WHAT IS CYBERCRIME? In general cybercrime may be defined as “Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
Below is a list for some of the cybercrimes :
1. CHILD PORNOGRAPHY/ CHILD SEXUALLY ABUSIVE MATERIAL (CSAM) Child sexually abusive material (CSAM) refers to material containing sexual image in any form, of a child who is abused or sexually exploited.
Immediately inform the social media service provider, if you notice that a fake account has been created by using your personal information. Do not share your vacations, travel plans etc. on social media. Always keep location services turned off on your devices unless necessary. Share your photos and videos only with your trusted friends by selecting right privacy settings on social media. Always use a strong password by using alphabets in upper case and lower case, numbers and special characters for your social media accounts.
Are you looking for a life partner online? Be Cautious, it could be a Cyber Fraud With advent of digital technology, online matrimonial platforms have emerged as a popular way of finding a suitable match. Matrimonial websites provide a convenient and user-friendly interface for youth and parents to search, interact and choose a suitable partner. However, unreliable websites may lead to fraud.
Go for verified matrimonial websites: Before registering on a matrimonial website, check authenticity and reviews of the website.
Online job frauds have been increasing in recent years as more and more people look for employment opportunities online. These frauds can take many forms, such as fake job postings, phishing emails, and schemes where the fraudster poses as a legitimate employer and requests personal information or money from the job seeker.
One of the reasons why online job frauds are increasing is that they are relatively easy to set up and can be difficult to detect.
Cybersecurity is important because it helps protect sensitive information, such as personal data and financial information, from being stolen or compromised by cybercriminals. Additionally, maintaining strong cybersecurity measures can help prevent the spread of malware and viruses, which can cause damage or disruption to computer systems.
In today’s digital age, where an increasing amount of personal and business activities are conducted online, the importance of cybersecurity has become even more crucial.
Questions on Chapter 8 from section 40 to 42 of Information Technology Act, 2000 What is the purpose of Chapter 8 of the Information Technology Act, 2000? What sections does Chapter 8 of the Information Technology Act, 2000 cover? What is the purpose of Section 40 of the Information Technology Act, 2000? What is the role of the Controller of Certifying Authorities in Section 40 of the Information Technology Act, 2000?
Secure your computer – Use antivirus software, keep the updated.
Always use Authentic softwares. never use Pirated softwares.
Strong Passwords – Use strong passwords with alphabet, numbers and special characters.
Avoide Public computers – Use ‘incognito mode’ – If needed, use ‘incognito or pritvate windoe mode’ while using others computer or networks.
Visit and transect on safe websites only – Browse safe websites only.
check “https://” in website URL.
Avoide imposter website.