Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

Cyber

Crime
Awareness

CYBER CRIME AWARENESS CAMPAIGN


For Virus Alerts, Incident & Vulnerability Reporting

Handling Computer Security Incidents


JOINTLY BY CHENNAI POLICE AND ISEA
Acknowledgement
HRD Division
Department of Electronics & Information Technology
Ministry of Communications and Information Technology
Government of India
About ISEA
Department of Electronics and Information Technology (DeitY) under Ministry of Communications and Information Tech-
nology, Government of India has sponsored a project in 2005 entitled Information Security Education and Awareness
(ISEA) which was completed in 2014 and Phase II of the said Project was approved in 2014

ISEA Project (Phase II) broadly aims to cover generation of high end quality manpower in the area of Information Security
through formal and non-formal programs, training of government personnel, creating mass Information Security aware-
ness targeted towards various user segments viz. Academic users (school/college student, teachers, parents), General
users (general public) and Government users (Central/State Govt. employees, legal & police personnel)

Vision of ISEA Awareness


Generate information security awareness among Indian citizens to enable
them to participate safely in Information Society

The Awareness Programme of ISEA phase-II is coordinated by C-DAC Hyderabad and implementing in association with
agencies including NIELIT, NIC, CERT-In, STQC and ERNET
¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷×
þó¾¢Â «Ãº¢ý, ¦¾¡¨Ä¦¾¡¼÷Ò ÁüÚõ ¾¸Åø ¦¾¡Æ¢øÑðÀ «¨Áò¾¢ý ¸£ú þÂíÌõ Á¢ýÉÏÅ¢Âø
ÁüÚõ ¾¸Åø ¦¾¡Æ¢ø ÑðÀòШÈ, “¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷×” ¾¢ð¼ò¨¾
2005¬õ ¬ñÎ ²üÀÎò¾¢ «ò¾¢ð¼õ 2014 ¬õ ¬ñÎ ÓÊŨ¼ó¾Ð. þ¾ý ¦¾¡¼÷¡¸ 2014 ¬õ
¬ñÎ Ó¾ø þò¾¢ð¼¾¢ý þÃñ¼¡õ ¸ð¼ò¾¢¨É ÐÅ츢 ¿¢¾¢Ô¾Å¢ «Ç¢òÐ ÅÕ¸¢ÈÐ

“¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷×” ¾¢ð¼õ þÃñ¼¡õ ¸ð¼ò¾¢ý ÓبÁÂ¡É ÌȢ째¡û
¾¸Åø À¡Ð¸¡ôÒò Шâø Ó¨ÈÂ¡É ÁüÚõ þÂøÀ¡É ¸øÅ¢ ãÄõ «º¡¾¡Ã½Á¡É; ¾ÃÁ¡É ÁÉ¢¾ÅÇõ
¯ÕÅ¡ì̾ø, «ÃÍ «¾¢¸¡Ã¢¸ÙìÌ À¢üº¢ «Ç¢ò¾ø, ÁüÚõ ¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ŢƢôÒ½÷¨Å
²üÀÎò¾ø ¦À¡ÕðÎ Àø§ÅÚ À̾¢ À¡ɡÇ÷¸û «¾¡ÅÐ ¸øÅ¢º¡÷ À¡ɡÇ÷¸û (ÀûÇ¢ / ¸øæâ Á¡½Å÷¸û,
¬º¢Ã¢Â÷¸û, ¦Àü§È¡÷¸û), ¦À¡Ð À¡ɡÇ÷¸û (¦À¡ÐÁì¸û), «Ãº¡í¸ô ÀÂÉ¡Ç¢¸û (Áò¾¢Â/Á¡¿¢Ä «ÃÍ
°Æ¢Â÷¸û, ºð¼õ & ¸¡ÅøÐ¨È «ÖÅÄ÷¸û)

¾¸Åø À¡Ð¸¡ôÒ Å¢Æ¢ôÒ½÷Å¢ý §¿¡ì¸õ


¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ŢƢôÒ½÷¨Å ²üÀÎòОý ãÄõ þó¾¢Â ÌÊÁì¸Ç¢¼õ µ÷
À¡Ð¸¡ôÀ¡É ¾¸Åø ¦¾¡Æ¢ø ÑðÀ ºã¸ò¾¢¨É ¯ÕÅ¡ì¸ Ó¨É¾ø.

¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷× þÃñ¼¡õ ¸ð¼ò¾¢ý ŢƢôÒ½÷× ¿¢¸ú¸¨Ç
´Õí¸¢¨½òÐ ÅÆíÌõ ¦À¡ÕôÀ¢¨É Á¢ýÉÏÅ¢Âø ÁüÚõ ¾¸Åø ¦¾¡Æ¢ø ÑðÀòШÈ, C-DAC, Hyderabad
þ¼õ ´ôÀ¨¼òÐûÇÐ. þò¾¢ð¼¾¢¨É C-DAC, Hyderabad À¢È Áò¾¢Â «ÃÍ ¿¢ÚÅÉí¸Ç¡É NIELIT, NIC, CERT-In,
STQC ÁüÚõ ERNET ¯¼ý þ¨½óÐ ¦ºÂøÀÎò¾¢ ÅÕ¸¢ÈÐ.
Be aware of Job Offers through E-mails
• Many of the students apply online for jobs. The accused collect the details posted in the
websites and send fake e-mails.
• The e-mail looks like a mail from genuine companies through fake mailer sites and also
conducts interviews.
• The victim receives a fake job offer letter. In return this fraudster asks for huge amount
before and after receiving the offer letter.
• Stranger may send the offer letter using fake mailer service and make spoofing call
in the name of MNC and send the offer letters and get the amounts deposited in the
various places/Bank accounts and immediately withdraw the amounts and they may
cheat you.
Precautions:
• Don’t respond to spam mails without verification of the e-mail origin.
• Don’t deposit money unless the candidate is interviewed personally by the company.
• Don’t try to get job through back door methods by paying money which promises to provide
employment, which will cheat you.
• Check with original company website for any job offers before proceeding.

Be aware of Fake Company E-mail Id’s


• Verify the e-mail ID thoroughly, with each and every letter of the e-mail
ID before responding to any e-mails in the business transaction.
• Genuine Companies will always prefer a secured and transparent payment
method if the company collect fee for job applications.
• Talk over phone with the company to ascertain, before depositing the
money into their account, whether there is change of a/c details and name
of the company.
• Maintain second step verification code to sign into account (Mobile alert).
• Whenever the fraud is noticed immediately inform to the original
company representatives.
• Don’t respond to spam e-mails without verification of the e-mail origin
(Header)

6
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Á¢ýÉïºø ãÄõ ¦ÀÈôÀÎõ §Å¨ÄÅ¡öôÒ ÌÈ¢ò¾ ±îºÃ¢ì¨¸:-


yy «§¿¸ Á¡½Å÷¸û þ¨½Âò¾Çí¸û ãÄõ §Å¨Ä Å¡öôÒ¸¡É Å¢ñ½ôÀõ ¦ºö¸¢ýÈÉ÷.
«ùÅ¡Ú §Å¨Ä §¾ÎÀÅ÷¸û À¾¢Ôõ ¾¸Åø¸¨Çî §º¸Ã¢òÐ ²Á¡üÚ측÷¸û §À¡Ä¢
Á¢ýÉïºø¸¨Ç «ÛôÒÅ÷.
yy þò¾¨¸Â §À¡Ä¢ Á¢ýÉïºø¸û ¯ñ¨ÁÂ¡É ¿¢ÚÅÉí¸Ç¢Ä¢ÕóÐ «ÛôÀôÀð¼Ð §À¡Ä
§À¡Ä¢ ŨľÇí¸û ãÄõ «ÛôÒÅÐ ÁðÎõ «øÄ¡Áø §À¡Ä¢Â¡É §¿÷¸¡½¨ÄÔõ
¿¼òи¢È¡÷¸û.
yy þ¾¨Éò¦¾¡¼÷óÐ ´Õ §À¡Ä¢ §Å¨Ä Å¡öôÒ ¸Ê¾Óõ «Å÷¸ÙìÌ «ÛôÀôÀθ¢ÈÐ. §ÁÖõ
²Á¡üÚ¸¡Ã÷¸û §Å¨Ä Å¡öôÒì ¸Ê¾ò¾¢¨É ÅÆíÌžü¸¡¸ ´Õ ¦ÀÕõ ¦¾¡¨¸Â¢¨Éì
¸Ê¾õ ÅÆíÌžüÌ Óýɧá «øÄÐ À¢ýɧá §¸ðÀ÷.
yy ÀýÉ¡ðÎ ¿¢ÚÅÉí¸Ç¢Ä¢ÕóÐ «¨ÆôÀЧÀ¡Äò ¦¾¡¨Ä§Àº¢Â¢ý š¢ġ¸ «¨ÆòÐ,
§Å¨Ä §¾ÎÀÅ÷¸Ç¢¼Á¢ÕóÐ ¦Åù§ÅÚ þ¼í¸Ç¢ø ¯ûÇ ¦Åù§ÅÚ Åí¸¢ì ¸½ì̸Ǣø
À½ò¾¢¨Éî ¦ºÖò¾î ¦ºöÐ ¯¼ÉÊ¡¸ «ÅüÈ¢¨É ±ÎòÐì ¦¸¡ñÎ ²Á¡üÚ¸¢ýÈÉ÷
Ó¦ÉîºÃ¢ì¨¸ :
yy ¿£í¸û ¦ÀÚõ ±ó¾ ´Õ Š§Àõ (SPAM) Á¢ýÉïºÖõ ¯ñ¨ÁÂ¡É ¿¢ÚÅÉí¸Ç¢Ä¢ÕóÐ «ÛôÀôÀ𼾡 ±ýÚ Á¢ýÉïºø ¾¨Äô¨À
ºÃ¢À¡÷측Áø À¾¢ÄÇ¢ì¸ §Åñ¼¡õ.
yy Å¢ñ½ôÀ¢ò¾ ¿¢ÚÅÉõ §¿ÃÊ¡¸ ¯í¸¨Ç §¿÷¸¡½ø ¦ºö¡¾Å¨Ã ¡âӼõ À½ò¾¢¨Éî ¦ºÖò¾ §Åñ¼¡õ.
yy À½õ ¦¸¡ÎòÐì ÌÚìÌÅƢ¢ø §Å¨Ä ¦ÀÈ ÓÂüº¢ì¸ §Åñ¼¡õ, §À¡Ä¢Â¡É §Å¨ÄÅ¡öôÒ Å¡ìÌÚ¾¢¸¨Ç «Ç¢òÐô À½ò¨¾ô ¦ÀüÈ À¢ý
²Á¡üÈôÀ¼ì ÜÎõ.
yy ¯í¸ÙìÌ ÅÆí¸ôÀ𼠧ŨÄÅ¡öôÒ ¯ñ¨Á¡ɾ¡ ±ýÚ «ºø ¿¢ÚÅÉò¾¢ý þ¨½Â¾Çò¾¢ý ãÄõ ºÃ¢ À¡÷ì¸ §ÅñÎõ

§À¡Ä¢ ¿¢ÚÅÉí¸Ç¢ý Á¢ýÉïºø Ó¸Åâ¸Ç¢¼õ ŢƢôÒ½÷×¼ý


yy ¿£í¸û §Áü¦¸¡ûÙõ «¨ÉòÐ þ¨½Â¾Ç Ž¢¸ ÀâÁ¡üÈõ ºõÁó¾ôÀð¼ ±ó¾ ´Õ
þÕì¸ §ÅñÎõ:- Á¢ýÉïºÖìÌõ À¾¢ÄÇ¢ìÌõ ÓýÉ÷, «ÅüÈ¢ý Ó¸Åâ¢ý ´ù¦Å¡Õ ±Øò¨¾Ôõ
º¡Ã¢ôÀ¡÷ò¾ À¢ýɧà À¾¢ÄÇ¢ì¸×õ
yy ´Õ§Å¨Ç, «ºø ¿¢ÚÅÉí¸û §Å¨Äì¸¡É Å¢ñ½ôÀí¸ÙìÌ À½õ ¦ÀÕ§Á ¬É¡ø
±ô¦À¡ØÐõ À¡Ð¸¡ôÀ¡É ÁüÚõ ¦¾ûÇò ¦¾Ç¢ó¾ À½õ ¦ºÖòоø ӨȨÂ
À¢ýÀüÚÅ¡÷¸û
yy ¿£í¸û ¿¢ÚÅÉí¸Ç¢ý Åí¸¢ ¸½ì¸¢ø À½õ ¦ºÖòÐõ ÓýÒ ¦¾¡¨Ä§Àº¢ š¢ġ¸
Åí¸¢ ¸½ìÌ ÁüÚõ ¿¢ÚÅÉò¾¢ý ¦ÀÂ÷ §À¡ýÈ Å¢ÅÃí¸¨Ç Á¡üÈõ ¯ûǾ¡ ±ýÚ
¯Ú¾¢ôÀÎò¾ §ÅñÎõ.
yy þÃñ¼¡õ ¸ð¼ («¨Ä §Àº¢Â¢ý š¢ġ¸ ¦ÀÈôÀÎõ) À¡Ð¸¡ôÒ ÌȢ£ð欃 ¦ÀüÚ
þ¨½Â¾Çò¾¢ý š¢ġ¸ ¯í¸û ¸½ì̸ÙìÌ Ñ¨Æ §ÅñÎõ
yy ±ó¾ ´Õ «ºø ¿¢ÚÅÉò¾¢ý ¦À¨à ¦¸¡ñÎ §Á¡ºÊ¢ø ®ÎÀÎÅÐ ¦¾Ã¢ó¾¡ø ¯¼ÉÊ¡¸
«ó¾ «ºø ¿¢ÚÅÉò¾¢ý À¢Ã¾¢¿¢¾¢Â¢¼õ ¦¾Ã¢ÂÀÎò¾×õ
yy Á¢ýÉïºÄ¢ý (¾¨ÄôÒ) ¦¾¡¼ì¸ô ÒûǢ¢ý Å¢ÀÃí¸¨Ç ºÃ¢ôÀ¡÷측Áø ±ó¾ ´Õ Š§Àõ
(SPAM) Á¢ýÉïºÖìÌõ À¾¢ø «ÛôÀìܼ¡Ð.

7
Are you getting lottery e-mails/SMS ?
like
( KaunBanegaCrorepathi, Airtel Lottery, Tata Docomo Lottery, Star Sports lottery,/Airtel/ICC Cup Lottery,
BBC/Hero Honda/Star Lottery / Star Cricket lottery/Sports/Chevrolet Motors etc.,)
• In the lottery emails/SMS the culprit sends e-mail or calls the victim or sends SMSs to public stating
that the cell phone numbers of the individuals has won lottery in lakhs and furnishes an e-mail id
and asks the individuals to furnish all details through e-mail and informs the individuals that he
should not reveal the matter to anyone.
• Victim thinks that he won big amount through lottery and furnishes all the details through e-mail.
• The fraudster sends a scanned copy of forged cheque/certificateon the victim name as it is ready for
dispatch. The culprit again informs the individual to deposit certain amount as registration fee by
furnishing a fake bank account number.
• Victim believes and deposits money in different bank accounts asasked by culprit & victim may
sometimes deposit more than lakhs in different amount numbers.
• Later after losing large amount of money the individual realize that he has been cheated on the
name of lottery on different names KaunBanegaCrorepathi, Airtel Lottery, Tata Docomo Lottery, ICC
Lottery, Star Sports lottery etc.,
Lottery scam Precautions
Sometimes you receive an email like “you won a lottery of million • Never respond to e-mail or SMS on mobile from strangers regarding
dollars” receiving such a kind of mails is a great thing, and really it’s aonline lottery or bumper festival bonanza.
happiest thing. By responding to such a kind of mails huge amount of • Don’t deposit any money in unknown accounts without proper
money willbe lost. Because these e-Mails are not true, scammers try to confirmation.
fool and trap you to obtain money. • The winning lottery amount is a fraud committed with convenience
of a bank account holder who is paid commission and has no link
Email Scam Like - Congratulations you have won Webcam, Digital with fraudster.
Camera, etc. • Don’t get trapped by scammers and e-Mails with a subject line
Sometimes you get an e-mail with a message like - you have won you won some $10000 just think why only you received the email
something special like digital camera webcam , all you need to do is without your participation.
just visit our web site by clicking the link given below and provide • Be aware about the products you get for a discounted price. Think
your debit or credit card details to cover shipping and managing costs. why you received email for products when you never enter any
However the item never arrives but after some days the charges will online shopping or contest.
be shown on your bank account , and you will lose money.

8
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

ÌÖì¸ø ÀâÍðÎ Á¢ýÉïºø, ÌÚ了ö¾¢¸¨Ç ¿£í¸û


¦ÀÚ¸¢È£÷¸Ç¡?
«¾¡ÅÐ ²Á¡üÚ측÷¸û ¦À¡ÐÁì¸û «¨Ä§Àº¢ ±ñ¸ÙìÌò ¦¾¡¼÷Ò¦¸¡ñÎ ¿£í¸û
ÌÖì¸ø ÀâÍðΠӨȢø ÀÄ þÄðºì ¸½ì¸¢ø À½ò¾¢¨É ¦ÅýÚŢ𼾡¸ì
ÜÈ¢ Á¢ýÉïºø¸û ÁüÚõ ÌÚ了ö¾¢¸¨Ç «ÛôÒÅ÷, «¾Û¼ý «¨¾ ¡â¼Óõ
¦¾Ã¢ÂôÀÎò¾ §Åñ¼¡õ ±ýÚõ ÜÚÅ÷.
yy ²Á¡üÚ측÷¸û ´Õ ¦ÀÕó ¦¾¡¨¸Â¢¨É ¿£í¸û ¦ÅýÚÅ¢ðË÷¸û ±Éì ÜÚÅ÷ ÁüÚõ
«¾ü¸¡É Å¢Çì¸ Å¢ÀÃí¸¨Ç Á¢ýÉïºø ãÄõ ÅÆíÌÅ÷.
yy ²Á¡üÚ측÷¸û ¨¸¦Â¡ôÀõ þ¼ôÀð¼ ¸¡§º¡¨Ä¢ý ¿¸ø, º¡ýÈ¢¾ú §À¡ýÈÅüÈ¢¨É
Á¢ýÉïºÄ¢ý ãÄõ «ÛôÒÅ÷ ÁüÚõ «Å÷¸û ÁÚÀÊÔõ «ó¾ò ¾É¢¿Àâ¼õ À¾¢×ì
¸ð¼½Á¡¸ ´Õ ÌÈ¢ôÀ¢ð¼ À½ò¾¢¨É ÅÆíÌÁ¡Ú ´Õ §À¡Ä¢Â¡É Åí¸¢ì ¸½ìÌ
±ñ½¢¨ÉÔõ ¦¸¡ÎôÀ÷.
yy ²Á¡Ç¢¸û, «Å÷¸û §¸ðÌõ ÓýÀ½ò¾¢¨É ²Á¡üÚ측Ã÷¸Ç¢ý ÀÄ Åí¸¢ì ¸½ì̸Ǣø
þÄðºì ¸½ì¸¢ø À½ò¾¢¨É ¦ºÖòи¢ýÈÉ÷.
yy ²Á¡Ç¢¸û þÄðºì ¸½ì¸¢ø À½ò¾¢¨É þÆó¾À¢ÈÌ §Á¡ºÊò¾Éò¾¢¨É ¯½÷Å¡÷¸û.
§Á¡ºÊ측Ã÷¸û ÀÄ ¦ÀÂ÷¸Ç¢ø ÌÖì¸ø ÀÃ¢Í º£ðÎ ¦ÅýȾ¡¸ «È¢Å¢ôÀ¡÷¸û. «¨Å
¿£í¸Ùõ ¦ÅøÄÄ¡õ ´Õ §¸¡Ê (Kaun banega crorepati) ²÷¦¼ø Ä¡ð¼Ã¢ (Airtel lottery), ¼¡¼¡
¦¼¡ì§¸¡§Á¡ Ä¡ð¼Ã¢ (tata docomo lotery), ³º¢º¢ Ä¡ð¼Ã¢ (ICC lottery) Š¼¡÷ Š§À¡÷ðŠ
Ä¡ð¼Ã¢ (star sports lottery) ±É ÀÄ.

yy Å¡úòÐì¸û ¿£í¸û ŨĿ¢ÆÄ¢, À¼ì¸ÕÅ¢ ¦ÅýÚÅ¢ð¼¡÷¸û- Ó¦ÉîºÃ¢ì¨¸:-


þЧÀ¡ýÚ ÅÕõ Á¢ýÉïºø¸Ç¢¼õ ŢƢôÒ¼ý þÕí¸û. yy «¨Ä§Àº¢Â¢ý ãÄõ ÅÕõ ²Á¡üÚ¸¡Ã÷¸Ç¢ý Á¢ýÉïºø («)
ÌÚ了ö¾¢¸û ÁüÚõ Å¢Æ¡ì¸¡Ä ºÖ¨¸, ÌÖì¸ø ÀüÈ¢ ÅÕõ
yy ´Õ º¢Ä §¿Ãí¸Ç¢ø ¿£í¸û ŨĿ¢ÆÄ¢ (Webcam) ÌÚ了ö¾¢¸ÙìÌ ´Õ¦À¡ØÐõ À¾¢ÄǢ측¾£÷¸û;.
ÁüÚõ À¼ì¸ÕÅ¢ (camera) §À¡ýÈ º¢ÈôÒô ¦À¡Õð¸¨Ç yy ¦¾Ã¢Â¡¾ Åí¸¢ ¸½ì̸Ǣø, ±ó¾ ´Õ Ó¨ÈÂ¡É ¯Ú¾¢ÂÇ¢ôÒõ
¦ÅýÚÅ¢ðË÷¸û þô¦À¡ØÐ ¿£í¸û À¢ýÅÕõ þ¨½Âò¾Ç þøÄ¡¾ ¿¢¨Ä¢ø ¿£í¸û ÓýÀ½õ ±Ð×õ ¸ð¼¡¾£÷¸û.
¦¾¡¼÷À¢¨Éî ¦º¡Îì¸×õ ÁüÚõ ¯í¸û ¦À¡Õð¸¨Ç yy §Á¡ºÊ측÷¸û Åí¸¢ ¸½ì¸¡Ç÷¸ÙìÌ ¨¸äðÎì ¦¸¡ÎòÐ
ÅÃŨÆìÌõ ¦ºÄ× ÁüÚõ ¿¢÷Å¡¸ ¦ºÄ׸¨Çô ¦ÀÚõ «ôÀ¡Å¢Â¡É ÁüÈ ¿Àâý Åí¸¢ ¸½ì¸¢¨É ¯À§Â¡¸¢ôÀ÷.
Åñ½õ ¯í¸Ù¨¼Â ¸¼ý «ð¨¼ ÁüÚõ ÀüÚ «ð¨¼Â¢ý ¬É¡ø «Å÷¸ÙìÌõ («ôÀ¡Å¢ ¿ÀÕìÌõ) §Á¡ºÊ¸¡Ã÷¸ÙìÌõ
¾¸Åø¸¨Ç ¦¸¡Îí¸û, ±ýÚ ÜÈ¢ §¸ðÀ¡÷¸û. ¬É¡Öõ ºõÀó¾õ þÕ측Ð.
´Õ §À¡Ðõ «ó¾ ¦À¡ÕÇ¡ÉÐ ¯í¸ÙìÌ ¸¢¨¼ì¸¡Ð yy ±ó¾¦Å¡Õ Àâͺ£ðÎ, ¦À¡Õ¨ÇÔõ Å¡í¸¡¾ ¿¢¨Ä¢ø ÀÄ
«ÐÁðÎÁøÄ¡Ð º¢Ä ¿¡ð¸û ¸Æ¢òÐô À¡÷¾¡ø ¯í¸Ù¨¼Â þÄðºí¸¨Ç ¦ÅýȾ¡¸ Á¢ýÉïºø ÅÕÁ¡É¡ø «Ð ²ý
Åí¸¢ì ¸½ì¸¢ø À½ò¾¢¨É þÆó¾¢ÕôÀ£÷¸û. ¾í¸ÙìÌ ÅÕ¸¢ÈÐ ±Éî º¢ó¾¢Ôí¸û.
9
Be aware of Online Cheating/Shopping

O nline shopping has become very popular to


purchase all things without leaving your home,
and it is a convenient way to buy things like apparels, electronic
¾¾ Avoid online shopping if you are not a regular user of
online shopping.
appliances, furniture, cosmetics, and many more. There is no ¾¾ Always perform online shopping from secured
particular time to buy things Online, we can buy at any time websites.
instead of waiting for the store to open and we can avoid the ¾¾ Don’t respond to phishing e-mails/links as they may
traffic/ crowds. Apart from all these advantages risks are involved collect vital information about the credit/debit cards
and there are unique internet risks so it is very important to take
some safety measures before you go for online shopping. and transfer the amount fraudulently online.

Tips for safe online shopping • After finishing the transaction take a print or screenshot
of the transaction records and details of product like price,
• Before you go for online shopping make sure your PC is confirmation receipt, terms and conditions of the sale.
secured with all core protections like an antivirus, anti • Immediately check the credit card statements as soon as
spyware, firewall, system updated with all patches and web you finish and get them to know about the charges you paid
browser security with the trusted sites and security level at were same, and if you find any changes immediately report to
high. concerned authorities.
• Before you buy things online research about the website • Beware of the e-Mails like “please confirm of your payment,
that you want to buy things from, since attackers try to trap purchase and account detail for the product.” Remember
with websites that appear to be legitimate, but they are not. legitimate business people never send such e-Mails. If you
So make a note of the telephone number’s physical address receive such e-Mails immediately call the merchant and
of the vendor and confirm that the website is a trusted site. inform the same.
Search for different web sites and compare the prices. • After finishing your online shopping clear all the web browser
• Check the reviews of consumers and media of that particular cookies and turn off your PC since spammers and phishers
web site or merchants. If you are ready to buy something will be looking for the system connected to the internet and
online check whether the site is secure like https or padlock try to send spam e-Mails and try to install the malicious
on the browser address bar or at the status bar and then software that may collect your personal information.
proceed with financial transactions.

10
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Always close all the applications while doing


online transactions
þ¨½Â¾Çõ ÓÄõ À½ô ÀâÅ÷ò¾¨É
¦ºöÔõ§À¡Ð À¢È ¦ºÂÄ¢¸¨Ç ¯À§Â¡¸ôÀÎò¾
§Åñ¼¡õ

Always prefer for cash on delivery in Online Shopping


¦À¡Õð¸¨Çô ¦ÀüÈÀ¢ý À½õ ¦ºÖòÐõ
Өȧ þ¨½Âò¾Ç Å¡Â¢Ä¡É Ñ¸÷§Å¡÷ìÌî
º¢È󾾡Ìõ
11
þ¨½Âò¾Ç §Á¡ºÊ / þ¨½Âò¾Ç Ž¢¸ §Á¡ºÊô ÀüÈ¢Â
ŢƢôÒ½÷×:-
¾ü¦À¡ØÐ þ¨½Âò¾Ç Ž¢¸Ó¨È ±ýÀÐ À¢ÃÀÄÁ¡¸¢ ÅÕ¸¢ýÈÐ.
þÅüÈ¢ý ÓÄõ ¿ÁìÌò§¾¨ÅÂ¡É «¨ÉòÐô ¦À¡Õð¸¨ÇÔõ ¾¾ ¿£í¸û ÅÆì¸Á¡É þ¨½Âò¾Ç Ž¢¸ ӨȢ¨É
(Å£ðÎ ¯À§Â¡¸, Á¢ýº¡¾Éô ¦À¡Õð¸û, ÁÃÁ¡ý¸û, ÀÂýÀÎòÐÀÅḠþøÄ¡¾§À¡Ð þ¨½Âò¾Ç Ž¢¸
«Æ̺¡¾Éô ¦À¡Õð¸û ÁüÚõ ÀÄ) ¿õ Å£ðÊÄ¢Õó¾Àʧ ӨÈ¢¨Éò ¾Å¢÷ì¸ §ÅñÎõ
±ô¦À¡ØÐ §ÅñÎÁ¡É¡Öõ Å¡í¸¢ì ¦¸¡ûÇÄ¡õ. þ¾ý ÓÄõ ¾¾ ±ô¦À¡ØЧÁ À¡Ð¸¡ì¸ôÀð¼ «øÄÐ
º¡¨Äô §À¡ìÌÅÃòÐ ¦¿Ã¢ºø¸û ÁüÚõ Áì¸û Üð¼ ¦¿Ã¢ºø¸Ç¢ø «í¸£¸Ã¢ì¸ôÀð¼ þ¨½Âò¾Ç Ó¸Åâ¢ø ÁðΧÁ
þÕóÐ ¾ôÀ¢ì¸Ä¡õ «øÄÐ «ÅüÈ¢¨Éò ¾Å¢÷ì¸Ä¡õ. ÌÈ¢ôÀ¢ð¼ þ¨½Âò¾Ç Ž¢¸ ӨȢ¨Éî ¦ºö §ÅñÎõ.
§¿Ãò¾¢ø¾¡ý ¦À¡Õð¸û Å¡í¸ §ÅñΦÁýÈ¢øÄ¡Áø, ¸¨¼ ¾¾ ·À¢„¢í (Phishing) Á¢ýÉïºø¸û «øÄÐ þ¨½Â
¾¢ÈìÌõŨà ¸¡ò¾¢Õì¸ §ÅñΦÁýÈ «Åº¢ÂÓõ þøÄ¡Áø ±ó¾ þ¨½ôÒ¸ÙìÌô À¾¢ÄÇ¢ì¸ §Åñ¼¡õ. «Å÷¸û ¸¼ý
§¿Ãò¾¢Öõ ¦À¡Õð¸¨Ç Å¡í¸Ä¡õ. þó¾ ¿ý¨Á¸¨Çò ¾Å¢÷òÐî ÁüÚõ ÀüÚ «ð¨¼¸û ÀüȢ ŢÀÃí¸¨Çî §º¸Ã¢òÐ
º¢Ä ¾£¨Á¸¨ÇÔõ ¯ûǼ츢ÂÐ þó¾ þ¨½Âò¾Ç Ž¢¸ Ó¨È. «ÅüÈ¢ø ¯ûÇ À½ò¾¢¨É þ¨½Âò¾Çò¾¢ý ÓÄõ
±É§Å, À¢ýÅÕõ À¡Ð¸¡ôÒì ÌÈ¢ôÒ¸¨Ç ¸ñÊôÀ¡¸ô À¢ýÀüÈ §Á¡ºÊ ¦ºöÂì ÜÎõ
§ÅñÎõ.
À¡Ð¸¡ôÀ¡É þ¨½Âò¾Ç Ž¢¸ò¾¢¨Éô ÀüȢ yy À½ò¾¢¨Éî ¦ºÖò¾¢Â À¢ýÉ÷ ¿£í¸û «ó¾ô Àì¸ò¾¢¨Éô À¾¢×
ÌÈ¢ôÒ¸û:- ±ÎòÐì ¦¸¡ûÇ §ÅñÎõ «øÄÐ ÀâÅ÷ò¾¨Éô Àì¸ò¾¢¨½ô
yy ¿£í¸û þ¨½Âò¾Çò¾¢ø ¦À¡Õð¸¨Ç Ѹà ŢÕôÀôÀð¼¡ø Àì¸ô Ò¨¸ôÀ¼õ (Screenshot) ±ÎòÐ ¦¸¡ûÇ×õ. ÁüÚõ «ó¾
«¾üÌ Óý ¯í¸û ¸½¢É¢Â¢ý «¨ÉòÐô À¡Ð¸¡ôÒ ¦À¡Õ¨Çô ÀüÈ¢Âì ¾¸Åø¸¨Çì ÌÈ¢òÐ즸¡ûÇ §ÅñÎõ
«õºí¸¨ÇÔõ ºÃ¢ôÀ¡÷ì¸×õ «¾¡ÅÐ ¨ÅÃ` «üȾ¡¸ ¯ûǾ¡ (¿¢ÂÁÉÅ¢¨Ä ÁüÚõ ¿¢Àó¾¨É¸û)
±ýÚ ºÃ¢À¡÷ì¸×õ yy ¸¼ý «ð¨¼Â¢ø ºÃ¢Â¡É À½õ ÀâÅ÷ò¾¨É ¦ºöÂôÀ𼾡
yy ¿£í¸û ¦À¡Õð¸¨Ç Å¡íÌžüÌ ÓýÉ÷ «ó¾ þ¨½Âò¾Ç ±ýÚ ºÃ¢À¡÷ì¸×õ. À¢ý «¾¢ø ²¾¡ÅÐ ÌÇÚÀÊ þÕó¾¡ø
Ó¸Åâ ¿õÀ¸Á¡É¾¡ ±É ¬Ã¡öóÐ «¾ýÀ¢ý ÀÂýÀÎò¾×õ. À¢ý ¯¼ÉÊ¡¸ ¯Ã¢Â «¾¢¸¡Ã¢¸Ç¢¼õ Ò¸¡÷ «Ç¢ì¸×õ
Å¢üÀ¨É¡ÇÕ¨¼Â ¦¾¡¨Ä§Àº¢ ±ñ¸û ÁüÚõ Ó¸Å⢨Éì yy ¿£í¸û Å¡íÌõ ¦À¡Õð¸ÙìÌô À½õ ¦ºÖòоø, Å¡í̾ø
ÌÈ¢òÐ즸¡ûÇ×õ. §ÁÖõ ÀÄ þ¨½Âò¾Çí¸Ç¢ø «ó¾ô ÁüÚõ ¸½ì̸¨Ç ¯Ú¾¢ôÀÎòÐÁ¡Ú ²¾¡ÅÐ ´Õ
¦À¡Õð¸Ç¢ý Å¢¨Ä¢¨É Áü¦È¡Õ ¿¢ÚÅÉ ¾Â¡Ã¢ôÒ¸Ù¼ý Á¢ýÉﺨÄô ¦ÀüÈ¡ø ¯¼ÉÊ¡¸ ¯ñ¨ÁÂ¡É Å½¢¸Ã¢¼õ
´ôÀ¢ðÎô À¡÷ì¸×õ ¦¾Ã¢ÂôÀÎò¾×õ. ²¦ÉýÈ¡ø Ó¨ÈÂ¡É Å½¢¸÷¸û «Ð§À¡ýÈ
yy ¿£í¸û «ùÅ¡Ú ´ôÀ¢ðÎô À¡÷ò¾ À¢ý ¿£í¸û ¦À¡Õð¸¨Ç Å¡í¸ Å¢ÀÃí¸¨Çì §¸ðÎ Á¢ýÉïºø¸¨Ç «ÛôÀÁ¡ð¼¡÷¸û
¿¢¨Éò¾¡ø ӾĢø «ó¾ þ¨½Âò¾Ç Àì¸õ ¯ñ¨Á¡ɾ¡, yy þ¨½Âò¾¢ý š¢ġ¸ Ž¢¸õ ¦ºöÐ ÓÊò¾ À¢ÈÌ ¯í¸û
À¡Ð¸¡ôÀ¡É¾¡ ±É ¬Ã¡Â §ÅñÎõ. ±ôÀÊ ±ýÈ¡ø «¾ý ¸½¢É¢Â¢ý þ¨½Âò¾Ç ¯ÄŢ¢ø (Web Browser) ¯ûÇ
Ó¸ÅâÀð¨¼Â¡ÉÐ À¡Ð¸¡ôÀ¡É¡¾¡ ±ýÚ ¬Ã¡Â §ÅñÎõ. Ì츢¸¨Ç (Cookies) ¿£ì¸¢ Å¢Îí¸û þø¨Ä¦ÂýÈ¡ø ŨľÇõ
(https (or) Padlock and address bar) À¢ý À½ò¾¢¨Éî ¦ºÖò¾ ÓÄõ ¯í¸Ù¨¼Â ¾¸Åø¸¨Ç §º¸Ã¢òÐ ¦¸¡ûÇÓÊÔõ
§ÅñÎõ

12
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Be aware of Loan Frauds


• Some of the culprits advertise in the news papers stating that they offer loans to the individuals on low rate of interest and furnishes a
cell number, which is taken on furnishing wrong address moog’s.
• The culprit sends some fake certificates to the individuals stating that he has been sanctioned a loan and asks them to deposit certain
amount in bank accounts. The individual deposits the amount in fake accounts for the purpose of registration, tax’s, advocate fee, etc.,
So be aware of such fake certificates
• Don’t believe advertisements of finance companies stating that they will sanction loans with low interest rate.

¸¼ý §Á¡ºÊ ÌÈ¢ò¾ ±îºÃ¢ì¨¸!!!


yy ²Á¡üÚ측÷¸û ¦ºö¾¢ò¾¡û¸Ç¢ø ̨Èó¾ ÅðÊ Å¢¸¢¾ò¾¢ø ¸¼ý ¾Õž¡¸ Å¢ÇõÀÃõ ¦ºöÅ¡÷¸û ÁüÚõ «Å÷¸Ù¨¼Â «¨Ä§Àº¢
±ñ¸¨Çì ¦¸¡ÎôÀ÷
yy ²Á¡üÚ측Ã÷¸û ¯í¸ÙìÌ ¸¼ý «ÛÁ¾¢ò¾ø ¸Ê¾õ Å󾾡¸ ÜÈ¢ ´Õ §À¡Ä¢î º¡ýÈ¢¾Æ¢¨É «ÛôÒÅ÷. «òмý «Å÷¸û
ÓýÀ½Á¡¸ ´Õ ÌÈ¢ôÀ¢ð¼ «Ç× À½ò¾¢¨É (À¾¢×ì¸¡É ¦ºÄ×, ÅâÄ×, ÅÆį̀ûÕì¸¡É ¦ºÄ× ÁüÚõ ÀÄ) ¦ºÖò¾î
¦º¡øÅ¡÷¸û
yy «¾É¡ø þЧÀ¡ýÈ º¡ýÈ¢¾Æ¢¨Éô ¦ÀüÈ¡ø ±îºÃ¢ì¨¸Ô¼ý þÕì¸ §ÅñÎõ §ÁÖõ þÐ §À¡ýÈ Å¢ÇõÀÃí¸¨Ç ¿õÒŨ¾
¾Å¢÷ì¸×õ

FAKE
13
Be aware of Debit / Credit Card Fraud
Steps to be followed before Credit card & Debit card/ATM card • Use only trusted payment gate ways, online money wallets.
usage: • Prefer net banking transactions when you do online payments
• Whenever you receive the card from the bank make sure the mail through debit card
is completely sealed and there is no damage. Identify security clues such as a lock image at the bottom of your
• Whenever you receive the card from the bank immediately sign on browser. A URL that begins with https:
the card. ( These signs indicates that your purchases are secured with encryption
• Try to cover the last three digit number behind the card (CVV to protect your account information)
number).
• Register your phone number to check the account transactions.
• Change the pin number immediately.

• Treat all e-mail messages with suspicion to avoid phishing scams.


Do not respond to e-mail messages asking for personal information
including financial information, as banks do not ask for such
information.
• Always log off from any website after completing online transaction
Secure usage of Credit/Debit cards at Shopping malls and with your credit/ debit card and delete the browser cookies.
Restaurants: • Never store your credit/ debit card information in online shopping
• Always keep an eye how the vendor swipe your card sites.
• Always make sure that the transactions happen at your presence. • Never send payment information via e-mail. Information that
• Never sign a blank credit card receipt. Carefully draw a line through travels over the Internet (such as e-mail) may not fully protect
blank portions of Receipt from being read by outside parties.
• Don’t give away your personal/Debit/Credit Card information in • Please be careful when providing personal online.
the survey forms given in the Restaurants/ Shopping malls. • Please be wary of promotional scams. Identity thieves may use
phony offers asking for your personal information
Secure usage of Credit / Debit card over Internet • Please keep your passwords secret. Some online stores may
• Always use secure websites for transaction and shopping. require you to register withThem via a username and password
• Always shop with merchants you know and trust before buying. Online passwords should be kept secret from
• Please look for signs of security. outside parties the same way you protect your ATM PIN.
14
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Do’s sources or instant message download links. Delete suspicious


• Before you use an ATM, please ensure that there are no strange e-mail immediately.
objects in the insertion panel of the ATM.( to avoid skimming) • Don’t give out your account number over the phone unless you ini-
• Shield the ATM pin number during transaction. Don’t carry the tiate the call and you know the company is reputable. Never give
transaction receipts along. your credit card info out when you receive a phone call. ( This is
• Please change your ATM PIN once in every 3 months. As advised called Vishing )
by banks. • Don’t provide your credit card information on a website that is not
• Keep your credit card receipts to guard against transaction frauds, a secure site.
check your receipts against your monthly statement. • Don’t share any confidential information such as password, cus-
• Only carry around credit cards that you absolutely need. tomer id, Debit card number, Pin CVV2, DOB to any email requests,
• Shred (tear up) any bill / receipt that contain your credit card even if the request is from government authorities like Income
number written on it. Tax department, RBI or any card association company like VISA or
• Notify your credit card issuers in advance of your change of ad- Master card.
dress, then you change home address. • Don’t address or refer to your bank account problems or your ac-
• If you lose your credit card, please report the loss immediately. count details and password on social networking site or blogs.
• When you dispose a card at the time of renewal/upgradation, • Don’t store critical information like your ATM PIN number on your
please make sure to cut it diagonally before disposal. mobile phone.

Don’ts
• Don’t accept the card received directly from bank in case if it is
damaged or seal is open.
• Don’t write your PIN number on your credit card.
• Don’t carry around extra credit cards that you rarely use.
• Don’t disclose your Credit Card Number/ATM PIN to anyone. Never keep your
• Don’t hand over the card to anyone, even if he/she claims to rep-
resent the Bank.
credit card
• Don’t get carried away by strangers who try to help you use the number and
ATM machine.
• Don’t use the ATM machines if the device is not in good conditions.
PIN at one place
• Don’t transfer or share your account details with unknown/non
validated source.
• Don’t access Netbanking or make payment using your Credit/Deb-
it card from shared or unprotected computers in public places.
• Don’t open unexpected e-mail attachments from unexpected

15
¸¼ý / ÀüÚ & ¾¡É¢Âí¸¢ «ð¨¼ §Á¡ºÊ ÌÈ¢ò¾ ŢƢôÒ½÷×:-
¸¼ý, ÀüÚ ÁüÚõ ¾¡É¢Âí¸¢ «ð¨¼ ÀÂýÀÎòОüÌ Óý ¸¼ý, ÀüÚ «ð¨¼¸¨Ç ŨÄò¾Çí¸Ç¢ø À¡Ð¸¡ôÀ¡¸
¸¨¼ôÀ¢Êì¸ §ÅñÊ ¿¨¼Ó¨È¸û ÀÂýÀÎòÐõ Өȸû:-
yy «ð¨¼Â¢¨É ¿£í¸û Åí¸¢¸Ç¢¼Á¢ÕóÐ ¦ÀÚõ§À¡Ð «Ð yy þ¨½Âò¾Çõ ãÄõ ¦À¡Õð¸¨Ç Å¡í¸ ¿¢¨Éò¾¡ø ±ô¦À¡ØÐõ
Óò¾¢¨Ã¢¼ôÀ𼾡¸×õ ÁüÚõ §º¾Á¨¼Â¡¾¾¡¸×õ þÕì¸ À¡Ð¸¡ôÀ¡É þ¨½Âò¾Ç Ó¸Åâ¢ø ¦ºÂøÀÎò¾×õ.
§ÅñÎõ yy ±ô¦À¡ØÐõ ¯í¸ÙìÌò ¦¾Ã¢ó¾ ÁüÚõ ¿õÀò¾Ìó¾ Ţ¡À¡Ã¢Â¢¼õ
yy «ð¨¼Â¢¨É Åí¸¢Â¢¼Á¢ÕóÐ ¦ÀüÈ×¼ý «¾ýÁ£Ð ¾í¸ÇÐ ¦À¡Õð¸¨Ç Å¡í¸×õ
¨¸¦Â¡ôÀò¾¢¨É þ¼ §ÅñÎõ yy ¾Â× Ü÷óÐ þ¨½Â ¯ÄŢ¢ø (Web Browser) À¡Ð¸¡ôÒ¸¡É
yy «ð¨¼Â¢ý À¢ýÒÈõ ¯ûÇ (CVV ±ñ¸û) ¸¨¼º¢ 3 ±ñ¸û «È¢ÌÈ¢¸¨Ç ¸ÅÉ¢ì¸×õ
Á¨Èó¾¢Õì¸ §ÅñÎõ yy ±ô¦À¡ØÐõ ¿õÀ¸Á¡É À½õ ¦ºÖò¾ø ѨÆÅ¢¨Â ÀÂýÀÎò¾×õ
yy ¯í¸Ç¢ý ¦¾¡¨Ä§Àº¢ ±ñ¸¨Çô À¾¢× ¦ºö §ÅñÎõ. ²¦ÉÉ¢ø yy ±ô¦À¡ØÐõ ÀüÚ «ð¨¼ ãÄõ À½ôÀâÁ¡üÈõ ¦ºöÔõ¦À¡ØÐ
þÐ ¸½ìÌô ÀâÅ÷ò¾¨É ¿¢¸ú׸¨Çì ¸ñ¸¡½¢ôÀ¾üÌ ¯¾×õ þ¨½Âò¾Ç Åí¸¢Â¢¼ø (Online Banking) ӨȨÂô ÀÂýÀÎò¾
yy Ó¾ýӾĢø ÅÆí¸ôÀð¼ À¡Ð¸¡ôÒì ÌȢ£ðÎ ±ñ½¢¨É §ÅñÎõ
¯¼ÉÊ¡¸ Á¡üÈ §ÅñÎõ À¡Ð¸¡ôÒ «õºí¸Ç¡Éô âðÎô ÀÊÁõ ¯í¸Ç¢ý
¯ÄŢ¢ý ¸£§Æ ¯ûǾ¡ ±ýÚ ¸ÅÉ¢ì¸×õ, ¯ÄŢ¢ý Ó¸Åâ Àð¨¼Â¢ø þ¨½Â
Ó¸Åâ (HTTPS) ±ýÚ ÐÅíÌõ§Á¡ɡø: («Ð ¯í¸Ç¢ý ÀâÅ÷ò¾¨É¨Âô
À¡Ð¸¡òÐ Á¨ÈÂ¡ì¸ Ó¨È¢ø Á¡üÈ ¯¾×õ)

yy Á¢ýÉïºø ãÄõ ¯í¸Ù¨¼Â ¾É¢¿À÷ ¦ºö¾¢¸¨ÇÔõ, Åí¸¢ì


¸½ìÌ ÀüȢ ¾¸Åø¸¨ÇÔõ §¸ðÎ ÅÕõ Á¢ýÉïºø¸ÙìÌ
¸¼ý, ÀüÚ «ð¨¼¸¨Ç Å¢üÀ¨Éì ܼí¸Ç¢ø ÁüÚõ À¾¢ÄÇ¢ì¸ §Åñ¼¡õ, Åí¸¢¸û ´Õ §À¡Ðõ þö¾¢¸¨Ç
¯½Å¸í¸Ç¢ø À¡Ð¸¡ôÀ¡¸ ÀÂýÀÎòÐõ Өȸû:- §¸ð¸¡Ð
yy Å¢üÀ¨É¡Ç÷ ±ùÅ¡Ú ¯í¸ÇÐ «ð¨¼Â¢¨Éò ¾£ðθ¢È¡÷ yy þ¨½Âò¾Çõ ãÄõ ¿£í¸û ¸¼ý ÁüÚõ ÀüÚ «ð¨¼Â¢¨É
±ýÀ¾¢¨É ¿£í¸û À¡÷ì¸ §ÅñÎõ ¨ÅòÐ À½õ ÀâÅ÷ò¾¨É ¦ºöÐ þÕó¾¡øô À¢ý ¯¼ÉÊ¡¸
yy ¯í¸û ÓýÉ¢¨Ä¢ø; À½õô ÀâÅ÷ò¾¨É ¿¢¸ú× ¿¨¼¦ÀÈ «ó¾ þ¨½Âò¾Çò¾¢¨É ÐñÊì¸ §ÅñÎõ ÁüÚõ ¯ÄÅ¢
§ÅñÎõ. Ì츣¸¨Ç (Cookies) «Æ¢òÐÅ¢¼ §ÅñÎõ.
yy ±ô¦À¡ØÐõ ¸¼ý «ð¨¼Â¢ý ¦ÅüÚ ¿¸ø¸Ç¢ø ¨¸ÂôÀÁ¢¼ yy À½õ ¦ºÖò¾¢Â Å¢ÅÃí¸¨Ç ´Õ §À¡Ðõ Á¢ýÉïºø ãÄõ
§Åñ¼¡õ, «øÄÐ ¦ÅüÚþ¼ò¾¢øì ¸ÅÉÁ¡¸ §¸¡Î þ¼×õ. À¸¢Ã §Åñ¼¡õ. ²¦ÉýÈáø «î¦ºö¾¢ À¡Ð¸¡ôÀüÈ Ó¨È¢ø
yy ¯í¸¨Çô Àü颃 ¾É¢ ¿À÷, ¸¼ý, ÀüÚ «ð¨¼ Å¢ÀÃí¸¨Ç Å¨Äò¾Çí¸Ç¢ø À½¢ìÌõ§À¡Ð ¦ÅÇ¢¿À÷ À¡÷ôÀ¾üìÌ Å¡öôÒ
¡§ÃÛõ Å¢º¡Ã¢ò¾¡øì ¦¸¡Îì¸ì ܼ¡Ð. ¯ñÎ.
yy ¯í¸Ù¨¼Â ¾É¢¿À÷ ¦ºö¾¢¸¨Ç ŨÄò¾Çí¸Ç¢ø

16
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

¦¸¡ÎìÌõ¦À¡ØÐ ¸ÅÉÁ¡¸ þÕì¸ §ÅñÎõ. «øÄÐ «¾Û¨¼Â À¡Ð¸¡ôÒ Óò¾¢¨Ã À¢Ã¢ì¸ôÀðÊÕ󾡧ġ


yy ¯í¸û À¡Ð¸¡ôÒ ÌȢ£ð欃 þøº¢ÂÁ¡¸ ¨ÅòÐì ¦¸¡ûÇ «ÅüÈ¢¨É ²üÚ즸¡ûÇ¡¾£÷¸û.
§ÅñÎõ. ´Õ º¢Ä Å¨Ä «¨ÁôÒ ¸¨¼¸û ¿£í¸û Å¡íÌžüÌ yy ¸¼ý «ð¨¼Â¢ý Á£Ð ÌȢ£ðÎ ±ñ¸¨Ç ±Ø¾¡¾£÷¸û
ÓýÉ÷ ¯í¸Ù¨¼Â ÀÂÉ¡Ç÷ ¦ÀÂ÷ ÁüÚõ À¡Ð¸¡ôÒ ÌȢ£ð欃 yy §¾¨ÅìÌ «¾¢¸Á¡É ¸¼ý «ð¨¼Â¢¨É ¨Åò¾¢Õ측¾£÷¸û,
À¾¢× ¦ºöÔÁ¡Ú §¸ðÀ¡÷¸û ŨÄò¾Ç À¡Ð¸¡ôÒ ÌȢ£θû «ôÀÊ¡¸ô ÀÂýÀÎòÐõ «ð¨¼¸û ±øÄ¡ÅüÈ¢¨ÉÔõ ´ýÈ¡¸
¦ÅÇ¢¿À÷¸ÙìÌ ¦¾Ã¢Â¡Áø þøº¢ÂÁ¡¸ ¨ÅòЦ¸¡ûÇ §ÅñÎõ. ¨Åò¾¢Õ측¾£÷¸û.
þЧÀ¡ýÚ ¾¡É¢Âí¸¢ «ð¨¼Â¢ý ÌȢ£ðʨÉÔõ þøº¢ÂÁ¡¸ yy ¯í¸Ù¨¼Â ¸¼ý «ð¨¼ ÁüÚõ ¾¡É¢Âí¸¢ «ð¨¼Â¢ý
¨ÅòÐ ¦¸¡ûÇ §ÅñÎõ. À¡Ð¸¡ôÒì ÌȢ£ðÎ ±ñ½¢¨É ¡â¼Óõ À¸¢Ã¡¾£÷¸û.
yy ´Õ §À¡Ðõ ¯í¸Ù¨¼Â ¸¼ý «ð¨¼ ÁüÚõ «¾Û¨¼Â yy ¾í¸Ù¨¼Â «ð¨¼Â¢¨É ¡â¼Óõ ¦¸¡ÎòÐ ¨Å측¾£÷¸û
À¡Ð¸¡ôÒ ÌȢ£ðʨÉÔõ ´§Ã þ¼ò¾¢ø ¨Å측¾£÷¸û ²¦ÉýÈ¡ø «Å÷¸û ¯í¸¨Çô §À¡ýÚ «ÅüÈ¢¨É Åí¸¢Â¢ø
ºÁÃôÀ¢ì¸ ÓÊÔõ.
yy ¾¡É¢Âí¸¢ þÂó¾¢Ãõ ¯À§Â¡¸¢ìÌõ§À¡Ð ¯¾Å¢ ¦ºöž¡¸ì
¦ºö §ÅñʨÅ:- ÜÈ¢ÅÕõ ²Á¡üÚ측Ã÷¸¨Çî §º÷측¾£÷¸û.
yy ¯í¸Ç¢ý ¾¡É¢Âí¸¢ «ð¨¼Â¢¨É ÀÂýÀÎòÐõ Óý, ¾Â¨Â yy ¾¡É¢Âí¸¢ þÂó¾¢Ãõ ÀØÐüÚ þÕó¾¡ø «ÅüÈ¢¨É
Ü÷óÐ ²§¾Ûõ ¸ÕÅ¢¸û ¾¡É¢Â¢ì¸ Åí¸¢ þÂó¾¢Ãõ (ATM þø) ¯À§Â¡¸¢ôÀ¾¨Éò ¾Å¢÷ì¸×õ.
¦À¡Õò¾ÀðÎûǾ¡ ±ýÚ ¯Ú¾¢ ÀÎò¾¢ ¦¸¡ûÇ×õ yy ¦À¡Ð þ¼í¸Ç¢ø ¯ûÇ À¡Ð¸¡ôÀüÈ ¸½¢É¢ ¨ÁÂí¸Ç¢ø,
yy ÀâÅ÷ò¾¨É¢ý§À¡Ð ¾¡É¢Âí¸¢ì ÌȢ£ðÎ ±ñ¸¨Çô À¡Ð¸¡ì¸ ŨÄò¾Ç Åí¸¢¸Ç¢ø ¯í¸Ù¨¼Â ¸¼ý, ÀüÚ «ð¨¼¸¨Çô
§ÅñÎõ. ÀÂýÀÎòО¢¨Éò ¾Å¢Õí¸û.
yy ¾¡É¢Âí¸¢ «ð¨¼Ô¼ý ÀâÅ÷ò¾¨É þú£¾¢¨É ´ýÈ¡¸ yy ±¾¢÷À¡Ã¡¾ Á¢ýÉïºø þ¨½ôÒ¸¨Çò ¾¢È측¾£÷¸û ²¾¡ÅÐ
¨Åì¸ìܼ¡Ð. ºó§¾¸ò¾¢üÌâ Á¢ýÉïºø¸û Åó¾¡ø «Æ¢òÐÅ¢¼×õ.
yy Åí¸¢¸Ç¢ý «È¢×¨Ã¸Ç¢ýÀÊ ãýÚ Á¡¾í¸ÙìÌ ´ÕÓ¨È yy ¦¾¡¨Ä§Àº¢Â¢ý ãÄõ ¡áÅÐ ¾í¸Ù¨¼Â ¸¼ý «ð¨¼ò
¾í¸Ù¨¼Â ¾¡É¢Âí¸¢ À¡Ð¸¡ôÒì ÌȢ£ðÎ ±ñ½¢¨É Á¡üÈ ¾¸Åø¸¨Çì §¸ð¼¡ø «ÅüÈ¢ìÌô À¾¢ÄǢ측¾£÷¸û.
§ÅñÎõ. yy À¡Ð¸¡ôÒ «üÈ þ¨½Âò¾Çô Àì¸í¸Ç¢ø ¾í¸Ù¨¼Â ¸¼ý
yy ¯í¸ÙìÌì ¸ñÊôÀ¡¸ò §¾¨Å ±ýÈ¡ø ÁðΧÁ ¾í¸Ù¨¼Â «ð¨¼Â¢ý ¾¸Åø¸¨Çì ¦¸¡Î측¾£÷¸û.
¸¼ý «ð¨¼Â¢¨Éì ¨¸Â¢ø ¨ÅòÐì ¦¸¡ûÇ×õ. yy ¯í¸Ù¨¼Â À¡Ð¸¡ôÒ Å¡÷ò¨¾, Ѹ÷§Å¡÷ «¨¼Â¡Ç ±ñ, Á¡üÈ
yy ´Õ §À¡Ðõ þú£Ð¸Ç¢ý§Áø ¾í¸Ù¨¼Â ¸¼ý «ð¨¼ ±ñ¸¨Ç «ð¨¼ ±ñ, CVV ÌȢ£Î, À¢Èó¾ §¾¾¢ §À¡ýÈÅüÈ¢¨Éì §¸ðÎ
±Ø¾¡¾£÷¸û. ÅÕõ Á¢ýÉïºø¸û ÁüÚõ ÅÕÁ¡ÉÅâò ШÈ¢ø þÕ󧾡,
yy ¾¡í¸û ¾í¸û Å£ðÎ Ó¸Åâ¢¨É Á¡üÈ ¿¢¨Éò¾¡ø Óýɾ¡¸§Å âî÷Å À¡íì ¬ô þó¾¢Â¡ (RBI) «øÄРţº¡ (VISA) «øÄÐ
¸¼ý «ð¨¼ Åí¸¢Â¡Çâ¼õ ¦¾Ã¢Å¢ì¸×õ. Á¡Š¼÷ «ð¨¼Â¢Ä¢ÕóÐ (Master Card) §¸ðÀ¾¡¸ì ÜÈ¢ ÅÕõ
yy ¿£í¸û ¸¼ý «ð¨¼¸¨Ç þÆì¸ §¿Ã¢ð¼¡ø ¯¼ÉÊ¡¸ô Ò¸¡÷ Á¢ýÉïºø¸ÙìÌõ À¾¢ÄÇ¢ì¸ §Åñ¼¡õ.
«Ç¢ì¸×õ. yy ¾í¸Ù¨¼Â Åí¸¢ì ¸½ìÌô À¢Ãɸ¨Ç§Â¡ «øÄÐ ¯í¸û
yy ¿£í¸û ¾í¸û «ð¨¼Â¢¨Éô ÒÐôÀ¢ò¾ À¢ýɧá «øÄÐ Á¡üȢ ¸½ìÌ Å¢ÀÃí¸¨Ç§Â¡ ÁüÚõ À¡Ð¸¡ôÒì ÌȢ£ðʨɧ¡ ºã¸
À¢ýɧá «ÅüÈ¢¨Éò à츢 ±Ã¢Â ¿¢¨Éò¾¡ø «ÅüÈ¢¨É ŨÄò¾Çí¸Ç¢ø ÌÈ¢ôÀ¢¼ §Åñ¼¡õ.
ã¨ÄÅ¢ð¼õ ÅÊÅ¢ø ¦ÅðÊò à츢ô §À¡¼×õ. yy ¯í¸û «¨Ä§Àº¢Â¢ø ¾í¸Ù¨¼Â ¾¡É¢Âí¸¢ «ð¨¼Â¢ý
ÌȢ£ðʨÉô À¾¢× ¦ºö §Åñ¼¡õ.
¦ºöÂìܼ¡¾¨Å:-
yy Åí¸¢Â¢¼Á¢ÕóÐ ¦ÀÈôÀÎõ «ð¨¼ ÀØÐ «¨¼óÐ þÕ󾡧ġ

17
Preventive measures to be taken in Cyber Space
• Dont give your personal details of whereabouts : Don’t post specific personal information online,
such as travel dates, location and time of the movie you plan to watch, evening classes that you take etc.,
• Keep contact information private : Beware of strangers.
• Friends : Better avoid strangers as friends when requests are received.
• Don’t share your personal information profile information
• Irrespective of genders as they may post abusive/indecent messages when the relations are strained
with them.
Be aware of following risks
• Spam users can be tricked into clicking in the links, icons, buttons etc,
As we all know that spam is usually unwanted e-mail advertising which could trigger running of processes at the background with-
about a product sent to list of e-mails or group of e-mail addresses. out the knowledge of the user. 
Similarly spammers are sending the unwanted mails or messages
to the billions of users of social networking sites which are free;
and are easily accessible by spammers to gather the personal in-
formation of the unsuspecting users.

• Scams:
Online scammers generally send an email or message with a link to
the user which ask for the profile information and tell the user that
it would add new followers. These links sent to the user would be
similar to applications, games etc. So whenever the user post his
details in the link then the details will be received by scammers
and information would be misused.

• Clickjacking
Generally, clickjacking is a malicious technique of tricking Web
users into revealing confidential information or taking control of
their computer while clicking on seemingly innocuous Web pages.
Vulnerability across a variety of browsers and platforms, a click-
jacking takes the form of embedded code or script that can run
without the user’s knowledge. The same is followed in the social
networking domain. The objective behind such an attack is that

18
CYBER CRIME AWARENESS

• Malicious application guardian.


Malicious application might come through different application • Change your password frequently, and avoid clicking links that pur-
while using or installing software’s. Similarly, the clicking on the port to send you back to the social network site. Instead, type the site’s
social networking application starts the application installation address directly into your browser (or follow a bookmark you’ve pre-
process or link to view the video, etc. In order to fulfil its intend- viously saved) to get back to your account.
ed operation the application requests for some elevated privileges • When you are choosing a Social Networking site, privacy issues
from the user like access to my basic information, update on my should be considered.
wall, post on my wall, etc . • While accepting the friends on Social Networking sites, be selective.
Add people as friends to your account / site if you know them in real

life, allow only selective people to send friend requests by using your
• Phishing
email ID/Mobile number you provided to them.
As we all know the phishing attack is creation of fake site just sim- • Never meet in person with anyone whom you met on Social Network-
ilar to original site. Similarly these days even social networking ing site because some of the people may not be who they say they are
phishing has come in different flavours just like phishing attacks • Take your parents permission if you want to meet the person whom
on banks and popular trading websites. Social networking phish- you met in the networking site.
ing has come up with fake mails and messages like offering some • Most of the Social Networking web sites enabling users to set privacy
specialized themes, updating the profile, updating the security ap- controls for who has the ability to view the information like photos,
plication/features etc. In order to see the updates the user needs contact details and updates. Never allow search engines to find you
to follow a link and log in, through which the credentials are taken outside of social networking sites, search with your name. So enable
by the attacker. The linked page is a fake copy of the original login such privacy settings.
page, focused on stealing user account credentials • Do not post anything which harm to your family credibility
• Never post photographs, videos and any other sensitive information
Guidelines to unknown persons in Social network sites.
• Don’t give or post any personal information like your name, address • If you think that your social networking account details have been
of the School / Home, Phone numbers, Age, Sex, Debit /Credit card compromised or stolen, report your suspicions to the networking site
details in Cyber Space. support team immediately.
• The information which was posted by you in online can be seen by • Never respond to harassing or rude comments which are posted on
everyone who is online because internet is the world’s biggest in- your profile.
formation exchange tool. Many people who are having access to the • Delete any unwanted messages or friends who continuously leave in-
site which you are using can access your profile and get all the infor- appropriate comments and immediately report those comments to
mation what you have posted. The persons who are having access to the networking site.
your profile may include good persons like your friends, parents, and • Do not post your friends information in networking sites without
teachers. Not the strangers. their permission, which may possibly put them at risk. Protect your
• Be aware that the information you give in the sites could also put you friends by not posting the group photos, school names, locations,
at risk of victimization. ages, sex…etc.
• Never give out your password to anyone other than your parent or • Avoid posting the plans and activities which you are going to do in
networking sites.

19
þ¨½Â¦ÅǢ¢ø (Cyber Space) Ó¦ÉîºÃ¢ì¨¸ ¿¼ÅÊ쨸¸û:-
yy Å¨Ä «¨ÁôÀ¢ø ¯í¸Ù¨¼Â ¦º¡ó¾ Å¢ÀÃí¸¨Çô À¾¢× ¦ºö¡¾£÷¸û. «¾¡ÅÐ
¿£í¸û À½¢ìÌõ §¾¾¢¸û, þÕôÀ¢¼õ, §¿Ãõ ÁüÚõ ¿£í¸û À¡÷ì¸Å¢ÕìÌõ
¾¢¨ÃôÀ¼ò¾¸Åø¸û, À¢Öõ Á¡¨Ä §¿Ã ÅÌôÒ¸û §À¡ýÈ þ¾Ã ÀÄ Å¢ÀÃí¸û
yy ¯í¸¨Çò ¦¾¡¼÷Ò ¦¸¡ûÇ ¯¾×õ Ó¸Åâ¢¨É À¡Ð¸¡òÐ ¨ÅòÐì ¦¸¡ûÇ×õ:
«È¢Ó¸Á¢øÄ¡¾Å÷¸Ç¢¼õ ±îºÃ¢ì¨¸
yy ¿ñÀ÷¸û: «È¢Ó¸õ þøÄ¡¾Å÷¸¨Ç þ¨½Âò¾Ç ¿ñÀ÷¸Ç¡¸
²üÚ즸¡ûÇ¡¾£÷¸û
yy ¬½¡¸ þÕó¾¡Öõ, ¦Àñ½¡¸ þÕó¾¡Öõ ¯í¸ÇÐ ¾É¢ôÀð¼ ¾¸Åø¸¨Çô
À¸¢Ã §Åñ¼¡õ. ²¦ÉÉ¢ø, «Å÷¸û ¯í¸¨ÇôÀüȢ ¾ÅÈ¡É / «¿¡¸Ã£¸Á¡É
¦ºö¾¢¸¨Çô À¾¢× ¦ºö šöôÒûÇÐ

À¢ýÅÕõ ¬ÀòÐ츨Çì ÌÈ¢ò¾ ŢƢôÒ½÷×:-


yy §¾¨ÅÂüÈ Á¢ýÉïºø:- (Spam) þ¨½ôÀ¢¨É «ØòÐõ§À¡§¾ «øÄÐ ¦À¡ò¾¡¨Éî
§¾¨ÅÂüÈ Á¢ýÉïºø Ó¸Åâ ãÄõ ´Õ ¦À¡ÕÇ¢¨Éô ÀüÈ¢ ¦º¡ÎìÌõ (CLICK) ¦À¡Ø§¾¡ ¯í¸Ù¨¼Â ¦ºö¾¢¸¨Çò
Å¢ÇõÀÃõ ¦ºöÐ ²Á¡üÚ측÷¸û §¾¨ÅÂüÈ Á¢ýÉïºø¸¨Çì ¾¡É¡¸§Å ¯í¸ÙìÌò ¦¾Ã¢Â¡Áø ´ÕÀ¢ýÀ¾¢× ¦ºÂø ÓÄõ
§¸¡Êì ¸½ì¸¢ø ºÓ¸ ŨľÇí¸Ç¢ø þÄźÁ¡¸ «ÛôÀ¢ §º¸Ã¢ôÀ¡÷¸û
«¾ý ãÄõ «Å÷¸û ´Õ ¾É¢ ¿Àâ¨ÉôÀüȢ ¦ºö¾¢¸¨Ç
«È¢Å÷. yy ÅýÁ «¨ÁôÒ À§ÉüÈõ:- (Malicious Application)
¸½¢É¢ô ÀÂɡǢ¢¼õ §¾¨ÅìÌô ÒÈõÀ¡É Å¢ÀÃí¸¨Çî
yy §Á¡ºÊ / ²Á¡üÚ측Ã÷:- (Scam) §º¸Ã¢ôÀÐ. «¾¡ÅÐ ¦Áý¦À¡ÕÇ¢¨É ¿¢Ú׾Ģý§À¡§¾¡
þ¨½Âò¾Ç §Á¡ºÊ측Ã÷¸û Á¢ýÉïºø «øÄÐ «øÄÐ ºã¸ ŨÄò¾Çí¸Ç¢Ä¢ÕóÐ À¾¢Å¢Èì¸õ
ÌÚ了ö¾¢¸¨Ç þÄź þ¨½Â þ¨½ôÒ ãÄõ ¦ºöÔõ§À¡§¾¡ «øÄÐ þ¨½Âò¾Ç Ò¨¸ôÀ¼ô À¾¢×¸¨Çô
ÀÂÉ¡Ç¢¸ÙìÌ «ÛôÀ¢ «Å÷¸Ù¨¼Â Å¢ÀÃí¸¨Çî §º¸Ã¢ôÀ÷. À¡÷ìÌõ§À¡§¾¡ §Á¡ºÊ측Ã÷¸û ¸ð¼¡ÂÁ¡¸ô ÀÂɡǢ¢ý
þó¾ þ¨½ôÒ ¦Áý¦À¡Õû, Å¢¨Ç¡ðÎ ¦Áý¦À¡Õû ÓØ Å¢ÀÃí¸¨Çì §¸ðÎô ¦ÀÚ¸¢ýÈÉ÷. À¢ýÉ¡Ç¢ø þ¾¨Éò
¬¸¢ÂÅüÈ¢¨Éô À¾¢Å¢Èì¸õ ¦ºöÔõ§À¡Ð «Å÷¸Ù¨¼Â ±øÄ¡ ¾ÅÈ¡¸ô ÀÂýÀÎò¾ìÜÎõ.
Å¢ÀÃí¸¨ÇÔõ §º¸Ã¢òÐò ¾ÅÈ¡É Ó¨È¢ø ÀÂýÀÎòÐÅ÷.
yy Phishing
• Clickjacking ²Á¡üÚ¸¡÷¸û «ºø ¿¢ÚÅÉò¾¢ý þ¨½Âò¾Ç Ó¸Åâ¨Âô
þõӨȢÖõ ¸½¢É¢ô ÀÂɡǢ¢¼õ §¾¨ÅìÌô ÒÈõÀ¡É §À¡ýÚ ²Á¡üÚ þ¨½Âò¾Ç Ó¸Å⢨Éò ¾Â¡Ã¢òÐô
¦ºö¾¢¸¨Çî §º¸Ã¢ôÀ§¾¡Î þ¨½Âò¾Çô ÀÂÉ¡Ç¢¸Ç¢ýô À¢È ÀÂɡǢ¢ý À¡Ð¸¡ì¸ôÀð¼ Å¢ÀÃí¸¨Çî §º¸Ã¢ôÀ÷.
Á¢¸ Ó츢ÂÁ¡É ¦ºö¾¢¸Ùõ §º¸Ã¢ì¸ôÀθ¢ýÈÉ. þ¨½Â ¾ü§À¡Ð ÀÄӨȸǢø ²Á¡üÚ þ¨½Âò¾Ç Ó¸Å⢨É

20
CYBER CRIME AWARENESS

¯ÕÅ¡ì̸¢ýÈÉ÷. «¾¡ÅÐ Åí¸¢ ÁüÚõ ÀíÌîºó¨¾ º¢ì¸ø¸û ±ÆìÜÎõ ±ýÀ¨¾ì ¸Õò¾¢ø ¦¸¡û¸
þ¨½Âò¾Ç Ó¸Å⢨Éô §À¡ý§È ¾Â¡Ã¢òÐ ²Á¡üÚ yy ºã¸ ŨÄò¾Çí¸Ç¢ø ¿£í¸û ¿ñÀ÷¸¨Ç §¾÷ó¦¾ÎìÌõ§À¡Ð
Á¢ýÉïºø¸û ÁüÚõ ÌÚï ¦ºö¾¢¸û ÓÄõ Å¢ÇõÀÃõ ¦ºöÐ «Å÷¸û ¯í¸Ù¨¼Â ¿¢ƒ Å¡úÅ¢ø ¿ýÌò ¦¾Ã¢ó¾Å÷¸Ç¡¸
ÀÂɡǢ¢ý Å¢ÀÃí¸¨Ç ÁüÚõ À¡Ð¸¡ôÒ Å¢„Âí¸¨Çî þÕì¸ §ÅñÎõ
§º¸Ã¢ì¸¢ýÈÉ÷. þò¾¨¸Â ²Á¡üÚ þ¨½Âò¾Çô Àì¸õ yy ´Õ§À¡Ðõ ºã¸ ŨÄò¾Çí¸Ç¢ø þ¨½ôҸǢø
«ºø þ¨½Âò¾Çô Àì¸í¸Ç¢ý ¿¸Ä¡Ìõ; þùÅ¡Ú ¦ºöž¢ý ¯ûÇÅ÷¸¨Ç §¿ÃÊ¡¸î ºó¾¢ì¸¡¾£÷¸û ²¦ÉýÈ¡ø «¾¢ø
§¿¡ì¸õ ÀÂÉ÷¸Ç¢ý º¡ýÈ¢¨É¸¨Ç ¾¢ÕÎŧ¾! º¢Ä÷ ¾¡õ; ¡¦ÃýÚ Å¨Ä¾Çò¾¢ø ÜÈ¢ÂÅ¡Ú «Å÷¸û §¿Ã¢ø
þÕì¸Á¡ð¼¡÷¸û
ÅÆ¢¸¡ðξø¸û:- yy «ôÀÊ ¿£í¸û ºã¸ ŨÄò ¾Çí¸Ç¢ý ¿ñÀ÷¸¨Çî ºó¾¢ì¸
yy ¾í¸Ù¨¼Â ¦ÀÂ÷, Ó¸Åâ, ÀûÇ¢, Å£Î, ¦¾¡¨Ä§Àº¢ ±ñ¸û, Å¢ÕõÀ¢É¡ø ¯í¸Ç¢ý ¦Àü§È¡Ã¢ý «ÛÁ¾¢Ô¼ý ºó¾¢Ôí¸û
ÅÂÐ, À¡Ä¢Éõ, ÁüÚõ ÀüÚ/¸¼ý «ð¨¼ Å¢Çì¸í¸¨Ç yy ¾í¸Ù¨¼Â ¾É¢ôÀð¼ ¾¸Åø¸¨Çò ¾¡í¸û Å¢ÕõÒÅ÷¸ÙìÌ
þ¨½Âò¾Çí¸Ç¢øì ¦¸¡Î측¾£÷¸û ÁðÎõ Á¨ÈòÐô À¸¢Õõ ź¾¢Â¢¨Éî ºã¸ Å¨Äò¾Çí¸Ç¢ø
yy þ¨½Âò¾Çõ ±ýÀÐ ¯Ä¦¸í¸¢Öõ Å¢„Âí¸¨Çô À¸¢Ã ¯¾×õ §¾÷ó¦¾ÎòÐô ÀÂýÀÎò¾×õ
º¢Èó¾ ¸ÕŢ¡¸ ¯¾×¸¢ÈÐ. ¾¡í¸û ¾í¸Ù¨¼Â Å¢ÀÃí¸¨Ç yy ¾í¸û ÌÎõÀ ¦¸ªÃÅò¾¢¨Éô À¡¾¢ìÌõ Å¢¾Á¡¸ ±ó¾¦Å¡Õ
«ÅüÈ¢ø À¾¢× ¦ºö¾¡ø þ¨½Âò¾Ç Ѹ÷§Å¡÷¸û ¡÷ ¾¸Åø¸¨ÇÔõ «ÛôÀ¡¾£÷¸û
§ÅñÎÁ¡É¡Öõ À¡÷ì¸ ÓÊÔõ (¿øÄÅ÷¸û ÁüÚõ ¾£ÂÅ÷¸û), yy ºã¸ ŨÄò ¾Çí¸Ç¢ø ¦¾Ã¢Â¡¾ ¿À÷¸ÙìÌò ¾í¸Ù¨¼Â,
¯í¸Ç¢ý þ¨½Âô Àì¸í¸¨Ç, ¿ñÀ÷¸û, ¦Àü§È¡÷¸û Ò¨¸ôÀ¼ôÀ¾¢×¸¨Ç§Â¡ «øÄÐ ¾í¸¨Ç ±Ç¢¾¢ø
ÁüÚõ ¬º¢Ã¢Â÷¸û ¾Å¢Ã ¡ռÛõô À¸¢Ã §Åñ¼¡õ À¡¾¢ì¸ìÜÊ Ţ¨_Âí¸¨Ç§Â¡ ¦¾Ã¢Å¢ì¸ §Åñ¼¡õ
yy ¾í¸Ù¨¼Â ¾¸Åø¸¨Ç þ¨½Âò¾Ç Ó¸Åâ¢ø À¾¢Ôõ§À¡Ð yy ¯í¸Ù¨¼Â ºã¸ ŨÄò¾Çì ¸½ì̸ǢĢÕóÐ ¯í¸û
ÀƢšíÌõ ±ñ½Ó¨¼ÂÅ÷¸ÙìÌ ²ÐÅ¡¸ «¨ÁÔõ ¾¸Åø¸¨Ç ¡§ÃÛõ ¾¢ÕÊÅ¢ð¼¡÷¸û ±Éî ºó§¾¸õ
yy ´Õ§À¡Ðõ ¯í¸Ù¨¼Â ¸¼×¡ø¨Ä ¯í¸Ù¨¼Â ²üôÀð¼¡ø «ó¾ ŨÄò¾Çì ÌØ «¨ÁôÀ¢É¢¼õ
¦Àü§È¡÷ «øÄÐ À¡Ð¸¡Å¡÷¸û ¾Å¢Ã §ÅÚ Â¡ÕìÌõ ¦¾Ã¢Å¢ì¸ ¯¼ÉÊ¡¸ò ¦¾Ã¢Å¢ì¸×õ
§Åñ¼¡õ yy ¯í¸ÙìÌ ÅÕõ §¾¨ÅÂüÈ À¾¢×¸¨Ç «Æ¢òÐÅ¢¼×õ §ÁÖõ
yy ¯í¸Ù¨¼Â ¸¼×¡ø¨Ä «Êì¸Ê Á¡üÈ×õ; ÁüÚõ ´Õ §Å¨Ç ŨÄò¾Ç ¿À÷¸û ¯í¸¨Çò ¦¾¡¼÷óÐ Ó¨ÈÂüÈ
ºã¸ ŨľÇí¸ÙìÌ «¨ÆòÐî ¦ºøž¡¸ º¢ò¾Ã¢ìÌõ Å¢Á÷ºÉõ ¦ºö¾¡ø ¿£í¸û ¯¼ÉÊ¡¸ «ÅüÈ¢¨ÉôÀüÈ¢
(¾¢¨Ã¢ø §¾¡ýÚõ þ¨½ôÒ¸¨Çî ¦º¡Î측¾£÷¸û) Á£È¢î ŨÄò¾Çì ÌØ «¨ÁôÀ¢É¢¼õ Ò¸¡÷ «Ç¢ì¸×õ
¦º¡Ê츢ɡø ¯í¸Ù¨¼Â þøº¢Âò ¾¸Åø¸û ºã¸ ŨÄò yy ¿£í¸û ´Õ§Å¨Ç Ó¨ÈÂüÈ Å¢Á÷ºÉí¸¨Çô ¦ÀüÈ¡ø
¾Çí¸Ç¢ø À¾¢Å¡Ìõ ±É§Å, «¾üÌô À¾¢Ä¡¸ ¿£í¸û Å¢ÕõÒõ «¾üÌô À¾¢ÄÇ¢ì¸ §Åñ¼¡õ
þ¨½Âò¾Ç Ó¸Åâ¨Â ¿£í¸Ç¡¸§Å §¿ÃÊ¡¸ ¯í¸ÇÐ yy ¯í¸Ù¨¼Â ¿ñÀ÷¸Ç¢ý ¾¸Åø¸¨Ç þ¨½Âò¾Çí¸Ç¢ø
¯Ä¡Å¢ (Browser) ãÄõ ¾ð¼îÍ ¦ºöÐ ¯û§Ç ¦ºøÄ×õ À¸¢Ã¡¾£÷¸û (ÌØ Ò¨¸ôÀ¼õ, ÀûǢ¢ý ¦ÀÂ÷, À¡Ä¢Éõ, þ¼õ,
«øÄÐ Óýɾ¡¸§Å ¿£í¸û ÀÂýÀÎò¾¢ô À¡Ð¸¡ì¸ôÀð¼ô ÅÂÐ ÁüÚõ ÀÄ). þÅüÈ¢ý ÓÄõ ¯í¸û ¿ñÀ÷¸¨ÇÔõ
Òò¾¸ìÌȢ£ðÊý (Bookmark) ãÄõ ¾í¸Ù¨¼Â þ¨½Âò¾Ç À¡Ð¸¡ò¾¢Îí¸û
¸½ì̸ÙìÌî ¦ºøÄ×õ yy ŨÄò¾Çí¸Ç¢ø ¿£í¸û Å¡úÅ¢ø ¦ºö ¿¢¨ÉìÌõ
yy ¿£í¸û ºã¸ ŨÄò¾Çí¸Ç¢ø þ¨½Ôõ ÓýÉ÷ ¾í¸Ç¢ý ¦ºÂøÓ¨Èò ¾¢ð¼í¸¨Ç À¸¢÷Ũ¾ò ¾Å¢÷ì¸×õ
¾É¢ôÀð¼ ¾¸Åø¸û ÁüÚõ ¾É¢ÁÉ¢¾ ;ó¾¢Ãõò ¦¾¡¼÷À¡É

21
Mobile Phone Security
M obile phones are becoming ever more popular and are rapidly becoming
attractive targets for malicious attacks. Mobile phones face the same security *For more
challenges as traditional desktop computers, but their mobility means they are also exposed to information
a set of risks quite different to those of a computer in a fixed location. phones can be infected
with worms, trojan horses or other virus families, which can compromise your security and
refer manufacturer
privacy or even gain complete control over the device. This guide provides the necessary steps, manual *
do’s, don’ts & tips to secure your mobile devices.

Steps to be followed before Mobile Phone usage :

• STEP 1 : Read the manufacturer’s manual carefully and follow the guidelines as specified to setup your mobile phone.
• STEP 2 : Record the IMEI (International Mobile Equipment Identity) number for tracking your mobile in case you lose it.
Note: This is usually printed on the phone below the battery, or can be accessed by keying *#06# on most of the phones.

Mobile Phone Security Threats Categories : tion along with private SMSs and calls without user’s knowledge.
• Mobile Device and Data Security Threats • Losing control over mobile phone and unknowingly becoming
• Threats related to unauthorised or intentional physical access zombie for targeted attacks.
to mobile phone and Lost or Stolen mobile phones.
• Mobile Connectivity Security Threats Mitigation against Mobile Device and Data Security Attacks :
• Threats related to mobile phone connectivity to unknown sys- Do’s
tems, phones and networks using technologies like Bluetooth, • Record IMEI number:
WiFi, USB etc. Record the unique 15 digit IMEI number. In case Mobile phone is
• Mobile Application and Operating System Security Threats stolen/lost, this IMEI number is required for registering complaint
• Threats arising from vulnerabilities in Mobile Applications and at Police station and may help in tracking your mobile phone
Operating Systems. through service provider.
• Enable Device locking:
Typical impact of attacks against Mobile Phones : Use autolock to automatically lock the phone or keypad lock pro-
• Exposure or Loss of user’s personal Information/Data, stored/ tected by passcode/ security patterns to restrict acess to your mo-
transmitted through mobile phone. bile phone.
• Monetary Loss due to malicious software unknowingly utilizing • Use a PIN to lock SIM card:
premium and highly priced SMS and Call Services. Use a PIN (Personal Identification Number) for SIM (Subscriber
• Privacy attacks which includes the tracing of mobile phone loca- Identity Module) card to prevent people from making use of it

22
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

when stolen. After turning on SIM security, each time phone starts less signals transmitted with Bluetooth cover short distanes, typically
it will prompt to enter SIM PIN. 30 feet (10 meters).
Use password to protect information on the memory card.
• Report lost or stolen devices Do’s:
Report lost or stolen devices immediately to the nearest Police Sta- • Use Bluetooth in hidden mode so that even if the device is using
tion and concerned service provider. Use mobile tracking feature. Bluetooth it is not visible to oth- ers.
Use the feature of Mobile Tracking which could help if the mobile • Change the name of the device to a different name to avoid recog-
phone is lost/stolen. Every time a new SIM card is inserted in the nition ofyour Mobile phone model.
mobile phone, it would automatically send messages to two pre- Note: The default name will be the mobile model number for Blue-
selected phone numbers of your choice, so that you can track your tooth devices.
Mobile device. • Put a password while pairing with other devices. The devices with
the same password can connect to your computer
Don’ts: • Disable Bluetooth when it is not actively transmitting information.
• Never leave your mobile device unattended. • Use Bluetooth with temporary time limit after which it automat-
• Turn off applications [camera, audio/video players] and connec- ically disables so that the device is not available continuously for
tions [Bluetooth, infrared, Wi-Fi] when not in use. Keeping the others.
connections on may pose security issues and also cause to drain
out the battery. Don’ts:
• Never allow unknown devices to connect through Bluetooth.
Do’s and Don’ts for Data Security: • Never switch on Bluetooth continuously.
Do’s: • Never put Bluetooth in always discoverable mode.
• Backup data regularly   Note: Attackers can take advantage of its default always-on, always
Backup data regularly and set up your phone such that it backs up discoverable settings to launch attacks.
your data when you sync it. You can also back up data on a sepa-
rate memory card. This can be done by using the Vendor’s docu- Check the source of all your files
ment backup procedure.
• Reset to factory settings:
and apps to make sure they’re safe
Make sure to reset to factory settings when a phone is permanent- before you download.
ly given to another user to ensure that personal data in the phone
is wiped out.

Mitigation against Mobile Connectivity Security Attacks


Bluetooth:
Bluetooth is a wireless technology that allows different devices to con-
nect to one another and share data, such as ringtones or photos. Wire-

23
Wi-Fi : Don’ts:
Wi-Fi is short for “Wireless Fidelity.” Wi-Fi refers to wireless network- • Never keep sensitive information like user names/passwords on
ing technology that allows computers and other devices to communi- mobile phones.
cate over a wireless signal. • Never forward the virus affected data to other Mobiles.
Many mobile devices, video game systems, and other standalone de-
vices also include Wi-Fi capability, enabling them to connect to wire- Mitigation against Mobile Application and Operating System
less networks. These devices may be able to connect to the Internet Attacks
using Wi-Fi. Mobile Application and Operating System:
• Update the mobile operating system regularly.
Do’s: • Upgrade the operating system to its latest version.
• Connect only to the trusted networks. • Always install mobile applications from trusted sources.
• Use Wi-Fi only when required. It is advisable to switch off the ser- • Consider installing security software from a reputable provider
vice when not in use. and update them regularly.
• Beware while connecting to public networks, as they may not be • It’s always helpful to check the features before downloading an ap-
secure. plication. Some applications may use your personal data.
• If you’re downloading an app from a third party vendors, do a little
Don’ts: research to make sure the app is reputable.
• Never connect to unknown networks or untrusted networks.
Location tracking services allow the
Mobile as USB:
The mobile phones can be used as USB memory devices when con-
whereabouts of registered cell phones to be known
nected to a computer. A USB cable is provided with the mobile phone and monitored. While it can be done openly
to connect to computer. Your mobile’s phone memory and memory for legitimate purposes, it may also be
stick can be accessed as USB devices. used for malicious purposes.
Your mobile phone’s memory and memory stick can be accessed as
USB devices.

Do’s:
• When a mobile phone is connected to a personal computer, scan
the external phone memory and memory card using an updated
anti virus.
• Take regular backup of your phone and external memory card be-
cause if an event like a system crash or malware penetration oc-
curs, at least your data is safe.
• Before transferring the data to Mobile from computer, the data
should be scanned with latest Antivirus with all updates.
24
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

25
«¨Ä§Àº¢ À¡Ð¸¡ôÒ Ó¨È¸û:-
«¨Ä§Àº¢ ±ýÀÐ Á¢¸×õ À¢ÃÀÄÁ¡É ´ýÈ¡Ìõ þÐ×õ ¾É¢¿À÷ ¸½¢É¢¨Â §À¡ýÚ
ÀÄ ¨Åʸǡø À¡¾¢ì¸Àθ¢ýÈÉ. (±.Î) ð§Ã¡ƒý †¡÷Š ÁüÚõ ÀÄ. þЧÀ¡ýÈ
* §ÁÖõ ¾¸Åø¸ÙìÌ
À¢ÃÀÄÁ¡É ¨Åʸǡø «¨Ä§Àº¢Â¢ýô À¡Ð¸¡ôÒô À¡¾¢ì¸ôÀθ¢ýÈÉ. ¯í¸Ù¨¼Â ¾Â¡Ã¢ôÀ¡Ç÷ ¨¸§Âð¨¼ô
«¨Ä§Àº¢Â¢¨Éô À¡Ð¸¡òÐì ¦¸¡ûÇ ¦ºö §ÅñʨŠÁüÚõ ¦ºöÂܼ¡¾¨Å À¡÷ì¸
ÀüÈ¢É Ó¨È¸û ¸£§Æ ¦¸¡Îì¸ôÀðÎûÇÉ.

«¨Ä§Àº¢Â¢¨É ÀÂýÀÎòОüìÌ ÓýÉ÷ ¦ºöÂÜÊ ¦ºÂø¸û:-


Ó¨È 1 : ¯üÀò¾¢Â¡Ç÷¸Ç¡ø ÅÆí¸ôÀð¼ô ÀÂÉ¡Ç÷ ¨¸§Âð欃 ¸ÅÉÁ¡¸ ÀÊÔí¸û À¢ÈÌ «¾¢ø ÌÈ¢ôÀ¢ÎûÇ À¢Ã¸¡Ãõ ¯í¸û «¨Ä§Àº¢Â¢ý
«¨ÁôÀ¢¨É «¨ÁòÐ ¦¸¡ûÙí¸û
Ó¨È 2 : «¨Ä§Àº¢Â¢ý IMEI ±ñ¸¨Ç À¾¢× ¦ºöÐ ¦¸¡ûÙí¸û ²¦ÉýÈ¡ø ´Õ§Å¨Ç ¯í¸Ù¨¼Â «¨Ä§Àº¢Â¡ÉÐ ¦¾¡¨ÄóÐÅ¢ð¼¡ø
Á£ñÎõ «¨Ä§Àº¢¨Â ¸ñ¼È¢Â þó¾ ±ñ ÀÂýÀÎõ.
ÌÈ¢ôÒ:-
IMEI ±ñ ¯í¸Ù¨¼Â «¨Ä§Àº¢Â¢ý Á¢ý ¸Äò¾¢ø ¦À¡¾¢ó¾¢ÕìÌõ þø¨Ä¦ÂÉ¢ø *#06# ±ýÈ ÌȢ£ðʨÉô ÀÂýÀÎò¾¢ «ó¾
±ñ½¢¨Éì ¸ñ¼È¢ÂÄ¡õ. §ÁÖõ, þ¨¾ôÀüȢ ¦ºö¾¢¸¨Çò ¦¾Ã¢óÐ ¦¸¡ûÇ ¯üÀò¾¢Â¡Çâý “ÀÂÉ¡Ç÷ ¨¸§Âðʨɔ ÀÂýÀÎò¾×õ.

«¨Ä§Àº¢ô À¡Ð¸¡ôÀ¢¨Éô À¡¾¢ìÌõ «îÍÚò¾ø¸Ç¢ý ¯¼§É¡ «øÄÐ Å¨Ä «¨ÁôÒ¸û ¯¼§É¡


Ũ¸¸û þ¨½ìÌõ¦À¡ØÐ «¾Û¨¼Â ¦ºö¾¢¸û ÁüÚõ
yy «¨Ä§Àº¢Â¢ø À¾¢× ¦ºöÂôÀð¼ («) ÀâÅ÷ò¾¨É «¨Ä§Àº¢Â¢ý À¡Ð¸¡ôÒõ À¡¾¢ì¸ôÀθ¢ýÈÉ.
yy ¦ºÂÔõ ¾É¢¿À÷ ¦¾¡¼÷À¡É ¾¸Åø¸¨Ç yy «¨Ä§Àº¢Â¢ø ÀÂýÀÎòÐõ ÀÄŨ¸Â¡É «¨Ä§Àº¢
¾¡ì̾ø¸¡Ã÷¸Ç¢¼õ þÆì¸ §¿Ã¢Îõ. ¦Áý¦À¡ÕǢɡÖõ ÁüÚõ þÂì¸ «¨ÁôÀ¢ý ÓÄÁ¡¸×õ
yy ¦¸ÎìÌõ ¦Áý¦À¡Õû¸û «¨Ä§Àº¢¸û À¡Ð¸¡ôÒ Ó¨È À¡¾¢ì¸ôÀθ¢ýÈÉ.
yy Á¨ÈÓ¸Á¡¸ ÌÚ了ö¾¢ ÁüÚõ «¨ÁôÒ¸¨Ç yy «¨Ä§Àº¢Â¢ý À¡Ð¸¡ôÀ¢¨É ¾¸÷ò¾¡ø ²üÀÎõ §À¡ÐÁ¡É
ÀÂýÀÎòО¢É¡ø ¦ÀÕ󦾡¨¸ þÆì¸ §¿Ã¢Îõ. Å¢¨Ç׸û.
yy «¨Ä§Àº¢ ÁüÚõ «¾ý ¾¸Åø¸¨Ç À¡¾¢ìÌõ Ũ¸¸û:- yy ²Á¡üÚ¸¡Ã÷¸û ÀÂÉ¡Ç¢¸ÙìÌò ¦¾Ã¢Â¡Áø «Å÷¸Ù¨¼Â
yy «ÛÁ¾¢ ¦ÀÈ¡Áø ¾¢ð¼Á¢ðÎ ÁüÈÅ÷¸Ç¢ý «¨Ä§Àº¢ þ¼ò¾¢¨É ¸ñ¼È¢¾ø ÁüÚõ «Å÷¸ÙìÌ ÅÕõ ¾É¢ôÀð¼
¾¸Åø¸¨Ç ¨¸Â¡Ç ÓÂøÅÐ ÁüÚõ ¦¾¡¨ÄòÐŢ𼡧ġ ÌÚï ¦ºö¾¢¸¨ÇÔõ ÁüÚõ «¨ÆôÒ¸¨ÇÔõ À¢ý ¦¾¡¼÷óÐ
«øÄР¡§ÃÛõ «¾¨Éò ¾¢ÕÊŢ𼡧ġ «ÅüÈ¢ÖûÇ ¦¾Ã¢óÐ ¦¸¡û¸¢È¡÷¸û.
¾¸Åø¸û À¡¾¢ì¸ôÀÎõ. yy ¾¡í¸û «È¢Â¡¾ Åñ½õ ¾í¸û «¨Ä§Àº¢Â¢ø ÁüÈÅ÷¸¨Çò
¾¡ìÌõ ¦Áý¦À¡ÕÇ¢¨É ¿¢ÚÅ þÂÖõ.
«¨Ä§Àº¢ þ¨½ôҸǢý ÓÄõ «ÅüÈ¢ý À¡Ð¸¡ôÒ
À¡¾¢ì¸ôÀÎõ Ũ¸:-
yy «¾¡ÅÐ «¨Ä§Àº¢Â¢¨É ¦¾Ã¢Â¡¾Å÷¸Ç¢ý ¦¾¡¨Ä§Àº¢

26
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

¨¸§Àº¢ º¡¾Éõ ÁüÚõ ¾Ã× À¡Ð¸¡ôÒ ¾¡ì̾ø¸¨Ç ¾Ã× À¡Ð¸¡ôÀ¢ø ¦ºö§ÅñʨŸû ÁüÚõ
ÁðÎôÀÎòоø: ¦ºöÂܼ¡¾¨Å¸û
� ¯í¸û ¨¸§Àº¢ º¡¾Éò¾¢ý IMEI ±ñ¨Â À¾¢× ¦ºö: ¦ºöÂܼ¡¾¨Å¸û:
¾É¢ò¾ý¨ÁÅ¡öó¾ 15 þÄì¸ IMEI ±ñ¨Â À¾¢× ¦ºöÂ×õ, � ¦ºö §ÅñʨÅ
´Õ§Å¨Ç ¯í¸û ¨¸§Àº¢ º¡¾Éõ ¦¾¡¨Ä󾡧ġ / ¦¾¡¼÷óÐ ¾¸Åø¸¨Ç À¢ýÀ¾¢× ±Îì¸ §ÅñÎõ «¾¡ÅÐ
¾¢Õ¼ôÀ𼡧ġ «Ð ¸¡Åø ¿¢¨ÄÂò¾¢ø Ò¸¡÷ «Ç¢ì¸ ¯¾×õ ¿£í¸û ¯í¸û «¨Ä§Àº¢Â¢ø §º¸Ã¢òÐûÇ ¾¸Åø¸¨Ç ´Õ
ÁüÚõ «¾¨É §º¨Å Å¢¿¢§Â¡¸¢ôÀÅ÷ ãÄõ ¸ñ¸¡É¢ì¸ ¾É¢ »¡À¸ «ð¨¼Â¢ý ÓÄõ ¦¾¡¼÷óÐ §º¸Ã¢òÐì (À¾¢×
¯¾×õ. ¦ºöÐì) ¦¸¡ûÇ §ÅñÎõ.
� º¡¾É¾¢ý À¡Ð¸¡ôÒ «¨ÁôÀ¢¨É þÂÄö � Reset & Factory Settings
¨¸§Àº¢ º¡¾É¾¢ý Å¢¨º¨Â ¾ýÉ¢Âì¸ Ó¨È¢ø âðÎ þ¼×õ ¿£í¸û ¡Õ측ÅÐ ¯í¸Ù¨¼Â «¨Ä§Àº¢Â¢¨É §ÅÚ
«øÄРިº ¾ð欃 ¸¼×¦º¡ø / À¡Ð¸¡ôÒ «¨ÁôÒ ãÄõ ¡Õ측ÅÐ ¦¸¡Îì¸ ¿¢¨Éò¾¡ø ¿£í¸û ÀÂýÀÎò¾¢Â
¨¸§Àº¢Â¢¨É ¸ðÎôÀÎò¾×õ. «¨ÁôÒ¸¨ÇÔõ ÁüÚõ ¿£í¸û §ºÁ¢òÐ ¨Åò¾ ¾¸Åø¸¨ÇÔõ
� º¢õ «ð¨¼ À¡Ð¸¡ôÀ¢¨É ÀÂýÀÎò¾×õ: «Æ¢òÐÅ¢ðÎô ÒÐ «¨ÁôÀ¢¨É «¨Áò¾À¢ý «Å÷¸Ç¢¼õ
º¢õ «ð¨¼ À¡Ð¸¡ôÀ¢¨É ÀÂýÀÎòÐõô ¦À¡ØÐ ¾¢Õ¼ôÀð¼ ¦¸¡Îì¸×õ.
¨¸§Àº¢Â¢¨É ¯À§Â¡¸ô ÀÎòÐŨ¾ ¾Îì¸ ¯¾×õ. «ùÅ¡Ú
¦ºöÔõ ¦À¡ØÐ ¨¸§Àº¢ þÂíÌõ Óý º¢õ «ð¨¼ À¡Ð¸¡ôÒ ¨¸§Àº¢ þ¨½ôÒ À¡Ð¸¡ôÒ ¾¡ì̾ø¸¨Ç ÁðÎôÀÎò¾ø
Ìȣ¢ð欃 þ¼ì §¸ðÌõ ÒÙ Þò
»¡À¸ «ð¨¼Â¢ø ¸¼×¦º¡ø¨Ä ÀÂýÀÎò¾¢ ¾¸Åø¸¨Ç ÒÙ Þò (Blue Tooth) ±ýÀÐ «¨Ä «¨ÁôÀ¡Ìõ þÅüÈ¢ý ÓÄõ
À¡Ð¸¡ì¸×õ ÀÄŨ¸ôÀð¼ ¸ÕÅ¢¸¨Ç þ¨½ì¸Ä¡õ. «ÅüÈ¢ý ¾¸Åø¸¨Ç
yy ¾¢Õ¼ôÀð¼ «øÄÐ ¦¾¡¨Äó¾ ¨¸§Àº¢ ÀüÈ¢ Ò¸¡÷ «Ç¢ì¸×õ: ´ÕÅâ¼Á¢ÕóÐ ÁüÈÅ÷¸ÙìÌ À¸¢÷óÐ ¦¸¡ûÇÄ¡õ, «¾¡ÅÐ
¾¢Õ¼ôÀð¼ «øÄÐ ¦¾¡¨Äó¾ ¨¸§Àº¢ ÀüÈ¢ ¯¼ÉÊ¡¸ (Ò¨¸ôÀ¼õ, À¡¼ø¸û §À¡ýȨÅ) þó¾ þ½ì¸¢ º¢ìÉø¸¨Ç
«Õ¸¢ø×ûÇ ¸¡Åø ¿¢¨ÄÂõ ÁüÚõ ºõÀó¾ôÀð¼ §º¨Å ̨Èó¾ þ¨¼¦ÅÇ¢ ¦¾¡¨ÄÅ¢ø ÁðΧÁ ¯À§Â¡¸¢ì¸Ä¡õ
Å¢¿¢§Â¡¸¢ôÀÅâ¼õ Ò¸¡÷ «Ç¢ì¸×õ. «¾¡ÅÐ 30 «Ê («) 10 Á£ð¼÷ ¦¾¡¨Ä×.

¦ºöÂܼ¡¾¨Å ¦ºö §ÅñʨÅ


yy ´Õ¦À¡ØÐõ ¨¸§Àº¢Â¢¨É ¸ÅÉ¢ôÀ¡ÃüÚ þÕì¸ §Åñ¼¡õ yy ¿£í¸û ÒÙ Þò (Blue Tooth) þ¨½ôÀ¢¨É ÀÂýÀÎò¾¡¾ §À¡Ð
yy ¦ºÂÄ¢ [camera, audio/video players] ÁüÚõ þ¨½ôÒ¸¨Ç «ÅüÈ¢¨É ÁüÈÅ÷¸ÙìÌ ¦¾Ã¢Â¡Áø Á¨ÈòÐ ¨Åì¸×õ.
[Bluetooth, infrared, Wi-Fi] À¢Ã§Â¡¸ÁøÄ¡¾ §¿Ãí¸Ç¢ø ¿¢Úò¾¢ yy ¯í¸Ù¨¼Â ¸ÕŢ¢ý ¦ÀÂâ¨É «¨ÁìÌõ §À¡Ð «ô¦ÀÂ÷
¨Åì¸×õ. «ùÅ¡Ú þ¨½ôÒ¸¨Ç ÀÂýÀÎòÐõ ¦À¡ØÐ ¯í¸Ù¨¼Â «¨Ä§Àº¢ Ũ¸ ¦ÀÂ÷¸¨Ç ¦¸¡ñÎ «¨Á측Áø
À¡Ð¸¡ôÒ þÎ׸û ÁüÚõ ܼ×õ ¨¸§Àº¢Â¢ý Á¢ý¸Äõ §ÅÚÀð¼ ¦ÀÂ÷¸¨Ç ¦¸¡ñÎ «¨Áì¸×õ.
¸¡Ä¢Â¡¸ ¸¡Ã½Á¡¸¢ÈÐ. yy ÁüÈÅ÷¸Ç¢ý ¸ÕÅ¢¸¨Ç þ¨½ôÀ¾üÌ ¿£í¸û ´Õ À¡Ð¸¡ôÒ
ÌȢ£ð欃 ÀÂýÀÎò¾×õ. ÁüÈÅ÷¸û «Å÷¸Ù¨¼Â
¸ÕÅ¢¨Â þ¨½ì¸ Å¢ÕôÀôÀð¼¡ø «Å÷¸Ùõ «§¾ À¡Ð¸¡ôÒ
ÌȢ£ðʨÉì ¦¸¡Îò¾¡ø ÁðÎõ ¾¡ý ¯í¸Ù¨¼Â
¸ÕÅ¢Ô¼ý þ¨½ì¸ ÓÊÔõ

27
¦ºöÂìÜʨÅ:- ¦ºöÂìܼ¡¾¨Å:-
yy ÒÙÞò (BlueTooth) ÓÄÁ¡¸ ¦¾Ã¢Â¡¾Å÷¸Ç¢ý ¸ÕÅ¢¸¨Ç yy ´Õ §À¡Ðõ «È¢Â¡¾ ÁüÚõ ¿õÀ¢ì¨¸ÂüÈ Å¨Äò¾Çí¸¨Ç
þ¨½ôÀ¾¢¨É ¾Å¢Õí¸û. þ¨½ì¸¡¾£÷¸û.
yy ±ô¦À¡ØÐõ ÒÙÞò (BlueTooth) ¦À¡ò¾¡¨É þÂì¸ò¾¢ø
¨Å측¾£÷¸û. ¦Á¡¨À¨Ä Ô±ŠÀ¢Â¡¸:
yy ±ô¦À¡ØÐõ ÒÙÞò (BlueTooth) ò¾¢¨É ÁüÈÅ÷¸û §¾Êì
¦Á¡¨Àø §À¡ý¸¨Ç Ô±ŠÀ¢ ¦ÁÁâ ʨŊ¸Ç¡¸
¸ñ¼È¢Ôõ (¸ñÎÀ¢Êì¸ìÜÊÂ) ӨȢø ¨Åò¾¢Õ측¾£÷¸û.
¸½¢ô¦À¡È¢Â¢ø ¦À¡ÕòÐõ§À¡Ð ÀÂýÀÎò¾Ä¡õ. Ô±ŠÀ¢
ÌÈ¢ôÒ:- ±ô¦À¡ØÐõ ÒÙÞò (BlueTooth) þÂì¸ò¾¢ø þÕó¾¡
¾¡ì̾ø¸¡Ã÷¸û ±Ç¢Â ӨȢø ¾¡ì̾ø¸¨Ç ²üÀÎòÐÅ÷. §¸À¢û ¦Á¡¨Àø §À¡Û¼ý ¸½¢ô¦À¡È¢Â¢ø þ¨½ì¸
¦¸¡Îì¸ôÀðÊÕìÌõ.

¯í¸ÇÐ ¦Á¡¨Àø §À¡É¢ý ¦ÁÁâÔõ


Reject all the unexpected ¦ÁÁâ ŠÊìÌõ Ô±ŠÀ¢ ¸ÕÅ¢¸Ç¡¸ ÀÂýÀÎõ.
pairing requests for
Bluetooth devices ¦ºö §ÅñʨÅ:
«È¢Ó¸Á¢øÄ¡¾ ôéÞò yy ¦Á¡¨Àø §À¡ý ¸½¢ô¦À¡È¢Â¢ø þ¨½ì¸ôÀðÊÕìÌõ §À¡Ð
þ¨½ôÒ ¦À¡Úò¾ø ±ìŠ¦¼÷Éø §À¡ý ¦ÁÁâ¨ÂÔõ ¦ÁÁâ ¸¡÷¨¼Ôõ ºÁ£Àò¾¢Â
¬ñʨÅÊ Š§¸É¨Ã ¨ÅòÐ Š§¸ý ¦ºöÂ×õ
Өȣθ¨Ç ¿¢Ã¡¸Ã¢ì¸×õ
yy §À¡ý ÁüÚõ ±ìŠ§¼÷Éø ¦ÁÁâ¨Â Өȡ¸ §Àì «ô
±ÎòШÅì¸×õ. ¯í¸û ¸ÕÅ¢ þÂí¸¡Áø §À¡É¡§Ä¡, ¨ÅÊ
¨Å-·¨À (Wi- Fi) °ÎÕÅø ²üÀ𼡧ġ þó¾ §Àì «ô ¯í¸ÇРŢÅÃí¸¨Çì
¨Å-·¨À (Wi-Fi) ±ýÀÐ þ¨½ôÒ¸û «üÈ Å¨Ä «¨ÁôÒ ¸¡ôÀ¡üÚõ.
ӨȡÌõ þÅüÈ¢ý ÓÄõ ŨľÇí¸¨Ç þ¨½òÐ yy ¸½¢ô¦À¡È¢Â¢Ä¢ÕóРŢÅÃí¸¨Ç ¦Á¡¨ÀÖìÌ Á¡üÚžüÌ
¾¸Åø¸¨Ç ´ÕÅâ¼Á¢ÕóÐ ÁüÈÅ÷¸ÙìÌ À¸¢ÃÄ¡õ. þ¾ý ÓÄõ ÓýÒ ºÁ£Àò¾¢Â ¬ñʨÅÊ ãÄõ «ó¾ Å¢ÅÃí¸¨Ç Š§¸ý
ÀÄ «¨Ä§Àº¢ ¸ÕÅ¢¸û, Ò¨¸ôÀ¼ À¾¢× Å¢¨Ç¡ðÎ «¨ÁôÒ¸û ¦ºöÂ×õ
ÁüÚõ ÀÄ.
¦ºöÂìܼ¡¾¨Å:
¦ºöÂìÜʨÅ:- yy äº÷ §¿õ ÁüÚõ À¡Š§Å÷θû §À¡ýÈ Ó츢ÂÁ¡É ¾¸Åø¸¨Ç
yy ±ô¦À¡ØÐõ ¯í¸û «¨Ä§Àº¢Â¢¨Éò ¦¾Ã¢ó¾ ÁüÚõ ¦Á¡¨Àø §À¡ý¸Ç¢ø §º¸Ã¢òÐ ¨Å츧Åñ¼¡õ.
¿õÀò¾ì¸ Å¨Ä «¨ÁôÀ¢ø ÁðΧÁ þ¨½ì¸×õ. yy ¨ÅÊ ¦¾¡üȢ ŢÅÃí¸¨Ç Â¡ÕìÌ À¡÷§Å÷𠦺ö¡¾£÷¸û
yy §¾¨Å ²üÀð¼¡ø ÁðÎõ þÂì¸ò¾¢ø ¨Åì¸×õ.
yy ¦À¡Ð ŨľÇí¸¨Ç «¨ÁôÀ¢ø þ¨½ìÌõ §À¡Ð
±îºÃ¢ì¨¸Ô¼ý þÕì¸×õ ²¦ÉýÈ¡ø «¨Å ¦ÀÕõÀ¡Öõ
À¡Ð¸¡ôÒ «üȨÅ.

28
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

±ó¾¦Å¡Õ ¬Å½õ ÁüÚõ


¦ºÂÄ¢¸¨Ç þ¨½Âò¾¢ø þÕóÐ À¾¢Å¢Ãì¸õ ¦ºöÔõ Dial 112
Óý «¾Û¼Â ãÄò¨¾ ºÃ¢Â¡É¾¡ ±É ¯Ú¾¢ÀÎò¾¢ÂÀ¢ý
þ¨½Âò¾¢ø þÕóÐ À¾¢Å¢Ãì¸õ ¦ºöÂ×õ Your mobile will search
¦Á¡¨Àø «ôÇ¢§¸ºý ÁüÚõ ¬À§ÃðÊí º¢Š¼õ Á£¾¡É
any existing network
¾¡ì̾ø¸¨Çò ¾ÎôÀÐ:
yy ¦Á¡¨Àø ¬À§ÃðÊí º¢Š¼ò¨¾ ¦¾¡¼÷óÐ «ô§¼ð ¦ºöÂ×õ.
to establish the emergency
yy ¬À§ÃðÊí º¢Š¼ò¨¾ ºÁ£Àò¾¢Â ¦Å÷ºÉ¢ø «ô¸¢§Ã𠦺öÂ×õ.
yy ¿õÀò¾ý¨Á Å¡öó¾ þ¼í¸Ç¢Ä¢Õó§¾ «ôÇ¢§¸ºý¨º
number for you
þýŠ¼¡ø ¦ºöÂ×õ.
yy «í¸£¸Ã¢ì¸ôÀð¼ ¿Àâ¼Á¢ÕóÐ ¦ºìäâðÊ º¡ôð§Å¨Ã
þýŠ¼¡ø ¦ºöŨ¾ô À⺣Ģì¸×õ.
yy ´Õ «ôÇ¢§¸º¨É ¼×ý§Ä¡Î ¦ºöžüÌ ÓýÒ «¾ý Interestingly this number
«¨ÉòÐ «õºí¸¨ÇÔõ À⧺¡¾¢ôÀÐ ¯¾Å¢Â¡¸ þÕìÌõ.
¯í¸ÇÐ ¾É¢ôÀð¼ Å¢ÅÃí¸¨Ç º¢Ä «ôÇ¢§¸ºý¸û can be dialed even if the
ÀÂýÀÎò¾Ä¡õ.
yy ãýÈ¡õ ¾ÃôÀ¢Éâ¼Á¢ÕóÐ ´Õ «ôÇ¢§¸º¨É ¿£í¸û keypad is locked
¼×ý§Ä¡Î ¦ºö¾£÷¸û ±É¢ø, «ó¾ «ôÇ¢§¸º¨É ÀüÈ¢ «¾ý
ÀÂý ÀüÈ¢ º¢È¢Ð ¬Ã¡ö ¦ºöÔí¸û.

Dial *#06# to record 15


digit IMEI number
þÕôÀ¢¼õ ¸ñ¸¡É¢ôÒ ¦ºÂÄ¢¸û À¾¢× ¦ºö¾
¨¸§Àº¢Â¢ý þÕôÀ¢¼õ ¸ñ¼È¢Â ÁüÚõ
§ÁüÀ¡÷¨Å¢¼ ÅÆ¢ÅÌìÌõ. þÐ §À¡ýÈ ¦ºÂÄ¢¸û
ºð¼ôÀÊÂ¡É ÁüÚõ ¦¸Î §¿¡ì¸¡É ¸¡Ã½í¸Ù측¸
¯À§Â¡¸¢ì¸ôÀθÈÐ

29
Phishing Attacks
Phishing is a way of attempting to acquire information such as usernames, passwords, PIN,bank account, credit card details
by masquerading as a trustworthy entity details through electronic communication means like e-mail.
Phishing is typically carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a
fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering
techniques used to deceive users.
How does a phishing email message look like? In detail ….

• Check for Spelling and bad grammar. • Spoofing popular / companies’ websites.
Links might also lead you to .exe files. These kinds of file are known Scam artists use graphics in email that look identical to legiti-
to spread malicious software. mate websites but actually take you to phony scam sites or legiti-
• Threats mate-looking pop-up windows.
Sometimes you may receive a threat mail saying that your webmail Cybercriminals also use web addresses that resemble the names of
account would be closed if you do not respond to an e-mail mes- well-known companies but are slightly altered.
sage. The e-mail message shown above is an example of the same Cybercriminals might call you on the phone and offer to help solve
trick. Cybercriminals often use techniques to make one believe your computer problems or sell you a software license.
that security has been compromised.
30
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Steps to remember :
Step1: Cross check the URL in the brows Step 4 : Always view email requests seeking for financial or other
personal information with suspicion email ID, particularly with “UR-
GENT” subject requests. When you are in doubt, do not respond to
questionable email or enter information on questionable websites.
You may also contact the alleged sender to confirm the legitimacy of
Don’t enter your information in the websites that communications you’ve received.
start with numbers

Step2: Always check for the misspelled URL

So Always key in the URL in the address bar yourself don’t copy and An Example of Phishing site, the look and feel of the Punjab national
paste bank is same.

Step3: Always perform online banking in secure channel i.e check for Step 5 : Never respond to the emails that ask for your personal infor-
the Padlock and secure channel for secure banking mation like creditcard /debit card/bank information.

How I can recognize a message of phishing?


• Normally phishing e-mails display grammatical errors or over-
lapped text.
Always check for the trusted website which has https and padlock • Test using false data before putting in actual information.

Know that phishing can also happen by phone.


So, never give personal information by phone.

31
Here are the few Phishing techniques…. Do’s
• Social networking sites are now a prime target of phishing attacks, • Be cautious about opening any attachments or downloading files
since the personal details in such site can be used in identity theft you receive regardless of who sent them.
• One of the latest phishing techniques is tabnabbing. It takes ad- • Look for the sender email ID before you enter/give away any
vantage of the multiple tabs that users use and silently redirects personal information.
a user to the affected site. • Use updated antivirus, antispyware and firewall software.
• Filter Evasion - Phishers have used images instead of text to make • Always update your web browser and enable phishing filter.
it harder for anti-phishing filters to detect text commonly used in • If you receive any suspicious e-mail, do call the company to con-
phishing e-mails. firm if it is legitimate or not.
• Phone Phishing - Not all phishing attacks require a fake website. • Do use a separate email accounts for things like shopping online,
Messages that claimed to be from a bank told users to dial a phone personal etc.
number regarding problems with their bank accounts. Once the
phone number (owned by the phisher, and provided by a Voice Don’ts
over IP service) was dialed, prompts told users to enter their ac- • Don’t reply to an e-mail or pop-up message that asks for personal
count numbers and PIN. Visher sometimes uses fake caller-ID data or financial information.
to give the appearance that calls come from a trusted organiza- • Don’t e-mail personal or financial information i.e credit card or
tion. other sensitive information via e-mail.
• Another attack used successfully is to forward the client to a bank’s • Don’t click on any email or social media messages you don’t ex-
legitimate website, then to place a popup window requesting cre- pect or need.
dentials on top of the website in a way that it appears the bank is • Don’t open e-mail that you have any suspicion may not be legiti-
requesting this sensitive information mate. If it is legitimate and the individual may try to contact you,
if the email really needs.
• Don’t open attachments that you were not expecting, especially
What should I do if I think I’ve responded to a phishing ZIP files and NEVER run .exe files.
scam? • Don’t use your company e-mail address for personal things.
• Take these steps to minimize any damage if you suspect that you’ve • Don’t open/download attachments from any spam e-mail.
responded to a phishing scam with personal or financial informa- • Don’t open suspicious videos or images in social networking
tion or entered this information into a fake website. sites since social networking sites are prime target of phishing.
• Change the passwords or PINs of all your online accounts that you • Never respond to phone calls asking for bank details. It might be
think could be compromised. vishing (voice phishing).
• Place a fraud alert on your credit reports. Check with your bank or • Beware of phishing phone calls.
financial advisor if you’re not sure how to do this. • Don’t respond if you receive any message(sms) asking you to
• Contact the bank or the online merchant directly. confirm account information that has been “stolen” or “lost”
• Do not follow the link in the fraudulent e-mail. or encouraging you to reveal personal information in order to
• Routinely review your bank and credit card statements for unex- receive a prize, it’s most likely a form of phishing
plained charges or inquiries that you didn’t initiate.

32
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

·À¢„¢í ¾¡ì̾ø¸û
·À¢„¢í (Phishing) ±ýÀÐ ¿õÀ¢ì¨¸ìÌâÂÅá Ó¸ãÊ¢ðÎ Á¢ýÉïºÄ¢ý ãÄõ ¾¸Åø¸¨Ç §º¸Ã¢ò¾ø «¾¡ÅÐ ÀÂɡǢ¢ý
¦ÀÂ÷, À¡Ð¸¡ôÒ ÌȢ£Î, þøº¢Â ÌȢ£Î, Åí¸¢ ¸½ìÌ ÁüÚõ ¸¼ý «ð¨¼ ¾¸Åø¸û.
·À¢„¢í (Phishing) ²Á¡üÚ¸¡Ã÷¸û Á¢ýÉïºø «øÄÐ ¯¼ÉÊ ÌÚ了ö¾¢ ãÄõ ²Á¡üÚ §Å¨Ä¢¨É ¦ºö¸¢ýÈÉ÷.
«¾¡ÅÐ þ¾ýãÄõ ÁüÈÅ÷¸¨Ç ÓÂüº¢ ¦ºöÐ ²Á¡üÚ Á¢ýÉïºø¸ÙìÌ À¾¢ÄÇ¢ì¸ ¨Å츢ÈýÈÉ÷. ²Á¡üÚ þ¨½Âò¾Ç
Àì¸õ ¿õÀ¾Ìó¾ ¿¢ÚÅÉò¾¢ý þ¨½Âò¾Ç Àì¸ò¾¢¨É §À¡ýÚ þÕìÌõ.

·À¢„¢í Á¢ýÉïºø À¡÷ôÀ¾üÌ ±ôÀÊ þÕìÌõ ? Å¢ÅÃí¸û

¦ºö §ÅñÊÂÐ:- ¿¢¨ÉÅ¢ø ¦¸¡û¸:-


yy ±ØòÐôÀ¢¨Æ, ÁüÚõ þÄ츽 À¢¨Æ¢¨É §º¡¾¢ì¸ §ÅñÎõ Ó¨È 1: :- ŨįÄÅ¢Âø Ô ¬÷ ±ø (URL) ¢¨É ÌÈ¢ì¸×õ
yy ¿£í¸û ¦ÀÚõ §¸¡ôҸǢý ¿£ðÊôÒ (File Extension) Ũ¸Â¢¨É
¸ÅÉ¢ì¸×õ (.EXE) ¡¸ þÕó¾¡ø «Ð ²Á¡üÚ §¸¡ôÀ¡¸ (File)
þÕì¸Ä¡õ.
yy þ¨½Âò¾Ç ÌüÈÅ¡Ç¢¸û Å¨Ä Ó¸Åâ¢¨É ÀÂýÀÎòи¢ýÈÉ÷.
«Å÷¸Ù¨¼Â Å¨Ä Ó¸Åâ¢¨É «ºø ¿¢ÚÅÉò¾¢Û¨¼ÂÐ §À¡ýÚ Ó¸ÅâÀð¨¼Â¢ø ±ñ¸û þÕì̧Á¡ɡø ¾í¸Ù¨¼Â Å¢ÅÃí¸¨Ç
Á¡üȢ¨ÁôÀ¡÷¸û. À¸¢÷óÐ즸¡ûÇ §Åñ¼¡õ
yy þ¨½Âò¾Ç ÌüÈÅ¡Ç¢¸û ¦¾¡¨Ä§Àº¢Â¢ý ÅƢ¡¸ ¦¾¡¼÷Ò
¦¸¡ñÎ ¯í¸Ù¨¼Â ¸½¢É¢Â¢ø ²¾¡ÅÐ À¢Ã½ ±ýÈ¡ø Ó¨È 2:- Ó¸ÅâÀð¨¼Â¢ø ¯ûÇ ÔÃøý ±ØòÐô À¢¨Æ¢¨É
ºÖ¨¸ ӨȢø ºÃ¢ ¦ºöÐ ¾ÃôÀÎõ ±Éì ÜÚÅ¡÷¸û. ¸ÅÉ¢ì¸×õ

33
yy þô¦À¡ØÐ ÀÂýÀÎòÐõ Ò¾¢Â Ó¨È ·À¢„¢í Tabnabbing «¾¡ÅÐ
ÀÂÉ¡Ç¢ ´§Ã §¿Ãò¾¢ø Àø§ÅÚ þ¨½Âò¾Ç Àì¸ò¾¢¨É À¡÷ìÌõ
§À¡Ð «Å÷¸ÙìÌ ¦¾Ã¢Â¡Áø À¡¾¢ôÀ¢¨É ¯ñ¼¡ìÌõ þ¨½ÔûÇ
Àì¸ò¾¢üìÌ «¨ÆòÐî ¦ºøÖõ.
±ô¦À¡ØÐõ Ô¬÷±ø (URL) ±ÉôÀÎõ þ¨½Âò¾Ç Ó¸Åâ¢¨É yy Åʸð¼ø ²öôÒ Ó¨È¡ø ¾Å¢÷ò¾ø - ·À¢„¢í ²Á¡üÚ
¾ð¼îÍ ¦ºö§¾ þ¨½Âò¾Çò¾¢ý ¯û§Ç ¦ºøÄ §ÅñÎõ Á¢ýÉïºÄ¢¨É «¾¢ø ÅÕõ ¯¨Ã¢¨É ¨ÅòÐ ¸ñ¼È¢Å÷
¬É¡ø ²Á¡üÚ측Ã÷¸û ¯¨ÃìÌ À¾¢ø À¼ò¾¢¨É ¦À¡Õò¾¢
Ó¨È 3 :- ±ô¦À¡ØÐõ þ¨½Âò¾Ç Åí¸¢ ¦ºÂøÀ¡ð欃 À¡Ð¸¡ôÀ¡É «ÛôÒ¸¢È¡÷¸û þ¾É¡ø ¬ñÊ-·À¢„¢í ¸ñ¼Ã¢Å¾÷Ì §ÁÖõ
¦¾¡¼÷À¢ø §Áü¦¸¡ûÇ×õ º¢ì¸ø¸¨Ç ²üÀÎòи¢ýÈÉ÷
yy ¦¾¡¨Ä§Àº¢ ·À¢„¢í - ±øÄ¡ •À¢„¢í ¿¼ÅÊ쨸¸û þ¨½Âò¾Ç
Àì¸ò¾¢ý ãÄõ ÁðÎõ ¿¨¼¦ÀÚž¢ø¨Ä. ¯í¸ÙìÌ ¯í¸û
Åí¸¢ ¸½ì¸¢ø ´Õ À¢Ãîº¨É ±É§Å ¿£í¸û ¦¾¡¨Ä§Àº¢Â¢ý
þ¨½Âò¾Ç Àì¸õ ¿õÀ¸Á¡É¾¡ À¡Ð¸¡ôÀ¡É¾¡ ±É ¬Ã¡Â §ÅñÎõ. ãÄõ ±í¸¨Ç «Û¸×õ ±ýÈ ÌÚï ¦ºö¾¢Â¢¨É «ÛôÒÅ¡÷¸û,
±ôÀÊ ±ýÈ¡ø «¾ý Ó¸ÅâÀð¨¼Â¡ÉÐ À¡Ð¸¡ôÀ¡É¡¾¡ ±ýÚ ¿£í¸û ¦¾¡¨Ä§Àº¢Â¢ý ¦¾¡¼÷Ò ¦¸¡ûÇ ÓÂüº¢ìÌõ §À¡Ð «¨Å
¬Ã¡Â §ÅñÎõ. (https (or) Padlock and address bar) ¯í¸Ç¢¼õ Åí¸¢¸½ìÌ ±ñ ÁüÚõ ¸¼×î ¦º¡øÄ¢¨É §¸ðÌõ.
«ó¾ ¦¾¡¨Ä§Àº¢Â¢ý ¾¸Åø¸¨Ç ¬Ã¡öó¾¡ø «Ð ¿õÀò¾Ìó¾
Ó¨È4 :- ¿£í¸û ¾É¢ ¿À÷ ¾¸Åø ÁüÚõ Åí¸¢ ¸½ìÌ Å¢ÅÃí¸¨Ç ¿¢ÚÅÉòШ¼ÂÐ §À¡ýÚ þÕìÌõ.
§¸ðÎ ±¾¡ÅÐ Á¢ýÉïºÄ¢¨É ¦ÀüÈ¡§Ä¡ «øÄÐ ¿ñÀ÷¸Ç¢¼Á¢ÕóÐ
«ÅºÃò §¾¨Å¸Ù측¸ À½õ §ÅñÊ Á¢ýÉïºÄ¢¨É ¦ÀüÈ¡§Ä¡ ·À¢„¢í ÌÚ了ö¾¢¸¨Ç ¸ñ¼È¢Â×õ Ó¨È :-
«ÅüÈ¢ø ¯í¸ÙìÌ ²¾¡ÅÐ ºó§¾¸õ ²üÀð¼¡ø «¾¢ø ÌÈ¢ôÀ¢ðÎûÇ yy ¦À¡ÐÅ¡¸ ·À¢„¢í ÌÚ了ö¾¢ þÄ츽ôÀ¢¨ÆÔ¼Ûõ ÁüÚõ
Á¢ýÉïºÖìÌ À¾¢ÄǢ측¾£÷¸û. ¿£í¸û «ÅüÈ¢ø ¯Ã¢Â ¿¢ÚÅÉòмý ¯¨Ã¢ø ¯ûÇ ±ØòÐì¸û ´ýÈ¢ý Á£Ð ´ýÚ «¨Áó¾¢ÕìÌõ
¦¾¡¼÷Ò ¦¸¡ñÎ ¯Ú¾¢ ¦ºö¾ À¢ý À¾¢ÄÇ¢ì¸×õ yy «ÅüÚìÌ ¯í¸Ù¨¼Â ¯ñ¨ÁÂ¡É ¾¸Åø¸¨Ç «ÛôÀ¡Áø
¦À¡öÂ¡É ¾¸Åø¸¨Ç «ÛôÀ×õ

·À¢„¢í °ÆøìÌ À¾¢ÄÇ¢òÐÅ¢ð¼¡ø ¯¼§É ¦ºöÂ


§ÅñʨÅ:-
yy ·À¢„¢í °ÆøìÌ À¾¢ÄÇ¢òÐÅ¢ð¼¡ø ¯¼§É ¯í¸Ù¨¼Â
þÐ Àﺡô §¾º¢Â Åí¸¢Â¢ý Àì¸õ §À¡ý§È §¾¡üÈÓ¨¼Â •À¢‰í À¡Ð¸¡ôÒ ÌȢ£ΠÁüÚõ þøº¢Â ±ñ½¢¨É ¯¼§É Á¡üÈ
Àì¸ò¾¢ý ¯¾¡Ã½õ §ÅñÎõ
yy ¯í¸Ù¨¼Â ¸¼ý «ð¨¼Â¢ý ¾¸Åø¸Ç¢ø ²Á¡üÚ Óý¦ÉîºÃ¢ì¨¸
Ó¨È5 :- ´Õ§À¡Ðõ ¸¼ý ÁüÚõ ÀüÚ «ð ¨¼ Åí¸¢ ¸½ìÌ «¨ÁôÀ¢¨É «¨ÁòÐì ¦¸¡ûÙí¸û þ¾üÌ ¾í¸Ù¨¼Â
Åí¸¢Â¢¨É «Û¸×õ
Å¢ÅÃí¸¨Ç §¸ðÎ ÅÕõ Á¢ýÉïºÖìÌ À¾¢ÄÇ¢ì¸ §Åñ¼¡õ yy ¯í¸Ù¨¼Â Åí¸¢ ÁüÚõ þ¨½Âò¾Ç Å¢üÀ¨É¡Çâ¼õ ¦¾¡¼÷Ò
¦¸¡ûÇ×õ; §À¡Ä¢ Á¢ýÉïºø ¦¾¡¼÷Ò¸¨Ç ÀÂýÀÎò¾¡¾£÷¸û
·À¢„¢í ¯ò¾¢¸û: yy Өȡ¸ ¦¾¡¼÷óÐ ¯í¸Ù¨¼Â ¸¼ý «ð¨¼ ¾¸Åø¸¨Ç
ºÃ¢À¡÷ì¸ §ÅñÎõ
yy ºã¸ ŨľÇí¸Ç¢ý ãÄõ Ó¾ý¨Á¡¸ ·À¢„¢í Ó¨È
¿¨¼ô¦ÀÚ¸¢ÈÐ.

34
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

¦ºö §ÅñʨŠ¦ºöÂìܼ¡¾¨Å


yy ²¾¡ÅÐ þ¨½ôÒ¸û «øÄÐ À¾¢Å¢Èì¸õ ¦ºö¾ §¸¡ôÒ¸û yy ¯í¸Ù¨¼Â ¾É¢¿À÷ ÁüÚõ À½ ¾¸Åø¸¨Çô ÀüÈ¢ §¸ðÎ
þÅüÈ¢¨É ¾¢ÈôÀ¾üìÌ Óý «¨Å ¦¾Ã¢Â¡¾Å÷¸Ç¢¼Á¢ÕóÐô ²¾¡ÅÐ Á¢ýÉïºÄ¢¨É ¦ÀüÈ¡ø «¾üìÌô À¾¢ÄǢ측¾£÷¸û.
¦ÀüÈ¢Õó¾¡ø ¿£í¸û ¸ÅÉÁ¡¸ þÕì¸ §ÅñÎõ yy ¸¼ý «ð¨¼ (Credit Card) Á¢¸ Ó츢ÂÁ¡É ¾¸Åø¸¨Ç Á¢ýÉïºø
yy ¯í¸Ù¨¼Â ¾É¢¿À÷ ¾¸Åø¸¨Ç ¯ûǣΠ¦ºö ¿¢¨Éò¾¡ø ÅƢ¡¸ô À¸¢Ã¡¾£÷¸û
¦ºöžüÌ Óý «ÛôÀ¢ÂÅÕ¨¼Â Á¢ýÉïºø Ó¸Åâ¢¨É yy ºó§¾¸õ ¿¢¨Èó¾ («) Ó¨ÈÂüÈ (SPAM) Á¢ýÉïºÄ¢¨É ¦ÀüÈ¡ø
¸ÅÉ¢ì¸×õ «¾¨É ¾¢È측¾£÷¸û
yy ±ô§À¡Ðõ ¿îÍ ¦Áý¦À¡Õû ±¾¢÷À¢ (¬ñʨÅÊ-AntiVirus), yy ¿£í¸û ±¾¢÷À¡Ã¡¾ þ¨½ôÒ¸¨Ç ¦ÀüÈ¡ø «Ð×õ
¬ñÊŠ¨À§Å÷- AntiSpyware, ¸½¢É¢ «Ãñ ±ÉôÀÎõ (·ôÂ÷Å¡ø- yy Ó츢ÂÁ¡¸ ƒ¢ô (ZIP) §¸¡ôÒ¸û ÁüÚõ (.EXE) §¸¡ôÒ¸û ¿£ðÊôÒ
Firewall) ¦Áý ¦À¡ÕÇ¢¨É ÀÂýÀÎò¾ §ÅñÎõ þÅü¨È ±øÄ¡õ ¦ÀÂâ¨É ¦¸¡ñ¼ þ¨½ôÒ¸¨Ç ¾¢Èì¸ §Åñ¼¡õ
Өȡ¸ ¦¾¡¼÷óÐ ÒÐôÀ¢ì¸ §ÅñÎõ yy ´Õ§À¡Ðõ ¯í¸Ù¨¼Â ¿¢ÚÅÉò¾¢ý Á¢ýÉïºø Ó¸Å⢨É
yy ±ô¦À¡ØÐõ ŨįÄŢ¢¨É ÒÐôÀ¢ì¸ §ÅñÎõ ÁüÚõ ²Á¡üÈ ¯í¸Ù¨¼Â ¾É¢ ¿À÷ ÀÂýÀ¡ðÊüÌ ÀÂýÀÎò¾¡¾£÷.
Á¢ýÉïºø Ó¸Åâ¢¨É À¢Ã¢ò¦¾ÎìÌõ «¨ÁôÀ¢¨ÉÔõ þÂì¸ yy ºó§¾¸õ ¿¢¨Èó¾ Á¢ýÉïºø¸¨Ç ¾¢Èì¸ §Åñ¼¡õ
§ÅñÎõ yy ºã¸ ŨľÇí¸Ç¢ø ºó§¾¸õ ¿¢¨Èó¾ À¼ôÀ¾¢× «øÄÐ
yy ¿£í¸û ±¾¡ÅÐ ºó§¾¸õ ¿¢¨Èó¾ Á¢ýÉïºÄ¢¨É ¦ÀüÈ¡ø ¯¼§É Ò¨¸ôÀ¼õ §À¡ýÈÅüÈ¢¨É ¾¢È측¾£÷¸û.
«Ð ¦¾¡¼÷À¡É ¿¢ÚÅÉò¾¢üÌ ¦¾¡¨Ä§Àº¢Â¢ý ÅƢ¡¸ «¨ÆôÒ yy ¦¾¡¨Ä§Àº¢Â¢ý ãÄõ ¡áÅÐ ¯í¸Ù¨¼Â Åí¸¢ ¸½ìÌ
Å¢ÎòÐ «Ð Ó¨ÈÂ¡É Á¢ýÉïºÄ¡ ±ýÚ ¯Ú¾¢ ¦ºöÐ ¦¸¡ûÇ×õ ¾¸ÅÄ¢¨Éì §¸ð¼¡ø À¾¢ÄÇ¢ì¸ §Åñ¼¡õ þó¾ Ó¨È vishing
yy þ¨½Âò¾Ç Ž¢¸õ ÁüÚõ ¾É¢¿À÷ ¾¸Åø¸û §À¡ýÅüÈ¢ü¸¡¸ (ÌÃø ·À¢„¢í ) ±Éì ÜÈôÀÎõ.
´Õ ¾É¢ôÀð¼ Á¢ýÉïºø ¸½ì¸¢¨Éô ÀÂýÀÎò¾×õ yy ²Á¡üÚ ¦¾¡¨Ä§Àº¢ «¨ÆôÀ¢¼õ Á¢¸×õ ¸ÅÉÁ¡¸ þÕì¸
§ÅñÎõ.

USB Pratirodh is a software solution which controls unauthorized


usage of portable USB storage devices. The USB Pratirodh blocks and
controls the usage of removable storage media like pen drive, external
hard drives, cell phones, IPods, camera and any USB mass storage
devices. Only authenticated users can access the removable storage
Regulating removable storage device access
media.
Features:
• User authentication
• Device Control
• Co-existence
• Support for both Windows
and Linux
• Device Control
For more details visit :
http://cdachyd.in/products/usb-pratirodh

35
Desktop Security
Why do you need to secure your Desktop?
A personal computer used without proper security measure could lead to exploiting the system
for illegal activities using the resources of such insecured computers. These exploiters could be
Virus, Trojans, Keyloggers and sometimes real hackers. This may result in data theft, data loss,
personal information disclosure, stealing of credentials like passwords etc. So, protect and secure
your Personal Computer before it is compromised.

To setup your computer safely The olden phrase is always golden..


Read the Vendor document Prevention is Better than Cure.
carefully and follow the guidelines

Things to remember while using your personal computer • Follow the installation steps as specified by the vendor docu-
• Always install Licensed Software so that you have regular updates ment.
of your Operating system and Applications. In case of open source • Use the CD provided by the Vendor to install your
software, make sure to update frequently. • Motherboard drivers
• Read the “Terms and Conditions” / “License Agreement” provided • Monitor drivers
by vendor/software before installation. • Audio & Video drivers
• Properly shutdown and switch off your personal computer after • Network drivers
the use along with your external devices like Monitor, Modem,
Speakers etc

Software Installation Do You Know?


• Installation of Operating System
• Get proper Licensed Operating System and read License agree-
84 % of Home Users
ment carefully before installing the OS. experienced at least one
• Switch on your personal computer and go to BIOS Settings and
change your first boot drive to CD Drive. security threat during 2015
• Insert your CD/DVD into the CD drive and restart your system
using Ctrl+Alt+Delete.
• After restart, the system boots from the CD/DVD.

36
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Guidelines
Physical Security Data Security
• Regularly clean your system and it’s components. • Enable Auto-updates of your Operating System and update it reg-
Note: Turn your PC Off before cleaning it. ularly.
• Properly organize the power cables, wires, to prevent from water, • Download Anti-Virus Software from a Trusted Website and Install.
insects etc. Make sure it automatically gets updated with latest virus signa-
• While working at PC, be careful not to spill water or food items on tures.
it. • Download Anti-Spyware Software from a Trusted Website and In-
• Always follow “Safely Remove” option provided by the Operating stall. Make sure it automatically updates with latest definitions.
System while disconnecting the USB devices. • Use “Encryption” to secure your valuable Information.
• By setting BIOS password, you can prevent unauthorized access to Note: For encryption password is required, always remember the
your personal computer. password used while encrypting it, else data would not be available
• Switch off the computer when it’s not in use. thereafter.
Note: To setup BIOS password refer “Setting password to BIOS” sec- • Strong password should be used for “Admin” Account on computer
tion. and for other important applications like E-mail client, Financial
Applications (accounting etc).
Internet Security: • Backup : Periodically backup your computer data on CD / DVD or
• Follow Internet Ethics while browsing. USB drive etc.. in case it may get corrupted due to HardDisk fail-
• Check the copyright issues before using the content of Internet. ures or when reinstalling/format ting the system.
• Always access the site which uses https (Hyper Text Transfer Pro- • Recovery Disk: Always keep recovery disk suplied by Manufactur-
tocol Secure) while performing Online transactions, Downloads er / Vendor of the Computer System to recover the Operating Sys-
etc, which is secure. tem in the event of boot fail- ures due to system changes such as
• If the site uses SSL, verify the Certificate details like Who is the uncerificated Drivers/unknown Software pub- lisher.
owner, Expiry date of the certificate etc to confirm whether it is • Startup programs should be monitored / controlled for optimal
trusted or not. system performance.
• You can do this by clicking the lock icon.
• Use only Original Websites for downloading the files rather than Browser Security:
Third Party websites. • Always update your Web Browser with latest patches.
• Scan the downloaded files with an updated Anti-Virus Software • Use privacy or security settings which are inbuilt in the browser.
before using it. • Also use content filtering software.
• Install and properly configure a Software firewall, to protect • Always have Safe Search “ON” in Search Engine.
against malicious traffic.

37
Modem Security: Wireless Security:
• Change the default passwords. • Change default Administrator passwords.
• Switch off when not in use. • Turn On WPA (Wi-Fi Protected Access) / WEP Encryption.
• Change default SSID.
e-Mail Security: • Enable MAC address filtering.
• Always use strong password for your email account. • Turn off your wireless network when not in use.
• Always use Anti-Spyware Software to scan the eMails for Spam.
• Always scan the e-Mail attachments with latest updated Anti-Virus
and Anti-Spy ware before opening.
• Always remember to empty the Spam folder.

SETUPS
BIOS (Basic Input / Output System)
Settings :
• Computers BIOS is the first program that runs when computer is
started. You can tell the BIOS to ask for a password when it starts,
thus restricting access to your computer.
• To enter the BIOS setup program, sometimes called CMOS setup:
• Turn on or reboot your computer. The screen will display a series
of diagnostics and a memory check. A message will come “Hit the
<DEL> key to enter the BIOS setup program” will appear. [It’s not
always the DEL key some BIOS’s use F2 or F10 or any other key
combination, check your motherboard manual for more details].
• Note: Some BIOS versions use a graphical type menu with icons (a GUI) or have a
text interface, the principle however is exactly the same.
• There are two options that relate to passwords, Supervisor
Password and User Pass word, these relate to controlling access to
the BIOS Setup Program and the Machine Boot respectively.
• Note: Not all BIOS’s have this password feature, your bios may not have it in which you’ll not forget. The BIOS will then prompt you to confirm the
case you won’t be able to restrict access to your computer in this way. password, just type the same thing again. Now you’ll want to set
• Select USER PASSWORD and you’ll be prompted to enter a password. your system to ask for that password every time it boots, so select
You should now enter a password of up to eight characters (most the BIOS FEATURES SETUP option, to see a menu. It’s the Password
BIOS’s are limited to eight characters unfortunately). I recommend Check option if you are interested in, so select it and change the
you to use the full eight but take care that you choose something setting to “ALWAYS”. Now navigate back to the main menu and

38
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

select SAVE & EXIT SETUP. Your machine will then reboot and • Log in to the administrative site by entering the user name and
you’ll be prompted for the password. Each and ever-time you boot password provided in the user manual. Again, if you cannot locate
you’ll be asked for password you chose. these, call the modem manufacturer’s/vendor’s customer service.
• Note: This method of restricting access to your computer is not completely Usually the default username and password is “Admin.”
foolproof, there are ways around it. But it will stop or at least delay the majority • Select the Internet connection type. There are four types of Internet
of casual attempts to get access.
• Note: If you forget your BIOS password, consult your motherboard manual or if connection: “Dynamic IP Address,” “Static IP Address,” “PPPoE/
you don’t have one, consult the website of the BIOS manufacturer. PPPoA” and “Bridge Mode.” Call your Internet service provider
(ISP) to ask which setting best suits their wireless service.
How to connect a Wireless Modem to a Desktop • Choose “Dynamic IP Address” to get an IP address automatically
Computer ? from the ISP’s server. For every wireless Internet connection you
Instructions to be followed while connecting the Wireless Modem make, you receive an IP address. In some cases the IP address is
• Make sure you have the necessary equipment. Your wireless dynamic (it changes every time you connect to the Internet), and
modem package should in other cases it is static (the IP address remains the same even
• include the wireless modem (or wireless adapter); an installation after you disconnect and reconnect to the Internet). If the address
CD-ROM with a manual; an Ethernet cable (or a USB cable if you is dynamic, you will have to choose this setting so that the modem
have a wireless USB modem); a wireless antenna (conforming to automatically takes the IP from the ISP’s server whenever a new
wireless standards such as 802.11a, 802.11b, or 802.11g); and wireless connection is established. Enter your modem’s MAC
a power adapter. Call the retailer or the manufacturer of your Address (usually found at the back of the modem) and other
wireless modem if any of these items are missing. details. Refer to the user manual or call the modem manufacturer’s
• Read the manual to learn how the equipment functions. For / vendor’s customer service to get these details.
example, use the wireless antenna to connect to the wireless • Select “Static IP Address” if you are provided with a static IP. You
network ; use the Ethernet cable (or USB cable) to connect the will need to fill in the fields for “VPI,” “VCI,” “IP Address,” “Subnet
computer to the modem. Mask,” “ISP Gateway Address,” “Server Address,” “Primary DNS
• Attach your wireless antenna to the modem. Address,” “Secondary DSN Address” and “Connection Type.” These
• Hook up an Ethernet cable from your computer to a LAN/Ethernet details can be obtained from your ISP.
port on the modem. Or, if you have a wireless USB modem, connect • Opt for “PPPoE/PPPoA” if your ISP uses this type of connection. DSL
the USB cable to the USB port of the computer. users may use this connection. Enter your user name, password
• Connect the power adapter to the power connector of the modem, and other details. These will be provided by your ISP.
plug it in and switch it on. • Select the “Bridge Mode” if your ISP uses this connection type.
Enter the relevant details provided by your ISP.
• Finish the process by clicking on the icon that says “Finish” or “OK”
Setting Up the Wireless Modem
or something similar. Your modem should be set up now.
• Open your Web browser and enter the URL of the modem’s
• Enter any URL address in your browser’s address window to check
administrative site. If you can’t find it in the users’ manual, call the
whether Internet is working or not.
modem manufacturer’s/vendor’s customer service.

39
Do’s Dont’s
• Read the vendor document carefully and follow the guidelines to • Do not install pirated software such as
know how to setup the personal computer ¾¾ Operating System Software (Windows, Unix, etc..).
• Connect ¾¾ Application Software (Office, Database..etc).
¾¾ Keyboard ¾¾ Security Software (Antivirus, Antispyware..etc).
¾¾ Mouse Note: Remember, some Pirated Software themselve
¾¾ Monitor can be rogue programs.
¾¾ Speakers and • Do not plug the computer directly to the wall outlet as power
¾¾ Network Cable …... to CPU (Central Processing Unit) as direct- surges may destroy computer. Instead use a genuine surge pro-
ed in vendor document. tector to plug a computer.
¾¾ Connect CPU and Monitor to Electrical Outlets. • Don’t eat food or drink around the PC.
• Don’t place any magnets near the PC.
• Never spray or squirt any liquid onto any computer component.
If a spray is needed, spray the liquid onto a cloth and then use
that cloth to rub down the component.
• Don’t open the e-Mail attachments which have double extensions

¦ºö §ÅñʨŠ: ¦ºöÂìܼ¡¾¨Å :


yy Å¢üÀ¨É¡Ç÷¸Ç¡ø ¦¸¡Îì¸ôÀð¼ §¸¡ôÒ¸¨Ç ¸ÅÉÁ¡¸ ¾¢ÕðÎ ¦Áý¦À¡ÕÇ¢¨É ¦À¡Õò¾ìܼ¡Ð. ¯¾¡Ã½Á¡¸
ÀÊì¸ §ÅñÎõ. ÁüÚõ «¾¢ø ÌÈ¢ôÀ¢ðÎûÇ ÅƢӨȸǢýÀÊ yy ¾¢ÕðÎ ¦Áý¦À¡ÕÇ¢¨É ¦À¡Õò¾ìܼ¡Ð. ¯¾¡Ã½Á¡¸
¸½¢É¢Â¢¨É «¨Áì¸ §ÅñÎõ ¾¾ þÂì¸ «¨ÁôÒ ¦Áý¦À¡Õû (OS Software) (Windows, Linux,
yy À¢ýÅÕÅÉÅüÈ¢¨É þ¨½ì¸×õ : etc)
¾¾ ¸£ §À¡÷ð ¾¾ ÀÂýÀ¡ðÎ ¦Áý¦À¡Õû (Application Software) (MS Office, SQL
¾¾ ¦ÁªŠ Database, etc)
¾¾ Á¡É¢ð¼÷ ¾¾ À¡Ð¸¡ôÒ ¦Áý¦À¡Õû¸û (Anti virus, Anti spyware)
¾¾ ŠÀ£ì¸÷ ¾¢ÕðÎ ¦Áý¦À¡Õû §À¡Ä¢ ¦ºÂø ¾¢ð¼í¸¨Ç ¯ûǼ츢ÂÐ
¾¾ ¸½¢É¢ ŨÄôÀ¢ýÉø «¨ÁôÒ¸û º¢ À¢ ä ¯ûǣΠÁüÚõ yy ¸½¢É¢¨Â §¿ÃÊ¡¸ Á¢ý¸Ä Àð¨¼Â¢ø ¦À¡Õò¾¡¾£÷¸û.
¦ÅǢ£θ¨Ç Å¢üÀ¨É¡Çâý ¨¸§ÂðÊýÀÊ þ¨½ôÒ¸¨Ç ²¦ÉýÈ¡ø Á¢ýº¡Ãõ ±ó¾ §¿ÃÓõ ºÁ¿¢¨Ä¢ø þÕ측Ð
«¨Áì¸×õ ºÁ¿¢¨Ä¢¨É Á£È¢É¡ø ¸½¢É¢ À¡¾¢ì¸ôÀ¼ Å¡öôÒñÎ
yy ¯½× ¯ñÀÐ ÁüÚõ ¾ñ½£÷ «ÕóÐÅÐ §À¡ýÈ ¦ºÂø¸¨Ç
¸½¢É¢Â¢ý «Õ¸¢ø ¦ºö¡¾£÷¸û
yy ¸¡ó¾ ¦À¡ÕÇ¢¨É ¸½¢É¢Â¢ý «Õ¸¢ø ¨Å측¾£÷¸û
yy ´Õ §À¡Ðõ ¦¾Ç¢ôÀ¡¨½ §¿ÃÊ¡¸ ¸½¢É¢Â¢ø ¦¾Ç¢ì¸¡Áø ´Õ
н¢Â¢ø ¿¨ÉòÐ «¨¾ì ¦¸¡ñÎ ¸½¢É¢Â¢¨É Íò¾õ ¦ºöÂ×õ.
yy Á¢ýÉïºø þ¨½ôÒ¸û þÃ𨼠¿£ðÊôÒ ÌȢ¢¨É (extension)
¦¸¡ñÊÕó¾¡ø ¾¢È측¾£÷¸û.

40
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

¦¼Šì¼¡ô À¡Ð¸¡ôÒ
¯í¸Ù¨¼Â ¸½¢É¢ìÌ ²ý À¡Ð¸¡ôÒ §¾¨Å?
¸½¢É¢Â¢¨É À¡Ð¸¡ôÒ þøÄ¡Áø ÀÂýÀÎòÐõ §À¡Ð ¨ÅÊ (Virus), ð§Ã¡ƒýŠ (Trojans), ¸£Ä¡¸÷Š (keyloggers)
ãÄÁ¡¸ò ¾í¸û ¸½¢É¢Â¢¨É ¾¡ì¸¢ò ¾¢ÕÎÀÅ÷¸û ÀÄ Ó¨ÈÂüÈ ¸¡Ã¢Âí¸¨Ç ¦ºö ¿£í¸û «È¢Â¡Á§Ä ¯í¸û
¸½¢É¢Â¢¨É ÀÂýÀÎò¾¢ì ¦¸¡ûÅ÷.

¯í¸Ù¨¼Â ¾É¢¿À÷ ¸½¢É¢¨Âô À¡Ð¸¡ôÀ¡¸ «¨ÁôÀ¾üÌ Ó¾Ä¢ø ¿£í¸û Å¢üÀ¨É¡Çâýì ¨¸§Âð欃 ¸ÅÉÁ¡¸ô
ÀÊì¸ §ÅñÎõ ÁüÚõ À¢ýÅÕõ ¯¾Å¢Ó¨È¸¨Çô À¢ýÀüÈ §ÅñÎõ

¸½¢É¢Â¢¨Éô ÀÂýÀÎòÐõ§À¡Ð ¿¢¨ÉÅ¢ø Ó¾ø ¦¾¡¼ì¸ (First BOOT) ¸ÕŢ¢¨É ¸½¢É¢Â¢ý ÌÚó¾¸Î ¸ÕÅ¢ìÌ
¦¸¡ûǧÅñʨŠÁ¡üÈ×õ.
yy ±ô¦À¡ØÐõ ¯Ã¢Áõ ¦ÀüÈ ¦Áý¦À¡ÕÇ¢¨É ¦À¡ÕòÐõ §À¡Ð yy ÌÚó¾¸Î ¸ÕŢ¢ø ¯í¸Ù¨¼Â (CD/DVD¢¨É ¦À¡Õò¾×õ) À¢ý
¸½¢É¢Â¢¨É (Ctrl + Alt + Del) ±ýÈ ¦À¡ò¾¡ý¸¨Çì ¦¸¡ñÎ
þÂíÌõ «¨ÁôÒ (Operating System) ÁüÚõ þ¾Ã «¨ÁôÒ¸û
ÁÚ¦¾¡¼ì¸õ ¦ºöÔí¸û, ¦¾¡¼í¸¢Â À¢ý ¸½¢É¢ BOOT ¬Ìõ.
(Application) §À¡ýÈÅü¨È «ùÅô§À¡Ð ÒÐôÀ¢òÐ ¦¸¡ûÇ þÂÖõ. yy Å¢üÀ¨É¡Ç÷¸Ç¡ø ÌÈ¢ôÀ¢¼ôÀð¼ ¦À¡ÕòÐõ Өȸ¨Ç ¸ñÊôÀ¡¸
´Õ §Å¨Ç Open Source ¦Áý¦À¡Õð¸¨Ç ¿¢ÚŢɡø «ùÅô§À¡Ð À¢ýÀüÈ §ÅñÎõ.
«Åü¨È ÒÐôÀ¢ì¸×õ. yy Å¢üÀ¨É¡Ç÷¸Ç¡ø ¦¸¡Îì¸ôÀð¼ ¦À¡ÕòÐõ Ó¨È ¦¸¡ñ¼
yy ¦Áý¦À¡ÕÇ¢¨Éô ¦À¡ÕòОüÌ Óý Å¢üÀ¨É¡Çâý ÌÚó¾¸Î¸¨Çô ÀÂýÀÎò¾¢ ¸£Æì¸ñ¼ ¸ÕÅ¢¸¨Ç þÂì¸ò §¾¨Å¡É
¿¢Àó¾¨É¸û ÁüÚõ ¯Ã¢Áõ º¡ýÈ¢¾ú §À¡ýÈÅüÈ¢¨Éì ¸ÅÉÓ¼ý ¦Áý¦À¡ÕÇ¢¨É ¿¢ÚÅ×õ
ÀÊì¸ §ÅñÎõ. ¾¾ Á¾÷§À¡÷ð ð¨ÃÅ÷` (Motherboard Drivers)
yy ¸½¢É¢Â¢ø ¦ÅǢ£ðÎ ¸ÕÅ¢¸û «¾¡ÅÐ (Monitor, Modem, Speakers ¾¾ Á¡É¢¼÷ ð¨ÃÅ÷` (Monitor Drivers)
ÁüÚõ ÀÄ) ÀÂýÀÎò¾¢ ÓÊò¾ À¢ýÒ ¸½¢É¢¨Â Өȡ¸ «Á÷ò¾ ¾¾ ¬Ê§Â¡ & ţʧ¡ ð¨ÃÅ÷` (Audio & Video Drivers)
(ShutDown) §ÅñÎõ. ¾¾ ¦¿ð¦Å¡÷ì ð¨ÃÅ÷` (Network Drivers)

ÌÈ¢ôÒ: ¯í¸ÙìÌ ¦¾Ã¢ÔÁ¡ ?


2015¬õ ¬ñÊø Å£ðÊø ÀÂýÀÎòÐõ ¸½¢É¢¸Ç¢ø 85
Å¢Ø측ΠÀÂÉ¡Ç¢¸Ç¢ý ¸½¢É¢ ̨Èó¾Àðºõ ´Õ ¨ÅÊ
ãÄÁ¡¸Å¡ÅÐ ¾¡ì¸ôÀð¼Ð.

¦Áý¦À¡Õû ¦À¡Õòоø:-
yy þÂì¸ «¨ÁôÒ (Operating System) ¦À¡Õòоø:-
¾¾ OS-³ ¦À¡ÕòОüÌ Óý «¨Å ¯Ã¢Áõ ¦ÀüȾ¡¸ þÕì¸ §ÅñÎõ
¯Ã¢Á º¡ýÈ¢¾Æ¢¨É ¸ÅÉÁ¡¸ô ÀÊì¸ §ÅñÎõ.
¾¾ ¯í¸û ¸½¢É¢Â¢¨É ON ¦ºö¾×¼ý BIOS «¨ÁôÀ¢üìÌ ¦ºýÚ À¢ý

41
ÅÆ¢¸¡ðθû: ¾¸Åø À¡Ð¸¡ôÒ Ó¨È:-
yy ¦¾¡¼÷óÐ ¯í¸Ù¨¼Â ¸½¢É¢Â¢¨ÉÔõ ÁüÚõ «ÅüÈ¢ý ÁüÈ yy þÂì¸ «¨ÁôÀ¢¨É (Operating System) ¾¡É¡¸§Å «¾¨É
À¡¸í¸¨ÇÔõ Íò¾õ ¦ºö §ÅñÎõ. ÒÐôÀ¢òÐì ¦¸¡ûÙõ Ũ¸Â¢ø «¨Áì¸ §ÅñÎõ.
ÌÈ¢ôÒ: Íò¾õ ¦ºöÔõ Óý ¸½¢É¢¨Â «Á÷ò¾¢Å¢¼ §ÅñÎõ yy ¿õÀò¾Ìó¾ þ¨½Â¾Ç Àì¸ò¾¢Ä¢ÕóÐ (Anti-virus) ¸¨Çì ¸ðÎ
yy ¸½¢É¢Â¢ø ¿£÷ À¼¡Áø À¡÷òÐì ¦¸¡ûÇ §ÅñÎõ. «¾Û¨¼Â ¿¢Ãø ¦Áý¦À¡ÕÇ¢¨É À¾¢Å¢Èì¸õ ¦ºöÐ À¢ý ¦À¡Õò¾§ÅñÎõ.
þ¨½ôÒ¸¨Ç º¡Ã¢À¡÷ì¸ §ÅñÎõ. ¸½¢É¢Â¢¨Éô ÀÂýÀÎòÐõ§À¡Ð yy ¯í¸Ù¨¼Â Á¢¸ Ó츢ÂÁ¡É ¾¸Åø¸¨Ç Á¨È¡ì¸õ (Encryption)
«ÅüÈ¢ý Á£Ð ¾ñ½£÷ ÁüÚõ ¯½× ¦À¡Õð¸¨Ç ¨ÅòÐ ãÄõ À¡Ð¸¡ì¸Ä¡õ.
¯ñϾ¨Äò ¾Å¢÷ì¸ §ÅñÎõ yy ¸½¢É¢Â¢ý ¿¢÷Å¡¸¢ “Admin” ¸½ìÌ ÁüÚõ Á¢ýÉïºø¸û
yy USB ¸ÕÅ¢¸¨Ç ¸½¢É¢Â¢Ä¢ÕóÐ ¿£ìÌõ §À¡Ð “Safely Remove” Å¡Ê쨸¡Ç÷ ÁüÚõ Åí¸¢ ¸½ìÌ §À¡ýȨÅìÌ ¸ÊÉÁ¡É
ӨȢ¨É À¢ýÀüÈ §ÅñÎõ. ¸¼×¡ø Å¡÷ò¨¾Â¢¨É ¦¸¡ñÎ «¨Áì¸ §ÅñÎõ.
yy BIOS «¨ÁôÀ¢ø ¸¼×¡ø¨Äô ¦À¡ÕòО¢ý ãÄõ yy À¢ýÀ¾¢× ¸¡ôÒÓ¨È: (Backup)
¯Ã¢¨ÁÂüÈÅ÷¸û ¯í¸û ¸½¢É¢Â¢¨Éô ÀÂýÀÎòО¢Ä¢ÕóÐ ´Õ ÌÈ¢ôÀ¢ð¼ ¸¡Ä þ¨¼¦ÅǢ¢ø ¸½¢É¢Â¢ý ¾¸Åø¸¨Ç Hard
¾Îì¸Ä¡õ Disk /CD / USB ð¨Ãù ãÄÁ¡¸ ¸¡ôÒ À¢ýÀ¾¢× ¦ºöÐ ¦¸¡ûÇ
yy ¸½¢É¢Â¢¨Éô ÀÂýÀÎò¾¡¾§À¡Ð «ÅüÈ¢¨É «Á÷ò¾¢ (OFF) ¨Åì¸ §ÅñÎõ ÁüÚõ þÂìÌ ¾Çõ ¦ºÂø þÆ󾡧ġ «øÄÐ ÁÚ
§ÅñÎõ. ¦À¡Õò¾õ «øÄÐ þÂì¸ «¨ÁôÀ¢¨É Á¡üÈ ¿¢¨Éò¾¡§Ä¡
ÌÈ¢ôÒ:- BIOS ¸¼×¡ø¨Ä «¨Áì¸ “Setting password to BIOS” ¸½¢É¢Â¢ø ¯ûÇ ¾¸Åø¸¨Ç À¢ýÀ¾¢× ¦ºöÐ ¦¸¡ûÇ §ÅñÎõ.
±ýÈ À̾¢Â¢¨É ÀÂýÀÎò¾×õ yy ¾¢ÕõÀ ¦ÀÚõ ¾ðÎ À¡Ð¸¡ôÒ Ó¨È (Recovery Disk)
±ô¦À¡ØÐõ ¾Ã׸¨Ç ¾¢ÕõÀô ¦ÀÈìÜÊ ʊ¸¢¨É
þ¨½Âô À¡Ð¸¡ôÒ : ÀÂýÀÎò¾×õ. þ¨Å Å¢üÀ¨É¡Ç÷¸Ç¡ø ÅÆí¸ôÀ𼾡¸
yy þ¨½Âò¾¢ø ¸¢¨¼ìÌõ ±ó¾¦Å¡Õ ¾¸ÅÄ¢¨ÉÔõ ¯Ã¢Áõ ¦ÀüÚô þÕì¸ §ÅñÎõ
ÀÂýÀÎò¾×õ. yy ¸½¢É¢ º¢ÈôÀ¡¸ þÂí¸ò¾ì¸ Ũ¸Â¢ø «¾ý ÐÅì¸ ¦ºÂÄ¢ø
yy þ¨½Âò¾Ç ÀâÁ¡üÈõ, À¾¢Å¢Èì¸õ ÁüÚõ ÀÄ ¦ºÂø¸û ¦ºöÔõ ¿¢ÚÅôÀ¼ §ÅñÎõ.
§À¡Ð `HTTPS' (HyperText Transfer Protocol Secured) þ¨½Âò¾Ç
Àì¸ò¾¢¨É ÀÂýÀÎò¾×õ þ¨Å Á¢¸×õ À¡Ð¸¡ôÀ¡ÉÐ. §Á¡¼õ À¡Ð¸¡ôÒ Ó¨È :
yy ¿£í¸û SSL Àì¸ò¾¢¨É ÀÂýÀÎò¾¢É¡ø «¾ý º¡ýÈ¢¾Æ¢ø ¡÷ yy ¸½¢É¢Â¢ø ¿¢¨ÄÂ¡É À¡Ð¸¡ôÒ Å¡÷ò¨¾Â¢¨É Á¡üÈ×õ.
¯Ã¢¨Á¡Ç÷ ÁüÚõ ¸¡Ä¡Å¾¢ §¾¾¢Ôõ ¸ÅÉ¢ì¸ §ÅñÎõ. À¢ý «¨Å yy ÀÂýÀÎò¾¡¾ §À¡Ð «Á÷ò¾¢ ¨Åì¸ §ÅñÎõ
¿õÀ¸Á¡É¾¡ ±ýÚ À¡÷ì¸ §ÅñÎõ. «ÅüÈ¢¨É “Ä¡ì ³ì¸¡¨É”
(Lock Icon) «ØòО¢ý ãÄõ ¦¾Ã¢óÐ ¦¸¡ûÇÄ¡õ. Á¢ýÉïºø À¡Ð¸¡ôÒ Ó¨È :
yy «ºø þ¨½Âò¾Ç Àì¸ò¾¢¨É ÁðΧÁ À¾¢Å¢Èì¸õ ¦ºö yy Á¢ýÉïºø ¸½ì̸ÙìÌ ±ô¦À¡ØÐõ ºì¾¢ Å¡öó¾ ¸¼×î
ÀÂýÀÎò¾ §ÅñÎõ. ¦º¡ø¨Ä «¨Áì¸×õ.
yy ¦Áý¦À¡Õû •¨ÀÂ÷Å¡ø (Software Firewall) -Ä¢¨É ¿¢ÚÅ¢ yy ±ô¦À¡ØÐõ Á¢ýÉïºø þ¨½ôÒ¸¨Ç ¾¢ÈôÀ¾üìÌ Óý Anti-spy
þ¨½Âò¾¢ý š¢ġ¸ §¾¨ÅÂüÈ À¡Ã¢Á¡üÈí¸û. ²Ðõ ¿¢¸ú¸¢È¾¡ «øÄÐ ¸¨Çì ¸ðÎ ¿¢Ãø (Anti-virus) ¦¸¡ñÎ §º¡¾¢ì¸×õ.
±ýÀ¾¢¨É ¸ÅÉ¢ì¸×õ, ¸ðÎôÀÎò¾×õ ¯À§Â¡¸ô Àθ¢ÈÐ. yy ±ô¦À¡ØÐõ §¾¨ÅÂüÈ Á¢ýÉïºø §¸¡ôÒ¨È (SPAM Folder)
yy À¾¢Å¢Èì¸õ ¦ºö¾ §¸¡ôÒ¸¨Ç (Antivirus) ¸¨Çì ¸ðÎ ¿¢Ãø ¦Áý À̾¢Â¢¨É ¸¡Ä¢Â¡¸ ¨ÅòÐì ¦¸¡ûÇ §ÅñÎõ
¦À¡ÕÇ¢¨É ¦¸¡ñÎ §º¡¾¢ò¾ À¢ý ÀÂýÀÎò¾×õ.
yy Ó¨ÈÂ¡É ¦Áý¦À¡ÕÇ¢¨É ÀÂýÀÎò¾×õ.

42
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

ŨįÄÅ¢ À¡Ð¸¡ôÒ Ó¨È (Browser Security) : «¨Ä¸ÕÅ¢ À¡Ð¸¡ôÒ Ó¨È :


yy þ¨½Â¾Ç ¦ºÂÄ¢¨É «ùÅô§À¡Ð ¸¢¨¼ìÌõ ºÁ£Àò ¦À¡Õòи yy «¨Ä¸ÕŢ¢ø ¯ûÇ ¿¢÷Å¡¸ ¸½ì¸¢ý (Administrative Username) ¸¼×î
¦¸¡ñÎ ÒÐôÀ¢ì¸×õ ¦º¡øÄ¢¨É Á¡üÈ×õ (Password)
yy ŨįÄŢ¢ý Óýɧà ¯ûÇ À¡Ð¸¡ôÒ «¨ÁôÒ Web Browser yy WPA (Wi-Fi protected Access) / WEP Encryption ¢¨É þÂì¸ §ÅñÎõ.
ӨȢ¨É À¡Ð¸¡ôÒ Ó¨È¢ø «¨Áì¸ §ÅñÎõ. yy Óýɧà ÅÆí¸ôÀð¼ SSID-¢¨É Á¡üÈ×õ.
yy «¾Û¼ý content filtering ¦Áý¦À¡ÕÇ¢¨É ÀÂýÀÎò¾×õ. yy MAC Ó¸Åâ ·À¢ø¼Ã¢Â¢¨É ÀÂýÀÎò¾×õ.
yy À¡Ð¸¡ôÒ §¾Î¾ø ӨȢ¨É ÀÂýÀÎò¾ §ÅñÎõ. yy «¨Ä ¸ÕŢ¢¨É ÀÂýÀÎò¾¡¾ §À¡Ð «Á÷ò¾¢ ¨Åì¸ §ÅñÎõ

BIOS (Basic Input / Output System) «¨ÁôÒ Ó¨È:-


yy ¸½¢É¢Â¢¨É þÂì¸ ¦¾¡¼í¸¢Â À¢ý ӾĢø ¦ºÂøÀÎõ ¦ºÂø¾¢ð¼õ Å¡÷ò¨¾Â¢¨É ¯Ú¾¢ôÀÎòÐÁ¡Ú §¸ðÌõ, ¿£í¸û Á£ñÎõ «¨¾§Â
BIOS. ¸½¢É¢ ¦¾¡¼í¸¢Â×¼ý BIOS ¸¼×¡ø¨Ä §¸ðÌõ Ũ¸Â¢ø À¾¢× ¦ºö §ÅñÎõ. À¾¢× ¦ºö¾ À¢ý ¿£í¸û ¸½¢É¢Â¢¨É
«¨ÁòÐ ¸½¢É¢¨Â ÀýÀÎòО¢¨É ¸ðÎôÀÎò¾ ÓÊÔõ ¦¾¡¼í¸¢É¡ø À¡Ð¸¡ôÒ Å¡÷ò¨¾Â¢¨É §¸ðÌõ. ´ù¦Å¡Õ Ó¨ÈÔõ
yy BIOS Setup Program¨Â þ¨Å CMOS setup ±É×õ «¨Æì¸ôÀÎõ ¸½¢É¢Â¢¨É ¦¾¡¼íÌõ §À¡Ð þó¾ ¸¼×î ¦º¡øÄ¢¨É §¸ð¸
yy ¸½¢É¢Â¢¨É ¦ºÂøÀÎò¾×õ «øÄÐ reboot ¦ºöÂ×õ. §ÅñΦÁýÈ¡ø “ALWAYS” ±ýÈ §¾÷× ±íÌ ¯ûÇÐ ±É À¡÷òÐ
yy ¾¢¨Ã¢ø À¾¢× «ÇÅ¢¨É (»¡À¸ «ð¨¼Â¢ý) §º¡¾¢ìÌõ ¿¢¸ú× «¾¨É ¿¢ÚÅ×õ
¿¼ìÌõ À¢ý ¸¼×î ¦º¡ø (password in 8 Character) ±ýÈ
ÌÚ了ö¾¢ ¾¢¨Ã¢¼ôÀÎõ. ±ô¦À¡ØÐõ <DEL> ÁüÚõ F2 or F10
¸¢ Àð¼¨É -¸¨ÇÔõ ÀÂýÀÎò¾¢ BIOS «¨ÁôÀ¢ý ¯û ѨÆÂÄ¡õ.
§ÁÖõ «ÅüÈ¢¨É ÀüȢ ¾¸Åø¸¨Ç «È¢Â ÀĨ¸Â¢ý ¦ºöÓ¨È
Å¢Çì¸í¸¨Ç À¡÷ì¸Ä¡õ.
ÌÈ¢ôÒ:-
´Õ º¢Ä BIOS Ũ¸ ¦ÁöôÒ ¿¢Ãø¢¨É (foolproof) ¦ÀüÈ¢ÕìÌõ þÃñΧÁ
´§Ã ¦¸¡û¨¸Â¢¨É ¯¨¼ÂÐ. BIOS ¸¼×î ¦º¡ü¸Ç¢ø þÃñΠŨ¸¸û
¯ûÇÉ.
yy ´ýÚ §ÁüÀ¡÷¨Å¡Ç÷ ¸¼×î ¦º¡ø ÁüÚõ ÀÂɡǢ¢ý ¸¼×î
¦º¡ø þ¨Å¸û BIOS «¨ÁôÀ¢¨É ÀÂýÀÎòОüÌõ ÁüÚõ
þÂó¾¢Ãõ ¦ºÂøÀ¼ ÐÅíÌžüÌõ ¯¾×¸¢ÈÐ.
ÌÈ¢ôÒ : þó¾ þÃñÎ ¸¼×î ¦º¡ø «¨ÁôÒ Å¨¸¸û ±øÄ¡ BIOS¢Öõ
þÕ측Рþ¨Å þøÄ¡Áø ¿¢Àó¾¨ÉìÌðÀð¼ ӨȢø ¸½¢É¢Â¢¨É
ÀÂýÀÎòÐõ ӨȢ¨É ¦ºÂøÀÎò¾ ÓÊ¡Ð
yy “ÀÂɡǢ¢ý ¸¼×î ¦º¡ø (User Password) §¾÷× ¦ºöÂ×õ À¢ý yy À¢ý ¿£í¸û SAVE & EXIT SETUP¢¨É §¾÷× ¦ºöÂ×õ
ÌÈ¢ôÒ [: ´Õ §Å¨Ç ¿£í¸û ¯í¸Ù¨¼Â BIOS À¡ÐÀ¡ôÒ Å¡÷ò¨¾Â¢¨É
¯í¸Ù¨¼Â À¡Ð¸¡ôÒ Å¡÷ò¨¾Â¢¨É «¨Áì¸ §ÅñÎõ. (¿£í¸û
ÁÈóРŢð¼¡ø ¸Õò¾ðÎ ¨¸§Âð欃 À¡÷ì¸×õ «øÄÐ BIOS
«¨ÁìÌõ À¡Ð¸¡ôÒ Å¡÷ò¨¾Â¡ÉÐ 8 ±ØòÐì¸û ¦¸¡ñÎ ¯üÀò¾¢Â¡Çâý þ¨½Â¾Ç Àì¸ò¾¢¨É À¡÷ì¸×õ.
«¨Áì¸×õ. «¨¾ ¿£í¸û ¿¢¨ÉÅ¢ø ¨ÅòÐì ¦¸¡ûÙõ Ũ¸Â¢ø
«¨Áì¸ §ÅñÎõ. À¢ý BIOS ¬ÉÐ ¯í¸Ù¨¼Â À¡Ð¸¡ôÒ

43
ÅÂ÷¦ÄŠ §Á¡¼òмý ¦¼Šì¼¡ô ¸½¢ô¦À¡È¢¨Â ±ôÀÊ ±ýÀ¨Å. þ¨½Â §º¨Å ÅÆíÌÀŨÃì ÜôÀ¢ðÎ ±ó¾ ¦ºðÊí,
¦À¡ÕòÐÅÐ ÅÂ÷¦ÄŠ §º¨ÅìÌô ÀÂýÀÎõ ±ýÚ §¸Ùí¸û.
yy ³±ŠÀ¢ ¦º÷ÅâĢÕóÐ ¾¡É¡¸§Å ³À¢ «ðèºô ¦ÀÚžüÌ
ÅÂ÷¦ÄŠ §Á¡¼ò¨¾ ¦À¡ÕòÐõ§À¡Ð ¸ÅÉ¢ì¸ §ÅñʨÅ
¨¼ÉÁ¢ì ³À¢ «ðÊ §¾¨Å. ´ù¦Å¡Õ ÅÂ÷ÄŠ þ¨½Âò
yy ¯í¸ÙìÌò §¾¨ÅÂ¡É ¸ÕÅ¢¾¡ý ¯í¸ÙìÌ ¦¸¡Îì¸ôÀðÎûǾ¡
¦¾¡¼÷¨À ¯ÕÅ¡ìÌõ §À¡Ðõ ´Õ ³À¢ «ðÊ ¸¢¨¼ìÌõ. «Ð º¢Ä
±ýÚ ¿¢îºÂôÀÎò¾¢ì¦¸¡ûÅÐ «Åº¢Âõ.
ºÁÂí¸Ç¢ø ´ù¦Å¡Õ Ó¨È þ¨½Âò ¦¾¡¼÷Ò ²üÀÎòÐõ §À¡Ðõ
yy ÅÂ÷¦ÄŠ §Á¡¼ò¨¾§Â¡ ÅÂ÷¦ÄŠ §Á¡¼õ «¼¡ô¼÷ ¸ÕÅ¢¨Â§Â¡
Á¡Úõ Ũ¸Â¢Öõ ³À¢ «ðÊ þÕìÌõ. ÁüÈ º¢Ä þ¨½ôҸǢø ³À¢
þ¨½ì¸ §ÅñÎõ. ¨¸§Âðμý þýŠ¼¡§Äºý º¢Ê§Ã¡õ þÕìÌõ.
«ðÊ Á¡È§Å Á¡È¡Ð. ³À¢ Ó¸Åâ Á¡Úõ ¾ý¨ÁÔ¼ý þÕó¾¡ø
«òмý ´Õ ®ò¾÷¦¿ð §¸À¢û ¦¸¡Îì¸ôÀðÊÕìÌõ(¯í¸Ç¢¼õ
þó¾ ¦ºðÊí¨¸ ¿£í¸û §¾÷ó¦¾ÎôÀÐ ¿øÄÐ. «ô§À¡Ð¾¡ý Ò¾¢Â
ÅÂ÷¦ÄŠ Ô±ŠÀ¢ §Á¡¼õ þÕó¾¡ø) ´Õ ÅÂ÷¦ÄŠ ¬ñ¦¼ýÉ¡
ÅÂ÷¦Ä` ¦¾¡¼÷Ò ¦¸¡Îì¸ôÀÎõ §À¡¦¾øÄ¡õ, §Á¡¼õ ¾¡É¡¸§Å
(802.11a, 802.11b, or 802.11g þý ¾Ãò¨¾ô ¦ÀüȾ¡¸
³À¢ «ðèº, ³±ŠÀ¢ º÷ÅâĢÕóÐ ±ÎòÐ즸¡ûÙõ . ÀÂɡǢ¢ý
þÕ츧ÅñÎõ); ÁüÚõ ´Õ ÀÅ÷ «¼¡ô¼÷. ¸¨¼ì¸¡Ã÷ «øÄÐ
¨¸§Âð¨¼ô À¡÷ì¸×õ. «øÄÐ §Á¡¼õ ¾Â¡Ã¢ôÀ¡Ç÷, Ž¢¸¨Ã
¾Â¡Ã¢ôÀ¡Ç¨Ãì ÜôÀ¢ðÎ ÅÂ÷¦ÄŠ §Á¡¼ò¾¢ø ²¾¡ÅÐ ¦À¡Õû
ÜôÀ¢ðΠŢÅÃí¸¨Çô ¦ÀÈ×õ.
þøÄ¡Áø þÕó¾¡ø ¦º¡øÄ×õ.
yy ¯í¸ÙìÌ `¼¡ðÊì ³À¢ ÅÆí¸ôÀðÊÕó¾¡ø “Static IP Address” ³
yy ¸ÕÅ¢ ±ôÀÊ þÂí̸¢ÈÐ ±ýÀ¨¾ ¦¾Ã¢óЦ¸¡ûÇ ¨¸§Âð¨¼ô
ÀÂýÀÎò¾×õ. . “VPI,” “VCI,” “IP Address,” “Subnet Mask,” “ISP Gateway
ÀÊì¸×õ. ¯¾¡Ã½ò¾¢üÌ, ÅÂ÷¦ÄŠ ¬ñ¼É¡¨Å,ÅÂ÷¦ÄŠ
Address,” “Server Address,” “Primary DNS Address,” “Secondary DSN
¦¿ð¦Å¡÷ì̼ý ¦À¡Õò¾ô ÀÂýÀÎò¾×õ. §Á¡¼òмý ÅÂ÷¦ÄŠ
Address” and “Connection Type.” ¬¸¢Â À£øθǢø ¿¢ÃôÀ §ÅñÎõ.
¬ñ¼É¡¨Å þ¨½ì¸×õ.
þó¾ Å¢ÅÃí¸¨Ç ¯í¸û ³±ŠÀ¢Â¢¼Á¢ÕóÐ ¦ÀüÚ즸¡ûÇÄ¡õ.
yy ®¾÷¦¿ð §¸À¢¨Ç ¯í¸û ¸½¢ô¦À¡È¢Â¢ø ±ÎòÐ §Á¡¼ò¾¢ý
yy ¯í¸ÇÐ ³±ŠÀ¢ þó¾ Ũ¸ ¦¾¡¼÷¨À ÀÂýÀÎòÐÁ¡É¡ø
§Äý/®¾÷¦¿ð §À¡÷ðμý þ¨½ì¸×õ. ¯í¸Ç¢¼õ ÅÂ÷¦ÄŠ
“PPPoE/PPPoA” ³ §¾÷ó¦¾Îì¸×õ. ʱŠ±ø ÀÂÉ¡Ç¢ì þó¾
Ô±ŠÀ¢ §Á¡¼õ þÕó¾¡ø Ô±ŠÀ¢ §¸À¢¨Ç ¸½¢ô¦À¡È¢Â¢ø ¯ûÇ
þ¨½ô¨Àô ÀÂýÀÎò¾ìÜÎõ. ¯í¸ÇÐ äº÷ §¿õ, À¡Š§Å÷Î
Ô±ŠÀ¢ §À¡÷ðμý þ¨½ì¸×õ.
ÁüÚõ À¢È Å¢ÅÃí¸¨Ç ±ñ¼÷ ¦ºöÂ×õ. þÐ ¯í¸ÇÐ ³±ŠÀ¢Â¡ø
yy ÀÅ÷ «¼¡ô¼¨Ã, §Á¡¼ò¾¢ý ÀÅ÷ ¸¦Éì¼Õ¼ý ¦À¡Õò¾×õ. ôÇì
ÅÆí¸ôÀðÊÕìÌõ.
¦ºöÐ ÍÅ¢ðî ¬ý ¦ºöÂ×õ
yy ¯í¸û ³±`À¢ þó¾ Ũ¸ þ¨½ô¨À ¨Åò¾¢Õó¾¡ø “Bridge Mode”
³ §¾÷ó¦¾Îì¸×õ. ¯í¸ÇÐ ³±ŠÀ¢Â¡ø ¾ÃôÀð¼ ¦À¡Õò¾Á¡É
ÅÂ÷¦ÄŠ §Á¡¼ò¨¾ ¦ºð«ô ¦ºöÅÐ
Å¢ÅÃí¸¨Ç ±ñ¼÷ ¦ºöÂ×õ.
yy ¦Åô ôÃ׺¨Ã ¾¢ÈóÐ, §Á¡¼Á¢ý «ðÁ¢É¢Šð§ÃÊù ¾Çò¾¢ø
yy “Finish” «øÄÐ “OK” «øÄÐ §ÅÚ ³¸¡É¢ø ¸¢Ç¢ì ¦ºöÐ
Ô¬÷±ø¨Ä ±ñ¼÷ ¦ºöÂ×õ.äº÷ §ÁÛÅÄ¢ø þøÄ¡Å¢ð¼¡ø,
¦ºÂøӨȨ â÷ò¾¢ ¦ºöÂ×õ. ¯í¸ÇÐ §Á¡¼ò¨¾ ¦ºð «ô
§Á¡¼õ ¾Â¡Ã¢ôÀ¡Ç÷ «øÄРŢüÀ¨É¡Ǩà šÊ쨸¡Ç÷
¦ºö¾¢Õì¸ §ÅñÎõ.
§º¨ÅìÌ «¨ÆòÐì §¸ð¸×õ.
yy ôÃ׺âý Ó¸Åâ Å¢ñ§¼¡Å¢ø ²¾¡ÅÐ Ô¬÷±ø Ó¸Åâ¨Â þðÎ,
yy «ðÁ¢É¢Šð§ÃÊù ¾Çò¾¢ø Ä¡ì ¬ý ¦ºöÐ, äº÷ §¿õ ÁüÚõ
þ¨½Âò ¦¾¡¼÷Ò ¸¢¨¼ì¸¢È¾¡ ±ýÚ À¡÷ì¸×õ.
À¡`§Å÷¨¼ ±ñ¼÷ ¦ºöÐ äº÷ §ÁÛÅÄ¢ø ¦¸¡Îì¸ôÀð¼Ð §À¡Ä
¦ºöÂ×õ. ¯í¸Ç¡ø ¸ñ¼È¢Â ÓÊ¡Ţð¼¡ø §Á¡¼õ ¾Â¡Ã¢ôÀ¡Ç÷
«øÄРŢüÀ¨É¡Ǩà šÊ쨸¡Ç÷ §º¨ÅìÌ «¨ÆòÐì
§¸ð¸×õ. ¦À¡ÐÅ¡¸ username ÁüÚõ password, “Admin” ¬¸
þÕìÌõ.
yy þ¨½Âò ¦¾¡¼÷Ò Å¨¸¨Â ӾĢø §¾÷ó¦¾Îì¸×õ. ¿¡ýÌ
Ũ¸Â¡É þ¨½Âò ¦¾¡¼÷Ò¸û ¯ûÇÉ: ¨¼ÉÁ¢ì ³À¢ «ðÊ,
Š¼¡ðÊì ³À¢ «ðÊ, À¢À¢À¢µþ/À¢À¢À¢µ² ÁüÚõ À¢Ã¢ðˆ §Á¡ð

44
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

45
USB Storage Device Security
USB (Universal Serial Bus) storage devices are very convenient to transfer data between different computers. You can plug it into
a USB port, copy your data, remove it and be on your way. Unfortunately this portability, convenience and popularity also brings
different threats to your information.
Data thefts and Data leakage are everyday news now! All these can be controlled or minimized with care, awareness and by using
appropriate tools to secure the information. The tips and recommendations provided in this document helps you to keep your in-
formation secure while using USB storage devices.
Threats What to do when you lose the Device?
• Malware Infection • If you have stored any personal or sensitive information inside
¾¾ Malware Spreads through USB storage devices. Somebody the USB drive like passwords etc, imediately change all passwords
may intentionally sell USB storage devices with malware to along with security questions and answers provided during any
track your activities, files, systems and networks. account creation [There may be chances that hacker can retrieve
¾¾ Malware may spread from one device to another device your online account logon information by using data in the stolen
through USB Storage Devices using autorun.exe, which is by drive].
default enabled. • Also ensure that all security measures have been taken against the
• Unauthorized Usage data lost.
¾¾ Somebody may steal your USB Devices for Data.

How to stop Data Leakage via USB storage ?


• Design and adopt a good security policy to limit the usage of USB
Baiting
Storage devices. Somebody
• Monitor the employees what they are copying.
• Implement Authentication, Authorization and Accounting to se-
intentionally
cure your information. leave USB devices at
How to stop Device theft ?
your Desk or Place
• Always secure the drive physically by tagging it to a key chain. with Malware
• Never leave your drive unattended anywhere.
• Never keep sensitive information with-out encryption .

46
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Types of devices which support USB Mobile as USB


• Card readers • The mobile phones can be used as USB memory devices when
• Mobile phones connected to computer. A USB cable is provided with the mobile
• PDAs phone to connect to computer.
• Digital cameras
• Digital audio players Do’s:
• Portable Media Players • When a mobile phone is connected to a personal computer, scan
• Portable flash memory devices the external phone memory and memory card using an updated
antivirus.
Guidelines in the usage of USB devices • Take regular backup of your phone and external memory card be-
• Do’s cause if an event like a system crash or malware penetration oc-
• Always do low format for first time usage. curs, at least your data is safe.
• Always delete the drive securely to clear the contents. • Before transferring the data to Mobile from computer, the data
• Always scan USB disk with latest Antivirus before accessing. should be scanned with latest Antivirus with all updates.
• Protect your USB device with a password. • Remember to remove the USB connection from your computer be-
• Encrypt the files / folders on the device. fore you walk away.
• Use USB security products to access or copy data in your USB.
• Always protect your documents with strong password. Don’ts:
For Small Business or Enterprises • Never forward the virus affected data to other Mobiles.
• Monitor what data is being copied.
• Block the unauthorized USB from connecting. The Conficker worm spreads via removable devices and drives such as mem-
• Pick the device with features and correct level of encryption to ory sticks, MP3 players and Digital Cameras.
meet compliance requirements and organization needs. Also 30 percent of new worms have been specifically designed to spread through
• Educate employees on acceptable and inacceptable use of USB USB storage devices connected to computers.
flash drives.   The Stuxnet worm was one of the year’s high-profile threats that spread
• Document policies so that users know who is authorized and what through USB drives.
they are authorized to do.
¦ÁÁâ ŠÊì̸û(Memory Stick), ±õÀ¢3ô§ÇÂ÷¸û ÁüÚõ
ʃ¢ð¼ø ¸¡Á¢Ã¡ì¸û §À¡ýÈ ¸ÕÅ¢¸û š¢ġ¸ ¸¡ýÀ¢ì¸÷
Don’ts Å¡÷õ ¨ÅÊ ÀÃ׸¢ÈÐ
• Do not accept any promotional USB device from unknown mem- ¸½¢ô¦À¡È¢¸Ç¢ø ¦À¡Õò¾ôÀÎõ Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸û
bers. š¢ġ¸ ÀÃôÒžü¸¡¸§Å 30 º¾Å¢¸¢¾õ ¨Åʸû À¢Ãò§Â¸Á¡¸
• Never keep sensitive information like username/passwords on ÅÊŨÁì¸ôÀðÎûÇÉ
USB disk. Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸û š¢ġ¸ ÀÃôÀôÀð¼ Š¼ìŠ¦¿ð Å¡÷õ
¨Åʾ¡ý þó¾ ¬ñÊø «¾¢¸ À¡¾¢ô¨À ²üÀÎò¾¢Â
¨ÅʸǢø ´ýÈ¡Ìõ

47
Ô±ŠÀ¢ §º¸Ãì ¸ÕŢ¢ý À¡Ð¸¡ôÒ
Ô±ŠÀ¢ (ÔÉ¢Å÷ºø º£Ã¢Âø ÀŠ) §º¸Ãì¸ÕÅ¢¸û(USB Storage), ¦Åù§ÅÚ ¸½¢ô¦À¡È¢¸Ù츢¨¼§Â ¾¸Åø,
Å¢ÅÃí¸¨Ç ÀâÁ¡üÚžüÌ ¯¸ó¾ ¯À¸Ã½í¸Ç¡¸ ¯ûÇÉ. Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢¨Â, ¸½¢ô¦À¡È¢Â¢ø
¯ûÇ Ô±ŠÀ¢ §À¡÷ðÊø ¦ºÕ¸¢ ¯í¸û Å¢ÅÃí¸¨Ç ¿¸ø ¦ºöЦ¸¡ûÇÄ¡õ. «¾üÌô À¢ÈÌ Ô±ŠÀ¢
§º¸Ãì ¸ÕÅ¢¨Â ¯ÕÅ¢ ±ÎòÐÅ¢¼Ä¡õ. Ðþ¢÷‰¼ÅºÁ¡¸ þó¾ì ¸ÕŢ¢ý ±Ç¢¨ÁÂ¡É ¨¸Â¡Ù¾Öõ,
¦ºª¸Ã¢ÂÓõ, À¢ÃÀÄÓõ ¯í¸ÇÐ ¾¸Åø¸ÙìÌ «îÍÚò¾Ä¡¸×õ þÕ츢ýÈÐ.

¾¸Åø ¾¢ÕðθÙõ, ¾¸Åø¸û ¦ÅÇ¢§Â ¸º¢ÅÐõ «ýÈ¡¼ ¿¢¸ú׸ǡ¸ þýÚ Á¡È¢Å¢ð¼É! §À¡¾¢Â
¸ÅÉõ ÁüÚõ ŢƢôÒ½÷Լý, ºÃ¢Â¡É ¸ÕÅ¢¸¨ÇÔõ ÀÂýÀÎò¾¢É¡ø þôÀ¢Ãî¨É¸¨Çì
¸ðÎôÀÎò¾¢ ¾¸Åø¸¨ÇÔõ À¡Ð¸¡ì¸ ÓÊÔõ. Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸¨Çô (USB Storage)
ÀÂýÀÎò¾¢ ¯í¸û ¾¸Åø¸¨Çô À¡Ð¸¡ìÌõ ÊôŠ¸û ÁüÚõ ÀâóШøû þó¾ ¼¡ì̦ÁñÊø
¦¸¡Îì¸ôÀðÎûÇÉ
«îÍÚò¾ø¸û ¯í¸û ¸ÕÅ¢ ¦¾¡¨ÄóÐ §À¡É¡ø ±ýÉ ¦ºöÅÐ ?
yy Á¡ø§Å÷ ±ýÛõ ¨ÅÊ ¦¾¡üÚ yy ¯í¸û Ô±ŠÀ¢ §º¸Ãì¸ÕŢ¢ø (Storage Device) ¾É¢ôÀð¼,
¾¾ Á¡ø§Å÷ ±ÉôÀÎõ ¨ÅÊ, Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸û (USB Ó츢ÂÁ¡É ¾¸Åø¸Ç¡É À¡Š§Å÷θû §À¡ýÈÅü¨È
Storage) š¢ġ¸ô ÀÃ׸¢ÈÐ. ¨ÅÊ ¦ºÖò¾ôÀð¼ ¿£ í ¸û ¨Åò¾¢Õó¾¡ø, ¯¼ÉÊ¡¸ «ì¸×ñð ¾¢ÈôÀ¢ý§À¡Ð
Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸¨Ç §ÅñΦÁý§È º¢Ä÷ Å¢ü¸Ä¡õ. ÀÂýÀÎò¾¢Â À¡Ð¸¡ôÒì¸¡É §¸ûÅ¢, À¾¢ø¸¨Çô ÀÂýÀÎò¾¢
þ¾ýãÄõ ¯í¸ÇÐ ¦ºÂøÀ¡Î¸û, §¸¡ôÒ¸û, ¸½¢ô¦À¡È¢ «¨ÉòÐ À¡Š§Å÷θ¨ÇÔõ Á¡üȢŢÎí¸û. (†¡ì¸÷¸Ç¡ø
ÁüÚõ ÁüÚõ ŨÄôÀ¢ýÉø¸¨Ç «È¢óЦ¸¡ûÇ ÓÊÔõ (Hackers) ¯í¸ÇÐ þ¨½ÂÅÆ¢ Åí¸¢ì ¸½ì¸¢üÌû ¯û§Ç
¾¾ Á¡ø§Å÷ ±ýÛõ ¨ÅÊ, ´Õ ¸ÕŢ¢ĢÕóÐ þý¦É¡Õ Ò¸ ÓÊÂÄ¡õ)
¸ÕÅ¢ìÌ Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸û ãÄõ autorun.exe ¨Âô yy ¦¾¡¨ÄóÐ §À¡É ¾¸Åø¸Ç¢ý À¢ýɽ¢Â¢ø «¨ÉòÐô
ÀÂýÀÎò¾¢ ѨƸ¢ÈÐ. þÐ ¦À¡Õò¾ôÀð¼×¼ý ¾¡É¡¸§Å À¡Ð¸¡ôÒ ²üÀ¡Î¸¨ÇÔõ ¦ºö¾¡¸¢Å¢ð¼¾¡ ±ýÚ
¦ºÂøÀ¼ò¦¾¡¼í¸¢Å¢ÎÁ¡Ú ¦ºÂøÀθ¢ÈÐ ¯Ú¾¢ôÀÎò¾¢ì ¦¸¡ûÙí¸û.
yy Ó¨ÈÂüÈ ÀÂýÀ¡Î
¾¾ ¾¸Åø Å¢ÅÃí¸Ù측¸ ¡áÅÐ ¯í¸ÇÐ Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢ ¾¢ÕΧÀ¡¸¡Áø ±ôÀÊ ¾ÎôÀÐ ?
¸ÕÅ¢¨Âò ¾¢ÕÊ Å¢¼ìÜÎõ. yy ¸£¦ºÂ¢Û¼ý ±ô§À¡Ðõ Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¨Â(Storage Device)
À¢¨½òÐ ¨ÅòÐ즸¡ûÙí¸û
Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢ ÅƢ¡¸ò ¾¸Åø ¸º¢Å¨¾ ±ôÀÊ ¿¢ÚòÐÅÐ ? yy ¦ºøÖõ þ¼õ ±íÌõ Å¢ðÎøÄ¡¾£÷¸û
yy Ô±`À¢ §º¸Ãì¸ÕÅ¢¸Ç¢ý (USB Storage) ÀÂýÀ¡ð¨¼ ŨÃÂÚòÐì yy Ó츢ÂÁ¡É ¾¸Åø¸¨Ç ºí§¸¾î ¦º¡ü¸Ç¡ø §ºÁ¢òÐ
¦¸¡ûÅÐõ À¡Ð¸¡ôÒ즸¡û¨¸¨Â ¯ÕÅ¡ìÌÅÐõ «Åº¢Âõ. ¨Åì¸×õ.
yy °Æ¢Â÷¸û ±ó¾ Å¢ÅÃí¸¨Ç ¿¸ø ±Î츢ȡ÷¸û ±ýÀ¨¾ì
¸ñ¸¡½¢ì¸×õ. ¦À¡È¢ ¨Åò¾ø (Baiting)
yy ¯í¸û ¾¸Åø¸¨Çô À¡Ð¸¡ì¸î ºÃ¢Â¡É ´ØíÌӨȸû, Ô±ŠÀ¢ ¸ÕÅ¢¸¨Ç ¯í¸ÇÐ §Á¨ƒÂ¢§Ä¡, ¸½¢ô¦À¡È¢ìÌ «Õ¸¢§Ä¡
¸½ì¸£Î¸û, Å¢¾¢¸¨Ç ²üÀÎò¾×õ. §ÅñΦÁý§È ¨ÅÃ…¤¼ý ¨ÅòÐÅ¢ðÎî ¦ºýÚÅ¢¼Ä¡õ

48
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Ô±ŠÀ¢ §º¸ÃòÐìÌ ¯¾×õ ¸ÕÅ¢¸û Flash Drive) ÀÂýÀÎò¾ì ܼ¡Ð ±ýÚ °Æ¢Â÷¸ÙìÌ
yy ¸¡÷Πã¼÷¸û (Card Reader) ¦º¡øÄ¢ò¾Ã×õ
yy ¦Á¡¨Àø §À¡ý¸û (Mobile Phone) yy ¡÷ ¬Å½í¸¨ÇÔõ, Å¢ÅÃí¸¨ÇÔõ À¡÷òÐ ¸¡ôÀ¢
yy À¢Ê²ì¸û (PDAs) ¦ºöÂÄ¡õ, ¡÷ ¦ºöÂì ܼ¡Ð ±ýÈ ¦¸¡û¨¸¸¨Ç
yy ʃ¢ð¼ø ¸¡Á¢Ã¡ì¸û (Digital Cameras)
¯ÕÅ¡ìÌÅÐ «Åº¢Âõ.
yy ʃ¢ð¼ø ¬Ê§Â¡ ô§ÇÂ÷¸û (Digital Audio Players)
yy §À¡÷ð¼À¢û Á£Ê¡ ô§ÇÂ÷¸û (Portable Media Players)
yy §À¡÷ð¼À¢û ôÇ¡Š ¦ÁÁâ ʨŊ¸û (Portable plus Memory ¦ºöÂì ܼ¡¾¨Å
Devices) yy Å¢ÇõÀÃò¾¢ü¸¡É Ô±ŠÀ¢ ¸ÕÅ¢¸¨Çò ¦¾Ã¢Â¡¾ ¿À÷¸Ç¢¼Á¢ÕóÐ
Å¡í¸ §Åñ¼¡õ.
yy Ó츢ÂÁ¡É ¾¸Åø¸Ç¡É äº÷ §¿õ ÁüÚõ À¡Š§Å÷ð
Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸¨Çô (Storage Devices)
Å¢ÅÃí¸¨Ç Ô±ŠÀ¢ ¸ÕŢ¢ø ¨Åì¸ §Åñ¼¡õ. Ô±ŠÀ¢
ÀÂýÀÎòОü¸¡É ÅÆ¢¸¡ðÎõ ÌÈ¢ôÒ¸û ¸ÕŢ¡¸ ¦Á¡¨À¨Äô ÀÂýÀÎò¾ §Åñ¼¡õ
¦ºö §ÅñʨŠyy Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢¸Ç¡¸ ¦Á¡¨Àø §À¡ý¸¨ÇÔõ
yy Ó¾øÓ¨È ÀÂýÀÎòÐõ§À¡Ð §Ä¡À¡÷ÁðÊø ÀÂýÀÎòÐí¸û. ¸½¢ô¦À¡È¢Â¢ø ¦À¡Õò¾¢ô ÀÂýÀÎò¾ ÓÊÔõ. ¸½¢ô¦À¡È¢Ô¼ý
yy ð¨ÃÅ¢ø ¯ûÇ Å¢_Âí¸¨Ç Ó¾Ä¢§Ä§Â «Æ¢òÐÅ¢ÎÅÐ þ¨½ì¸ Ô±ŠÀ¢ §¸À¢û ´ýÚ ¾ÃôÀÎõ
À¡Ð¸¡ôÀ¡ÉÐ
yy Ô±ŠÀ¢ (USB) ¸ÕÅ¢¨Â ºÁ£Àò¾¢Â ¬ñʨÅèºô ÀÂýÀÎò¾¢ ¦ºö §ÅñʨÅ
Š§¸ý ¦ºöÐÅ¢¼×õ yy ¸½¢ô¦À¡È¢Ô¼ý ¦Á¡¨Àø §À¡¨Éô ¦À¡Õò¾¢Â×¼ý ¦Á¡¨Àø
yy ¯í¸ÇÐ Ô±ŠÀ¢ (USB) ¸ÕÅ¢¨Â À¡Š§Å÷ð ´ýÈ¢ý ãÄõ §À¡ý §º¸Ãò¾¢ø ¯ûÇ Å¢ÅÃí¸¨Ç ºÁ£Àò¾¢Â ¬ñʨÅÊ
À¡Ð¸¡ì¸×õ ãÄõ Š§¸ý ¦ºöÂ×õ
yy ¸ÕŢ¢ø ¯ûÇ §¸¡ôÒ¸û ÁüÚõ •§À¡ø¼÷¸ÙìÌ ºí§¸¾î yy ¯í¸ÇÐ §À¡ý ÁüÚõ ¦ÁÁâ ¸¡÷ÊÄ¢ÕóÐ «ùÅô§À¡Ð
¦º¡ü¸¨Ç þ¼×õ ¾¸Åø¸¨Ç ¿¸ø ¦ºöÐ §º¸Ã¢òÐ즸¡ûÇ×õ. Á¡ø§Å÷
yy ¯í¸ÇÐ Ô±ŠÀ¢Â¢Ä¢ÕóÐ (USB) Å¢ÅÃí¸¨Çô À¡÷ôÀ¾üÌõ ¨ÅÊ °ÎÕÅø ²üÀð¼¡Öõ ¯í¸û ¾¸Åø¸û À¡Ð¸¡ôÒ¼ý
¿¸ø ¦ºöžüÌõ À¡Ð¸¡ôÒô ¦À¡Õð¸¨Çô ÀÂýÀÎò¾×õ þÕìÌõ.
yy ¡Õõ ±Ç¢¾¢ø °¸¢ì¸ ÓÊ¡¾ ¦Àâ À¡`§Å÷¨¼ ¯í¸û yy ¸½¢ô¦À¡È¢Â¢Ä¢ÕóÐ ¦Á¡¨ÀÖìÌò ¾¸Åø Å¢ÅÃí¸¨Ç
¬Å½í¸û À¡Ð¸¡ôÀ¢ü¸¡¸ ±ô§À¡Ðõ ÀÂýÀÎòÐÅÐ ¿øÄÐ Á¡üÚžüÌ ÓýÒ «ó¾ Å¢ÅÃí¸¨Ç ºÁ£Àò¾¢Â ¬ñÊ ¨ÅÃ`
º¢È¢Â ¿¢ÚÅÉí¸û ÁüÚõ Å÷ò¾¸õ ¦ºöÀÅÕìÌ ãÄõ Š§¸ý ¦ºöЦ¸¡ûÇ×õ.
yy ±ý¦ÉýÉ Å¢ÅÃí¸û ¸¡ôÀ¢ ¦ºöÂôÀθ¢ýÈÉ ±ýÀ¨¾ì yy ¿£í¸û ¸½¢ô¦À¡È¢Â¢ø §Å¨Ä¨Â ÓÊòÐÅ¢ðÎî ¦ºøÖõ§À¡Ð
¸ñ¸¡½¢ì¸×õ Ô±ŠÀ¢ ¸ÕÅ¢¨Â «¸üÈ¢ ±ÎòÐî ¦ºøÅÐ «Åº¢Âõ.
yy ¦ÅǢ¢ĢÕóÐ ¦¸¡ñÎÅÃôÀÎõ Ô±ŠÀ¢¨Âò ¾ÎìÌõ
²üÀ¡Î¸¨Çî ¦ºöЦ¸¡ûÇ×õ ¦ºöÂì ܼ¡¾¨Å:
yy ºÃ¢Â¡É «ÇÅ¢ø ºí§¸¾î ¦º¡ü¸¨Çô ÀÂýÀÎòОüÌ, yy ÁüÈ ¦Á¡¨Àø ¸ÕÅ¢¸ÙìÌ ¨Åú¡ø À¡¾¢ì¸ôÀð¼ ¾¸Åø¸¨Ç
ÜÎ¾Ä¡É Åº¾¢¸û ¦¸¡ñ¼ ¸ÕÅ¢¨Â§Â §¾÷ó¦¾Îì¸×õ. •À¡÷§Å÷𠦺ö§Åñ¼¡õ
yy §¾¨Å¢øÄ¡Áø Ô±ŠÀ¢ À¢Ç¡‰ ð¨Ãù¸¨Çô (USB

49
Broadband Internet Security
DD Broadband refers to high-speed network connection

DD Traditional Internet services are accessed in “dial-on-
demand” mode, whereas broadband Internet is an “always-
on” connection, therefore security risk is very high

DD Without our knowledge, computer can be compro¬mised


and it can also be used as a launching pad for carrying out
disrupting activities on other computers

DD Since broadband Internet is widely used, it is very important


for every citizen to securely configure it for safe usage

Broadband Security Threats : yy Satellite


yy As broadband Internet connection is “Always On” , it leads to yy Broadband over Powerlines (BPL)
intentional misuse through yy Terminal Adapter Modem
¾¾ Trojans and backdoors yy Universal Serial Bus (USB)
¾¾ Denial of Service
¾¾ Intermediary for another attack
¾¾ Hidden file extensions
¾¾ Chat clients
Anti-socialism groups use unsecured
¾¾ Packet sniffing Wi-Fi networks to send terror e-mails
yy Default configurations are extremely vulnerable

Types of Broadband Modem : Prevent your wireless network to
yy Wireless Fidelity (Wi-Fi) become such a hot spot by securing it
yy Digital Subscriber Line (DSL)
¾¾ Asynchronous Digital Subscriber Line (ADSL)
¾¾ Very high speed Digital Subscriber Line (VDSL)
yy Cable Modem
50
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

Broadband Modem Setup : Guidelines for Securing Broadband Internet Access :


yy Always read the manufacturer’s manual care¬fully and follow the Do’s
guidelines, while setting up broadband modem. yy Always download broadband drivers from th le¬gitimate websites
yy Insert the power source into the modem and then plug the other recommended by the manu¬facturer.
end of it into the wall socket. yy Regularly download the firmware (driver code)
yy Before connecting the modem to the computer, check for proper yy Always use the power adapter supplied by the manufacturer along
functioning of the computer. with the modem.
yy While setting up the modem, follow instructions specific to the yy In case of terminal adapter modem make sure that filter is enabled
type & model of the modem. for broadband lines. To filter unnecessary noise generated during
yy In case of signal via cable, connect the modem with the cable wire the transmission.
provided. yy Change Default Administrator ( Passwords and User names) :
yy In case of ethernet, connect the modem to the ethernet port of the In order to allow only authorized access to the equipment, change
computer. the default adminstrator or admin password of broadband router
yy In case of USB connection, connect the modem after the computer modem, as these details are given by the manufacturer which are
is properly initialised. common to all modems and can be misused by anyone.
yy Wait until the indicators on the modem are lit. yy Assign Static IP Addresses to Devices:
yy Install the modem driver and associated soft¬ware provided along Most of the home users are allotted dynamic IP addresses, as DHCP
with the modem. technology is easy to setup. This may even helps the attackers who
yy To initialize the connectivity the proper user cre¬dentials need to can easily obtain valid address from DHCP pool. Therefore turn off
be given and response should be awaited before use. DHCP option in router or access point and use fixed IP address
range.
yy Enable MAC Address Filtering:
Every device is provided with an unique MAC address. Broadband
Points to be remembered
access points and router & provide an option for the user to
The setup, configuration and the features
combine the MAC addresse of the home equipment for access.
may vary from model to model.
This facilitates to allow connections only from those devices.
yy Enable Wireless Security:
For more information please refer manufacturer’s manual.
Modem routers support wireless security.User can select any one
protocol and a protection key. The same wireless security protocol
Many home computers are victims
and protection key has to be enabled in computer.
of cyber criminals
yy Turn on (Compatible) WPA / WEP Encryption:
All Wi-Fi enabled modems/router support some form of
Prevent your computer from becoming
encryption technology, which has to be enabled.
a victim by securing it
yy Change the Default SSID (Service Set Identifier):
All the access points and routers use a network name called SSID.
51
Manfacturer normally ships their products with the same SSID access public hotspots. For a home user this feature is unnecessary
set. As it can be misused by the attacker to break into the net and can be an entry point to break into the network.
work / computer, it is neccesary to change the default SSID while yy Do not Enable Auto-Connect to Open Wi-Fi Networks:
configuring wireless security. In case if Auto-Connect setting is enabled, computer with Wi-Fi
yy Use effective end point security solution (with anti virus, anti interface can connect automatically without notifying to the user.
spyware, desktop firewall etc) to protect computer/ laptop from This may expose our computer to security risks.This setting should
broadband Internet security threats. not be enabled except in specific cases.
yy Enable Firewall on Modem Router as well as Computer: yy Do not leave broadband connectivity open when it is not utilized.
Broadband modem routers contain built-in firewall feature, but this yy Never connect to unkown or untrusted network in case of Wi-Fi.
option has to be enabled. Computer connected to the broddband
modem also needs to be protected with desktop firewall.
yy Turn off Modems during extended periods of Non-Use:
Shutting down a network will certainly prevent outside
unauthorized people breaking into the network. Since it is
very difficult to frequently turn on and off the devices, it can be
considered during travel or extended offline period.
yy In case of USB broadband modem, disconnect and remove the
device after usage.
yy Install broadband Internet bandwidth usage monitoring tool.
yy Enable SSH (secure channel) for remote administration.

Dont’s:
yy Don’t enable the option for remote administration (via Internet),
as it is not required for a home user.
yy Don’t enable the option “Restore Factory Default Setting” in
broadband modem.
yy Don’t use connection without a filter for each broadband Internet
line.
yy Don’t tap the line before the splitter (a small dvice that separates
phone line from data / PC port).
yy Don’t use USB broadband modem with insecure computer/laptop.
yy Do not Enable SSID Broadcast:
In Wi-Fi networking, wireless access point or router typically
broadcasts the network name (SSID) over the air at regular
intervals.This feature was designed for businesses as well as to

52
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

53
ôáð§Àñð þý¼÷¦¿ð À¡Ð¸¡ôÒ
DD«¾¢§Å¸ ¦¿ð¦Å¡÷ì ¦¾¡¼÷Ò¾¡ý ôáð§Àñð ±ýÚ
«¨Æì¸ôÀθ¢ÈÐ.

DDÁÃÒÅÆ¢ þ¨½Â §º¨Å¸û ¼Âø ¬ý ÊÁ¡ñð (Dial-on-Demand)


ӨȢø ¸¢¨¼ò¾É. þó¾ ӨȢø þ¨½Âõ ±ô§À¡Ðõ
¬ý ¬¸ þÕìÌõ. «¾É¡ø À¡Ð¸¡ôÒ º¢ì¸ø¸û ²üÀÎõ
Å¡öôÒ¸û «¾¢¸õ ¯ñÎ.

DD¿ÁìÌò ¦¾Ã¢Â¡Á§Ä§Â À¢È ¸½¢ô¦À¡È¢¸Ç¢ý ¦ºÂøÀ¡Î¸¨Çò


¦¾¡ó¾Ã× ¦ºöžü¸¡É §Á¨¼Â¡¸ ¿ÁÐ ¸½¢ô¦À¡È¢¨Â §ÅÚ
¿À÷¸û ÀÂýÀÎòÐõ Å¡öôÒ ¯ñÎ.

DDôáð§Àñð þ¨½Âź¾¢§Â ÀÃÅÄ¡¸ô ÀÂýÀÎò¾ôÀΞ¡ø,


´ù¦Å¡Õ ÌÊÁ¸Ûõ «¨¾ À¡Ð¸¡ôÀ¡¸ ÅÊŨÁòÐ
À¡Ð¸¡ôÀ¡É ÀÂýÀ¡ðÎìÌ «¨ÁòÐì ¦¸¡û¾ø §ÅñÎõ.

ôáð§Àñð À¡Ð¸¡ôÒ «îÍÚò¾ø¸û: yy ʃ¢ð¼ø ºŠ¸¢¨ÃÀ÷ ¨Äý (DSL)


yy ôáð§Àñð þ¨½ôÒ ±ô§À¡Ð ¬ý þø þÕôÀ¾¡ø ¾¾ «º¢í§Ã¡ÉŠ ʃ¢ð¼ø ºŠì¨ÃÀ÷ ¨Äý (ADSL)
Өȧ¸ÎìÌ Â¡Ã¡ÅÐ ÀÂýÀÎò¾Ä¡õ ¾¾ ¦Åâ ¨† ŠÀ£ð ʃ¢ð¼ø ºŠì¨ÃÀ÷ ¨Äý (VDSL)
¾¾ ð§Ã¡ƒý¸û ÁüÚõ §À짼¡÷¸û yy §¸À¢û §Á¡¼õ
¾¾ §º¨Å ÁÚôÒ (Denial of Service) yy §ºðʨÄð
¾¾ §Å¦È¡Õ ¾¡ì̾¨Ä ¿¼òОü¸¡É þ¼Á¡¸ô yy ôáð§Àñð µÅ÷ ÀÅ÷¨ÄýŠ (BoPL) ¦¼÷Á¢Éø «¼¡ô¼÷
ÀÂýÀÎòоø §Á¡¼õ
¾¾ Á¨È¿¢¨Äì §¸¡ôÒ ±ìŠ¼ýºý¸û yy ÔÉ¢Å÷ºø º£Ã¢Âø ÀŠ (Ô±ŠÀ¢)
¾¾ §ºð ì¨ÇÂýð (Chat Client)
¾¾ §Àì¸ð ŠÉ¢•À¢í (Packet Sniffing) À¡Ð¸¡ôÀüÈ ¨Å·¨À ¦¿ð¦Å¡÷ì̸¨Çò ¾£Å¢ÃÅ¡¾
yy þÂü¨¸ ¿¢¨Ä «¨ÁôÒ¸û Üξġ¸ À¡¾¢ôÒìÌ ¯ûÇ¡Ìõ þ¦Áöø¸¨Ç «ÛôÀ ºð¼Å¢§Ã¡¾ì ÌØì¸û ÀÂýÀÎòи¢ýÈÉ
Å¡öôÒûǨÅ
«ôÀÊÂ¡É þ¼Á¡¸ ¯í¸ÇÐ ÅÂ÷¦ÄŠ ¦¿ð¦Å¡÷ì
ôáð§Àñð §Á¡¼ò¾¢ý Ũ¸¸û : ¬¸¢Å¢¼¡Áø ¾ü¸¡òÐì ¦¸¡ûÙí¸û
yy ÅÂ÷¦ÄŠ ·À¢¼Ä¢ðÊ (¨Å-·¨À)

54
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA

ôáð§Àñð §Á¡¼õ ¦ºð«ô: ôáð§Àñð þ¨½Â ź¾¢¨Âô ¦ÀÚžü¸¡É


ÅƢӨȸû
yy ¾Â¡Ã¢ôÀ¡Çâý ¨¸§Â𨼠±ô§À¡Ðõ ¸ÅÉÁ¡¸ô ÀÊòÐ ¦ºö §ÅñʨÅ
ôáð§Àñð §Á¡¼ò¨¾ ¦ºðÊí ¦ºöÂ×õ. yy ¾Â¡Ã¢ôÀ¡Ç÷ «í¸£¸Ã¢ò¾ ŨÄò¾Çí¸Ç¢Ä¢Õó§¾ ôáð§Àñð
yy §Á¡¼òмý Á¢ýº¡Ã þ¨½ô¨À þ¨½ì¸×õ. À¢ýÉ÷ ð¨ÃÅ÷¸¨Ç ¼×ý§Ä¡Î ¦ºöÂ×õ
þý¦É¡Õ Өɨ ÍÅüÈ¢ø ¯ûÇ ôÇì À¡Â¢ñÊø ¦ºÕ¸×õ. yy ð¨ÃÅ÷ §¸¡¨¼ «Êì¸Ê ¼×ý§Ä¡Î ¦ºöÂ×õ
yy ¸½¢ô¦À¡È¢Ô¼ý §Á¡¼ò¨¾ ¦À¡ÕòОüÌ ÓýÒ, ¸½¢ô¦À¡È¢ yy §Á¡¼òмý ¾Â¡Ã¢ôÀ¡Ç÷ ¦¸¡Îò¾ ÀÅ÷ «¼¡ô¼¨Ã§Â
ºÃ¢Â¡¸ þÂí̸¢È¾¡ ±ýÀ¨¾ô ºÃ¢À¡÷ì¸×õ. ±ô§À¡Ðõ ÀÂýÀÎò¾×õ.
yy §Á¡¼ò¨¾ «¨ÁìÌõ §À¡Ð, §Á¡¼ò¾¢ý Ũ¸ ÁüÚõ yy ¦¼÷Á¢Éø «¼¡ô¼÷ ±É¢ø ôáð§Àñð þ¨½ôÀ¢ø ·À¢ø¼÷
Á¡¾¢Ã¢Ì¸ ²üÀ ÅÆ¢¸¡ðξø¸¨Çô À¢ýÀüÈ×õ. ¯ûǾ¡ ±ýÚ ¿¢îºÂôÀÎò¾¢ì ¦¸¡ûÇ×õ. þó¾ ·À¢ø¼÷,
yy §¸À¢û ÅƢ¡¸ º¢ìÉø ÅÕÁ¡É¡ø, ¦¸¡Îì¸ôÀð¼ §¸À¢û §¼ð¼¡ ÀÃÅÄ¢ý §À¡Ð ²üÀÎõ ´Ä¢¨Âì ̨ÈìÌõ.
Å¨à ¨ÅòÐ §Á¡¼ò¨¾ô ¦À¡Õò¾×õ. yy ËÀ¡øð «ðÁ¢É¢Šð§Ãð¼¨Ã Á¡üÈ×õ (À¡Š§Å÷θû ÁüÚõ
yy ®¾÷¦¿ð ±É¢ø, §Á¡¼ò¨¾ ¸½¢ô¦À¡È¢Â¢ý ®¾÷¦¿ð §À¡ðμý äº÷ §¿õ¸û):
¦À¡Õò¾×õ. þ¨½Âź¾¢¨Â ¯Ã¢ÂÅ÷ ÁðΧÁ ÀÂýÀÎòÐõ Ũ¸Â¢ø
yy Ô±ŠÀ þ¨½ô¨Àô ¦À¡Õò¾Å¨Ã¢ø ¸½¢ô¦À¡È¢¨Â ºÃ¢Â¡¸ ËÀ¡øð «ðÁ¢É¢Šð§Ãð¼¨Ã§Â¡ «ðÁ¢ý À¡Š§Å÷¨¼§Â¡
«¨Áò¾À¢ÈÌ §Á¡¼ò¨¾ô ¦À¡Õò¾×õ. Á¡üÈ×õ. ¾Â¡Ã¢ôÀ¡Ç÷ þЦ¾¡¼÷À¡É Å¢ÅÃí¸¨Ç «Ç¢ò¾¢Õì¸
yy §Á¡¼ò¾¢ø ¯ûÇ Å¢Çì̸û ±Ã¢Ôõ ŨÃì ¸¡ò¾¢Õì¸×õ. §ÅñÎõ. ¦À¡ÐÅ¡¸ «¨ÉòÐ §Á¡¼í¸ÙìÌõ þó¾ ÌÈ¢ôÒ¸û
yy §Á¡¼õ ʨÃŨà þýŠ¼¡ø ¦ºöÐ, «Ð ¦¾¡¼÷À¡É ¦À¡Ð ±ýÀ¾¡ø ¡Õõ Өȧ¸¼¡¸ô ÀÂýÀÎò¾ Å¡öôÒñÎ.
º¡ôð§Å¨ÃÔõ §Á¡¼òмý þýŠ¼¡ø ¦ºöÂ×õ. yy ¿¢¨ÄÂ¡É ³À¢ Ó¸Åâ¸¨Ç ¸ÕÅ¢¸ÙìÌò ¾Ã×õ:
yy ÀÂýÀÎòОüÌ ÓýÒ þ¨½ô¨À ²üÀÎОüÌ ¿õÀ¸Á¡É ¦ÀÕõÀ¡Ä¡É ţθǢø ¸½¢ô¦À¡È¢ ÀÂýÀÎòÐÀÅ÷¸ÙìÌ
¾¸Åø¸¨Çì ¦¸¡Îì¸ §ÅñÎõ. ´ù¦Å¡Õ Ó¨ÈÔõ Á¡Úõ ¨¼ÉÁ¢ì «ðçº ¾ÃôÀÎõ.
²¦ÉÉ¢ø ʱÀ¢ ¦¾¡Æ¢øÑðÀõ ¾¡ý ¦ºð«ô ¦ºöžüÌ
±Ç¢¨Á¡ÉÐ. ʱÀ¢ ¾Çò¾¢Ä¢ÕóÐ ¯Ã¢Â Ó¸Åâ¨Âô ¦ÀüÈ
¿¢¨ÉÅ¢ø ¦¸¡ûÇ §Å¨½Ê¨Š¾¡ì̾ø ¿¼ò¾×õ þÐ ±Ç¢ÂÐ. «¾É¡ø ʱÀ¢ ¬ôº¨É
¦ºð«ô, ¸¡ý·À¢¸§Ã„ý ÁüÚõ À¢È «õºí¸û ¦Ãªð¼Ã¢ø ¼÷ý ¬ô ¦ºöÐÅ¢¼×õ. ¿¢¨ÄÂ¡É ³À¢ Ó¸Åâ¨Âô
´ù¦Å¡Õ Á¡¼ÖìÌõ Á¡Úõ ¾ý¨Á ¦¸¡ñ¼Ð ÀÂýÀÎò¾×õ.
¾¸Åø¸ÙìÌ ¾Â¡Ã¢ôÀ¡Çâý ¨¸§Âð¨¼ì yy §Áì «ðÊ ·À¢ø¼Ã¢í¨¸ ¦ºÂøÀÎòÐÅÐ :
´ù¦Å¡Õ ¸ÕÅ¢ìÌõ ¾É¢ §Áì «ðÊ ¯ñÎ. À¢Ã¡ð§Àñð
¸ÅÉÁ¡¸ô ÀÊì¸×õ
ãÄõ, À¡öñð¸¨ÇÔõ ¦Ãª×ð¼¨ÃÔõ «Ï¸Ä¡õ. §Áì
Å£ðÎì ¸½¢ô¦À¡È¢¸û ÀÄ ¨ºÀ÷ ÌüÈÅ¡Ç¢¸Ç¢ý
«ðèº ¨ÅòÐ ¸ÕÅ¢¨Â ÀÂýÀÎò¾ ÓÊÔõ. þó¾ ź¾¢
¾¡ì̾ÖìÌûÇ¡¸¢ýÈÉ. ãÄõ ÌÈ¢ôÀ¢ð¼ ¸ÕÅ¢ ãħÁ ¸½¢ô¦À¡È¢¨Âô ÀÂýÀÎòÐõ
¯í¸û ¸½¢ô¦À¡È¢¨Âò ¾¡ì̾ÖìÌûÇ¡¸¡Áø À¡Ð¸¡ôÒ ²üÀ¡ð¨¼ ¦ºöÂÓÊÔõ
¾Îí¸û yy ÅÂ÷¦ÄŠ À¡Ð¸¡ô¨À ¦ºÂøÀÎòоø:
§Á¡¼õ ¦Ãªð¼÷¸û ÅÂ÷¦ÄŠ À¡Ð¸¡ôÒìÌ ¯¾×õ.

55
ÀÂýÀÎòÐÀÅ÷ ²¾¡ÅÐ ´Õ ô§Ã¡ð§¼¡¸¡ø ÁüÚõ À¡Ð¸¡ôÒ ±Š ±Š ±î þýŠ¼¡ø ¦ºöÂ×õ.
¸£¨Âô ÀÂýÀÎò¾¢ì ¦¸¡ûÇÄ¡õ. «§¾ ÅÂ÷¦ÄŠ À¡Ð¸¡ôÒ yy ±Š±Š±î (¦ºìä÷ §ºÉø) ³ â§Á¡ð ¿¢÷Å¡¸ò¾¢üÌ
ô§Ã¡ð§¼¡¸¡Öõ, À¡Ð¸¡ôÒ ¸£Ôõ ¸½¢ô¦À¡È¢Â¢Öõ ¦ºÂøÀÎòи.
¦ºÂøÀÎò¾ôÀΞ¡¸ þÕì¸ §ÅñÎõ.
yy ¼À¢ûÔ À¢ ² (WPA) /¼À¢ûÔ þ À¢ (WEP) ±ý¸¢Ã¢ôº¨É ¼÷ý ¬ý ¦ºö ܼ¡¾¨Å:
¦ºö¾ø: yy Å£ðÊø ¸½¢ô¦À¡È¢¨Âô ÀÂýÀÎòÐÀÅ÷¸û â§Á¡ð
±øÄ¡ ¨Å •¨À ¦ºÂøÀÎò¾¢ §Á¡¼õ¸û «øÄÐ ¦Ãªð¼÷¸Ùõ (þñ¼÷¦¿ð š¢ġ¸) ¿¢÷Å¡¸ ¬ôº¨É ¦ºÂüÀÎò¾
±ý¸¢Ã¢ôºý ¦¾¡Æ¢øÑðÀòÐìÌ ¯¾×À¨Å¾¡ý. «¨¾ §Åñ¼¡õ. Å£ðÊø ÀÂýÀÎòÐÀÅ÷¸ÙìÌ «Ð §¾¨ÅÂüÈÐ.
¦ºÂøÀÎòÐÅÐ ÁðΧÁ «Åº¢Âõ. yy ôáð§Àñð“Restore Factory Default Setting” ±ýÀ¨¾
yy ËÀ¡ø𠱊±Š³Ê ¨Â Á¡üÈ×õ (º÷Å£Š ¦ºð ³¼ýÊ•¨ÀÂ÷): ¦ºÂüÀÎò¾ §Åñ¼¡õ.
±øÄ¡ ¬ìºŠ À¡öñθÙõ ¦Ãªð¼÷¸Ùõ ±Š±Š³Ê yy ´ù¦Å¡Õ ôáð§Àñð þ¨½ÂÅÆ¢ò ¦¾¡¼÷¨ÀÔõ ·À¢øð¼÷
±ýÈ ¦¿ð¦Å¡÷쨸 ÀÂýÀÎòи¢ýÈÉ. ¾Â¡Ã¢ôÀ¡Ç÷¸û þýÈ¢ô ÀÂýÀÎò¾ §Åñ¼¡õ.
¾í¸û ¾Â¡Ã¢ôÒ¸¨Ç «§¾ ±Š±Š³Ê ¦ºðμý ¾¡ý ¾í¸û yy ŠÀ¢Ç¢ð¼ÕìÌ ÓýÉ¡ø ¦¾¡¼÷¨À ¼¡ô ¦ºö §Åñ¼¡õ.
¦À¡Õð¸¨Ç «ÛôÒÅ¡÷¸û. þ¾É¡ø ¾¡ì̾ø ¿¼òÐÀÅ÷ (ŠÀ¢Ç¢ð¼÷ ±ýÀÐ ¦¾¡¨Ä§Àº¢ ¦¾¡¼÷¨ÀÔõ §¼ð¼¡/
þ¨¾ô ÀÂýÀÎò¾¢ ¾¡ì¸ìÜÎõ ±É§Å ËÀ¡ø𠱊±Š³Ê¨Â ¸õôäð¼÷ §À¡÷ð¨¼Ôõ À¢Ã¢ì¸ìÜÊ ¸ÕŢ¡Ìõ).
Á¡üȢŢ¼ §ÅñÎõ. yy À¡Ð¸¡ôÀüÈ ¸½¢ô¦À¡È¢ «øÄÐ §Äô¼¡ôÀ¢ø Ô±ŠÀ¢
yy ¬ñʨÅÊ, ¬ñÊ Š¨À§Å÷, ¦¼Šì¼¡ô ÀÂ÷Å¡Ö¼ý ôáð§Àñ¨¼ô ÀÂýÀÎò¾ §Åñ¼¡õ.
À¡Ð¸¡ôÒò ²üÀ¡Î¸¨Ç ¦ºöЦ¸¡ûǧÅñÎõ. «ô§À¡Ð¾¡ý yy ±Š±Š³Ê ôá𸡊¨¼ ¦ºÂøÀÎò¾ §Åñ¼¡õ:
À¢Ã¡ð§Àñð À¡Ð¸¡ôÒ «îÍÚò¾ø¸Ç¢Ä¢ÕóÐ ¯í¸û ¨Å ·¨À ¦¿ð¦Å¡÷ì¸¢í¸¢ø, ÅÂ÷¦ÄŠ ¬ìºŠ À¡Â¢ñð
¸½¢ô¦À¡È¢ ÁüÚõ §Äô¼¡ô¨Àì ¸¡ôÀ¡üÈ ÓÊÔõ. «øÄÐ Ã×ð¼÷ ¦¿ð¦Å¡÷츢ý ¦À¨à §¿ÃÊ¡¸ ´Ç¢ÀÃôÒõ.
yy §Á¡¼õ ¦Ãªð¼÷ ·ÀÂ÷Å¡¨Äì ¸½¢ô¦À¡È¢ìÌõ §Á¡¼òÐìÌõ þó¾ «õºõ Å÷ò¾¸ò §¾¨Å¸Ù측¸ ¯ÕÅ¡ì¸ôÀð¼Ð.
ÀÂýÀÎò¾ §ÅñÎõ: Å£ðÎò §¾¨ÅìÌ þó¾ «õºõ §¾¨ÅÂüÈÐ. ¦¿ð¦Å¡÷ìÌìÌû
ôáð§Àñð §Á¡¼õ ¦Ãªð¼÷¸Ç¢ø ÀÂ÷Å¡ø «õºõ §º÷ó§¾ ÒÌóÐ §º¾õ ²üÀÎòОüÌ Ñ¨Æך¢ġ¸ þÐ þÕìÌõ
þÕìÌõ. ¬É¡ø «¨¾ ¦ºÂøÀÎò¾ §ÅñÊÂÐ «Åº¢Âõ. yy ¨Å·¨À ¦¿ð´÷쨸 ¬ð§¼¡ ¸¦Éìð ¬ÌõÀÊ ô§Ã¡ìáõ
¸½¢ô¦À¡È¢Ô¼ý ¦À¡Õò¾ôÀð¼ ôáð§Àñð §Á¡¼Óõ ¦ºö§Åñ¼¡õ,
ÀÂ÷Å¡Ä¡ø À¡Ð¸¡ì¸ôÀ¼ §ÅñÊÂÐ «Åº¢Âõ. yy ¬ð§¼¡ ¸¦Éìð ²üÀ¡Î ¦ºöÂôÀðÊÕó¾¡ø, ¨Å ·¨À
yy ÀÂýÀÎò¾¡¾ §À¡Ð §Á¡¼õ¸¨Ç ¼÷ý ¬ô ¦ºöРŢÎí¸û: þý¼÷§Àͼý ÜÊ ¸½¢ô¦À¡È¢ äºÕìÌò ¦¾Ã¢Å¢ì¸¡Á§Ä§Â
¦¿ð¦Å¡÷쨸 „ð ¼×ý ¦ºöÅÐ ¦ÅÇ¢¿À÷¸û ¸¦Éì𠬸¢Å¢Îõ. þ¾É¡ø ¿ÁÐ ¸½¢ô¦À¡È¢ À¡Ð¸¡ôÒ
¦¿ð¦Å¡÷ìÌìÌû Ò¸¡Áø þÕôÀ¾üÌ ¿¢îºÂõ ¯¾×õ. «À¡Âí¸ÙìÌ ¯ûÇ¡Ìõ. ÌÈ¢ôÀ¢ð¼ Ýú¿¢¨Ä¸¨Çò ¾Å¢Ã
´ù¦Å¡Õ Ó¨ÈÔõ ¬ý ¦ºöÐ ¬ô ¦ºöÅÐ º¡ò¾¢ÂÁ¢øÄ¡¾ þó¾ ²üÀ¡Î ¦À¡ÐÅ¡¸ò §¾¨ÅÂüÈÐ.
Å¢„Âõ ±ýÀ¾¡ø À½ò¾¢Öõ, ¿£ÊìÌõ ¬ô¨Äý §¿Ãò¾¢Öõ yy ôáð§Àñ¨¼ ÀÂýÀÎò¾¡¾ §¿Ãò¾¢ø ¸¦ÉìÊÅ¢ðʨÂ
À⺣Ģì¸Ä¡õ. «ôÀʧ ŢðÎÅ¢¼ §Åñ¼¡õ.
yy Ô±ŠÀ¢ À¢Ã¡ð§Àñð §Á¡¼ò¨¾ ÀÂýÀ¡ðÎìÌô À¢ý yy ¯í¸Ù¨¼ÂÐ ¨Å·¨À¡¸ þÕìÌõ ¿¢¨Ä¢ø ¦¾Ã¢Â¡¾,
ÊŠ¸¦Éì𠦺öÐ ¸ÆüȢŢ¼Ä¡õ ¿õÀ¸ÁüÈ ¦¿ð¦Å¡÷ì̼ý þ¨½ì¸ §Åñ¼¡õ.
yy ôáð§Àñð þ¨½Â §ÀñðÅ¢ò ÀÂýÀ¡ðÎ ¸ñ¸¡½¢ôÒì

56
www.infosecawareness.in
Like us on
Facebook
https://www.facebook.com/infosecaware-
nesss

Subscribe us on
YouTube
https://www.youtube.com/channel/
UCWPBKQryyVvydUy4rYsbBfA

Follow us on
Twitter
https://twitter.com/CDAC_ISEA
Disclaimer
We have taken at most care for correctness of language with available experts and still if you find
any mistakes or any suggestions for content correctness, you may please write to
isea@cdac.in <mailto:isea@cdac.in>

¦À¡ÚôÒò ÐÈôÒ
ÅøÖ¿÷¸Ç¢ý §ÁüÀ¡÷¨Å¢ø ¦Á¡Æ¢Â¢Âø ¾¢Õò¾í¸¨Ç º¢Ãò¨¾Ô¼ý
§Áü¦¸¡ñÎû§Ç¡õ,
²§¾Ûõ À¢¨Æ ÁüÚõ ¾¢Õò¾í¸û §Áü¦¸¡ûÇ §ÅñÎõ ±É Å¢ÕõÀ¢É¡ø
isea@cdac.in ±ýÈ Á¢ýÉïºÄ¢ø ¦¾Ã¢Å¢ì¸ §¸ðÎ즸¡ûÇôÀθ¢ÈÐ
For any queries on Information Security
Call us on Toll Free No.

1800 425 6235


between 10 A M to 6 P M
or give us a missed call, we will call back within 24 hrs

Supported by

For Virus Alerts, Incident & Vulnerability Reporting

NIELIT Chennai Centre


Handling Computer Security Incidents
No.25, ISTE Complex, Gandhi Mandapam Road,
Opposite to Anna Centenary Library
Chennai - 600 025

Department of Electronics & Information Technology,


Ministry of Communications & Information Technology,
Government of India

You might also like