View
457
Download
4
Embed Size (px)
Citation preview
Cyber Challenges
K. Srinivasan
14 October 2012
2nd TAN-ISHA CON Puducherry
What we will discuss
• Global internet scenario
• Websites and social media networking sites
• Challenges before the users
• Information Technology Act 2000
• Protecting from cyber challenges
Global Internet scenario
• Out of 7 billion population, 33% use internet globally
• 10% internet penetration in India and I billion mobile phones
Websites and social media
• 1.4 bn Top Level domains (TLDS) com, org, net, info, biz, us
• Facebook, Twitter, LinkedIn, YouTube, Orkut
• Facebook has 1 bn users
Social Media
• 500 million status updates / day
• 300 milion emails per day (80% spam)
• 250 millions photo uploads / day
Internet is a double edged
weapon
Challenges before the users
• Information hacking. Eg: id and password theft. The id is being used for illegal purposes;
• Cyber stalking – Cyber harassment through mail, mobile sms, phone call etc.
Cyber Challenges
• Morphing / spoofing of IP address and email address. Sending mails as if it emanates from your IP address or email.
• Cyber squatting – Getting the domain name of the branded person or organization and selling to the company at huge price.
Cyber Challenges
• Defamation / character assassination of persons or organizations through internet and social media.
• Spamming – sending unwanted and irrelevant junk mails.
Cyber Challenges
• Cyber Terrorism
• Eg: Spreading rumours to create clash, enmity, etc., Intruding on the computer system
Information Technology Act• IT Act 2000 effective from 17th
October 2000
• Amendment of 2008 effective from 27th October 2009
• Using of computer for committing crime is an offense – computer is defined in the Act
Which are the devices ?
• PCs, Laptops, Iphones, Ipads, Tablets, mobiles with internet, etc.
• Mobile phones without internet
• Even washing machines and electric ovens with memory chip
Cyber offenses punishable
• Sections 43, 43A, 65, 66 and 67A of the IT Act define some of the offenses and the corresponding punishments.
How to protect ourselves
• Use BOSS operating system
• Ignore all spam mails, lottery or prize mails, or mails asking for passwords and private data
• Keep complicated password – do not share with others
How to protect ourselves
• Use licensed software – avoid pirated software. Use licensed anti virus software
• Avoid sharing personal information in social media. Ladies may avoid uploading photos
How to protect ourselves
• Avoid forwarding controversial mails or messages through internet and mobile
• Victims of cyber offense should file a police complaint
• Ensure safe journey in Cyber Space
Avoid addiction to internet -treat social media like shoes – use only when you need
Thank you
K. Srinivasan
Prime Point Foundation and Cyber Society of India
www.prpoint.com
www.cysi.in
[email protected] 91766 50273