1 / 44

Cyber safe week 2010

Cyber Space – Safe to Use, Unsafe to Misuse. A Joint Initiative of Pune Police – NASSCOM – DSCI. Cyber safe week 2010. Supported by :. Cyber crimes & Safety Awareness. Cyber Safe Week is organized by Pune Police & NASSCOM – DSCI.

wilona
Télécharger la présentation

Cyber safe week 2010

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Space – Safe to Use, Unsafe to Misuse A Joint Initiative of Pune Police – NASSCOM – DSCI Cyber safe week 2010 Supported by :

  2. Cyber crimes&Safety Awareness

  3. Cyber Safe Week is organized by Pune Police & NASSCOM – DSCI. • It is supported by many leading IT Companies, Financial & Educational Institutes. The idea of the Cyber Safe Week is to spread Cyber Awareness among School, College Students & also for the Citizens & Netizens of Pune Cyber Safe Week 2010

  4. Cyber Crime Cell Pune started functioning since 1st July 2003 & it is modernized in Dec 2009. Only 5 Cyber Crime cases were registered in the year 2003 and now due to rapid increase in Cyber Crime, 390 Cyber Complaints have been received up to 30th Nov 2010. Cyber Crime Cell consist of 5 Officers and 15 Constables About Cyber Crime Cell

  5. Statistics of Complaints Received by Cyber Crime Cell, Pune

  6. Trends of Cyber Complaints in Pune

  7. Modernized Cyber Crime Cell & Cyber Forensic Lab

  8. Pune A Joint Initiative of Pune Police – DSCI -NASSCOM India Cyber Lab – Pune

  9. A Brief History :   Cyber Lab Evolved As A Unique Public-private Partnership Project, Out Of The First-ever Cyber Safety Week In 2003. Cyber Lab, Pune Was Inaugurated On 20th January 2007 By Mr. P.S. Pasricha (DGP, MS, Mumbai). Objective Facilitate Cyber Crime Investigation Training Among Police Officers And Law Enforcement Agencies. Improve Awareness Of Cyber Crime Among Citizens Of India And Enhance Information Security. Act As Resource Centre For Other Police Organizations In The Country. About Cyber Lab, Pune

  10. State of Art Training Lab High Configuration Computers Dedicated High speed broadband Fully Air Conditioned Training Lab Cyber Crime – Incident Response Tool Kit Licensed Softwares Infrastructure @ Cyber Lab, Pune

  11. Statistics

  12. Introduction About Cyber Crime Types of Cyber Crimes Parents Concerns Cyber Safety – Do’s & Don'ts 7 Key Messages for Cyber Safety Agenda

  13. Introduction

  14. What is Internet? • World Wide Web: Network of computers • Even more simply—millions of computers around the world connected with cables or wireless technology. • These “connections” allow the computers to communicate and share information.

  15. Advantages of the Internet • Instant Communications • E-mails, Chat Rooms, Instant Messaging & Web Sites • News and Information • Most major newspapers online • “Information Highway” - anything you want to know is on the Internet • Research , School projects • Entertainment • Movies, music, games, developing photos, etc • Business • Shop, travel, ecommerce, bargains, advertising, net banking, etc…

  16. Disadvantages of Internet • Anonymity • Exposure to inappropriate information • Cyber Crimes • Illegal Music/Video/Games • Malware (Virus/Worms/Trojan)

  17. Cyber Crime in a criminal activity committed with the use of Computing Devices & Internet. • Such crimes are increasing rapidly in Pune. • School & College Students are the most common victims of these attacks. What is cyber crimes ?

  18. Hacking Crimes related to Social Networking, Blogs & IRC Phishing Nigerian Scams 419 / Lottery Scams Software & Internet Piracy Cyber Crimes related to Girls & Womens Wi-Fi related Crimes Risks @ Internet

  19. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. Hacking

  20. Crimes related to social Networking

  21. Social Networking websites are designed to make your social life more active and stimulating. Social network can help you to maintain existing relationships with pictures and messages, and establish new ones by reaching out to people you've never met before. Play Social networking on internet

  22. Adnan Patrawala Murder Case

  23. Social Networking & Blogs • Publishing of Private Information - This can lead to undesirable people trying to make personal contact. • Profiles - profiles of their user accounts. • Inappropriate Content - Children may be able to search through other people’s blogs and find inappropriate content or discussions on topics that are not suited • Online Bullying - Children can use blogs as a way to bully or intimidate other children. • Defamation - Children can use blogs as a form of publishing to defame other innocent people • Publishing Unreliable Information - Unreliable information can be published by anybody creating a blog, just as it can anybody creating a website. 

  24. Phishing

  25. Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by deceptive means in an electronic communication. • Online Banks & Shopping Websites are very common targets of phishing activities . Phishing

  26. A ‘Nigerian’ scam is a upfront payment or money transfer scam. This scam starts with a bulk mailing or bulk faxing of a bunch of identical letters to businessmen, professionals and other persons who tend be of greater than average wealth. Lottery Scams Foreign Job Offer Scam Nigerian Scams

  27. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Software Piracy

  28. Girls & Womens very susceptible to Cyber Crimes. • Harassment through emails • Cyber Stalking • Blackmailing • Threatening • Harassment through Social Networking Websites • Identity Theft • Cyber Defamation Cyber Crimes related to Girls & Womens

  29. Wi-Fi stands for Wireless Fidelity. It is nothing but a Wireless Connection between two or more computer. Can be used in PC2PC (i.e LAN) connection & also for Wireless Internet Connectivity It is widely used in home networks , mobile phones , video games & even corporate networks. Wi-FI

  30. Recent Attacks on Wi-Fi Security • The masterminds behind the Ahmedabad serial blasts sent threatening e-mails from the wi-fi laptop network of American expatriate Kenneth Haywood, a Navi Mumbai-based 'executive at a multinational corporation' . • The Indian Mujahideen sent the terror email to media houses on Saturday just minutes before the Delhi bomb blasts went off from the wi-fi connection of K Kamath, the owner of Kamran Power Private Limited. ( Chembur , Mumbai )

  31. Children are a lot smarter than we always give them credit for. This is especially true when it comes to technological issues. Few could argue that they know more about the Internet, computers or cell phones, than their children do. Changing times have called for an increased awareness in how your kids' extensive knowledge of the Internet may not be a good thing. Parents concerns

  32. The biggest solution to this issue is parental check. It is the parent's job to make sure what the child is doing while surfing the web. Parents should take out some time to discuss what new findings they have made through the web. Go light while discussing this because if you are too harsh on him, then your child can start telling lies and might even turn rebellious. At the end of the day, preventing your child from cyber crime is in your hands. Parents concerns (cont….)

  33. Cyber Safety - Do’s & Don’ts

  34. Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child’s bedroom. • Learn enough about computers so you can enjoy them together with your kids. • Teach them never to meet an online friend offline unless you are with them. • Watch your children when they’re online and see where they go. • Install Parental Control Softwares For parents

  35. Only give your mobile number out to people you know and trust. • Do not use your mobile phone to communicate with strangers. Only text and call people or businesses you know in real life. • Don’t turn on the Bluetooh if it is not in use. • Do not allow others to take pictures or videos of you without your permission. Remember – these pictures and videos can be posted to the Internet. • If your phone is lost or stolen, report it to your local police station and your network operator immediately. Mobile related safety

  36. Understand what you put online will be there forever.  • Use a strong password (a combination of upper and lower case letters, symbols and numbers). • Don’t post inappropriate or illegal content anywhere on the internet. • Don’t open e-mail attachments or instant-message attachments unless you are completely sure they do not contain viruses. • Don’t click on links inside e-mails or instant messages. Never agree to meet a fellow chatter in real life. • Never give out personal information about yourself, your family, or your friends (such as your last name, address, phone numbers, the town or city you live in, the name of your school, photos of yourself or your family, PIN numbers for your bank, social-security numbers, etc.). Online safety tips

  37. 7 Key Messages • The following 7 key messages should be reiterated throughout the week. All programs conducted should fall within these categories: • Keep your children and yourself eSafe • Know your virtual friends and enemies • Update your antivirus, web browsers and operating systems • Secure your computer and wireless network • Back up important files • Use strong passwords and secure financial sites; don’t write passwords on shared locations • What to do when you feel something is wrong OR something wrong has happened? 39

  38. If you are a victim of any Cyber Crime or if u feel any suspicious activity then…. • Contact nearest Police Station or Cyber Crime Cell, Pune Where to lodge a complaint

  39. Police Commissioner Office, Email :crimecomp.pune@nic.in Website : www.punepolice.gov.in Cyber Crime Cell, Pune Email : crimecyber.pune@nic.in Tel : 020 -26123346 Contact us :

  40. Sandip Gadiya, Manager Cell : +91-9422321705, Tel : 02026208477 Email : sandip.gadiya@dsci.in Contact india cyber lab, pune Pune

  41. Thank You “Happy Surfing & Safe Surfing”

  42. Mr.P.G.MaNDHARE9923191533

More Related