cyber challenges by prime point srinivasan
TRANSCRIPT
![Page 1: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/1.jpg)
Cyber Challenges
K. Srinivasan
14 October 2012
2nd TAN-ISHA CON Puducherry
![Page 2: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/2.jpg)
What we will discuss
• Global internet scenario
• Websites and social media networking sites
• Challenges before the users
• Information Technology Act 2000
• Protecting from cyber challenges
![Page 3: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/3.jpg)
Global Internet scenario
• Out of 7 billion population, 33% use internet globally
• 10% internet penetration in India and I billion mobile phones
![Page 4: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/4.jpg)
![Page 5: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/5.jpg)
Websites and social media
• 1.4 bn Top Level domains (TLDS) com, org, net, info, biz, us
• Facebook, Twitter, LinkedIn, YouTube, Orkut
• Facebook has 1 bn users
![Page 6: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/6.jpg)
Social Media
• 500 million status updates / day
• 300 milion emails per day (80% spam)
• 250 millions photo uploads / day
![Page 7: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/7.jpg)
Internet is a double edged
weapon
![Page 8: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/8.jpg)
Challenges before the users
• Information hacking. Eg: id and password theft. The id is being used for illegal purposes;
• Cyber stalking – Cyber harassment through mail, mobile sms, phone call etc.
![Page 9: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/9.jpg)
Cyber Challenges
• Morphing / spoofing of IP address and email address. Sending mails as if it emanates from your IP address or email.
• Cyber squatting – Getting the domain name of the branded person or organization and selling to the company at huge price.
![Page 10: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/10.jpg)
Cyber Challenges
• Defamation / character assassination of persons or organizations through internet and social media.
• Spamming – sending unwanted and irrelevant junk mails.
![Page 11: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/11.jpg)
Cyber Challenges
• Cyber Terrorism
• Eg: Spreading rumours to create clash, enmity, etc., Intruding on the computer system
![Page 12: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/12.jpg)
Information Technology Act• IT Act 2000 effective from 17th
October 2000
• Amendment of 2008 effective from 27th October 2009
• Using of computer for committing crime is an offense – computer is defined in the Act
![Page 13: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/13.jpg)
Which are the devices ?
• PCs, Laptops, Iphones, Ipads, Tablets, mobiles with internet, etc.
• Mobile phones without internet
• Even washing machines and electric ovens with memory chip
![Page 14: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/14.jpg)
Cyber offenses punishable
• Sections 43, 43A, 65, 66 and 67A of the IT Act define some of the offenses and the corresponding punishments.
![Page 15: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/15.jpg)
How to protect ourselves
• Use BOSS operating system
• Ignore all spam mails, lottery or prize mails, or mails asking for passwords and private data
• Keep complicated password – do not share with others
![Page 16: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/16.jpg)
How to protect ourselves
• Use licensed software – avoid pirated software. Use licensed anti virus software
• Avoid sharing personal information in social media. Ladies may avoid uploading photos
![Page 17: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/17.jpg)
How to protect ourselves
• Avoid forwarding controversial mails or messages through internet and mobile
• Victims of cyber offense should file a police complaint
• Ensure safe journey in Cyber Space
![Page 18: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/18.jpg)
Avoid addiction to internet -treat social media like shoes – use only when you need
![Page 19: Cyber challenges by prime point srinivasan](https://reader036.vdocuments.us/reader036/viewer/2022082702/554ac22fb4c90580698b4c89/html5/thumbnails/19.jpg)
Thank you
K. Srinivasan
Prime Point Foundation and Cyber Society of India
www.prpoint.com
www.cysi.in
[email protected] 91766 50273