Cyber challenges by prime point srinivasan

Preview:

Citation preview

Cyber Challenges

K. Srinivasan

14 October 2012

2nd TAN-ISHA CON Puducherry

What we will discuss

• Global internet scenario

• Websites and social media networking sites

• Challenges before the users

• Information Technology Act 2000

• Protecting from cyber challenges

Global Internet scenario

• Out of 7 billion population, 33% use internet globally

• 10% internet penetration in India and I billion mobile phones

Websites and social media

• 1.4 bn Top Level domains (TLDS) com, org, net, info, biz, us

• Facebook, Twitter, LinkedIn, YouTube, Orkut

• Facebook has 1 bn users

Social Media

• 500 million status updates / day

• 300 milion emails per day (80% spam)

• 250 millions photo uploads / day

Internet is a double edged

weapon

Challenges before the users

• Information hacking. Eg: id and password theft. The id is being used for illegal purposes;

• Cyber stalking – Cyber harassment through mail, mobile sms, phone call etc.

Cyber Challenges

• Morphing / spoofing of IP address and email address. Sending mails as if it emanates from your IP address or email.

• Cyber squatting – Getting the domain name of the branded person or organization and selling to the company at huge price.

Cyber Challenges

• Defamation / character assassination of persons or organizations through internet and social media.

• Spamming – sending unwanted and irrelevant junk mails.

Cyber Challenges

• Cyber Terrorism

• Eg: Spreading rumours to create clash, enmity, etc., Intruding on the computer system

Information Technology Act• IT Act 2000 effective from 17th

October 2000

• Amendment of 2008 effective from 27th October 2009

• Using of computer for committing crime is an offense – computer is defined in the Act

Which are the devices ?

• PCs, Laptops, Iphones, Ipads, Tablets, mobiles with internet, etc.

• Mobile phones without internet

• Even washing machines and electric ovens with memory chip

Cyber offenses punishable

• Sections 43, 43A, 65, 66 and 67A of the IT Act define some of the offenses and the corresponding punishments.

 

How to protect ourselves

• Use BOSS operating system

• Ignore all spam mails, lottery or prize mails, or mails asking for passwords and private data

• Keep complicated password – do not share with others

How to protect ourselves

• Use licensed software – avoid pirated software. Use licensed anti virus software

• Avoid sharing personal information in social media. Ladies may avoid uploading photos

How to protect ourselves

• Avoid forwarding controversial mails or messages through internet and mobile

• Victims of cyber offense should file a police complaint

• Ensure safe journey in Cyber Space

Avoid addiction to internet -treat social media like shoes – use only when you need

Thank you

K. Srinivasan

Prime Point Foundation and Cyber Society of India

www.prpoint.com

www.cysi.in

prpoint@gmail.com 91766 50273

Recommended