CYBER SAFETY
SAMARTH KUMAR
TODAY’S AGE CANNOT BE EVEN THOUGHT OF
WITHOUT INTERNET ,EVEN IN DREAMS. ALTHOUGH
INTERNET HAS MADE MANY THINGS EASIER BUT AT
THE SAME TIME IT HAS POSED MANY SECURITY
RISKS TOO, IF NOT USED IN A PROPER WAY. THUS,
IT IS IMPORTANT TO KNOW ABOUT POSSIBLE
THREATS, CHALLENGES AND RISKS OF WORKING ON
INTERNET TO ENSURE PERSONAL SAFETY AND
INFORMATION SECURITY.
WHAT IS CYBER SAFETY ?
CYBER SAFETY REFERS TO THE SAFE AND RESPONSIBLE
USE OF INTERNET SO AS TO ENSURE SAFETY AND
SECURITY OF PERSONAL INFORMATION AND NOT
POSING AS A THREAT TO ANYONE ELSE’S INFORMATION.
IT INVOLVES GAINING KNOWLEDGE ABOUT POSSIBLE
THREATS TO PERSONAL SAFETY AND SECURITY RISKS
FOR THE INFORMATION ALONG WITH MEASURES TO
PREVENT AND COUNTER THEM.
SAFELY BROWSING THE
WEB
• WHAT ARE THE POSSIBLE DANGERS ?
• HOW TO AVOID THESE ?
• HOW TO VIRTUALLY CONDUCT YOURSELF
WHILE BROWSING WEB ?
IDENTITY PROTECTION
WHILE USING
THE INTERNET
WE SURF THE INTERNET FOR A VARIETY OF
REASONS, FROM USING SOCIAL MEDIA, BUYING
AND SELLING GOODS, TO SENDING INFORMATION.
IN THIS PROCESS WE GIVE OUT SOME SENSITIVE
INFORMATION WHICH CAN BE USED FOR IDENTITY
FRAUDS, HACKING, STALKING ETC.
IDENTITY FRAUD/THEFT
IDENTITY THEFT IS A TYPE OF FRAUD THAT INVOLVES USING SOMEONE ELSE’S
IDENTITY TO STEAL MONEY OR GAIN OTHER BENEFITS
ONLINE IDENTITY THEFT REFERS TO AN ACT OF STEALING SOMEONE’S PERSONAL
INFORMATION SUCH AS NAME, LOGIN DETAILS ETC. AND THEN POSING AS THAT
PERSON ONLINE.
MOST COMMMON SOLUTION TO THIS IS: PRIVATE
BROWSING OR ANONYMOUS BROWSING ON INTERNET.
For chrome- ctrl+Shift+N
For firefox- ctrl+shift+P
MANY WAYS WEBSITES CAN TRACK YOU
IP HTTP
COOKIES
ADDRESS REFERRER
SUPER USER
COOKIES AGENT
1. IP ADDRESS
IP ADDRESS IS A UNIQUE ADDRESS OF YOUR DEVICE WHEN YOU
CONNECT TO THE INTERNET.
IT’S LIKELY THAT YOUR COMPUTER SHARES YOUR IP ADDRESS WITH
OTHER NETWORKED DEVICES IN YOUR HOUSE OR OFFICE.
FROM YOUR IP ADDRESS, A WEBSITE CAN DETERMINE YOUR ROUGH
GEOGRAPHICAL LOCATION.
2. COOKIES OR TRACKING SCRIPTS
COOKIES ARE SMALL PIECES OF INFORMATION
RELATED TO YOUR ONLINE HABITS WEBSITES CAN
STORE IN YOUR BROWSER.
COOKIES HAVE A LOT OF LEGITIMATE USES BUT THEY
CAN USED TO IDENTIFY YOU AND TRACK YOUR
BROWSING HISTORY ACROSS A WEBSITE.
3. HTTP REFERRER
THIS MEANS THAT WHEN A USER CLICKS A HYPERLINK IN A WEB
BROWSER, THE BROWSER SENDS A REQUEST TO THE SERVER
HOLDING THE DESTINATION WEBPAGE. THE REQUEST INCLUDES
THE REFERER FIELD, WHICH INDICATES THE LAST PAGE THE USER
WAS ON (THE ONE WHERE THEY CLICKED THE LINK).
REFERER LOGGING IS USED TO ALLOW WEBSITES AND WEB
SERVERS TO IDENTIFY WHERE PEOPLE ARE VISITING THEM FROM,
FOR PROMOTIONAL OR STATISTICAL PURPOSES.
4. SUPER COOKIES
A SUPERCOOKIE IS A TYPE OF TRACKING COOKIE INSERTED INTO AN HTTP
HEADER BY AN INTERNET SERVICE PROVIDER (ISP) TO COLLECT DATA ABOUT A
USER'S INTERNET BROWSING HISTORY AND HABITS.
SUPERCOOKIES CAN BE USED TO COLLECT A WIDE ARRAY OF DATA ON USERS'
PERSONAL INTERNET BROWSING HABITS INCLUDING THE WEBSITES USERS
VISIT AND THE TIME THEY VISIT THEM. IT DOES NOT MATTER WHICH BROWSER
IS BEING USED OR IF USERS SWITCH BROWSERS. SUPERCOOKIES CAN ALSO
ACCESS INFORMATION COLLECTED BY TRADITIONAL TRACKING COOKIES --
INCLUDING LOGIN INFORMATION, CACHED IMAGES AND FILES AND PLUG-IN
DATA -- AND STORE THAT INFORMATION EVEN AFTER THE TRADITIONAL COOKIE
HAS BEEN DELETED. EACH SUPERCOOKIE CAN GET AS LARGE AS 100 KB.
5. USER AGENT
IN COMPUTING, A USER AGENT IS SOFTWARE (A SOFTWARE AGENT) THAT IS
ACTING ON BEHALF OF A USER. ONE COMMON USE OF THE TERM REFERS TO A
WEB BROWSER TELLING A WEBSITE INFORMATION ABOUT THE BROWSER AND
OPERATING SYSTEM. THIS ALLOWS THE WEBSITE TO CUSTOMIZE CONTENT FOR
THE CAPABILITIES OF A PARTICULAR DEVICE, BUT ALSO RAISES PRIVACY
ISSUES.
SPAM BOTS AND WEB SCRAPERS OFTEN USE FAKE USER AGENTS.
A RESULT OF USER AGENT SPOOFING MAY BE THAT COLLECTED STATISTICS OF
WEB BROWSER USAGE ARE INACCURATE.
PRACTICES TO ENSURE CONFIDENTIALITY OF
INFORMATION
COMPUTERS, NETWORKING, INTERNET- THESE ALL ARE INEVITABLE; YOU
CAN’T AVOID THESE AS THESE ARE MODERN AGE TOOLS. BUT YOU SURELY
CAN FOLLOW CERTAIN PRACTICES TO SAFEGAURD YOUR DATA AND
ENSURE ITS CONFIDENTIALITY.
USE FIREWALL
WHEREVER
POSSIBLE
CONTROL
BROWSER
SETTINGS TO
BLOCK TRACKING
BROWSE
PRIVATELY
WHEREVER
POSSIBLE
BE CAREFUL
WHILE POSTING
ON THE
INTERNET
ENSURE SAFE SITES
WHILE ENTERING
CRUCIAL
INFORMATION
CAREFULLY
HANDLE E-MAILS
DO NOT GIVE
SENSITIVE
INFORMATION ON
WIRELESS NETWORKS
AVOID USING
PUBLIC
COMPUTERS
CYBER CRIME
ANY CRIMINAL OFFENSE THAT IS
FACILITATED BY, OR INVOLVES THE USE OF,
ELECTRONIC COMMUNICATIONS OR
INFORMATION SYSTEMS, INCLUDING ANY
ELECTRONIC DEVICE, COMPUTER, OR THE
INTERNET IS REFERRED TO AS CYBERCRIME.
CYBER TROLLS
DEROGATORY MESSAGES OR
COMMMENTS POSTED ONLINE
TARGETING PEOPLE ARE CALLED CYBER
TROLLS.
TROLLING IS A CYBER CRIME AND IS
CLOSELY RELATED TO CYBER BULLYING.
IN FACT, IT IS A FORM OF CYBER
BULLYING
CYBER BULLYING
HARASSING, DEMEANING, EMBARRASSING,
DEFAMING OR INTIMIDATING SOMEONE
USING MODERN TECHNOLOGIES LIKE
INTERNET, CELL PHONES, INSTANT
MESSENGERS, SOCIAL NETWORKS ETC., IS
CALLED CYBER BULLYING
CYBER STALKING
THIS IS A KIND OF ONLINE HARASSMENT
WHEREIN THE VICTIM IS SUBJECTED TO A
BARRAGE OF ONLINE MESSAGES AND E-
MAILS.
A CYBER STALKER RELIES UPON THE
ANONYMITY AFFORDED BY THE INTERNET TO
ALLOW THEM TO STALK THEIR VICTIM
WITHOUT BEING DETECTED.
SPREADING
RUMOURS
ONLINE
People often think that they can make a fake profile with some different name and do anything online
and never be caught. Through such fake profiles, people sometimes indulge in posting false
information on social media, or comments that could hurt others or spread rumours that may trigger
panic or hurt religious sentiments of other people resulting into clashes and even riots etc.
Spreading rumours online is a cybercrime and is a punishable offence. As per information Technology
Act of India, Punishable/circulation of Rumours, especially hurting religious sentiments is a
cybercrime and it may invite a fine with imprisonment extendable up to three years.
REPORTING CYBERCRIME
• The local police stations can be approached for filing
complaints just as the cybercrime cells specially designated
with the jurisdiction to register complaint.
• In addition, provisions have now been made for filing of ‘E-FIR’
in most states of India.
• In addition, the Ministry of Home Affairs is also launching a
website for registering crimes against women and children
online including cybercrimes.
The Information Technology Act categorically provides that a
cybercrime has global jurisdiction, meaning that the crime may
be reported in the Cyber Crime Units of any city, irrespective of
the place where the act was committed.
SOCIAL NETWORKING
A social networking site is a web
application or online platform
where people can setup their public
profile and make connections with
other people called online friends.
DIGITAL FOOTPRINTS
Digital Footprints are the records and traces
individuals’ activities as they use the Internet.
Digital Footprints are permanently stored.
PRIVACY SETTINGS
When you start using social media , you should not go
with default privacy settings. Rather it is always a
good idea to set-up privacy settings yourself by using
Account Settings. Through privacy settings, you can
control:
• Who can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others,
even to your contacts etc.
In short, you should always set-up privacy settings for
all types of social media yourself.
SOCIAL MEDIA
USAGE RULES
1) Be Authentic
2) Use a Disclaimer
3) Don’t pick fights online
4) Don’t use Fake names or
Pseudonyms
5) Protect your Identity
6) Post appropriate content online
7) Respect your Audience
8) Respect other’s sentiments
9) Monitor Comments
THANK YOU
A POWERPOINT™ PRESENTATION BY SAMARTH KUMAR