cyber crime Workshop was organized at Hotel Park Ascent, Sector 62, Noida

Galgotias Ad

In his address, Shri Anuj Agarwal, Chairman, Computer Society of India, Noida Chapter mentioned that the size of the global cyber crime is US Dollar 400 billion and 68% of the money lost through the cyber crime is never recovered. Usually it takes on average 170 days to track a malicious attack and finding a counter to that.

 

There are 1.6 billion social media users worldwide and daily 600000 facebook accounts are compromised by the cyber criminals.

 

Out of every ten social media user one user has become a victim of cyber crime and this trend is increasing.

 

In social media crimes stalking and spear-phishing by for the most common and being used by cyber criminals.

 

In stalking the cyber criminals continuously follows the target and at certain opportune moment attacks the victim and takes away wealth and at times ut leads to sexual and emotional crimes even kidnapping.

 

In spear phishing, the cyber criminals targets a prominent victim like a bank employee, befriends him and tries to enter the bank network using the compromised computer of the victim who may not even be aware that his computer or phone is being used for a cyber crime. By far spear phishing had been the most successful of all cyber crimes in stealing money from financial institutions.

 

The costliest virus ‘mydoom’ had costed the world economy 38.5 billion US Dollars.

 

The question arises how to safeguard oneself and in this the education is the first step.

If a person wants to drive a car he first learn it similarly if a person wants to use computer and mobile safely he must learn and understand the risk and how to avoid those.

Cyber criminals are invisible and highly educated people and really smart.

 

  • Never share your name/phone number/Date of birth/PAN card together
  • If you give an id proof write on it the purpose
  • If you see no service in your phone for more than an hour inform your service provider
  • Never leave wi-fi in your office or home unprotected.
  • Do not use public wi-fi
  • Download apps who are genuine and not get lured by free downloads of books and other paid material
  • Do not click on advertisements on unknown websites offering jobs and free sexual pleasure
  • For all job related matters before making any payment call and visit company office. Usually candidates are not charged for recruitment
  • If your on-line bank account is ever compromised or you believe someone else has got the password etc just close the account immediately and open a new one
  • Banks and government departments and gmail etc never ask for your passwords on phone or in email. Never share password/PIN on phone/SMS/Email they are definitely fraudulent people
  • Inform your nearest police station and cyber experts

 

Mr. Anuj Agarwal, corporate and cyber law expert also dealt with offences committed by the companies in ignorance and highlighted that the punishment for cyber crimes committed by their employees etc the directors of the company can be liable.

 

Highlighting further the vulnerabilities of the companies he mentioned that even if an offence as mentioned in the IT Act, 2000 is purportedly committed in the premises using any part of the computer system (namely  hardware, software or network) the Key Managerial Personnel will liable and prosecuted accordingly.

 

 

He also mentioned that using electronic devices, the threat of breach of privacy is a potential problem and the liability on offenders is a harsh punishment. He cited some examples to bring the point home. Recently Samsung has disclosed that its smart TVs even when in off mode can listen to the conversation (say in a bedroom) and transmit to an undisclosed location, leading to serious breach of privacy.

 

In a gang rape case the victim was filmed and later her pics were circulated on whasapp and since whasapp is not having an office here, the contents can not be removed from whasapp.

 

Citing the example of recently an employee using the twitter handle the speakers emphasized that the vulnerabilities of cyber attack within an organizations are increasing by each day.

 

The speakers also emphasized and discussed about preventive measurers including a robust IT policy for use of computer systems belonging to the organization or being brought by the employees on BYOD basis.

 

The vulnerability audit by a competent professional, to check  clear and unambiguous terms of use of public and private information, about copyrighted and patented material, handling of third part software and other IPR protected material and also prohibited contents like pornographic material, was also emphasized.

 

 

 

 

 

Comments are closed.