment methods.
2. Merchants/Retailers: Businesses or individuals selling goods or
services and accepting digital payments from customers.
3. Financial Institutions: Banks, credit unions, and other financial
entities that provide the infrastructure and accounts necessary for digital
transactions.
4. Payment Service Providers (PSPs): Companies that offer services
facilitating digital payments for merchants, such as Stripe, Square, or
Adyen.
5. Regulatory Bodies/Government Agencies: Entities responsible for
creating and enforcing rules, regulations, and standards for digital
payments to ensure security and fairness.
6. Technology Providers: Companies developing and maintaining the
technology and software necessary for secure digital payment systems,
including hardware manufacturers and software developers.
7. Security Firms: Organizations specializing in ensuring the security of
digital payment systems by providing encryption, fraud detection, and
cybersecurity services.
▪ These components and stakeholders collectively form the ecosystem
that enables the seamless execution of digital payments across various
platforms and devices.
Modes of digital payments :
▪ There are various modes of digital payments that have become
increasingly popular due to their convenience and accessibility.
▪ Here's a brief overview of each:
1. Banking cards:
Cards are among the most widely used payment methods and come with
various features and benefits such as security of payments, convenience,
etc. The main advantage of debit/credit or prepaid banking cards is that
they can be used to make other types of digital payments.
For example, customers can store card information in digital payment
apps or mobile wallets to make a cashless payment. Some of the most
reputed and well-known card payment systems are
Visa, Ru-pay and MasterCard, among others. Banking cards can be used
for online purchases, in digital payment apps, PoS machines, online
transactions, etc.
2. Unified Payment Interface (UPI)
UPI is a payment system that culminates numerous bank accounts into a
single application, allowing the transfer of money easily between any two
parties. As compared to NEFT, RTGS, and IMPS, UPI is far more well-
defined and standardized across banks. You can use UPI to initiate a bank
transfer from anywhere in just a few clicks. The benefit of using UPI is
that it allows you to pay directly from your bank account, without the
need to type in the card or bank details. This method has become one of
the most popular digital payment modes in 2020, with October witnessing
over 2 billion transactions.
3. e-Wallets
Electronic wallets or e-wallets store financial information and allow users
to make online transactions quickly. E-wallet is a type of prepaid account
in which a user can store his/her money for any future online transaction.
An E-wallet is protected with a password. With the help of an E-wallet,
one can make payments for groceries, online purchases, and flight tickets,
among others. E-wallet has mainly two components, software and
information. The software component stores personal information and
provides security and encryption of the data. The information component
is a database of details provided by the user which includes their name,
shipping address, payment method, amount to be paid, credit or debit card
details, etc. Services like PayPal, Google Pay, Apple Pay, and Paytm fall
under this category.
4. Unstructured Supplementary Service Data (USSD)
USSD technology enables mobile banking services through basic phones,
allowing users to access banking services by dialing a short code. This
method doesn't require internet connectivity and is particularly beneficial
in regions with limited internet access. USSD was launched for those
sections of India’s population which don’t have access to proper banking
and internet facilities. Under USSD, mobile banking transactions are
possible without an internet connection by simply dialing *99# on any
essential feature phone.
This number is operational across all Telecom Service Providers (TSPs)
and allows customers to avail of services including inter bank account to
account fund transfer, balance inquiry, and availing mini statements.
Around 51 leading banks offer USSD service in 12 different languages,
including Hindi & English.
5. Aadhar enabled payments system (AEPS)
AEPS is a bank-led model for digital payments that was initiated to
leverage the presence and reach of Aadhar. Under this system, customers
can use their Adhara-linked accounts to transfer money between two
Aadhar linked Bank Accounts. As of February 2020, AEPS had crossed
more than 205 million as per NPCI data.AEPS doesn’t require any
physical activity like visiting a branch, using debit or credit cards or
making a signature on a document. This bank-led model allows digital
payments at PoS (Point of Sale / Micro ATM) via a Business
Correspondent (also known as Bank Mithra) using Aadhaar
authentication.
▪ Each mode of digital payment offers its own set of advantages in terms
of accessibility, ease of use, security, and suitability for different
scenarios. The choice of which to use often depends on factors like
convenience, accessibility to technology, internet connectivity, and
personal preferences.
Digital Payments Related Common Frauds and Preventive Measures
▪ With the increasing trend of digital payment systems, the number of
fraud attempts is also increasing at an alarming rate. Cybercriminals are
always looking for ways to exploit the loopholes in the digital payment
process to steal money from unsuspecting individuals.
1.Phishing
▪ Phishing scams are fake messages, emails, or websites that trick people
into providing their personal information, such as login credentials, credit
card details, or social security numbers. These scammers then use this
information to access victims’ accounts and steal their funds.
▪ Preventive Measures:
− Verify website URLs before entering any personal information.
− Never share personal or financial details via email or unsecured
websites.
− Enable two-factor authentication for added security.
2.Identity Theft
▪ Identity theft occurs when a fraudster steals someone’s personal
information, such as their name, address, or social security number, and
uses it for fraudulent activities, such as opening a new credit card or
mobile payment account.
▪ Preventive Measures:
− Use strong, unique passwords for each financial account.
− Regularly monitor your credit report for any suspicious activities.
− Be cautious while sharing personal information online.
3.Account Takeover
▪ In an account takeover, a fraudster gains access to a user’s digital
payment account by stealing their login credentials or obtaining their
personal information using phishing scams. The attacker then uses the
account to make unauthorized transactions and transfer funds.
▪ Preventive Measures:
− Use strong, unique passwords and change them regularly.
− Enable account alerts for any unusual activity.
− Consider using biometric authentication if available.
4.Card Skimming
▪ Card skimming involves the illegal copying of a user’s credit or debit
card information using a skimming device when the card is swiped for
payment. The scammers then use the copied information to make
fraudulent transactions.
▪ Preventive Measures:
− Check for tampering on card readers before using them.
− Use contactless payment methods where possible.
− Regularly monitor your account statements for any unauthorized
charges.
5.Malware and Spyware:
▪ Malicious software designed to steal financial information from devices.
▪ Preventive Measures:
− Install and regularly update antivirus and anti-malware software.
− Avoid clicking on suspicious links or downloading unknown
attachments.
− Keep your device's operating system and apps up to date.
6. Unauthorized Transactions:
▪ Transactions made without the account holder's knowledge or consent.
▪ Preventive Measures:
− Regularly check account statements for any unfamiliar transactions.
− Enable transaction notifications or alerts for your accounts.
− Report any unauthorized transactions to your bank or payment provider
immediately.
7. Social Engineering Attacks:
▪ Manipulating individuals to reveal confidential information.
▪ Preventive Measures:
− Be cautious of unsolicited calls or messages asking for personal
information.
− Verify the identity of the person or organization before sharing any
details.
− Educate yourself and your family about common social engineering
tactics.
RBI guidelines on digital payments and customer protection in
unauthorized banking transaction:
▪ The Reserve Bank of India (RBI) has put forth various guidelines
regarding digital payments and customer protection, particularly
concerning unauthorized banking transactions.
▪ Here are some key aspects:
▪ Digital Payments:
1.Security Measures: RBI mandates that banks and financial institutions
implement robust security measures to safeguard digital transactions.
This includes two-factor authentication, encryption, and other security
protocols.
2.Customer Awareness: Banks are required to educate customers about
safe digital practices, potential risks, and methods to secure their
transactions. This could be through notifications, SMS alerts, or
educational campaigns.
3.Fraud Monitoring: Regular monitoring of transactions for any
suspicious activity or patterns to prevent fraudulent transactions is
mandatory.
4.Prompt Redressal: There are provisions for customers to report
unauthorized transactions promptly. Upon receiving such reports, banks
are obligated to investigate and resolve complaints within a specific
timeline.
▪ Customer Protection in Unauthorized Transactions:
1.Limited Liability of Customers: In cases of unauthorized transactions,
if the customer reports the transaction within a stipulated time frame, the
customer's liability is limited. The liability shift is from the customer to
the bank, subject to certain conditions and documentation.
2.Timely Reporting: Customers are encouraged to report unauthorized
transactions or any suspicious activity as soon as possible to minimize
their liability.
3.Dispute Resolution: There is a defined process for dispute resolution
between the customer and the bank regarding unauthorized transactions.
4.Reversal of Transactions: The RBI mandates that banks have to
ensure prompt reversal of any unauthorized transaction within a specified
time frame once it is reported by the customer.
Relevant provisions of Payment Settlement Act,2007.
▪ The Payment and Settlement Systems Act, 2007 is an Indian legislation
that provides the regulatory framework for payment systems in India.
Here are some of the relevant provisions:
1. Regulation of Payment Systems: The Act establishes the Reserve
Bank of India (RBI) as the regulatory authority for payment systems in
India. It aims to ensure the stability, efficiency, and integrity of payment
systems.
2. Designation of Payment Systems: The RBI has the authority to
designate systems for the purpose of the Act, allowing it to regulate and
supervise various payment systems in the country.
3. Licensing of Payment System Operators: The Act outlines
provisions for the licensing and regulation of payment system operators,
ensuring that entities involved in payment systems meet certain criteria
and adhere to specified norms.
4. Oversight and Monitoring: The RBI is empowered to oversee and
monitor payment systems to ensure their smooth functioning, stability,
and compliance with regulations.
5. Settlement Finality: The Act provides for settlement finality, meaning
that once a settlement in a payment system is deemed final, it cannot be
revoked or reversed, except in certain specified circumstances.
6. Establishment of Payment System Board: The Act establishes a
Payment System Board within the RBI to regulate and supervise payment
systems more effectively.
7. Penalties and Enforcement: Provisions for penalties and enforcement
mechanisms are outlined in the Act to ensure compliance with its
provisions and regulations set by the RBI.
▪ These provisions and more are detailed in the Payment and Settlement
Systems Act, 2007, aimed at fostering a secure, efficient, and reliable
payment system framework in India.
MODULE O5
End Point device and Mobile phone security :
▪ Securing endpoint devices and mobile phones is crucial due to the
sensitive information they often hold and their susceptibility to various
threats. Here are some essential practices:
▪ For End Point Devices:
1. Keep Software Updated: Regularly update operating systems and
applications. Patches often contain security fixes.
2. Use Antivirus/Malware Protection: Install reputable antivirus and
anti-malware software. Schedule regular scans.
3. Implement Firewalls: Enable firewalls to prevent unauthorized access
to your device.
4.Strong Authentication: Use strong, unique passwords or consider
using password managers. Implement multi-factor authentication where
possible.
5.Encrypt Data: Encrypt sensitive data to prevent unauthorized access if
the device is lost or stolen.
6. Backup Regularly: Maintain backups of important data. In case of a
security breach, you can recover your data.
7. Limit User Privileges: Users should have only the necessary
permissions to perform their tasks to limit the potential damage from a
compromised account.
▪ For Mobile Phones:
1. Lock Screen Security: Use pass codes, patterns, fingerprints, or facial
recognition to secure access to the device.
2. App Permissions: Review and manage app permissions to limit what
data apps can access.
3. Install from Trusted Sources: Only download apps from official app
stores to reduce the risk of installing malicious software.
4. Encrypt Mobile Data: Enable encryption for data stored on the device.
Most modern smartphones have this option in settings.
5. Remote Wipe/Find Features: Activate remote wipe/locate features so
that if the device is lost, you can erase its data or find its location.
6. Regular Updates: Keep the phone's operating system and apps
updated to patch vulnerabilities.
8. Use VPNs on Public Networks: When connecting to public Wi-Fi,
use a Virtual Private Network (VPN) for encrypted and secure browsing.
9. Avoid Jail breaking or Rooting: Avoid modifying the phone's
operating system beyond the manufacturer's intended use, as it can
expose the device to more risks.
Password policy :
▪ A password policy sets the rules that passwords for a service must meet,
such as length and type of characters allowed and disallowed.
▪ Password policies are crucial for ensuring the security of digital
accounts and systems. They typically include guidelines and requirements
that dictate how passwords should be created, used, and managed. Here
are some common elements of a robust password policy:
1. Password Length: Requiring a minimum number of characters (often
8-12) helps create stronger passwords.
2. Complexity Requirements: Encouraging or mandating a mix of
character types (uppercase, lowercase, numbers, symbols) makes
passwords harder to crack.
3. Regular Changes: Requiring periodic password changes (every 60-90
days) reduces the risk of prolonged exposure to potential breaches.
4. Prohibiting Common Passwords: Blocking commonly used or easily
guessable passwords enhances security.
5. Account Lockout: Implementing a mechanism that locks an account
after multiple failed login attempts prevents brute force attacks.
6. Multi-Factor Authentication (MFA): Encouraging or mandating the
use of MFA adds an extra layer of security, requiring users to provide
more than one form of verification.
7. Education and Training: providing guidance to users on creating
strong passwords and the importance of safeguarding them through
regular training or resources.
8. Restrictions on Password Sharing: Discouraging or prohibiting the
sharing of passwords helps maintain individual account security.
9. Monitoring and Enforcement: Regularly auditing password practices
and enforcing policy compliance ensures ongoing security.
10. Encryption and Storage: Safely storing passwords using encryption
and secure hashing methods mitigates the risk of exposing them in case of
a data breach.
▪ Creating a policy that balances security needs with user convenience is
essential. Forcing overly complex passwords might lead users to write
them down or reuse them across multiple accounts, which can introduce
vulnerabilities. Balancing complexity with usability is often a challenge
but a critical aspect of a strong password policy.
Security patch management :
▪ Security patch management is a crucial aspect of maintaining a secure
system or network. It involves identifying, acquiring, testing, and
applying patches or updates to software, applications, or devices to
address known vulnerabilities or security weaknesses. Here's a
breakdown of the process:
1. Identification: Stay informed about security vulnerabilities. This
involves monitoring vendor websites, security advisories, mailing lists,
and other sources to identify patches relevant to your systems.
2. Assessment: Evaluate the severity and impact of the vulnerability on
your systems. Determine if the patch is applicable and necessary for your
environment.
3. Acquisition: Download or obtain the necessary patches or updates
from the official sources. Ensure that you're getting patches from trusted
and verified sources to avoid installing malicious software.
4. Testing: Before deploying patches to your production environment,
test them in a controlled environment (like a test network or system) to
ensure they work as intended and don’t create conflicts with existing
software.
4. Deployment: Once patches are tested and validated, deploy them to
the production environment. Use automation tools where possible to
streamline the deployment process.
5. Verification: Confirm that the patches have been successfully applied
and that systems are functioning properly after the update.
6. Monitoring and Maintenance: Regularly monitor for new
vulnerabilities and keep track of installed patches. Perform periodic
checks to ensure all systems are up to date with the latest security patches.
7. Documentation: Maintain records of applied patches, dates, and any
issues encountered during the patching process. Documentation is
essential for audits and future reference.
▪ Effective patch management helps mitigate the risks associated with
security vulnerabilities, reducing the chances of security breaches or
attacks exploiting known weaknesses in software or systems.
Data backup :
▪ Data backup is crucial for safeguarding your important information. It
involves creating duplicate copies of your files or data to protect against
data loss in case of hardware failures, human error, cyber attacks, or any
unforeseen disasters.
▪ Here are some essential tips for effective data backup:
1. Regular backups: Set up a routine schedule for backing up your data.
How frequently you back up depends on the importance of the data and
how frequently it changes.
2. Multiple locations: Store your backups in multiple locations. This
could include external hard drives, cloud storage, or even offsite locations.
Having copies in different places reduces the risk of losing all data in
case of a localized issue.
3. Automate backups: Use backup tools that allow you to automate the
process. This ensures consistency and helps prevent forgetting to back up
important data.
4. Verify backups: Periodically check your backups to ensure they are
complete and accurate. Sometimes, backups may contain errors or
become corrupted.
5. Use encryption: If your data contains sensitive information, consider
encrypting your backups. This adds an extra layer of security, especially
when storing data in the cloud or on portable devices.
6. Test restoration: Regularly test the restoration process to ensure your
backups are usable. It’s crucial to know that you can recover data
effectively when needed.
7. Prioritize important data: Not all data is equally critical. Prioritize
what needs to be backed up more frequently or with higher security
measures.
Downloading and management of third-party software :
▪ Downloading and managing third-party software involves several steps
to ensure you're obtaining it safely and using it securely:
1. Source: Obtain software from reputable sources. Official websites or
trusted app stores (like Apple App Store, Google Play Store, Microsoft
Store) are safer than random websites.
2. Reviews and Ratings: Check reviews, ratings, and user feedback to
gauge the software's reliability, performance, and security.
3. Official Websites: Prefer downloading from the official website of the
software developer. Be cautious of downloading from third-party
websites as they might bundle software with malware.
4. Verify Authenticity: Verify the authenticity of the website and the
software. Look for digital signatures or official hashes provided by the
developer to ensure the software hasn't been tampered with.
5. Read Permissions: When installing, read the permissions the software
is requesting. Be cautious if the permissions seem excessive for the
software's intended function.
6. Security Software: Have reliable antivirus/anti-malware software
installed and keep it up to-date. Run scans on downloaded files to ensure
they're safe.
7.Regular Updates: Keep all software updated, including third-party
applications, to patch security vulnerabilities.
8. Uninstall Unused Software: Remove any software that is no longer
needed to reduce the potential vulnerabilities on your system.
9. License Agreement: Read the license agreement to understand the
terms and conditions of using the software.
10.Back Up Data: Regularly back up your data to mitigate the impact of
any potential issues caused by third-party software.
11. Virtual Environments/Sandboxes: Consider using virtual
environments or sandboxes to test potentially risky software before
installing it on your main system.
▪ Remember, exercising caution and staying informed are crucial when
downloading and managing third-party software to maintain the security
and performance of your system.
Device security policy :
▪ Creating a device security policy is crucial to safeguarding your systems
and data. Here are some key components you might want to consider
when drafting a device security policy:
1. Device Usage Guidelines: Establish rules for how devices should be
used within your organization. This might include specifying who can use
company devices, how they should be used, and for what purposes.
2. Acceptable Use Policy: Define what is and isn't permitted on company
devices. This can cover browsing certain websites, downloading software,
or using external drives.
3. Password and Authentication: Require strong, unique passwords for
each device and enforce multi-factor authentication where possible.
4. Data Encryption: Mandate encryption for sensitive data stored on
devices to prevent unauthorized access.
5. Regular Updates and Patching: Ensure that devices have the latest
security updates and patches installed to protect against vulnerabilities.
6.Access Control: Implement controls that limit access to data and
systems based on job roles and responsibilities.
7. Remote Access Security: Define protocols for secure remote access to
company systems, including the use of virtual private networks (VPNs)
and secure connections.
8. Lost or Stolen Devices: Establish procedures for reporting and
handling lost or stolen devices to mitigate potential data breaches.
9. Software and Application Management: Specify guidelines for
installing, updating, and removing software and applications on company
devices.
10. Monitoring and Reporting: Outline measures for monitoring device
usage, detecting security incidents, and reporting breaches or suspicious
activities.
11. Employee Training: Provide regular training and awareness
programs to educate employees about security best practices and potential
threats.
12. BYOD (Bring Your Own Device) Policy: If applicable, define rules
for personal devices used for work purposes, including security
requirements and access limitations.
Cyber Security best practices :
▪ Cybersecurity is crucial in protecting digital systems and data. Here are
some best practices to enhance cybersecurity:
1. Use Strong Passwords: Create complex passwords with a mix of
letters (uppercase and lowercase), numbers, and symbols. Consider using
a password manager to keep track of them.
2. Enable Multi-Factor Authentication (MFA): Implement MFA
wherever possible. It adds an extra layer of security by requiring users to
provide more than one form of identification to access an account.
3. Keep Software Updated: Regularly update operating systems,
applications, and antivirus software. Updates often include security
patches that protect against known vulnerabilities.
4. Regular Backups: Perform regular backups of important data and
systems. This ensures that if there's a security breach or data loss, you can
recover your information.
5. Educate Employees: Train staff on cybersecurity best practices,
including recognizing phishing attempts, avoiding suspicious links or
downloads, and handling sensitive information securely.
6. Secure Wi-Fi Networks: Use strong encryption (like WPA3) for Wi-
Fi networks, change default passwords on routers, and hide your
network's SSID to prevent unauthorized access.
7. Implement Firewalls: Use firewalls to establish barriers between your
internal network and untrusted external networks, such as the internet.
8. Limit Access and Permissions: Grant access only to necessary data
and systems. Regularly review and update user permissions as roles
change within the organization.
9. Monitor and Respond: Employ monitoring tools to detect and
respond to security threats promptly. This includes network traffic,
system logs, and anomalous activities.
10. Create an Incident Response Plan: Develop a plan outlining steps
to take in the event of a cybersecurity incident. This helps in responding
effectively and minimizing damage.
11. Encrypt Sensitive Data: Encrypt data both in transit and at rest. This
adds a layer of protection even if data is compromised.
12. Third-Party Risk Management: Assess and manage the security
risks posed by third-party vendors and service providers who have access
to your systems or data.
13. Regular Security Audits: Conduct periodic security audits and
assessments to identify vulnerabilities and address them promptly.
14. Implement Least Privilege: Provide users with the minimum level
of access needed to perform their jobs. This minimizes the risk of
unauthorized access.
15. Stay Informed: Stay updated on the latest cybersecurity threats and
trends. This knowledge helps in proactively securing systems and
networks.
▪ Cybersecurity is an ongoing process requiring continuous efforts to stay
ahead of evolving threats. Implementing these best practices can
significantly strengthen your organization's security posture.
Significance of host firewall and Ant-virus :
▪ Both host firewalls and antivirus software play critical roles in computer
security, albeit in different ways.
▪ Host Firewall:
A host firewall is a software or hardware component that monitors and
controls incoming and outgoing network traffic on an individual device
(such as a computer or server). Its primary function is to act as a barrier
between your device and potentially malicious content from the internet
or other networks.
− Protection: It helps prevent unauthorized access to or from a private
network by controlling the traffic entering or leaving the device.
− Filtering: It filters network packets based on predefined security rules,
allowing or denying traffic based on various criteria like IP addresses,
ports, protocols, and applications.
− Defense: A host firewall is the first line of defense against many
common network-based attacks, such as port scanning, malware, and
certain types of cyber threats.
▪ Antivirus Software:
Antivirus software is designed to detect, prevent, and remove malicious
software (malware) from a computer or device.
− Malware Protection: It scans files, emails, downloads, and other
elements of your system for known patterns and behaviors associated
with viruses, worms, Trojans, spyware, ransomware, and other types of
malicious software.
− Real-time Monitoring: Many antivirus programs run continuously in
the background, monitoring system activities and flagging or
quarantining suspicious files or processes.
− Updates and Heuristics: Antivirus software relies on regular updates to
its virus definition databases to recognize new threats. Additionally, some
use heuristic analysis to detect previously unknown malware by
identifying suspicious behavior patterns.
▪ Significance:
− Complementary Protection: Host firewalls and antivirus software
complement each other. Firewalls protect against unauthorized network
access, while antivirus software safeguards against malware threats.
− Defense in Depth: Employing both provides a multi-layered defense,
crucial in cybersecurity, known as defense in depth. If one layer fails,
others might still provide protection.
− Preventative Measures: Together, they significantly reduce the risk of
various cyber threats, preventing unauthorized access, data breaches, and
the potential damage caused by malware infections.
▪ In the constantly evolving landscape of cybersecurity, it's essential to
keep both your host firewall and antivirus software updated to ensure
they can effectively counter new and emerging threats.
Management of host firewall and Anti-virus :
▪ Managing host firewalls and antivirus software is crucial for
maintaining a secure system. Here are some general guidelines for
managing them effectively:
▪ Firewall Management:
1. Understand Firewall Rules: Learn how your firewall works and the
rules governing inbound and outbound traffic. Configure rules based on
the principle of least privilege, allowing only necessary traffic.
2. Regular Updates: Keep the firewall software updated to ensure it has
the latest security patches and features.
3. Logging and Monitoring: Enable logging to track firewall activities.
Regularly review logs for any suspicious activities or unauthorized access
attempts.
4. Default Deny Policy: Implement a default deny policy where all traffic
is blocked unless specifically allowed. This minimizes the attack surface.
5. Application Control: Use application-specific rules to control which
applications can access the network. This helps prevent unauthorized
programs from communicating externally.
▪ Antivirus Management:
1. Regular Updates: Ensure your antivirus software is updated with the
latest virus definitions and software patches. New threats emerge
regularly, so frequent updates are crucial.
2. Scheduled Scans: Set up regular system scans to check for malware,
viruses, and other threats. Perform full system scans periodically.
3. Real-Time Protection: Enable real-time scanning to monitor files and
processes in real time for any suspicious behavior or malware.
4. Quarantine and Removal: Configure the antivirus to quarantine or
remove identified threats automatically. Regularly review quarantined
items to ensure no false positives.
5. User Education: Educate users about safe browsing habits,
downloading files from trusted sources, and avoiding suspicious emails or
websites that could introduce malware.
6. Compatibility and Performance: Ensure the antivirus software
doesn’t conflict with other applications or significantly degrade system
performance. Adjust settings if needed for optimal performance
Wi-Fi security :
▪ Wi-Fi security is crucial in safeguarding your network from
unauthorized access, data breaches, and various cyber threats. Here are
some essential tips to enhance Wi-Fi security:
1. Strong Passwords: Use a complex, unique password for your Wi-Fi
network. Avoid using default passwords provided by the router
manufacturer.
2. Encryption: Enable WPA3 (Wi-Fi Protected Access 3) encryption if
available on your router. WPA2 is also secure but might not be as robust
as WPA3.
3. Network Name (SSID) Hiding: Consider hiding the network name
(SSID) to make it less visible to potential attackers. While this won’t
fully protect your network, it can add a layer of obscurity.
4. Router Firmware Updates: Regularly update your router's firmware
to patch any security vulnerabilities and ensure it has the latest security
features.
5. Firewall: Activate the firewall on your router to control incoming and
outgoing traffic. This helps prevent unauthorized access.
6. Guest Network: Set up a separate guest network for visitors. This
network should have limited access to your main network and its devices.
7. MAC Address Filtering: Restrict network access to specific devices
by allowing only approved MAC addresses to connect to your network.
Note: MAC addresses can be spoofed, so this isn't foolproof.
8. Use a VPN: When connected to public Wi-Fi networks, use a Virtual
Private Network (VPN) to encrypt your internet traffic and protect your
data from potential eavesdropping.
9. Disable WPS: Wi-Fi Protected Setup (WPS) can sometimes be
vulnerable to brute force attacks. Disable it on your router to enhance
security.
10. Regular Audits: Periodically check connected devices, review
network logs, and monitor traffic for any suspicious activity.
11. Physical Security: Place your router in a secure location to prevent
physical tampering or unauthorized access.
12. Stronger Authentication: Consider using stronger authentication
methods like two-factor authentication (2FA) for accessing your router's
settings.
▪ By implementing these measures, you can significantly improve the
security of your Wi-Fi network and reduce the chances of unauthorized
access or data breaches.
Configuration of basic security policy and permissions
▪ Creating a basic security policy involves several steps and
considerations. Here’s a general guide on how to approach setting up
security policies and permissions:
1. Identify Assets: Determine what data, systems, or resources need
protection. This could be customer data, intellectual property, servers, etc.
2. Risk Assessment: Evaluate potential threats and vulnerabilities to
those assets. Consider internal and external risks, such as cyber-attacks,
unauthorized access, data breaches, etc.
3.Define Security Policies: Create a set of rules and guidelines to protect
the identified assets. This might include:
− Access Control Policies: Define who can access what. Use principles
like least privilege (giving users only the necessary permissions) and
separation of duties.
− Data Encryption Policies: Specify when and where encryption should
be applied to sensitive data, both at rest and in transit.
− Password Policies: Establish guidelines for strong, regularly updated
passwords and multi-factor authentication.
− Security Update Policies: Define how often systems and software
should be updated to patch vulnerabilities.
− Incident Response Policies: Lay out procedures for responding to
security incidents, including reporting and mitigation steps.
4. Implement Permissions:
− User Roles: Define roles (like admin, user, manager) and assign
permissions accordingly. Admins usually have the highest level of access,
while users have more limited access.
− Access Controls: Use tools like access control lists (ACLs) or Role-
Based Access Control (RBAC) to enforce permissions. This can be
managed through operating systems, databases, or applications.
5. Regular Audits and Updates: Periodically review and update security
policies and permissions. Technology changes and new threats emerge,
so it’s important to stay up-to-date.
6.Employee Training: Educate employees about security policies and
the importance of adhering to them. Human error is a significant factor in
security breaches.
7.Monitoring and Logging: Implement systems to monitor user
activities and log events. This helps in identifying suspicious behavior
and investigating incidents.
8. Compliance: Ensure that your security policies align with relevant
regulations and industry standards applicable to your organization.
▪ Remember, this is a general framework. The specifics will vary
depending on the nature of your organization, the industry, and the
regulatory environment you operate in. Always consider seeking
professional advice or a security expert's help when setting up security
policies for an
organization.