Professional Documents
Culture Documents
Cyber Crime English Tamil
Cyber Crime English Tamil
Crime
Awareness
ISEA Project (Phase II) broadly aims to cover generation of high end quality manpower in the area of Information Security
through formal and non-formal programs, training of government personnel, creating mass Information Security aware-
ness targeted towards various user segments viz. Academic users (school/college student, teachers, parents), General
users (general public) and Government users (Central/State Govt. employees, legal & police personnel)
The Awareness Programme of ISEA phase-II is coordinated by C-DAC Hyderabad and implementing in association with
agencies including NIELIT, NIC, CERT-In, STQC and ERNET
¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷×
þó¾¢Â «Ãº¢ý, ¦¾¡¨Ä¦¾¡¼÷Ò ÁüÚõ ¾¸Åø ¦¾¡Æ¢øÑðÀ «¨Áò¾¢ý ¸£ú þÂíÌõ Á¢ýÉÏÅ¢Âø
ÁüÚõ ¾¸Åø ¦¾¡Æ¢ø ÑðÀòШÈ, “¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷×” ¾¢ð¼ò¨¾
2005¬õ ¬ñÎ ²üÀÎò¾¢ «ò¾¢ð¼õ 2014 ¬õ ¬ñÎ ÓÊŨ¼ó¾Ð. þ¾ý ¦¾¡¼÷¡¸ 2014 ¬õ
¬ñÎ Ó¾ø þò¾¢ð¼¾¢ý þÃñ¼¡õ ¸ð¼ò¾¢¨É ÐÅ츢 ¿¢¾¢Ô¾Å¢ «Ç¢òÐ ÅÕ¸¢ÈÐ
“¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷×” ¾¢ð¼õ þÃñ¼¡õ ¸ð¼ò¾¢ý ÓبÁÂ¡É ÌȢ째¡û
¾¸Åø À¡Ð¸¡ôÒò Шâø Ó¨ÈÂ¡É ÁüÚõ þÂøÀ¡É ¸øÅ¢ ãÄõ «º¡¾¡Ã½Á¡É; ¾ÃÁ¡É ÁÉ¢¾ÅÇõ
¯ÕÅ¡ì̾ø, «ÃÍ «¾¢¸¡Ã¢¸ÙìÌ À¢üº¢ «Ç¢ò¾ø, ÁüÚõ ¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ŢƢôÒ½÷¨Å
²üÀÎò¾ø ¦À¡ÕðÎ Àø§ÅÚ À̾¢ À¡ɡÇ÷¸û «¾¡ÅÐ ¸øÅ¢º¡÷ À¡ɡÇ÷¸û (ÀûÇ¢ / ¸øæâ Á¡½Å÷¸û,
¬º¢Ã¢Â÷¸û, ¦Àü§È¡÷¸û), ¦À¡Ð À¡ɡÇ÷¸û (¦À¡ÐÁì¸û), «Ãº¡í¸ô ÀÂÉ¡Ç¢¸û (Áò¾¢Â/Á¡¿¢Ä «ÃÍ
°Æ¢Â÷¸û, ºð¼õ & ¸¡ÅøÐ¨È «ÖÅÄ÷¸û)
¾¸Åø À¡Ð¸¡ôÒ ÌÈ¢ò¾ ¸øÅ¢ ÁüÚõ ŢƢôÒ½÷× þÃñ¼¡õ ¸ð¼ò¾¢ý ŢƢôÒ½÷× ¿¢¸ú¸¨Ç
´Õí¸¢¨½òÐ ÅÆíÌõ ¦À¡ÕôÀ¢¨É Á¢ýÉÏÅ¢Âø ÁüÚõ ¾¸Åø ¦¾¡Æ¢ø ÑðÀòШÈ, C-DAC, Hyderabad
þ¼õ ´ôÀ¨¼òÐûÇÐ. þò¾¢ð¼¾¢¨É C-DAC, Hyderabad À¢È Áò¾¢Â «ÃÍ ¿¢ÚÅÉí¸Ç¡É NIELIT, NIC, CERT-In,
STQC ÁüÚõ ERNET ¯¼ý þ¨½óÐ ¦ºÂøÀÎò¾¢ ÅÕ¸¢ÈÐ.
Be aware of Job Offers through E-mails
• Many of the students apply online for jobs. The accused collect the details posted in the
websites and send fake e-mails.
• The e-mail looks like a mail from genuine companies through fake mailer sites and also
conducts interviews.
• The victim receives a fake job offer letter. In return this fraudster asks for huge amount
before and after receiving the offer letter.
• Stranger may send the offer letter using fake mailer service and make spoofing call
in the name of MNC and send the offer letters and get the amounts deposited in the
various places/Bank accounts and immediately withdraw the amounts and they may
cheat you.
Precautions:
• Don’t respond to spam mails without verification of the e-mail origin.
• Don’t deposit money unless the candidate is interviewed personally by the company.
• Don’t try to get job through back door methods by paying money which promises to provide
employment, which will cheat you.
• Check with original company website for any job offers before proceeding.
6
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
7
Are you getting lottery e-mails/SMS ?
like
( KaunBanegaCrorepathi, Airtel Lottery, Tata Docomo Lottery, Star Sports lottery,/Airtel/ICC Cup Lottery,
BBC/Hero Honda/Star Lottery / Star Cricket lottery/Sports/Chevrolet Motors etc.,)
• In the lottery emails/SMS the culprit sends e-mail or calls the victim or sends SMSs to public stating
that the cell phone numbers of the individuals has won lottery in lakhs and furnishes an e-mail id
and asks the individuals to furnish all details through e-mail and informs the individuals that he
should not reveal the matter to anyone.
• Victim thinks that he won big amount through lottery and furnishes all the details through e-mail.
• The fraudster sends a scanned copy of forged cheque/certificateon the victim name as it is ready for
dispatch. The culprit again informs the individual to deposit certain amount as registration fee by
furnishing a fake bank account number.
• Victim believes and deposits money in different bank accounts asasked by culprit & victim may
sometimes deposit more than lakhs in different amount numbers.
• Later after losing large amount of money the individual realize that he has been cheated on the
name of lottery on different names KaunBanegaCrorepathi, Airtel Lottery, Tata Docomo Lottery, ICC
Lottery, Star Sports lottery etc.,
Lottery scam Precautions
Sometimes you receive an email like “you won a lottery of million • Never respond to e-mail or SMS on mobile from strangers regarding
dollars” receiving such a kind of mails is a great thing, and really it’s aonline lottery or bumper festival bonanza.
happiest thing. By responding to such a kind of mails huge amount of • Don’t deposit any money in unknown accounts without proper
money willbe lost. Because these e-Mails are not true, scammers try to confirmation.
fool and trap you to obtain money. • The winning lottery amount is a fraud committed with convenience
of a bank account holder who is paid commission and has no link
Email Scam Like - Congratulations you have won Webcam, Digital with fraudster.
Camera, etc. • Don’t get trapped by scammers and e-Mails with a subject line
Sometimes you get an e-mail with a message like - you have won you won some $10000 just think why only you received the email
something special like digital camera webcam , all you need to do is without your participation.
just visit our web site by clicking the link given below and provide • Be aware about the products you get for a discounted price. Think
your debit or credit card details to cover shipping and managing costs. why you received email for products when you never enter any
However the item never arrives but after some days the charges will online shopping or contest.
be shown on your bank account , and you will lose money.
8
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
Tips for safe online shopping • After finishing the transaction take a print or screenshot
of the transaction records and details of product like price,
• Before you go for online shopping make sure your PC is confirmation receipt, terms and conditions of the sale.
secured with all core protections like an antivirus, anti • Immediately check the credit card statements as soon as
spyware, firewall, system updated with all patches and web you finish and get them to know about the charges you paid
browser security with the trusted sites and security level at were same, and if you find any changes immediately report to
high. concerned authorities.
• Before you buy things online research about the website • Beware of the e-Mails like “please confirm of your payment,
that you want to buy things from, since attackers try to trap purchase and account detail for the product.” Remember
with websites that appear to be legitimate, but they are not. legitimate business people never send such e-Mails. If you
So make a note of the telephone number’s physical address receive such e-Mails immediately call the merchant and
of the vendor and confirm that the website is a trusted site. inform the same.
Search for different web sites and compare the prices. • After finishing your online shopping clear all the web browser
• Check the reviews of consumers and media of that particular cookies and turn off your PC since spammers and phishers
web site or merchants. If you are ready to buy something will be looking for the system connected to the internet and
online check whether the site is secure like https or padlock try to send spam e-Mails and try to install the malicious
on the browser address bar or at the status bar and then software that may collect your personal information.
proceed with financial transactions.
10
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
12
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
FAKE
13
Be aware of Debit / Credit Card Fraud
Steps to be followed before Credit card & Debit card/ATM card • Use only trusted payment gate ways, online money wallets.
usage: • Prefer net banking transactions when you do online payments
• Whenever you receive the card from the bank make sure the mail through debit card
is completely sealed and there is no damage. Identify security clues such as a lock image at the bottom of your
• Whenever you receive the card from the bank immediately sign on browser. A URL that begins with https:
the card. ( These signs indicates that your purchases are secured with encryption
• Try to cover the last three digit number behind the card (CVV to protect your account information)
number).
• Register your phone number to check the account transactions.
• Change the pin number immediately.
Don’ts
• Don’t accept the card received directly from bank in case if it is
damaged or seal is open.
• Don’t write your PIN number on your credit card.
• Don’t carry around extra credit cards that you rarely use.
• Don’t disclose your Credit Card Number/ATM PIN to anyone. Never keep your
• Don’t hand over the card to anyone, even if he/she claims to rep-
resent the Bank.
credit card
• Don’t get carried away by strangers who try to help you use the number and
ATM machine.
• Don’t use the ATM machines if the device is not in good conditions.
PIN at one place
• Don’t transfer or share your account details with unknown/non
validated source.
• Don’t access Netbanking or make payment using your Credit/Deb-
it card from shared or unprotected computers in public places.
• Don’t open unexpected e-mail attachments from unexpected
15
¸¼ý / ÀüÚ & ¾¡É¢Âí¸¢ «ð¨¼ §Á¡ºÊ ÌÈ¢ò¾ ŢƢôÒ½÷×:-
¸¼ý, ÀüÚ ÁüÚõ ¾¡É¢Âí¸¢ «ð¨¼ ÀÂýÀÎòОüÌ Óý ¸¼ý, ÀüÚ «ð¨¼¸¨Ç ŨÄò¾Çí¸Ç¢ø À¡Ð¸¡ôÀ¡¸
¸¨¼ôÀ¢Êì¸ §ÅñÊ ¿¨¼Ó¨È¸û ÀÂýÀÎòÐõ Өȸû:-
yy «ð¨¼Â¢¨É ¿£í¸û Åí¸¢¸Ç¢¼Á¢ÕóÐ ¦ÀÚõ§À¡Ð «Ð yy þ¨½Âò¾Çõ ãÄõ ¦À¡Õð¸¨Ç Å¡í¸ ¿¢¨Éò¾¡ø ±ô¦À¡ØÐõ
Óò¾¢¨Ã¢¼ôÀ𼾡¸×õ ÁüÚõ §º¾Á¨¼Â¡¾¾¡¸×õ þÕì¸ À¡Ð¸¡ôÀ¡É þ¨½Âò¾Ç Ó¸Åâ¢ø ¦ºÂøÀÎò¾×õ.
§ÅñÎõ yy ±ô¦À¡ØÐõ ¯í¸ÙìÌò ¦¾Ã¢ó¾ ÁüÚõ ¿õÀò¾Ìó¾ Ţ¡À¡Ã¢Â¢¼õ
yy «ð¨¼Â¢¨É Åí¸¢Â¢¼Á¢ÕóÐ ¦ÀüÈ×¼ý «¾ýÁ£Ð ¾í¸ÇÐ ¦À¡Õð¸¨Ç Å¡í¸×õ
¨¸¦Â¡ôÀò¾¢¨É þ¼ §ÅñÎõ yy ¾Â× Ü÷óÐ þ¨½Â ¯ÄŢ¢ø (Web Browser) À¡Ð¸¡ôÒ¸¡É
yy «ð¨¼Â¢ý À¢ýÒÈõ ¯ûÇ (CVV ±ñ¸û) ¸¨¼º¢ 3 ±ñ¸û «È¢ÌÈ¢¸¨Ç ¸ÅÉ¢ì¸×õ
Á¨Èó¾¢Õì¸ §ÅñÎõ yy ±ô¦À¡ØÐõ ¿õÀ¸Á¡É À½õ ¦ºÖò¾ø ѨÆÅ¢¨Â ÀÂýÀÎò¾×õ
yy ¯í¸Ç¢ý ¦¾¡¨Ä§Àº¢ ±ñ¸¨Çô À¾¢× ¦ºö §ÅñÎõ. ²¦ÉÉ¢ø yy ±ô¦À¡ØÐõ ÀüÚ «ð¨¼ ãÄõ À½ôÀâÁ¡üÈõ ¦ºöÔõ¦À¡ØÐ
þÐ ¸½ìÌô ÀâÅ÷ò¾¨É ¿¢¸ú׸¨Çì ¸ñ¸¡½¢ôÀ¾üÌ ¯¾×õ þ¨½Âò¾Ç Åí¸¢Â¢¼ø (Online Banking) ӨȨÂô ÀÂýÀÎò¾
yy Ó¾ýӾĢø ÅÆí¸ôÀð¼ À¡Ð¸¡ôÒì ÌȢ£ðÎ ±ñ½¢¨É §ÅñÎõ
¯¼ÉÊ¡¸ Á¡üÈ §ÅñÎõ À¡Ð¸¡ôÒ «õºí¸Ç¡Éô âðÎô ÀÊÁõ ¯í¸Ç¢ý
¯ÄŢ¢ý ¸£§Æ ¯ûǾ¡ ±ýÚ ¸ÅÉ¢ì¸×õ, ¯ÄŢ¢ý Ó¸Åâ Àð¨¼Â¢ø þ¨½Â
Ó¸Åâ (HTTPS) ±ýÚ ÐÅíÌõ§Á¡ɡø: («Ð ¯í¸Ç¢ý ÀâÅ÷ò¾¨É¨Âô
À¡Ð¸¡òÐ Á¨ÈÂ¡ì¸ Ó¨È¢ø Á¡üÈ ¯¾×õ)
16
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
17
Preventive measures to be taken in Cyber Space
• Dont give your personal details of whereabouts : Don’t post specific personal information online,
such as travel dates, location and time of the movie you plan to watch, evening classes that you take etc.,
• Keep contact information private : Beware of strangers.
• Friends : Better avoid strangers as friends when requests are received.
• Don’t share your personal information profile information
• Irrespective of genders as they may post abusive/indecent messages when the relations are strained
with them.
Be aware of following risks
• Spam users can be tricked into clicking in the links, icons, buttons etc,
As we all know that spam is usually unwanted e-mail advertising which could trigger running of processes at the background with-
about a product sent to list of e-mails or group of e-mail addresses. out the knowledge of the user.
Similarly spammers are sending the unwanted mails or messages
to the billions of users of social networking sites which are free;
and are easily accessible by spammers to gather the personal in-
formation of the unsuspecting users.
• Scams:
Online scammers generally send an email or message with a link to
the user which ask for the profile information and tell the user that
it would add new followers. These links sent to the user would be
similar to applications, games etc. So whenever the user post his
details in the link then the details will be received by scammers
and information would be misused.
• Clickjacking
Generally, clickjacking is a malicious technique of tricking Web
users into revealing confidential information or taking control of
their computer while clicking on seemingly innocuous Web pages.
Vulnerability across a variety of browsers and platforms, a click-
jacking takes the form of embedded code or script that can run
without the user’s knowledge. The same is followed in the social
networking domain. The objective behind such an attack is that
18
CYBER CRIME AWARENESS
19
þ¨½Â¦ÅǢ¢ø (Cyber Space) Ó¦ÉîºÃ¢ì¨¸ ¿¼ÅÊ쨸¸û:-
yy Å¨Ä «¨ÁôÀ¢ø ¯í¸Ù¨¼Â ¦º¡ó¾ Å¢ÀÃí¸¨Çô À¾¢× ¦ºö¡¾£÷¸û. «¾¡ÅÐ
¿£í¸û À½¢ìÌõ §¾¾¢¸û, þÕôÀ¢¼õ, §¿Ãõ ÁüÚõ ¿£í¸û À¡÷ì¸Å¢ÕìÌõ
¾¢¨ÃôÀ¼ò¾¸Åø¸û, À¢Öõ Á¡¨Ä §¿Ã ÅÌôÒ¸û §À¡ýÈ þ¾Ã ÀÄ Å¢ÀÃí¸û
yy ¯í¸¨Çò ¦¾¡¼÷Ò ¦¸¡ûÇ ¯¾×õ Ó¸Åâ¢¨É À¡Ð¸¡òÐ ¨ÅòÐì ¦¸¡ûÇ×õ:
«È¢Ó¸Á¢øÄ¡¾Å÷¸Ç¢¼õ ±îºÃ¢ì¨¸
yy ¿ñÀ÷¸û: «È¢Ó¸õ þøÄ¡¾Å÷¸¨Ç þ¨½Âò¾Ç ¿ñÀ÷¸Ç¡¸
²üÚ즸¡ûÇ¡¾£÷¸û
yy ¬½¡¸ þÕó¾¡Öõ, ¦Àñ½¡¸ þÕó¾¡Öõ ¯í¸ÇÐ ¾É¢ôÀð¼ ¾¸Åø¸¨Çô
À¸¢Ã §Åñ¼¡õ. ²¦ÉÉ¢ø, «Å÷¸û ¯í¸¨ÇôÀüȢ ¾ÅÈ¡É / «¿¡¸Ã£¸Á¡É
¦ºö¾¢¸¨Çô À¾¢× ¦ºö šöôÒûÇÐ
20
CYBER CRIME AWARENESS
¯ÕÅ¡ì̸¢ýÈÉ÷. «¾¡ÅÐ Åí¸¢ ÁüÚõ ÀíÌîºó¨¾ º¢ì¸ø¸û ±ÆìÜÎõ ±ýÀ¨¾ì ¸Õò¾¢ø ¦¸¡û¸
þ¨½Âò¾Ç Ó¸Å⢨Éô §À¡ý§È ¾Â¡Ã¢òÐ ²Á¡üÚ yy ºã¸ ŨÄò¾Çí¸Ç¢ø ¿£í¸û ¿ñÀ÷¸¨Ç §¾÷ó¦¾ÎìÌõ§À¡Ð
Á¢ýÉïºø¸û ÁüÚõ ÌÚï ¦ºö¾¢¸û ÓÄõ Å¢ÇõÀÃõ ¦ºöÐ «Å÷¸û ¯í¸Ù¨¼Â ¿¢ƒ Å¡úÅ¢ø ¿ýÌò ¦¾Ã¢ó¾Å÷¸Ç¡¸
ÀÂɡǢ¢ý Å¢ÀÃí¸¨Ç ÁüÚõ À¡Ð¸¡ôÒ Å¢„Âí¸¨Çî þÕì¸ §ÅñÎõ
§º¸Ã¢ì¸¢ýÈÉ÷. þò¾¨¸Â ²Á¡üÚ þ¨½Âò¾Çô Àì¸õ yy ´Õ§À¡Ðõ ºã¸ ŨÄò¾Çí¸Ç¢ø þ¨½ôҸǢø
«ºø þ¨½Âò¾Çô Àì¸í¸Ç¢ý ¿¸Ä¡Ìõ; þùÅ¡Ú ¦ºöž¢ý ¯ûÇÅ÷¸¨Ç §¿ÃÊ¡¸î ºó¾¢ì¸¡¾£÷¸û ²¦ÉýÈ¡ø «¾¢ø
§¿¡ì¸õ ÀÂÉ÷¸Ç¢ý º¡ýÈ¢¨É¸¨Ç ¾¢ÕÎŧ¾! º¢Ä÷ ¾¡õ; ¡¦ÃýÚ Å¨Ä¾Çò¾¢ø ÜÈ¢ÂÅ¡Ú «Å÷¸û §¿Ã¢ø
þÕì¸Á¡ð¼¡÷¸û
ÅÆ¢¸¡ðξø¸û:- yy «ôÀÊ ¿£í¸û ºã¸ ŨÄò ¾Çí¸Ç¢ý ¿ñÀ÷¸¨Çî ºó¾¢ì¸
yy ¾í¸Ù¨¼Â ¦ÀÂ÷, Ó¸Åâ, ÀûÇ¢, Å£Î, ¦¾¡¨Ä§Àº¢ ±ñ¸û, Å¢ÕõÀ¢É¡ø ¯í¸Ç¢ý ¦Àü§È¡Ã¢ý «ÛÁ¾¢Ô¼ý ºó¾¢Ôí¸û
ÅÂÐ, À¡Ä¢Éõ, ÁüÚõ ÀüÚ/¸¼ý «ð¨¼ Å¢Çì¸í¸¨Ç yy ¾í¸Ù¨¼Â ¾É¢ôÀð¼ ¾¸Åø¸¨Çò ¾¡í¸û Å¢ÕõÒÅ÷¸ÙìÌ
þ¨½Âò¾Çí¸Ç¢øì ¦¸¡Î측¾£÷¸û ÁðÎõ Á¨ÈòÐô À¸¢Õõ ź¾¢Â¢¨Éî ºã¸ Å¨Äò¾Çí¸Ç¢ø
yy þ¨½Âò¾Çõ ±ýÀÐ ¯Ä¦¸í¸¢Öõ Å¢„Âí¸¨Çô À¸¢Ã ¯¾×õ §¾÷ó¦¾ÎòÐô ÀÂýÀÎò¾×õ
º¢Èó¾ ¸ÕŢ¡¸ ¯¾×¸¢ÈÐ. ¾¡í¸û ¾í¸Ù¨¼Â Å¢ÀÃí¸¨Ç yy ¾í¸û ÌÎõÀ ¦¸ªÃÅò¾¢¨Éô À¡¾¢ìÌõ Å¢¾Á¡¸ ±ó¾¦Å¡Õ
«ÅüÈ¢ø À¾¢× ¦ºö¾¡ø þ¨½Âò¾Ç Ѹ÷§Å¡÷¸û ¡÷ ¾¸Åø¸¨ÇÔõ «ÛôÀ¡¾£÷¸û
§ÅñÎÁ¡É¡Öõ À¡÷ì¸ ÓÊÔõ (¿øÄÅ÷¸û ÁüÚõ ¾£ÂÅ÷¸û), yy ºã¸ ŨÄò ¾Çí¸Ç¢ø ¦¾Ã¢Â¡¾ ¿À÷¸ÙìÌò ¾í¸Ù¨¼Â,
¯í¸Ç¢ý þ¨½Âô Àì¸í¸¨Ç, ¿ñÀ÷¸û, ¦Àü§È¡÷¸û Ò¨¸ôÀ¼ôÀ¾¢×¸¨Ç§Â¡ «øÄÐ ¾í¸¨Ç ±Ç¢¾¢ø
ÁüÚõ ¬º¢Ã¢Â÷¸û ¾Å¢Ã ¡ռÛõô À¸¢Ã §Åñ¼¡õ À¡¾¢ì¸ìÜÊ Ţ¨_Âí¸¨Ç§Â¡ ¦¾Ã¢Å¢ì¸ §Åñ¼¡õ
yy ¾í¸Ù¨¼Â ¾¸Åø¸¨Ç þ¨½Âò¾Ç Ó¸Åâ¢ø À¾¢Ôõ§À¡Ð yy ¯í¸Ù¨¼Â ºã¸ ŨÄò¾Çì ¸½ì̸ǢĢÕóÐ ¯í¸û
ÀƢšíÌõ ±ñ½Ó¨¼ÂÅ÷¸ÙìÌ ²ÐÅ¡¸ «¨ÁÔõ ¾¸Åø¸¨Ç ¡§ÃÛõ ¾¢ÕÊÅ¢ð¼¡÷¸û ±Éî ºó§¾¸õ
yy ´Õ§À¡Ðõ ¯í¸Ù¨¼Â ¸¼×¡ø¨Ä ¯í¸Ù¨¼Â ²üôÀð¼¡ø «ó¾ ŨÄò¾Çì ÌØ «¨ÁôÀ¢É¢¼õ
¦Àü§È¡÷ «øÄÐ À¡Ð¸¡Å¡÷¸û ¾Å¢Ã §ÅÚ Â¡ÕìÌõ ¦¾Ã¢Å¢ì¸ ¯¼ÉÊ¡¸ò ¦¾Ã¢Å¢ì¸×õ
§Åñ¼¡õ yy ¯í¸ÙìÌ ÅÕõ §¾¨ÅÂüÈ À¾¢×¸¨Ç «Æ¢òÐÅ¢¼×õ §ÁÖõ
yy ¯í¸Ù¨¼Â ¸¼×¡ø¨Ä «Êì¸Ê Á¡üÈ×õ; ÁüÚõ ´Õ §Å¨Ç ŨÄò¾Ç ¿À÷¸û ¯í¸¨Çò ¦¾¡¼÷óÐ Ó¨ÈÂüÈ
ºã¸ ŨľÇí¸ÙìÌ «¨ÆòÐî ¦ºøž¡¸ º¢ò¾Ã¢ìÌõ Å¢Á÷ºÉõ ¦ºö¾¡ø ¿£í¸û ¯¼ÉÊ¡¸ «ÅüÈ¢¨ÉôÀüÈ¢
(¾¢¨Ã¢ø §¾¡ýÚõ þ¨½ôÒ¸¨Çî ¦º¡Î측¾£÷¸û) Á£È¢î ŨÄò¾Çì ÌØ «¨ÁôÀ¢É¢¼õ Ò¸¡÷ «Ç¢ì¸×õ
¦º¡Ê츢ɡø ¯í¸Ù¨¼Â þøº¢Âò ¾¸Åø¸û ºã¸ ŨÄò yy ¿£í¸û ´Õ§Å¨Ç Ó¨ÈÂüÈ Å¢Á÷ºÉí¸¨Çô ¦ÀüÈ¡ø
¾Çí¸Ç¢ø À¾¢Å¡Ìõ ±É§Å, «¾üÌô À¾¢Ä¡¸ ¿£í¸û Å¢ÕõÒõ «¾üÌô À¾¢ÄÇ¢ì¸ §Åñ¼¡õ
þ¨½Âò¾Ç Ó¸Åâ¨Â ¿£í¸Ç¡¸§Å §¿ÃÊ¡¸ ¯í¸ÇÐ yy ¯í¸Ù¨¼Â ¿ñÀ÷¸Ç¢ý ¾¸Åø¸¨Ç þ¨½Âò¾Çí¸Ç¢ø
¯Ä¡Å¢ (Browser) ãÄõ ¾ð¼îÍ ¦ºöÐ ¯û§Ç ¦ºøÄ×õ À¸¢Ã¡¾£÷¸û (ÌØ Ò¨¸ôÀ¼õ, ÀûǢ¢ý ¦ÀÂ÷, À¡Ä¢Éõ, þ¼õ,
«øÄÐ Óýɾ¡¸§Å ¿£í¸û ÀÂýÀÎò¾¢ô À¡Ð¸¡ì¸ôÀð¼ô ÅÂÐ ÁüÚõ ÀÄ). þÅüÈ¢ý ÓÄõ ¯í¸û ¿ñÀ÷¸¨ÇÔõ
Òò¾¸ìÌȢ£ðÊý (Bookmark) ãÄõ ¾í¸Ù¨¼Â þ¨½Âò¾Ç À¡Ð¸¡ò¾¢Îí¸û
¸½ì̸ÙìÌî ¦ºøÄ×õ yy ŨÄò¾Çí¸Ç¢ø ¿£í¸û Å¡úÅ¢ø ¦ºö ¿¢¨ÉìÌõ
yy ¿£í¸û ºã¸ ŨÄò¾Çí¸Ç¢ø þ¨½Ôõ ÓýÉ÷ ¾í¸Ç¢ý ¦ºÂøÓ¨Èò ¾¢ð¼í¸¨Ç À¸¢÷Ũ¾ò ¾Å¢÷ì¸×õ
¾É¢ôÀð¼ ¾¸Åø¸û ÁüÚõ ¾É¢ÁÉ¢¾ ;ó¾¢Ãõò ¦¾¡¼÷À¡É
21
Mobile Phone Security
M obile phones are becoming ever more popular and are rapidly becoming
attractive targets for malicious attacks. Mobile phones face the same security *For more
challenges as traditional desktop computers, but their mobility means they are also exposed to information
a set of risks quite different to those of a computer in a fixed location. phones can be infected
with worms, trojan horses or other virus families, which can compromise your security and
refer manufacturer
privacy or even gain complete control over the device. This guide provides the necessary steps, manual *
do’s, don’ts & tips to secure your mobile devices.
• STEP 1 : Read the manufacturer’s manual carefully and follow the guidelines as specified to setup your mobile phone.
• STEP 2 : Record the IMEI (International Mobile Equipment Identity) number for tracking your mobile in case you lose it.
Note: This is usually printed on the phone below the battery, or can be accessed by keying *#06# on most of the phones.
Mobile Phone Security Threats Categories : tion along with private SMSs and calls without user’s knowledge.
• Mobile Device and Data Security Threats • Losing control over mobile phone and unknowingly becoming
• Threats related to unauthorised or intentional physical access zombie for targeted attacks.
to mobile phone and Lost or Stolen mobile phones.
• Mobile Connectivity Security Threats Mitigation against Mobile Device and Data Security Attacks :
• Threats related to mobile phone connectivity to unknown sys- Do’s
tems, phones and networks using technologies like Bluetooth, • Record IMEI number:
WiFi, USB etc. Record the unique 15 digit IMEI number. In case Mobile phone is
• Mobile Application and Operating System Security Threats stolen/lost, this IMEI number is required for registering complaint
• Threats arising from vulnerabilities in Mobile Applications and at Police station and may help in tracking your mobile phone
Operating Systems. through service provider.
• Enable Device locking:
Typical impact of attacks against Mobile Phones : Use autolock to automatically lock the phone or keypad lock pro-
• Exposure or Loss of user’s personal Information/Data, stored/ tected by passcode/ security patterns to restrict acess to your mo-
transmitted through mobile phone. bile phone.
• Monetary Loss due to malicious software unknowingly utilizing • Use a PIN to lock SIM card:
premium and highly priced SMS and Call Services. Use a PIN (Personal Identification Number) for SIM (Subscriber
• Privacy attacks which includes the tracing of mobile phone loca- Identity Module) card to prevent people from making use of it
22
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
when stolen. After turning on SIM security, each time phone starts less signals transmitted with Bluetooth cover short distanes, typically
it will prompt to enter SIM PIN. 30 feet (10 meters).
Use password to protect information on the memory card.
• Report lost or stolen devices Do’s:
Report lost or stolen devices immediately to the nearest Police Sta- • Use Bluetooth in hidden mode so that even if the device is using
tion and concerned service provider. Use mobile tracking feature. Bluetooth it is not visible to oth- ers.
Use the feature of Mobile Tracking which could help if the mobile • Change the name of the device to a different name to avoid recog-
phone is lost/stolen. Every time a new SIM card is inserted in the nition ofyour Mobile phone model.
mobile phone, it would automatically send messages to two pre- Note: The default name will be the mobile model number for Blue-
selected phone numbers of your choice, so that you can track your tooth devices.
Mobile device. • Put a password while pairing with other devices. The devices with
the same password can connect to your computer
Don’ts: • Disable Bluetooth when it is not actively transmitting information.
• Never leave your mobile device unattended. • Use Bluetooth with temporary time limit after which it automat-
• Turn off applications [camera, audio/video players] and connec- ically disables so that the device is not available continuously for
tions [Bluetooth, infrared, Wi-Fi] when not in use. Keeping the others.
connections on may pose security issues and also cause to drain
out the battery. Don’ts:
• Never allow unknown devices to connect through Bluetooth.
Do’s and Don’ts for Data Security: • Never switch on Bluetooth continuously.
Do’s: • Never put Bluetooth in always discoverable mode.
• Backup data regularly Note: Attackers can take advantage of its default always-on, always
Backup data regularly and set up your phone such that it backs up discoverable settings to launch attacks.
your data when you sync it. You can also back up data on a sepa-
rate memory card. This can be done by using the Vendor’s docu- Check the source of all your files
ment backup procedure.
• Reset to factory settings:
and apps to make sure they’re safe
Make sure to reset to factory settings when a phone is permanent- before you download.
ly given to another user to ensure that personal data in the phone
is wiped out.
23
Wi-Fi : Don’ts:
Wi-Fi is short for “Wireless Fidelity.” Wi-Fi refers to wireless network- • Never keep sensitive information like user names/passwords on
ing technology that allows computers and other devices to communi- mobile phones.
cate over a wireless signal. • Never forward the virus affected data to other Mobiles.
Many mobile devices, video game systems, and other standalone de-
vices also include Wi-Fi capability, enabling them to connect to wire- Mitigation against Mobile Application and Operating System
less networks. These devices may be able to connect to the Internet Attacks
using Wi-Fi. Mobile Application and Operating System:
• Update the mobile operating system regularly.
Do’s: • Upgrade the operating system to its latest version.
• Connect only to the trusted networks. • Always install mobile applications from trusted sources.
• Use Wi-Fi only when required. It is advisable to switch off the ser- • Consider installing security software from a reputable provider
vice when not in use. and update them regularly.
• Beware while connecting to public networks, as they may not be • It’s always helpful to check the features before downloading an ap-
secure. plication. Some applications may use your personal data.
• If you’re downloading an app from a third party vendors, do a little
Don’ts: research to make sure the app is reputable.
• Never connect to unknown networks or untrusted networks.
Location tracking services allow the
Mobile as USB:
The mobile phones can be used as USB memory devices when con-
whereabouts of registered cell phones to be known
nected to a computer. A USB cable is provided with the mobile phone and monitored. While it can be done openly
to connect to computer. Your mobile’s phone memory and memory for legitimate purposes, it may also be
stick can be accessed as USB devices. used for malicious purposes.
Your mobile phone’s memory and memory stick can be accessed as
USB devices.
Do’s:
• When a mobile phone is connected to a personal computer, scan
the external phone memory and memory card using an updated
anti virus.
• Take regular backup of your phone and external memory card be-
cause if an event like a system crash or malware penetration oc-
curs, at least your data is safe.
• Before transferring the data to Mobile from computer, the data
should be scanned with latest Antivirus with all updates.
24
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
25
«¨Ä§Àº¢ À¡Ð¸¡ôÒ Ó¨È¸û:-
«¨Ä§Àº¢ ±ýÀÐ Á¢¸×õ À¢ÃÀÄÁ¡É ´ýÈ¡Ìõ þÐ×õ ¾É¢¿À÷ ¸½¢É¢¨Â §À¡ýÚ
ÀÄ ¨Åʸǡø À¡¾¢ì¸Àθ¢ýÈÉ. (±.Î) ð§Ã¡ƒý †¡÷Š ÁüÚõ ÀÄ. þЧÀ¡ýÈ
* §ÁÖõ ¾¸Åø¸ÙìÌ
À¢ÃÀÄÁ¡É ¨Åʸǡø «¨Ä§Àº¢Â¢ýô À¡Ð¸¡ôÒô À¡¾¢ì¸ôÀθ¢ýÈÉ. ¯í¸Ù¨¼Â ¾Â¡Ã¢ôÀ¡Ç÷ ¨¸§Âð¨¼ô
«¨Ä§Àº¢Â¢¨Éô À¡Ð¸¡òÐì ¦¸¡ûÇ ¦ºö §ÅñʨŠÁüÚõ ¦ºöÂܼ¡¾¨Å À¡÷ì¸
ÀüÈ¢É Ó¨È¸û ¸£§Æ ¦¸¡Îì¸ôÀðÎûÇÉ.
26
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
¨¸§Àº¢ º¡¾Éõ ÁüÚõ ¾Ã× À¡Ð¸¡ôÒ ¾¡ì̾ø¸¨Ç ¾Ã× À¡Ð¸¡ôÀ¢ø ¦ºö§ÅñʨŸû ÁüÚõ
ÁðÎôÀÎòоø: ¦ºöÂܼ¡¾¨Å¸û
� ¯í¸û ¨¸§Àº¢ º¡¾Éò¾¢ý IMEI ±ñ¨Â À¾¢× ¦ºö: ¦ºöÂܼ¡¾¨Å¸û:
¾É¢ò¾ý¨ÁÅ¡öó¾ 15 þÄì¸ IMEI ±ñ¨Â À¾¢× ¦ºöÂ×õ, � ¦ºö §ÅñʨÅ
´Õ§Å¨Ç ¯í¸û ¨¸§Àº¢ º¡¾Éõ ¦¾¡¨Ä󾡧ġ / ¦¾¡¼÷óÐ ¾¸Åø¸¨Ç À¢ýÀ¾¢× ±Îì¸ §ÅñÎõ «¾¡ÅÐ
¾¢Õ¼ôÀ𼡧ġ «Ð ¸¡Åø ¿¢¨ÄÂò¾¢ø Ò¸¡÷ «Ç¢ì¸ ¯¾×õ ¿£í¸û ¯í¸û «¨Ä§Àº¢Â¢ø §º¸Ã¢òÐûÇ ¾¸Åø¸¨Ç ´Õ
ÁüÚõ «¾¨É §º¨Å Å¢¿¢§Â¡¸¢ôÀÅ÷ ãÄõ ¸ñ¸¡É¢ì¸ ¾É¢ »¡À¸ «ð¨¼Â¢ý ÓÄõ ¦¾¡¼÷óÐ §º¸Ã¢òÐì (À¾¢×
¯¾×õ. ¦ºöÐì) ¦¸¡ûÇ §ÅñÎõ.
� º¡¾É¾¢ý À¡Ð¸¡ôÒ «¨ÁôÀ¢¨É þÂÄö � Reset & Factory Settings
¨¸§Àº¢ º¡¾É¾¢ý Å¢¨º¨Â ¾ýÉ¢Âì¸ Ó¨È¢ø âðÎ þ¼×õ ¿£í¸û ¡Õ측ÅÐ ¯í¸Ù¨¼Â «¨Ä§Àº¢Â¢¨É §ÅÚ
«øÄРިº ¾ð欃 ¸¼×¦º¡ø / À¡Ð¸¡ôÒ «¨ÁôÒ ãÄõ ¡Õ측ÅÐ ¦¸¡Îì¸ ¿¢¨Éò¾¡ø ¿£í¸û ÀÂýÀÎò¾¢Â
¨¸§Àº¢Â¢¨É ¸ðÎôÀÎò¾×õ. «¨ÁôÒ¸¨ÇÔõ ÁüÚõ ¿£í¸û §ºÁ¢òÐ ¨Åò¾ ¾¸Åø¸¨ÇÔõ
� º¢õ «ð¨¼ À¡Ð¸¡ôÀ¢¨É ÀÂýÀÎò¾×õ: «Æ¢òÐÅ¢ðÎô ÒÐ «¨ÁôÀ¢¨É «¨Áò¾À¢ý «Å÷¸Ç¢¼õ
º¢õ «ð¨¼ À¡Ð¸¡ôÀ¢¨É ÀÂýÀÎòÐõô ¦À¡ØÐ ¾¢Õ¼ôÀð¼ ¦¸¡Îì¸×õ.
¨¸§Àº¢Â¢¨É ¯À§Â¡¸ô ÀÎòÐŨ¾ ¾Îì¸ ¯¾×õ. «ùÅ¡Ú
¦ºöÔõ ¦À¡ØÐ ¨¸§Àº¢ þÂíÌõ Óý º¢õ «ð¨¼ À¡Ð¸¡ôÒ ¨¸§Àº¢ þ¨½ôÒ À¡Ð¸¡ôÒ ¾¡ì̾ø¸¨Ç ÁðÎôÀÎò¾ø
Ìȣ¢ð欃 þ¼ì §¸ðÌõ ÒÙ Þò
»¡À¸ «ð¨¼Â¢ø ¸¼×¦º¡ø¨Ä ÀÂýÀÎò¾¢ ¾¸Åø¸¨Ç ÒÙ Þò (Blue Tooth) ±ýÀÐ «¨Ä «¨ÁôÀ¡Ìõ þÅüÈ¢ý ÓÄõ
À¡Ð¸¡ì¸×õ ÀÄŨ¸ôÀð¼ ¸ÕÅ¢¸¨Ç þ¨½ì¸Ä¡õ. «ÅüÈ¢ý ¾¸Åø¸¨Ç
yy ¾¢Õ¼ôÀð¼ «øÄÐ ¦¾¡¨Äó¾ ¨¸§Àº¢ ÀüÈ¢ Ò¸¡÷ «Ç¢ì¸×õ: ´ÕÅâ¼Á¢ÕóÐ ÁüÈÅ÷¸ÙìÌ À¸¢÷óÐ ¦¸¡ûÇÄ¡õ, «¾¡ÅÐ
¾¢Õ¼ôÀð¼ «øÄÐ ¦¾¡¨Äó¾ ¨¸§Àº¢ ÀüÈ¢ ¯¼ÉÊ¡¸ (Ò¨¸ôÀ¼õ, À¡¼ø¸û §À¡ýȨÅ) þó¾ þ½ì¸¢ º¢ìÉø¸¨Ç
«Õ¸¢ø×ûÇ ¸¡Åø ¿¢¨ÄÂõ ÁüÚõ ºõÀó¾ôÀð¼ §º¨Å ̨Èó¾ þ¨¼¦ÅÇ¢ ¦¾¡¨ÄÅ¢ø ÁðΧÁ ¯À§Â¡¸¢ì¸Ä¡õ
Å¢¿¢§Â¡¸¢ôÀÅâ¼õ Ò¸¡÷ «Ç¢ì¸×õ. «¾¡ÅÐ 30 «Ê («) 10 Á£ð¼÷ ¦¾¡¨Ä×.
27
¦ºöÂìÜʨÅ:- ¦ºöÂìܼ¡¾¨Å:-
yy ÒÙÞò (BlueTooth) ÓÄÁ¡¸ ¦¾Ã¢Â¡¾Å÷¸Ç¢ý ¸ÕÅ¢¸¨Ç yy ´Õ §À¡Ðõ «È¢Â¡¾ ÁüÚõ ¿õÀ¢ì¨¸ÂüÈ Å¨Äò¾Çí¸¨Ç
þ¨½ôÀ¾¢¨É ¾Å¢Õí¸û. þ¨½ì¸¡¾£÷¸û.
yy ±ô¦À¡ØÐõ ÒÙÞò (BlueTooth) ¦À¡ò¾¡¨É þÂì¸ò¾¢ø
¨Å측¾£÷¸û. ¦Á¡¨À¨Ä Ô±ŠÀ¢Â¡¸:
yy ±ô¦À¡ØÐõ ÒÙÞò (BlueTooth) ò¾¢¨É ÁüÈÅ÷¸û §¾Êì
¦Á¡¨Àø §À¡ý¸¨Ç Ô±ŠÀ¢ ¦ÁÁâ ʨŊ¸Ç¡¸
¸ñ¼È¢Ôõ (¸ñÎÀ¢Êì¸ìÜÊÂ) ӨȢø ¨Åò¾¢Õ측¾£÷¸û.
¸½¢ô¦À¡È¢Â¢ø ¦À¡ÕòÐõ§À¡Ð ÀÂýÀÎò¾Ä¡õ. Ô±ŠÀ¢
ÌÈ¢ôÒ:- ±ô¦À¡ØÐõ ÒÙÞò (BlueTooth) þÂì¸ò¾¢ø þÕó¾¡
¾¡ì̾ø¸¡Ã÷¸û ±Ç¢Â ӨȢø ¾¡ì̾ø¸¨Ç ²üÀÎòÐÅ÷. §¸À¢û ¦Á¡¨Àø §À¡Û¼ý ¸½¢ô¦À¡È¢Â¢ø þ¨½ì¸
¦¸¡Îì¸ôÀðÊÕìÌõ.
28
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
29
Phishing Attacks
Phishing is a way of attempting to acquire information such as usernames, passwords, PIN,bank account, credit card details
by masquerading as a trustworthy entity details through electronic communication means like e-mail.
Phishing is typically carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a
fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering
techniques used to deceive users.
How does a phishing email message look like? In detail ….
• Check for Spelling and bad grammar. • Spoofing popular / companies’ websites.
Links might also lead you to .exe files. These kinds of file are known Scam artists use graphics in email that look identical to legiti-
to spread malicious software. mate websites but actually take you to phony scam sites or legiti-
• Threats mate-looking pop-up windows.
Sometimes you may receive a threat mail saying that your webmail Cybercriminals also use web addresses that resemble the names of
account would be closed if you do not respond to an e-mail mes- well-known companies but are slightly altered.
sage. The e-mail message shown above is an example of the same Cybercriminals might call you on the phone and offer to help solve
trick. Cybercriminals often use techniques to make one believe your computer problems or sell you a software license.
that security has been compromised.
30
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
Steps to remember :
Step1: Cross check the URL in the brows Step 4 : Always view email requests seeking for financial or other
personal information with suspicion email ID, particularly with “UR-
GENT” subject requests. When you are in doubt, do not respond to
questionable email or enter information on questionable websites.
You may also contact the alleged sender to confirm the legitimacy of
Don’t enter your information in the websites that communications you’ve received.
start with numbers
So Always key in the URL in the address bar yourself don’t copy and An Example of Phishing site, the look and feel of the Punjab national
paste bank is same.
Step3: Always perform online banking in secure channel i.e check for Step 5 : Never respond to the emails that ask for your personal infor-
the Padlock and secure channel for secure banking mation like creditcard /debit card/bank information.
31
Here are the few Phishing techniques…. Do’s
• Social networking sites are now a prime target of phishing attacks, • Be cautious about opening any attachments or downloading files
since the personal details in such site can be used in identity theft you receive regardless of who sent them.
• One of the latest phishing techniques is tabnabbing. It takes ad- • Look for the sender email ID before you enter/give away any
vantage of the multiple tabs that users use and silently redirects personal information.
a user to the affected site. • Use updated antivirus, antispyware and firewall software.
• Filter Evasion - Phishers have used images instead of text to make • Always update your web browser and enable phishing filter.
it harder for anti-phishing filters to detect text commonly used in • If you receive any suspicious e-mail, do call the company to con-
phishing e-mails. firm if it is legitimate or not.
• Phone Phishing - Not all phishing attacks require a fake website. • Do use a separate email accounts for things like shopping online,
Messages that claimed to be from a bank told users to dial a phone personal etc.
number regarding problems with their bank accounts. Once the
phone number (owned by the phisher, and provided by a Voice Don’ts
over IP service) was dialed, prompts told users to enter their ac- • Don’t reply to an e-mail or pop-up message that asks for personal
count numbers and PIN. Visher sometimes uses fake caller-ID data or financial information.
to give the appearance that calls come from a trusted organiza- • Don’t e-mail personal or financial information i.e credit card or
tion. other sensitive information via e-mail.
• Another attack used successfully is to forward the client to a bank’s • Don’t click on any email or social media messages you don’t ex-
legitimate website, then to place a popup window requesting cre- pect or need.
dentials on top of the website in a way that it appears the bank is • Don’t open e-mail that you have any suspicion may not be legiti-
requesting this sensitive information mate. If it is legitimate and the individual may try to contact you,
if the email really needs.
• Don’t open attachments that you were not expecting, especially
What should I do if I think I’ve responded to a phishing ZIP files and NEVER run .exe files.
scam? • Don’t use your company e-mail address for personal things.
• Take these steps to minimize any damage if you suspect that you’ve • Don’t open/download attachments from any spam e-mail.
responded to a phishing scam with personal or financial informa- • Don’t open suspicious videos or images in social networking
tion or entered this information into a fake website. sites since social networking sites are prime target of phishing.
• Change the passwords or PINs of all your online accounts that you • Never respond to phone calls asking for bank details. It might be
think could be compromised. vishing (voice phishing).
• Place a fraud alert on your credit reports. Check with your bank or • Beware of phishing phone calls.
financial advisor if you’re not sure how to do this. • Don’t respond if you receive any message(sms) asking you to
• Contact the bank or the online merchant directly. confirm account information that has been “stolen” or “lost”
• Do not follow the link in the fraudulent e-mail. or encouraging you to reveal personal information in order to
• Routinely review your bank and credit card statements for unex- receive a prize, it’s most likely a form of phishing
plained charges or inquiries that you didn’t initiate.
32
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
·À¢„¢í ¾¡ì̾ø¸û
·À¢„¢í (Phishing) ±ýÀÐ ¿õÀ¢ì¨¸ìÌâÂÅá Ó¸ãÊ¢ðÎ Á¢ýÉïºÄ¢ý ãÄõ ¾¸Åø¸¨Ç §º¸Ã¢ò¾ø «¾¡ÅÐ ÀÂɡǢ¢ý
¦ÀÂ÷, À¡Ð¸¡ôÒ ÌȢ£Î, þøº¢Â ÌȢ£Î, Åí¸¢ ¸½ìÌ ÁüÚõ ¸¼ý «ð¨¼ ¾¸Åø¸û.
·À¢„¢í (Phishing) ²Á¡üÚ¸¡Ã÷¸û Á¢ýÉïºø «øÄÐ ¯¼ÉÊ ÌÚ了ö¾¢ ãÄõ ²Á¡üÚ §Å¨Ä¢¨É ¦ºö¸¢ýÈÉ÷.
«¾¡ÅÐ þ¾ýãÄõ ÁüÈÅ÷¸¨Ç ÓÂüº¢ ¦ºöÐ ²Á¡üÚ Á¢ýÉïºø¸ÙìÌ À¾¢ÄÇ¢ì¸ ¨Å츢ÈýÈÉ÷. ²Á¡üÚ þ¨½Âò¾Ç
Àì¸õ ¿õÀ¾Ìó¾ ¿¢ÚÅÉò¾¢ý þ¨½Âò¾Ç Àì¸ò¾¢¨É §À¡ýÚ þÕìÌõ.
33
yy þô¦À¡ØÐ ÀÂýÀÎòÐõ Ò¾¢Â Ó¨È ·À¢„¢í Tabnabbing «¾¡ÅÐ
ÀÂÉ¡Ç¢ ´§Ã §¿Ãò¾¢ø Àø§ÅÚ þ¨½Âò¾Ç Àì¸ò¾¢¨É À¡÷ìÌõ
§À¡Ð «Å÷¸ÙìÌ ¦¾Ã¢Â¡Áø À¡¾¢ôÀ¢¨É ¯ñ¼¡ìÌõ þ¨½ÔûÇ
Àì¸ò¾¢üìÌ «¨ÆòÐî ¦ºøÖõ.
±ô¦À¡ØÐõ Ô¬÷±ø (URL) ±ÉôÀÎõ þ¨½Âò¾Ç Ó¸Åâ¢¨É yy Åʸð¼ø ²öôÒ Ó¨È¡ø ¾Å¢÷ò¾ø - ·À¢„¢í ²Á¡üÚ
¾ð¼îÍ ¦ºö§¾ þ¨½Âò¾Çò¾¢ý ¯û§Ç ¦ºøÄ §ÅñÎõ Á¢ýÉïºÄ¢¨É «¾¢ø ÅÕõ ¯¨Ã¢¨É ¨ÅòÐ ¸ñ¼È¢Å÷
¬É¡ø ²Á¡üÚ측Ã÷¸û ¯¨ÃìÌ À¾¢ø À¼ò¾¢¨É ¦À¡Õò¾¢
Ó¨È 3 :- ±ô¦À¡ØÐõ þ¨½Âò¾Ç Åí¸¢ ¦ºÂøÀ¡ð欃 À¡Ð¸¡ôÀ¡É «ÛôÒ¸¢È¡÷¸û þ¾É¡ø ¬ñÊ-·À¢„¢í ¸ñ¼Ã¢Å¾÷Ì §ÁÖõ
¦¾¡¼÷À¢ø §Áü¦¸¡ûÇ×õ º¢ì¸ø¸¨Ç ²üÀÎòи¢ýÈÉ÷
yy ¦¾¡¨Ä§Àº¢ ·À¢„¢í - ±øÄ¡ •À¢„¢í ¿¼ÅÊ쨸¸û þ¨½Âò¾Ç
Àì¸ò¾¢ý ãÄõ ÁðÎõ ¿¨¼¦ÀÚž¢ø¨Ä. ¯í¸ÙìÌ ¯í¸û
Åí¸¢ ¸½ì¸¢ø ´Õ À¢Ãîº¨É ±É§Å ¿£í¸û ¦¾¡¨Ä§Àº¢Â¢ý
þ¨½Âò¾Ç Àì¸õ ¿õÀ¸Á¡É¾¡ À¡Ð¸¡ôÀ¡É¾¡ ±É ¬Ã¡Â §ÅñÎõ. ãÄõ ±í¸¨Ç «Û¸×õ ±ýÈ ÌÚï ¦ºö¾¢Â¢¨É «ÛôÒÅ¡÷¸û,
±ôÀÊ ±ýÈ¡ø «¾ý Ó¸ÅâÀð¨¼Â¡ÉÐ À¡Ð¸¡ôÀ¡É¡¾¡ ±ýÚ ¿£í¸û ¦¾¡¨Ä§Àº¢Â¢ý ¦¾¡¼÷Ò ¦¸¡ûÇ ÓÂüº¢ìÌõ §À¡Ð «¨Å
¬Ã¡Â §ÅñÎõ. (https (or) Padlock and address bar) ¯í¸Ç¢¼õ Åí¸¢¸½ìÌ ±ñ ÁüÚõ ¸¼×î ¦º¡øÄ¢¨É §¸ðÌõ.
«ó¾ ¦¾¡¨Ä§Àº¢Â¢ý ¾¸Åø¸¨Ç ¬Ã¡öó¾¡ø «Ð ¿õÀò¾Ìó¾
Ó¨È4 :- ¿£í¸û ¾É¢ ¿À÷ ¾¸Åø ÁüÚõ Åí¸¢ ¸½ìÌ Å¢ÅÃí¸¨Ç ¿¢ÚÅÉòШ¼ÂÐ §À¡ýÚ þÕìÌõ.
§¸ðÎ ±¾¡ÅÐ Á¢ýÉïºÄ¢¨É ¦ÀüÈ¡§Ä¡ «øÄÐ ¿ñÀ÷¸Ç¢¼Á¢ÕóÐ
«ÅºÃò §¾¨Å¸Ù측¸ À½õ §ÅñÊ Á¢ýÉïºÄ¢¨É ¦ÀüÈ¡§Ä¡ ·À¢„¢í ÌÚ了ö¾¢¸¨Ç ¸ñ¼È¢Â×õ Ó¨È :-
«ÅüÈ¢ø ¯í¸ÙìÌ ²¾¡ÅÐ ºó§¾¸õ ²üÀð¼¡ø «¾¢ø ÌÈ¢ôÀ¢ðÎûÇ yy ¦À¡ÐÅ¡¸ ·À¢„¢í ÌÚ了ö¾¢ þÄ츽ôÀ¢¨ÆÔ¼Ûõ ÁüÚõ
Á¢ýÉïºÖìÌ À¾¢ÄǢ측¾£÷¸û. ¿£í¸û «ÅüÈ¢ø ¯Ã¢Â ¿¢ÚÅÉòмý ¯¨Ã¢ø ¯ûÇ ±ØòÐì¸û ´ýÈ¢ý Á£Ð ´ýÚ «¨Áó¾¢ÕìÌõ
¦¾¡¼÷Ò ¦¸¡ñÎ ¯Ú¾¢ ¦ºö¾ À¢ý À¾¢ÄÇ¢ì¸×õ yy «ÅüÚìÌ ¯í¸Ù¨¼Â ¯ñ¨ÁÂ¡É ¾¸Åø¸¨Ç «ÛôÀ¡Áø
¦À¡öÂ¡É ¾¸Åø¸¨Ç «ÛôÀ×õ
34
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
35
Desktop Security
Why do you need to secure your Desktop?
A personal computer used without proper security measure could lead to exploiting the system
for illegal activities using the resources of such insecured computers. These exploiters could be
Virus, Trojans, Keyloggers and sometimes real hackers. This may result in data theft, data loss,
personal information disclosure, stealing of credentials like passwords etc. So, protect and secure
your Personal Computer before it is compromised.
Things to remember while using your personal computer • Follow the installation steps as specified by the vendor docu-
• Always install Licensed Software so that you have regular updates ment.
of your Operating system and Applications. In case of open source • Use the CD provided by the Vendor to install your
software, make sure to update frequently. • Motherboard drivers
• Read the “Terms and Conditions” / “License Agreement” provided • Monitor drivers
by vendor/software before installation. • Audio & Video drivers
• Properly shutdown and switch off your personal computer after • Network drivers
the use along with your external devices like Monitor, Modem,
Speakers etc
36
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
Guidelines
Physical Security Data Security
• Regularly clean your system and it’s components. • Enable Auto-updates of your Operating System and update it reg-
Note: Turn your PC Off before cleaning it. ularly.
• Properly organize the power cables, wires, to prevent from water, • Download Anti-Virus Software from a Trusted Website and Install.
insects etc. Make sure it automatically gets updated with latest virus signa-
• While working at PC, be careful not to spill water or food items on tures.
it. • Download Anti-Spyware Software from a Trusted Website and In-
• Always follow “Safely Remove” option provided by the Operating stall. Make sure it automatically updates with latest definitions.
System while disconnecting the USB devices. • Use “Encryption” to secure your valuable Information.
• By setting BIOS password, you can prevent unauthorized access to Note: For encryption password is required, always remember the
your personal computer. password used while encrypting it, else data would not be available
• Switch off the computer when it’s not in use. thereafter.
Note: To setup BIOS password refer “Setting password to BIOS” sec- • Strong password should be used for “Admin” Account on computer
tion. and for other important applications like E-mail client, Financial
Applications (accounting etc).
Internet Security: • Backup : Periodically backup your computer data on CD / DVD or
• Follow Internet Ethics while browsing. USB drive etc.. in case it may get corrupted due to HardDisk fail-
• Check the copyright issues before using the content of Internet. ures or when reinstalling/format ting the system.
• Always access the site which uses https (Hyper Text Transfer Pro- • Recovery Disk: Always keep recovery disk suplied by Manufactur-
tocol Secure) while performing Online transactions, Downloads er / Vendor of the Computer System to recover the Operating Sys-
etc, which is secure. tem in the event of boot fail- ures due to system changes such as
• If the site uses SSL, verify the Certificate details like Who is the uncerificated Drivers/unknown Software pub- lisher.
owner, Expiry date of the certificate etc to confirm whether it is • Startup programs should be monitored / controlled for optimal
trusted or not. system performance.
• You can do this by clicking the lock icon.
• Use only Original Websites for downloading the files rather than Browser Security:
Third Party websites. • Always update your Web Browser with latest patches.
• Scan the downloaded files with an updated Anti-Virus Software • Use privacy or security settings which are inbuilt in the browser.
before using it. • Also use content filtering software.
• Install and properly configure a Software firewall, to protect • Always have Safe Search “ON” in Search Engine.
against malicious traffic.
37
Modem Security: Wireless Security:
• Change the default passwords. • Change default Administrator passwords.
• Switch off when not in use. • Turn On WPA (Wi-Fi Protected Access) / WEP Encryption.
• Change default SSID.
e-Mail Security: • Enable MAC address filtering.
• Always use strong password for your email account. • Turn off your wireless network when not in use.
• Always use Anti-Spyware Software to scan the eMails for Spam.
• Always scan the e-Mail attachments with latest updated Anti-Virus
and Anti-Spy ware before opening.
• Always remember to empty the Spam folder.
SETUPS
BIOS (Basic Input / Output System)
Settings :
• Computers BIOS is the first program that runs when computer is
started. You can tell the BIOS to ask for a password when it starts,
thus restricting access to your computer.
• To enter the BIOS setup program, sometimes called CMOS setup:
• Turn on or reboot your computer. The screen will display a series
of diagnostics and a memory check. A message will come “Hit the
<DEL> key to enter the BIOS setup program” will appear. [It’s not
always the DEL key some BIOS’s use F2 or F10 or any other key
combination, check your motherboard manual for more details].
• Note: Some BIOS versions use a graphical type menu with icons (a GUI) or have a
text interface, the principle however is exactly the same.
• There are two options that relate to passwords, Supervisor
Password and User Pass word, these relate to controlling access to
the BIOS Setup Program and the Machine Boot respectively.
• Note: Not all BIOS’s have this password feature, your bios may not have it in which you’ll not forget. The BIOS will then prompt you to confirm the
case you won’t be able to restrict access to your computer in this way. password, just type the same thing again. Now you’ll want to set
• Select USER PASSWORD and you’ll be prompted to enter a password. your system to ask for that password every time it boots, so select
You should now enter a password of up to eight characters (most the BIOS FEATURES SETUP option, to see a menu. It’s the Password
BIOS’s are limited to eight characters unfortunately). I recommend Check option if you are interested in, so select it and change the
you to use the full eight but take care that you choose something setting to “ALWAYS”. Now navigate back to the main menu and
38
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
select SAVE & EXIT SETUP. Your machine will then reboot and • Log in to the administrative site by entering the user name and
you’ll be prompted for the password. Each and ever-time you boot password provided in the user manual. Again, if you cannot locate
you’ll be asked for password you chose. these, call the modem manufacturer’s/vendor’s customer service.
• Note: This method of restricting access to your computer is not completely Usually the default username and password is “Admin.”
foolproof, there are ways around it. But it will stop or at least delay the majority • Select the Internet connection type. There are four types of Internet
of casual attempts to get access.
• Note: If you forget your BIOS password, consult your motherboard manual or if connection: “Dynamic IP Address,” “Static IP Address,” “PPPoE/
you don’t have one, consult the website of the BIOS manufacturer. PPPoA” and “Bridge Mode.” Call your Internet service provider
(ISP) to ask which setting best suits their wireless service.
How to connect a Wireless Modem to a Desktop • Choose “Dynamic IP Address” to get an IP address automatically
Computer ? from the ISP’s server. For every wireless Internet connection you
Instructions to be followed while connecting the Wireless Modem make, you receive an IP address. In some cases the IP address is
• Make sure you have the necessary equipment. Your wireless dynamic (it changes every time you connect to the Internet), and
modem package should in other cases it is static (the IP address remains the same even
• include the wireless modem (or wireless adapter); an installation after you disconnect and reconnect to the Internet). If the address
CD-ROM with a manual; an Ethernet cable (or a USB cable if you is dynamic, you will have to choose this setting so that the modem
have a wireless USB modem); a wireless antenna (conforming to automatically takes the IP from the ISP’s server whenever a new
wireless standards such as 802.11a, 802.11b, or 802.11g); and wireless connection is established. Enter your modem’s MAC
a power adapter. Call the retailer or the manufacturer of your Address (usually found at the back of the modem) and other
wireless modem if any of these items are missing. details. Refer to the user manual or call the modem manufacturer’s
• Read the manual to learn how the equipment functions. For / vendor’s customer service to get these details.
example, use the wireless antenna to connect to the wireless • Select “Static IP Address” if you are provided with a static IP. You
network ; use the Ethernet cable (or USB cable) to connect the will need to fill in the fields for “VPI,” “VCI,” “IP Address,” “Subnet
computer to the modem. Mask,” “ISP Gateway Address,” “Server Address,” “Primary DNS
• Attach your wireless antenna to the modem. Address,” “Secondary DSN Address” and “Connection Type.” These
• Hook up an Ethernet cable from your computer to a LAN/Ethernet details can be obtained from your ISP.
port on the modem. Or, if you have a wireless USB modem, connect • Opt for “PPPoE/PPPoA” if your ISP uses this type of connection. DSL
the USB cable to the USB port of the computer. users may use this connection. Enter your user name, password
• Connect the power adapter to the power connector of the modem, and other details. These will be provided by your ISP.
plug it in and switch it on. • Select the “Bridge Mode” if your ISP uses this connection type.
Enter the relevant details provided by your ISP.
• Finish the process by clicking on the icon that says “Finish” or “OK”
Setting Up the Wireless Modem
or something similar. Your modem should be set up now.
• Open your Web browser and enter the URL of the modem’s
• Enter any URL address in your browser’s address window to check
administrative site. If you can’t find it in the users’ manual, call the
whether Internet is working or not.
modem manufacturer’s/vendor’s customer service.
39
Do’s Dont’s
• Read the vendor document carefully and follow the guidelines to • Do not install pirated software such as
know how to setup the personal computer ¾¾ Operating System Software (Windows, Unix, etc..).
• Connect ¾¾ Application Software (Office, Database..etc).
¾¾ Keyboard ¾¾ Security Software (Antivirus, Antispyware..etc).
¾¾ Mouse Note: Remember, some Pirated Software themselve
¾¾ Monitor can be rogue programs.
¾¾ Speakers and • Do not plug the computer directly to the wall outlet as power
¾¾ Network Cable …... to CPU (Central Processing Unit) as direct- surges may destroy computer. Instead use a genuine surge pro-
ed in vendor document. tector to plug a computer.
¾¾ Connect CPU and Monitor to Electrical Outlets. • Don’t eat food or drink around the PC.
• Don’t place any magnets near the PC.
• Never spray or squirt any liquid onto any computer component.
If a spray is needed, spray the liquid onto a cloth and then use
that cloth to rub down the component.
• Don’t open the e-Mail attachments which have double extensions
40
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
¦¼Šì¼¡ô À¡Ð¸¡ôÒ
¯í¸Ù¨¼Â ¸½¢É¢ìÌ ²ý À¡Ð¸¡ôÒ §¾¨Å?
¸½¢É¢Â¢¨É À¡Ð¸¡ôÒ þøÄ¡Áø ÀÂýÀÎòÐõ §À¡Ð ¨ÅÊ (Virus), ð§Ã¡ƒýŠ (Trojans), ¸£Ä¡¸÷Š (keyloggers)
ãÄÁ¡¸ò ¾í¸û ¸½¢É¢Â¢¨É ¾¡ì¸¢ò ¾¢ÕÎÀÅ÷¸û ÀÄ Ó¨ÈÂüÈ ¸¡Ã¢Âí¸¨Ç ¦ºö ¿£í¸û «È¢Â¡Á§Ä ¯í¸û
¸½¢É¢Â¢¨É ÀÂýÀÎò¾¢ì ¦¸¡ûÅ÷.
¯í¸Ù¨¼Â ¾É¢¿À÷ ¸½¢É¢¨Âô À¡Ð¸¡ôÀ¡¸ «¨ÁôÀ¾üÌ Ó¾Ä¢ø ¿£í¸û Å¢üÀ¨É¡Çâýì ¨¸§Âð欃 ¸ÅÉÁ¡¸ô
ÀÊì¸ §ÅñÎõ ÁüÚõ À¢ýÅÕõ ¯¾Å¢Ó¨È¸¨Çô À¢ýÀüÈ §ÅñÎõ
¸½¢É¢Â¢¨Éô ÀÂýÀÎòÐõ§À¡Ð ¿¢¨ÉÅ¢ø Ó¾ø ¦¾¡¼ì¸ (First BOOT) ¸ÕŢ¢¨É ¸½¢É¢Â¢ý ÌÚó¾¸Î ¸ÕÅ¢ìÌ
¦¸¡ûǧÅñʨŠÁ¡üÈ×õ.
yy ±ô¦À¡ØÐõ ¯Ã¢Áõ ¦ÀüÈ ¦Áý¦À¡ÕÇ¢¨É ¦À¡ÕòÐõ §À¡Ð yy ÌÚó¾¸Î ¸ÕŢ¢ø ¯í¸Ù¨¼Â (CD/DVD¢¨É ¦À¡Õò¾×õ) À¢ý
¸½¢É¢Â¢¨É (Ctrl + Alt + Del) ±ýÈ ¦À¡ò¾¡ý¸¨Çì ¦¸¡ñÎ
þÂíÌõ «¨ÁôÒ (Operating System) ÁüÚõ þ¾Ã «¨ÁôÒ¸û
ÁÚ¦¾¡¼ì¸õ ¦ºöÔí¸û, ¦¾¡¼í¸¢Â À¢ý ¸½¢É¢ BOOT ¬Ìõ.
(Application) §À¡ýÈÅü¨È «ùÅô§À¡Ð ÒÐôÀ¢òÐ ¦¸¡ûÇ þÂÖõ. yy Å¢üÀ¨É¡Ç÷¸Ç¡ø ÌÈ¢ôÀ¢¼ôÀð¼ ¦À¡ÕòÐõ Өȸ¨Ç ¸ñÊôÀ¡¸
´Õ §Å¨Ç Open Source ¦Áý¦À¡Õð¸¨Ç ¿¢ÚŢɡø «ùÅô§À¡Ð À¢ýÀüÈ §ÅñÎõ.
«Åü¨È ÒÐôÀ¢ì¸×õ. yy Å¢üÀ¨É¡Ç÷¸Ç¡ø ¦¸¡Îì¸ôÀð¼ ¦À¡ÕòÐõ Ó¨È ¦¸¡ñ¼
yy ¦Áý¦À¡ÕÇ¢¨Éô ¦À¡ÕòОüÌ Óý Å¢üÀ¨É¡Çâý ÌÚó¾¸Î¸¨Çô ÀÂýÀÎò¾¢ ¸£Æì¸ñ¼ ¸ÕÅ¢¸¨Ç þÂì¸ò §¾¨Å¡É
¿¢Àó¾¨É¸û ÁüÚõ ¯Ã¢Áõ º¡ýÈ¢¾ú §À¡ýÈÅüÈ¢¨Éì ¸ÅÉÓ¼ý ¦Áý¦À¡ÕÇ¢¨É ¿¢ÚÅ×õ
ÀÊì¸ §ÅñÎõ. ¾¾ Á¾÷§À¡÷ð ð¨ÃÅ÷` (Motherboard Drivers)
yy ¸½¢É¢Â¢ø ¦ÅǢ£ðÎ ¸ÕÅ¢¸û «¾¡ÅÐ (Monitor, Modem, Speakers ¾¾ Á¡É¢¼÷ ð¨ÃÅ÷` (Monitor Drivers)
ÁüÚõ ÀÄ) ÀÂýÀÎò¾¢ ÓÊò¾ À¢ýÒ ¸½¢É¢¨Â Өȡ¸ «Á÷ò¾ ¾¾ ¬Ê§Â¡ & ţʧ¡ ð¨ÃÅ÷` (Audio & Video Drivers)
(ShutDown) §ÅñÎõ. ¾¾ ¦¿ð¦Å¡÷ì ð¨ÃÅ÷` (Network Drivers)
¦Áý¦À¡Õû ¦À¡Õòоø:-
yy þÂì¸ «¨ÁôÒ (Operating System) ¦À¡Õòоø:-
¾¾ OS-³ ¦À¡ÕòОüÌ Óý «¨Å ¯Ã¢Áõ ¦ÀüȾ¡¸ þÕì¸ §ÅñÎõ
¯Ã¢Á º¡ýÈ¢¾Æ¢¨É ¸ÅÉÁ¡¸ô ÀÊì¸ §ÅñÎõ.
¾¾ ¯í¸û ¸½¢É¢Â¢¨É ON ¦ºö¾×¼ý BIOS «¨ÁôÀ¢üìÌ ¦ºýÚ À¢ý
41
ÅÆ¢¸¡ðθû: ¾¸Åø À¡Ð¸¡ôÒ Ó¨È:-
yy ¦¾¡¼÷óÐ ¯í¸Ù¨¼Â ¸½¢É¢Â¢¨ÉÔõ ÁüÚõ «ÅüÈ¢ý ÁüÈ yy þÂì¸ «¨ÁôÀ¢¨É (Operating System) ¾¡É¡¸§Å «¾¨É
À¡¸í¸¨ÇÔõ Íò¾õ ¦ºö §ÅñÎõ. ÒÐôÀ¢òÐì ¦¸¡ûÙõ Ũ¸Â¢ø «¨Áì¸ §ÅñÎõ.
ÌÈ¢ôÒ: Íò¾õ ¦ºöÔõ Óý ¸½¢É¢¨Â «Á÷ò¾¢Å¢¼ §ÅñÎõ yy ¿õÀò¾Ìó¾ þ¨½Â¾Ç Àì¸ò¾¢Ä¢ÕóÐ (Anti-virus) ¸¨Çì ¸ðÎ
yy ¸½¢É¢Â¢ø ¿£÷ À¼¡Áø À¡÷òÐì ¦¸¡ûÇ §ÅñÎõ. «¾Û¨¼Â ¿¢Ãø ¦Áý¦À¡ÕÇ¢¨É À¾¢Å¢Èì¸õ ¦ºöÐ À¢ý ¦À¡Õò¾§ÅñÎõ.
þ¨½ôÒ¸¨Ç º¡Ã¢À¡÷ì¸ §ÅñÎõ. ¸½¢É¢Â¢¨Éô ÀÂýÀÎòÐõ§À¡Ð yy ¯í¸Ù¨¼Â Á¢¸ Ó츢ÂÁ¡É ¾¸Åø¸¨Ç Á¨È¡ì¸õ (Encryption)
«ÅüÈ¢ý Á£Ð ¾ñ½£÷ ÁüÚõ ¯½× ¦À¡Õð¸¨Ç ¨ÅòÐ ãÄõ À¡Ð¸¡ì¸Ä¡õ.
¯ñϾ¨Äò ¾Å¢÷ì¸ §ÅñÎõ yy ¸½¢É¢Â¢ý ¿¢÷Å¡¸¢ “Admin” ¸½ìÌ ÁüÚõ Á¢ýÉïºø¸û
yy USB ¸ÕÅ¢¸¨Ç ¸½¢É¢Â¢Ä¢ÕóÐ ¿£ìÌõ §À¡Ð “Safely Remove” Å¡Ê쨸¡Ç÷ ÁüÚõ Åí¸¢ ¸½ìÌ §À¡ýȨÅìÌ ¸ÊÉÁ¡É
ӨȢ¨É À¢ýÀüÈ §ÅñÎõ. ¸¼×¡ø Å¡÷ò¨¾Â¢¨É ¦¸¡ñÎ «¨Áì¸ §ÅñÎõ.
yy BIOS «¨ÁôÀ¢ø ¸¼×¡ø¨Äô ¦À¡ÕòО¢ý ãÄõ yy À¢ýÀ¾¢× ¸¡ôÒÓ¨È: (Backup)
¯Ã¢¨ÁÂüÈÅ÷¸û ¯í¸û ¸½¢É¢Â¢¨Éô ÀÂýÀÎòО¢Ä¢ÕóÐ ´Õ ÌÈ¢ôÀ¢ð¼ ¸¡Ä þ¨¼¦ÅǢ¢ø ¸½¢É¢Â¢ý ¾¸Åø¸¨Ç Hard
¾Îì¸Ä¡õ Disk /CD / USB ð¨Ãù ãÄÁ¡¸ ¸¡ôÒ À¢ýÀ¾¢× ¦ºöÐ ¦¸¡ûÇ
yy ¸½¢É¢Â¢¨Éô ÀÂýÀÎò¾¡¾§À¡Ð «ÅüÈ¢¨É «Á÷ò¾¢ (OFF) ¨Åì¸ §ÅñÎõ ÁüÚõ þÂìÌ ¾Çõ ¦ºÂø þÆ󾡧ġ «øÄÐ ÁÚ
§ÅñÎõ. ¦À¡Õò¾õ «øÄÐ þÂì¸ «¨ÁôÀ¢¨É Á¡üÈ ¿¢¨Éò¾¡§Ä¡
ÌÈ¢ôÒ:- BIOS ¸¼×¡ø¨Ä «¨Áì¸ “Setting password to BIOS” ¸½¢É¢Â¢ø ¯ûÇ ¾¸Åø¸¨Ç À¢ýÀ¾¢× ¦ºöÐ ¦¸¡ûÇ §ÅñÎõ.
±ýÈ À̾¢Â¢¨É ÀÂýÀÎò¾×õ yy ¾¢ÕõÀ ¦ÀÚõ ¾ðÎ À¡Ð¸¡ôÒ Ó¨È (Recovery Disk)
±ô¦À¡ØÐõ ¾Ã׸¨Ç ¾¢ÕõÀô ¦ÀÈìÜÊ ʊ¸¢¨É
þ¨½Âô À¡Ð¸¡ôÒ : ÀÂýÀÎò¾×õ. þ¨Å Å¢üÀ¨É¡Ç÷¸Ç¡ø ÅÆí¸ôÀ𼾡¸
yy þ¨½Âò¾¢ø ¸¢¨¼ìÌõ ±ó¾¦Å¡Õ ¾¸ÅÄ¢¨ÉÔõ ¯Ã¢Áõ ¦ÀüÚô þÕì¸ §ÅñÎõ
ÀÂýÀÎò¾×õ. yy ¸½¢É¢ º¢ÈôÀ¡¸ þÂí¸ò¾ì¸ Ũ¸Â¢ø «¾ý ÐÅì¸ ¦ºÂÄ¢ø
yy þ¨½Âò¾Ç ÀâÁ¡üÈõ, À¾¢Å¢Èì¸õ ÁüÚõ ÀÄ ¦ºÂø¸û ¦ºöÔõ ¿¢ÚÅôÀ¼ §ÅñÎõ.
§À¡Ð `HTTPS' (HyperText Transfer Protocol Secured) þ¨½Âò¾Ç
Àì¸ò¾¢¨É ÀÂýÀÎò¾×õ þ¨Å Á¢¸×õ À¡Ð¸¡ôÀ¡ÉÐ. §Á¡¼õ À¡Ð¸¡ôÒ Ó¨È :
yy ¿£í¸û SSL Àì¸ò¾¢¨É ÀÂýÀÎò¾¢É¡ø «¾ý º¡ýÈ¢¾Æ¢ø ¡÷ yy ¸½¢É¢Â¢ø ¿¢¨ÄÂ¡É À¡Ð¸¡ôÒ Å¡÷ò¨¾Â¢¨É Á¡üÈ×õ.
¯Ã¢¨Á¡Ç÷ ÁüÚõ ¸¡Ä¡Å¾¢ §¾¾¢Ôõ ¸ÅÉ¢ì¸ §ÅñÎõ. À¢ý «¨Å yy ÀÂýÀÎò¾¡¾ §À¡Ð «Á÷ò¾¢ ¨Åì¸ §ÅñÎõ
¿õÀ¸Á¡É¾¡ ±ýÚ À¡÷ì¸ §ÅñÎõ. «ÅüÈ¢¨É “Ä¡ì ³ì¸¡¨É”
(Lock Icon) «ØòО¢ý ãÄõ ¦¾Ã¢óÐ ¦¸¡ûÇÄ¡õ. Á¢ýÉïºø À¡Ð¸¡ôÒ Ó¨È :
yy «ºø þ¨½Âò¾Ç Àì¸ò¾¢¨É ÁðΧÁ À¾¢Å¢Èì¸õ ¦ºö yy Á¢ýÉïºø ¸½ì̸ÙìÌ ±ô¦À¡ØÐõ ºì¾¢ Å¡öó¾ ¸¼×î
ÀÂýÀÎò¾ §ÅñÎõ. ¦º¡ø¨Ä «¨Áì¸×õ.
yy ¦Áý¦À¡Õû •¨ÀÂ÷Å¡ø (Software Firewall) -Ä¢¨É ¿¢ÚÅ¢ yy ±ô¦À¡ØÐõ Á¢ýÉïºø þ¨½ôÒ¸¨Ç ¾¢ÈôÀ¾üìÌ Óý Anti-spy
þ¨½Âò¾¢ý š¢ġ¸ §¾¨ÅÂüÈ À¡Ã¢Á¡üÈí¸û. ²Ðõ ¿¢¸ú¸¢È¾¡ «øÄÐ ¸¨Çì ¸ðÎ ¿¢Ãø (Anti-virus) ¦¸¡ñÎ §º¡¾¢ì¸×õ.
±ýÀ¾¢¨É ¸ÅÉ¢ì¸×õ, ¸ðÎôÀÎò¾×õ ¯À§Â¡¸ô Àθ¢ÈÐ. yy ±ô¦À¡ØÐõ §¾¨ÅÂüÈ Á¢ýÉïºø §¸¡ôÒ¨È (SPAM Folder)
yy À¾¢Å¢Èì¸õ ¦ºö¾ §¸¡ôÒ¸¨Ç (Antivirus) ¸¨Çì ¸ðÎ ¿¢Ãø ¦Áý À̾¢Â¢¨É ¸¡Ä¢Â¡¸ ¨ÅòÐì ¦¸¡ûÇ §ÅñÎõ
¦À¡ÕÇ¢¨É ¦¸¡ñÎ §º¡¾¢ò¾ À¢ý ÀÂýÀÎò¾×õ.
yy Ó¨ÈÂ¡É ¦Áý¦À¡ÕÇ¢¨É ÀÂýÀÎò¾×õ.
42
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
43
ÅÂ÷¦ÄŠ §Á¡¼òмý ¦¼Šì¼¡ô ¸½¢ô¦À¡È¢¨Â ±ôÀÊ ±ýÀ¨Å. þ¨½Â §º¨Å ÅÆíÌÀŨÃì ÜôÀ¢ðÎ ±ó¾ ¦ºðÊí,
¦À¡ÕòÐÅÐ ÅÂ÷¦ÄŠ §º¨ÅìÌô ÀÂýÀÎõ ±ýÚ §¸Ùí¸û.
yy ³±ŠÀ¢ ¦º÷ÅâĢÕóÐ ¾¡É¡¸§Å ³À¢ «ðèºô ¦ÀÚžüÌ
ÅÂ÷¦ÄŠ §Á¡¼ò¨¾ ¦À¡ÕòÐõ§À¡Ð ¸ÅÉ¢ì¸ §ÅñʨÅ
¨¼ÉÁ¢ì ³À¢ «ðÊ §¾¨Å. ´ù¦Å¡Õ ÅÂ÷ÄŠ þ¨½Âò
yy ¯í¸ÙìÌò §¾¨ÅÂ¡É ¸ÕÅ¢¾¡ý ¯í¸ÙìÌ ¦¸¡Îì¸ôÀðÎûǾ¡
¦¾¡¼÷¨À ¯ÕÅ¡ìÌõ §À¡Ðõ ´Õ ³À¢ «ðÊ ¸¢¨¼ìÌõ. «Ð º¢Ä
±ýÚ ¿¢îºÂôÀÎò¾¢ì¦¸¡ûÅÐ «Åº¢Âõ.
ºÁÂí¸Ç¢ø ´ù¦Å¡Õ Ó¨È þ¨½Âò ¦¾¡¼÷Ò ²üÀÎòÐõ §À¡Ðõ
yy ÅÂ÷¦ÄŠ §Á¡¼ò¨¾§Â¡ ÅÂ÷¦ÄŠ §Á¡¼õ «¼¡ô¼÷ ¸ÕÅ¢¨Â§Â¡
Á¡Úõ Ũ¸Â¢Öõ ³À¢ «ðÊ þÕìÌõ. ÁüÈ º¢Ä þ¨½ôҸǢø ³À¢
þ¨½ì¸ §ÅñÎõ. ¨¸§Âðμý þýŠ¼¡§Äºý º¢Ê§Ã¡õ þÕìÌõ.
«ðÊ Á¡È§Å Á¡È¡Ð. ³À¢ Ó¸Åâ Á¡Úõ ¾ý¨ÁÔ¼ý þÕó¾¡ø
«òмý ´Õ ®ò¾÷¦¿ð §¸À¢û ¦¸¡Îì¸ôÀðÊÕìÌõ(¯í¸Ç¢¼õ
þó¾ ¦ºðÊí¨¸ ¿£í¸û §¾÷ó¦¾ÎôÀÐ ¿øÄÐ. «ô§À¡Ð¾¡ý Ò¾¢Â
ÅÂ÷¦ÄŠ Ô±ŠÀ¢ §Á¡¼õ þÕó¾¡ø) ´Õ ÅÂ÷¦ÄŠ ¬ñ¦¼ýÉ¡
ÅÂ÷¦Ä` ¦¾¡¼÷Ò ¦¸¡Îì¸ôÀÎõ §À¡¦¾øÄ¡õ, §Á¡¼õ ¾¡É¡¸§Å
(802.11a, 802.11b, or 802.11g þý ¾Ãò¨¾ô ¦ÀüȾ¡¸
³À¢ «ðèº, ³±ŠÀ¢ º÷ÅâĢÕóÐ ±ÎòÐ즸¡ûÙõ . ÀÂɡǢ¢ý
þÕ츧ÅñÎõ); ÁüÚõ ´Õ ÀÅ÷ «¼¡ô¼÷. ¸¨¼ì¸¡Ã÷ «øÄÐ
¨¸§Âð¨¼ô À¡÷ì¸×õ. «øÄÐ §Á¡¼õ ¾Â¡Ã¢ôÀ¡Ç÷, Ž¢¸¨Ã
¾Â¡Ã¢ôÀ¡Ç¨Ãì ÜôÀ¢ðÎ ÅÂ÷¦ÄŠ §Á¡¼ò¾¢ø ²¾¡ÅÐ ¦À¡Õû
ÜôÀ¢ðΠŢÅÃí¸¨Çô ¦ÀÈ×õ.
þøÄ¡Áø þÕó¾¡ø ¦º¡øÄ×õ.
yy ¯í¸ÙìÌ `¼¡ðÊì ³À¢ ÅÆí¸ôÀðÊÕó¾¡ø “Static IP Address” ³
yy ¸ÕÅ¢ ±ôÀÊ þÂí̸¢ÈÐ ±ýÀ¨¾ ¦¾Ã¢óЦ¸¡ûÇ ¨¸§Âð¨¼ô
ÀÂýÀÎò¾×õ. . “VPI,” “VCI,” “IP Address,” “Subnet Mask,” “ISP Gateway
ÀÊì¸×õ. ¯¾¡Ã½ò¾¢üÌ, ÅÂ÷¦ÄŠ ¬ñ¼É¡¨Å,ÅÂ÷¦ÄŠ
Address,” “Server Address,” “Primary DNS Address,” “Secondary DSN
¦¿ð¦Å¡÷ì̼ý ¦À¡Õò¾ô ÀÂýÀÎò¾×õ. §Á¡¼òмý ÅÂ÷¦ÄŠ
Address” and “Connection Type.” ¬¸¢Â À£øθǢø ¿¢ÃôÀ §ÅñÎõ.
¬ñ¼É¡¨Å þ¨½ì¸×õ.
þó¾ Å¢ÅÃí¸¨Ç ¯í¸û ³±ŠÀ¢Â¢¼Á¢ÕóÐ ¦ÀüÚ즸¡ûÇÄ¡õ.
yy ®¾÷¦¿ð §¸À¢¨Ç ¯í¸û ¸½¢ô¦À¡È¢Â¢ø ±ÎòÐ §Á¡¼ò¾¢ý
yy ¯í¸ÇÐ ³±ŠÀ¢ þó¾ Ũ¸ ¦¾¡¼÷¨À ÀÂýÀÎòÐÁ¡É¡ø
§Äý/®¾÷¦¿ð §À¡÷ðμý þ¨½ì¸×õ. ¯í¸Ç¢¼õ ÅÂ÷¦ÄŠ
“PPPoE/PPPoA” ³ §¾÷ó¦¾Îì¸×õ. ʱŠ±ø ÀÂÉ¡Ç¢ì þó¾
Ô±ŠÀ¢ §Á¡¼õ þÕó¾¡ø Ô±ŠÀ¢ §¸À¢¨Ç ¸½¢ô¦À¡È¢Â¢ø ¯ûÇ
þ¨½ô¨Àô ÀÂýÀÎò¾ìÜÎõ. ¯í¸ÇÐ äº÷ §¿õ, À¡Š§Å÷Î
Ô±ŠÀ¢ §À¡÷ðμý þ¨½ì¸×õ.
ÁüÚõ À¢È Å¢ÅÃí¸¨Ç ±ñ¼÷ ¦ºöÂ×õ. þÐ ¯í¸ÇÐ ³±ŠÀ¢Â¡ø
yy ÀÅ÷ «¼¡ô¼¨Ã, §Á¡¼ò¾¢ý ÀÅ÷ ¸¦Éì¼Õ¼ý ¦À¡Õò¾×õ. ôÇì
ÅÆí¸ôÀðÊÕìÌõ.
¦ºöÐ ÍÅ¢ðî ¬ý ¦ºöÂ×õ
yy ¯í¸û ³±`À¢ þó¾ Ũ¸ þ¨½ô¨À ¨Åò¾¢Õó¾¡ø “Bridge Mode”
³ §¾÷ó¦¾Îì¸×õ. ¯í¸ÇÐ ³±ŠÀ¢Â¡ø ¾ÃôÀð¼ ¦À¡Õò¾Á¡É
ÅÂ÷¦ÄŠ §Á¡¼ò¨¾ ¦ºð«ô ¦ºöÅÐ
Å¢ÅÃí¸¨Ç ±ñ¼÷ ¦ºöÂ×õ.
yy ¦Åô ôÃ׺¨Ã ¾¢ÈóÐ, §Á¡¼Á¢ý «ðÁ¢É¢Šð§ÃÊù ¾Çò¾¢ø
yy “Finish” «øÄÐ “OK” «øÄÐ §ÅÚ ³¸¡É¢ø ¸¢Ç¢ì ¦ºöÐ
Ô¬÷±ø¨Ä ±ñ¼÷ ¦ºöÂ×õ.äº÷ §ÁÛÅÄ¢ø þøÄ¡Å¢ð¼¡ø,
¦ºÂøӨȨ â÷ò¾¢ ¦ºöÂ×õ. ¯í¸ÇÐ §Á¡¼ò¨¾ ¦ºð «ô
§Á¡¼õ ¾Â¡Ã¢ôÀ¡Ç÷ «øÄРŢüÀ¨É¡Ǩà šÊ쨸¡Ç÷
¦ºö¾¢Õì¸ §ÅñÎõ.
§º¨ÅìÌ «¨ÆòÐì §¸ð¸×õ.
yy ôÃ׺âý Ó¸Åâ Å¢ñ§¼¡Å¢ø ²¾¡ÅÐ Ô¬÷±ø Ó¸Åâ¨Â þðÎ,
yy «ðÁ¢É¢Šð§ÃÊù ¾Çò¾¢ø Ä¡ì ¬ý ¦ºöÐ, äº÷ §¿õ ÁüÚõ
þ¨½Âò ¦¾¡¼÷Ò ¸¢¨¼ì¸¢È¾¡ ±ýÚ À¡÷ì¸×õ.
À¡`§Å÷¨¼ ±ñ¼÷ ¦ºöÐ äº÷ §ÁÛÅÄ¢ø ¦¸¡Îì¸ôÀð¼Ð §À¡Ä
¦ºöÂ×õ. ¯í¸Ç¡ø ¸ñ¼È¢Â ÓÊ¡Ţð¼¡ø §Á¡¼õ ¾Â¡Ã¢ôÀ¡Ç÷
«øÄРŢüÀ¨É¡Ǩà šÊ쨸¡Ç÷ §º¨ÅìÌ «¨ÆòÐì
§¸ð¸×õ. ¦À¡ÐÅ¡¸ username ÁüÚõ password, “Admin” ¬¸
þÕìÌõ.
yy þ¨½Âò ¦¾¡¼÷Ò Å¨¸¨Â ӾĢø §¾÷ó¦¾Îì¸×õ. ¿¡ýÌ
Ũ¸Â¡É þ¨½Âò ¦¾¡¼÷Ò¸û ¯ûÇÉ: ¨¼ÉÁ¢ì ³À¢ «ðÊ,
Š¼¡ðÊì ³À¢ «ðÊ, À¢À¢À¢µþ/À¢À¢À¢µ² ÁüÚõ À¢Ã¢ðˆ §Á¡ð
44
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
45
USB Storage Device Security
USB (Universal Serial Bus) storage devices are very convenient to transfer data between different computers. You can plug it into
a USB port, copy your data, remove it and be on your way. Unfortunately this portability, convenience and popularity also brings
different threats to your information.
Data thefts and Data leakage are everyday news now! All these can be controlled or minimized with care, awareness and by using
appropriate tools to secure the information. The tips and recommendations provided in this document helps you to keep your in-
formation secure while using USB storage devices.
Threats What to do when you lose the Device?
• Malware Infection • If you have stored any personal or sensitive information inside
¾¾ Malware Spreads through USB storage devices. Somebody the USB drive like passwords etc, imediately change all passwords
may intentionally sell USB storage devices with malware to along with security questions and answers provided during any
track your activities, files, systems and networks. account creation [There may be chances that hacker can retrieve
¾¾ Malware may spread from one device to another device your online account logon information by using data in the stolen
through USB Storage Devices using autorun.exe, which is by drive].
default enabled. • Also ensure that all security measures have been taken against the
• Unauthorized Usage data lost.
¾¾ Somebody may steal your USB Devices for Data.
46
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
47
Ô±ŠÀ¢ §º¸Ãì ¸ÕŢ¢ý À¡Ð¸¡ôÒ
Ô±ŠÀ¢ (ÔÉ¢Å÷ºø º£Ã¢Âø ÀŠ) §º¸Ãì¸ÕÅ¢¸û(USB Storage), ¦Åù§ÅÚ ¸½¢ô¦À¡È¢¸Ù츢¨¼§Â ¾¸Åø,
Å¢ÅÃí¸¨Ç ÀâÁ¡üÚžüÌ ¯¸ó¾ ¯À¸Ã½í¸Ç¡¸ ¯ûÇÉ. Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢¨Â, ¸½¢ô¦À¡È¢Â¢ø
¯ûÇ Ô±ŠÀ¢ §À¡÷ðÊø ¦ºÕ¸¢ ¯í¸û Å¢ÅÃí¸¨Ç ¿¸ø ¦ºöЦ¸¡ûÇÄ¡õ. «¾üÌô À¢ÈÌ Ô±ŠÀ¢
§º¸Ãì ¸ÕÅ¢¨Â ¯ÕÅ¢ ±ÎòÐÅ¢¼Ä¡õ. Ðþ¢÷‰¼ÅºÁ¡¸ þó¾ì ¸ÕŢ¢ý ±Ç¢¨ÁÂ¡É ¨¸Â¡Ù¾Öõ,
¦ºª¸Ã¢ÂÓõ, À¢ÃÀÄÓõ ¯í¸ÇÐ ¾¸Åø¸ÙìÌ «îÍÚò¾Ä¡¸×õ þÕ츢ýÈÐ.
¾¸Åø ¾¢ÕðθÙõ, ¾¸Åø¸û ¦ÅÇ¢§Â ¸º¢ÅÐõ «ýÈ¡¼ ¿¢¸ú׸ǡ¸ þýÚ Á¡È¢Å¢ð¼É! §À¡¾¢Â
¸ÅÉõ ÁüÚõ ŢƢôÒ½÷Լý, ºÃ¢Â¡É ¸ÕÅ¢¸¨ÇÔõ ÀÂýÀÎò¾¢É¡ø þôÀ¢Ãî¨É¸¨Çì
¸ðÎôÀÎò¾¢ ¾¸Åø¸¨ÇÔõ À¡Ð¸¡ì¸ ÓÊÔõ. Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸¨Çô (USB Storage)
ÀÂýÀÎò¾¢ ¯í¸û ¾¸Åø¸¨Çô À¡Ð¸¡ìÌõ ÊôŠ¸û ÁüÚõ ÀâóШøû þó¾ ¼¡ì̦ÁñÊø
¦¸¡Îì¸ôÀðÎûÇÉ
«îÍÚò¾ø¸û ¯í¸û ¸ÕÅ¢ ¦¾¡¨ÄóÐ §À¡É¡ø ±ýÉ ¦ºöÅÐ ?
yy Á¡ø§Å÷ ±ýÛõ ¨ÅÊ ¦¾¡üÚ yy ¯í¸û Ô±ŠÀ¢ §º¸Ãì¸ÕŢ¢ø (Storage Device) ¾É¢ôÀð¼,
¾¾ Á¡ø§Å÷ ±ÉôÀÎõ ¨ÅÊ, Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸û (USB Ó츢ÂÁ¡É ¾¸Åø¸Ç¡É À¡Š§Å÷θû §À¡ýÈÅü¨È
Storage) š¢ġ¸ô ÀÃ׸¢ÈÐ. ¨ÅÊ ¦ºÖò¾ôÀð¼ ¿£ í ¸û ¨Åò¾¢Õó¾¡ø, ¯¼ÉÊ¡¸ «ì¸×ñð ¾¢ÈôÀ¢ý§À¡Ð
Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸¨Ç §ÅñΦÁý§È º¢Ä÷ Å¢ü¸Ä¡õ. ÀÂýÀÎò¾¢Â À¡Ð¸¡ôÒì¸¡É §¸ûÅ¢, À¾¢ø¸¨Çô ÀÂýÀÎò¾¢
þ¾ýãÄõ ¯í¸ÇÐ ¦ºÂøÀ¡Î¸û, §¸¡ôÒ¸û, ¸½¢ô¦À¡È¢ «¨ÉòÐ À¡Š§Å÷θ¨ÇÔõ Á¡üȢŢÎí¸û. (†¡ì¸÷¸Ç¡ø
ÁüÚõ ÁüÚõ ŨÄôÀ¢ýÉø¸¨Ç «È¢óЦ¸¡ûÇ ÓÊÔõ (Hackers) ¯í¸ÇÐ þ¨½ÂÅÆ¢ Åí¸¢ì ¸½ì¸¢üÌû ¯û§Ç
¾¾ Á¡ø§Å÷ ±ýÛõ ¨ÅÊ, ´Õ ¸ÕŢ¢ĢÕóÐ þý¦É¡Õ Ò¸ ÓÊÂÄ¡õ)
¸ÕÅ¢ìÌ Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸û ãÄõ autorun.exe ¨Âô yy ¦¾¡¨ÄóÐ §À¡É ¾¸Åø¸Ç¢ý À¢ýɽ¢Â¢ø «¨ÉòÐô
ÀÂýÀÎò¾¢ ѨƸ¢ÈÐ. þÐ ¦À¡Õò¾ôÀð¼×¼ý ¾¡É¡¸§Å À¡Ð¸¡ôÒ ²üÀ¡Î¸¨ÇÔõ ¦ºö¾¡¸¢Å¢ð¼¾¡ ±ýÚ
¦ºÂøÀ¼ò¦¾¡¼í¸¢Å¢ÎÁ¡Ú ¦ºÂøÀθ¢ÈÐ ¯Ú¾¢ôÀÎò¾¢ì ¦¸¡ûÙí¸û.
yy Ó¨ÈÂüÈ ÀÂýÀ¡Î
¾¾ ¾¸Åø Å¢ÅÃí¸Ù측¸ ¡áÅÐ ¯í¸ÇÐ Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢ ¾¢ÕΧÀ¡¸¡Áø ±ôÀÊ ¾ÎôÀÐ ?
¸ÕÅ¢¨Âò ¾¢ÕÊ Å¢¼ìÜÎõ. yy ¸£¦ºÂ¢Û¼ý ±ô§À¡Ðõ Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¨Â(Storage Device)
À¢¨½òÐ ¨ÅòÐ즸¡ûÙí¸û
Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢ ÅƢ¡¸ò ¾¸Åø ¸º¢Å¨¾ ±ôÀÊ ¿¢ÚòÐÅÐ ? yy ¦ºøÖõ þ¼õ ±íÌõ Å¢ðÎøÄ¡¾£÷¸û
yy Ô±`À¢ §º¸Ãì¸ÕÅ¢¸Ç¢ý (USB Storage) ÀÂýÀ¡ð¨¼ ŨÃÂÚòÐì yy Ó츢ÂÁ¡É ¾¸Åø¸¨Ç ºí§¸¾î ¦º¡ü¸Ç¡ø §ºÁ¢òÐ
¦¸¡ûÅÐõ À¡Ð¸¡ôÒ즸¡û¨¸¨Â ¯ÕÅ¡ìÌÅÐõ «Åº¢Âõ. ¨Åì¸×õ.
yy °Æ¢Â÷¸û ±ó¾ Å¢ÅÃí¸¨Ç ¿¸ø ±Î츢ȡ÷¸û ±ýÀ¨¾ì
¸ñ¸¡½¢ì¸×õ. ¦À¡È¢ ¨Åò¾ø (Baiting)
yy ¯í¸û ¾¸Åø¸¨Çô À¡Ð¸¡ì¸î ºÃ¢Â¡É ´ØíÌӨȸû, Ô±ŠÀ¢ ¸ÕÅ¢¸¨Ç ¯í¸ÇÐ §Á¨ƒÂ¢§Ä¡, ¸½¢ô¦À¡È¢ìÌ «Õ¸¢§Ä¡
¸½ì¸£Î¸û, Å¢¾¢¸¨Ç ²üÀÎò¾×õ. §ÅñΦÁý§È ¨ÅÃ…¤¼ý ¨ÅòÐÅ¢ðÎî ¦ºýÚÅ¢¼Ä¡õ
48
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
Ô±ŠÀ¢ §º¸ÃòÐìÌ ¯¾×õ ¸ÕÅ¢¸û Flash Drive) ÀÂýÀÎò¾ì ܼ¡Ð ±ýÚ °Æ¢Â÷¸ÙìÌ
yy ¸¡÷Πã¼÷¸û (Card Reader) ¦º¡øÄ¢ò¾Ã×õ
yy ¦Á¡¨Àø §À¡ý¸û (Mobile Phone) yy ¡÷ ¬Å½í¸¨ÇÔõ, Å¢ÅÃí¸¨ÇÔõ À¡÷òÐ ¸¡ôÀ¢
yy À¢Ê²ì¸û (PDAs) ¦ºöÂÄ¡õ, ¡÷ ¦ºöÂì ܼ¡Ð ±ýÈ ¦¸¡û¨¸¸¨Ç
yy ʃ¢ð¼ø ¸¡Á¢Ã¡ì¸û (Digital Cameras)
¯ÕÅ¡ìÌÅÐ «Åº¢Âõ.
yy ʃ¢ð¼ø ¬Ê§Â¡ ô§ÇÂ÷¸û (Digital Audio Players)
yy §À¡÷ð¼À¢û Á£Ê¡ ô§ÇÂ÷¸û (Portable Media Players)
yy §À¡÷ð¼À¢û ôÇ¡Š ¦ÁÁâ ʨŊ¸û (Portable plus Memory ¦ºöÂì ܼ¡¾¨Å
Devices) yy Å¢ÇõÀÃò¾¢ü¸¡É Ô±ŠÀ¢ ¸ÕÅ¢¸¨Çò ¦¾Ã¢Â¡¾ ¿À÷¸Ç¢¼Á¢ÕóÐ
Å¡í¸ §Åñ¼¡õ.
yy Ó츢ÂÁ¡É ¾¸Åø¸Ç¡É äº÷ §¿õ ÁüÚõ À¡Š§Å÷ð
Ô±ŠÀ¢ §º¸Ãì¸ÕÅ¢¸¨Çô (Storage Devices)
Å¢ÅÃí¸¨Ç Ô±ŠÀ¢ ¸ÕŢ¢ø ¨Åì¸ §Åñ¼¡õ. Ô±ŠÀ¢
ÀÂýÀÎòОü¸¡É ÅÆ¢¸¡ðÎõ ÌÈ¢ôÒ¸û ¸ÕŢ¡¸ ¦Á¡¨À¨Äô ÀÂýÀÎò¾ §Åñ¼¡õ
¦ºö §ÅñʨŠyy Ô±ŠÀ¢ §º¸Ãì ¸ÕÅ¢¸Ç¡¸ ¦Á¡¨Àø §À¡ý¸¨ÇÔõ
yy Ó¾øÓ¨È ÀÂýÀÎòÐõ§À¡Ð §Ä¡À¡÷ÁðÊø ÀÂýÀÎòÐí¸û. ¸½¢ô¦À¡È¢Â¢ø ¦À¡Õò¾¢ô ÀÂýÀÎò¾ ÓÊÔõ. ¸½¢ô¦À¡È¢Ô¼ý
yy ð¨ÃÅ¢ø ¯ûÇ Å¢_Âí¸¨Ç Ó¾Ä¢§Ä§Â «Æ¢òÐÅ¢ÎÅÐ þ¨½ì¸ Ô±ŠÀ¢ §¸À¢û ´ýÚ ¾ÃôÀÎõ
À¡Ð¸¡ôÀ¡ÉÐ
yy Ô±ŠÀ¢ (USB) ¸ÕÅ¢¨Â ºÁ£Àò¾¢Â ¬ñʨÅèºô ÀÂýÀÎò¾¢ ¦ºö §ÅñʨÅ
Š§¸ý ¦ºöÐÅ¢¼×õ yy ¸½¢ô¦À¡È¢Ô¼ý ¦Á¡¨Àø §À¡¨Éô ¦À¡Õò¾¢Â×¼ý ¦Á¡¨Àø
yy ¯í¸ÇÐ Ô±ŠÀ¢ (USB) ¸ÕÅ¢¨Â À¡Š§Å÷ð ´ýÈ¢ý ãÄõ §À¡ý §º¸Ãò¾¢ø ¯ûÇ Å¢ÅÃí¸¨Ç ºÁ£Àò¾¢Â ¬ñʨÅÊ
À¡Ð¸¡ì¸×õ ãÄõ Š§¸ý ¦ºöÂ×õ
yy ¸ÕŢ¢ø ¯ûÇ §¸¡ôÒ¸û ÁüÚõ •§À¡ø¼÷¸ÙìÌ ºí§¸¾î yy ¯í¸ÇÐ §À¡ý ÁüÚõ ¦ÁÁâ ¸¡÷ÊÄ¢ÕóÐ «ùÅô§À¡Ð
¦º¡ü¸¨Ç þ¼×õ ¾¸Åø¸¨Ç ¿¸ø ¦ºöÐ §º¸Ã¢òÐ즸¡ûÇ×õ. Á¡ø§Å÷
yy ¯í¸ÇÐ Ô±ŠÀ¢Â¢Ä¢ÕóÐ (USB) Å¢ÅÃí¸¨Çô À¡÷ôÀ¾üÌõ ¨ÅÊ °ÎÕÅø ²üÀð¼¡Öõ ¯í¸û ¾¸Åø¸û À¡Ð¸¡ôÒ¼ý
¿¸ø ¦ºöžüÌõ À¡Ð¸¡ôÒô ¦À¡Õð¸¨Çô ÀÂýÀÎò¾×õ þÕìÌõ.
yy ¡Õõ ±Ç¢¾¢ø °¸¢ì¸ ÓÊ¡¾ ¦Àâ À¡`§Å÷¨¼ ¯í¸û yy ¸½¢ô¦À¡È¢Â¢Ä¢ÕóÐ ¦Á¡¨ÀÖìÌò ¾¸Åø Å¢ÅÃí¸¨Ç
¬Å½í¸û À¡Ð¸¡ôÀ¢ü¸¡¸ ±ô§À¡Ðõ ÀÂýÀÎòÐÅÐ ¿øÄÐ Á¡üÚžüÌ ÓýÒ «ó¾ Å¢ÅÃí¸¨Ç ºÁ£Àò¾¢Â ¬ñÊ ¨ÅÃ`
º¢È¢Â ¿¢ÚÅÉí¸û ÁüÚõ Å÷ò¾¸õ ¦ºöÀÅÕìÌ ãÄõ Š§¸ý ¦ºöЦ¸¡ûÇ×õ.
yy ±ý¦ÉýÉ Å¢ÅÃí¸û ¸¡ôÀ¢ ¦ºöÂôÀθ¢ýÈÉ ±ýÀ¨¾ì yy ¿£í¸û ¸½¢ô¦À¡È¢Â¢ø §Å¨Ä¨Â ÓÊòÐÅ¢ðÎî ¦ºøÖõ§À¡Ð
¸ñ¸¡½¢ì¸×õ Ô±ŠÀ¢ ¸ÕÅ¢¨Â «¸üÈ¢ ±ÎòÐî ¦ºøÅÐ «Åº¢Âõ.
yy ¦ÅǢ¢ĢÕóÐ ¦¸¡ñÎÅÃôÀÎõ Ô±ŠÀ¢¨Âò ¾ÎìÌõ
²üÀ¡Î¸¨Çî ¦ºöЦ¸¡ûÇ×õ ¦ºöÂì ܼ¡¾¨Å:
yy ºÃ¢Â¡É «ÇÅ¢ø ºí§¸¾î ¦º¡ü¸¨Çô ÀÂýÀÎòОüÌ, yy ÁüÈ ¦Á¡¨Àø ¸ÕÅ¢¸ÙìÌ ¨Åú¡ø À¡¾¢ì¸ôÀð¼ ¾¸Åø¸¨Ç
ÜÎ¾Ä¡É Åº¾¢¸û ¦¸¡ñ¼ ¸ÕÅ¢¨Â§Â §¾÷ó¦¾Îì¸×õ. •À¡÷§Å÷𠦺ö§Åñ¼¡õ
yy §¾¨Å¢øÄ¡Áø Ô±ŠÀ¢ À¢Ç¡‰ ð¨Ãù¸¨Çô (USB
49
Broadband Internet Security
DD Broadband refers to high-speed network connection
DD Traditional Internet services are accessed in “dial-on-
demand” mode, whereas broadband Internet is an “always-
on” connection, therefore security risk is very high
Dont’s:
yy Don’t enable the option for remote administration (via Internet),
as it is not required for a home user.
yy Don’t enable the option “Restore Factory Default Setting” in
broadband modem.
yy Don’t use connection without a filter for each broadband Internet
line.
yy Don’t tap the line before the splitter (a small dvice that separates
phone line from data / PC port).
yy Don’t use USB broadband modem with insecure computer/laptop.
yy Do not Enable SSID Broadcast:
In Wi-Fi networking, wireless access point or router typically
broadcasts the network name (SSID) over the air at regular
intervals.This feature was designed for businesses as well as to
52
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
53
ôáð§Àñð þý¼÷¦¿ð À¡Ð¸¡ôÒ
DD«¾¢§Å¸ ¦¿ð¦Å¡÷ì ¦¾¡¼÷Ò¾¡ý ôáð§Àñð ±ýÚ
«¨Æì¸ôÀθ¢ÈÐ.
54
CYBER CRIME AWARENESS CAMPAIGN | JOINTLY BY CHENNAI POLICE AND ISEA
55
ÀÂýÀÎòÐÀÅ÷ ²¾¡ÅÐ ´Õ ô§Ã¡ð§¼¡¸¡ø ÁüÚõ À¡Ð¸¡ôÒ ±Š ±Š ±î þýŠ¼¡ø ¦ºöÂ×õ.
¸£¨Âô ÀÂýÀÎò¾¢ì ¦¸¡ûÇÄ¡õ. «§¾ ÅÂ÷¦ÄŠ À¡Ð¸¡ôÒ yy ±Š±Š±î (¦ºìä÷ §ºÉø) ³ â§Á¡ð ¿¢÷Å¡¸ò¾¢üÌ
ô§Ã¡ð§¼¡¸¡Öõ, À¡Ð¸¡ôÒ ¸£Ôõ ¸½¢ô¦À¡È¢Â¢Öõ ¦ºÂøÀÎòи.
¦ºÂøÀÎò¾ôÀΞ¡¸ þÕì¸ §ÅñÎõ.
yy ¼À¢ûÔ À¢ ² (WPA) /¼À¢ûÔ þ À¢ (WEP) ±ý¸¢Ã¢ôº¨É ¼÷ý ¬ý ¦ºö ܼ¡¾¨Å:
¦ºö¾ø: yy Å£ðÊø ¸½¢ô¦À¡È¢¨Âô ÀÂýÀÎòÐÀÅ÷¸û â§Á¡ð
±øÄ¡ ¨Å •¨À ¦ºÂøÀÎò¾¢ §Á¡¼õ¸û «øÄÐ ¦Ãªð¼÷¸Ùõ (þñ¼÷¦¿ð š¢ġ¸) ¿¢÷Å¡¸ ¬ôº¨É ¦ºÂüÀÎò¾
±ý¸¢Ã¢ôºý ¦¾¡Æ¢øÑðÀòÐìÌ ¯¾×À¨Å¾¡ý. «¨¾ §Åñ¼¡õ. Å£ðÊø ÀÂýÀÎòÐÀÅ÷¸ÙìÌ «Ð §¾¨ÅÂüÈÐ.
¦ºÂøÀÎòÐÅÐ ÁðΧÁ «Åº¢Âõ. yy ôáð§Àñð“Restore Factory Default Setting” ±ýÀ¨¾
yy ËÀ¡ø𠱊±Š³Ê ¨Â Á¡üÈ×õ (º÷Å£Š ¦ºð ³¼ýÊ•¨ÀÂ÷): ¦ºÂüÀÎò¾ §Åñ¼¡õ.
±øÄ¡ ¬ìºŠ À¡öñθÙõ ¦Ãªð¼÷¸Ùõ ±Š±Š³Ê yy ´ù¦Å¡Õ ôáð§Àñð þ¨½ÂÅÆ¢ò ¦¾¡¼÷¨ÀÔõ ·À¢øð¼÷
±ýÈ ¦¿ð¦Å¡÷쨸 ÀÂýÀÎòи¢ýÈÉ. ¾Â¡Ã¢ôÀ¡Ç÷¸û þýÈ¢ô ÀÂýÀÎò¾ §Åñ¼¡õ.
¾í¸û ¾Â¡Ã¢ôÒ¸¨Ç «§¾ ±Š±Š³Ê ¦ºðμý ¾¡ý ¾í¸û yy ŠÀ¢Ç¢ð¼ÕìÌ ÓýÉ¡ø ¦¾¡¼÷¨À ¼¡ô ¦ºö §Åñ¼¡õ.
¦À¡Õð¸¨Ç «ÛôÒÅ¡÷¸û. þ¾É¡ø ¾¡ì̾ø ¿¼òÐÀÅ÷ (ŠÀ¢Ç¢ð¼÷ ±ýÀÐ ¦¾¡¨Ä§Àº¢ ¦¾¡¼÷¨ÀÔõ §¼ð¼¡/
þ¨¾ô ÀÂýÀÎò¾¢ ¾¡ì¸ìÜÎõ ±É§Å ËÀ¡ø𠱊±Š³Ê¨Â ¸õôäð¼÷ §À¡÷ð¨¼Ôõ À¢Ã¢ì¸ìÜÊ ¸ÕŢ¡Ìõ).
Á¡üȢŢ¼ §ÅñÎõ. yy À¡Ð¸¡ôÀüÈ ¸½¢ô¦À¡È¢ «øÄÐ §Äô¼¡ôÀ¢ø Ô±ŠÀ¢
yy ¬ñʨÅÊ, ¬ñÊ Š¨À§Å÷, ¦¼Šì¼¡ô ÀÂ÷Å¡Ö¼ý ôáð§Àñ¨¼ô ÀÂýÀÎò¾ §Åñ¼¡õ.
À¡Ð¸¡ôÒò ²üÀ¡Î¸¨Ç ¦ºöЦ¸¡ûǧÅñÎõ. «ô§À¡Ð¾¡ý yy ±Š±Š³Ê ôá𸡊¨¼ ¦ºÂøÀÎò¾ §Åñ¼¡õ:
À¢Ã¡ð§Àñð À¡Ð¸¡ôÒ «îÍÚò¾ø¸Ç¢Ä¢ÕóÐ ¯í¸û ¨Å ·¨À ¦¿ð¦Å¡÷ì¸¢í¸¢ø, ÅÂ÷¦ÄŠ ¬ìºŠ À¡Â¢ñð
¸½¢ô¦À¡È¢ ÁüÚõ §Äô¼¡ô¨Àì ¸¡ôÀ¡üÈ ÓÊÔõ. «øÄÐ Ã×ð¼÷ ¦¿ð¦Å¡÷츢ý ¦À¨à §¿ÃÊ¡¸ ´Ç¢ÀÃôÒõ.
yy §Á¡¼õ ¦Ãªð¼÷ ·ÀÂ÷Å¡¨Äì ¸½¢ô¦À¡È¢ìÌõ §Á¡¼òÐìÌõ þó¾ «õºõ Å÷ò¾¸ò §¾¨Å¸Ù측¸ ¯ÕÅ¡ì¸ôÀð¼Ð.
ÀÂýÀÎò¾ §ÅñÎõ: Å£ðÎò §¾¨ÅìÌ þó¾ «õºõ §¾¨ÅÂüÈÐ. ¦¿ð¦Å¡÷ìÌìÌû
ôáð§Àñð §Á¡¼õ ¦Ãªð¼÷¸Ç¢ø ÀÂ÷Å¡ø «õºõ §º÷ó§¾ ÒÌóÐ §º¾õ ²üÀÎòОüÌ Ñ¨Æך¢ġ¸ þÐ þÕìÌõ
þÕìÌõ. ¬É¡ø «¨¾ ¦ºÂøÀÎò¾ §ÅñÊÂÐ «Åº¢Âõ. yy ¨Å·¨À ¦¿ð´÷쨸 ¬ð§¼¡ ¸¦Éìð ¬ÌõÀÊ ô§Ã¡ìáõ
¸½¢ô¦À¡È¢Ô¼ý ¦À¡Õò¾ôÀð¼ ôáð§Àñð §Á¡¼Óõ ¦ºö§Åñ¼¡õ,
ÀÂ÷Å¡Ä¡ø À¡Ð¸¡ì¸ôÀ¼ §ÅñÊÂÐ «Åº¢Âõ. yy ¬ð§¼¡ ¸¦Éìð ²üÀ¡Î ¦ºöÂôÀðÊÕó¾¡ø, ¨Å ·¨À
yy ÀÂýÀÎò¾¡¾ §À¡Ð §Á¡¼õ¸¨Ç ¼÷ý ¬ô ¦ºöРŢÎí¸û: þý¼÷§Àͼý ÜÊ ¸½¢ô¦À¡È¢ äºÕìÌò ¦¾Ã¢Å¢ì¸¡Á§Ä§Â
¦¿ð¦Å¡÷쨸 „ð ¼×ý ¦ºöÅÐ ¦ÅÇ¢¿À÷¸û ¸¦Éì𠬸¢Å¢Îõ. þ¾É¡ø ¿ÁÐ ¸½¢ô¦À¡È¢ À¡Ð¸¡ôÒ
¦¿ð¦Å¡÷ìÌìÌû Ò¸¡Áø þÕôÀ¾üÌ ¿¢îºÂõ ¯¾×õ. «À¡Âí¸ÙìÌ ¯ûÇ¡Ìõ. ÌÈ¢ôÀ¢ð¼ Ýú¿¢¨Ä¸¨Çò ¾Å¢Ã
´ù¦Å¡Õ Ó¨ÈÔõ ¬ý ¦ºöÐ ¬ô ¦ºöÅÐ º¡ò¾¢ÂÁ¢øÄ¡¾ þó¾ ²üÀ¡Î ¦À¡ÐÅ¡¸ò §¾¨ÅÂüÈÐ.
Å¢„Âõ ±ýÀ¾¡ø À½ò¾¢Öõ, ¿£ÊìÌõ ¬ô¨Äý §¿Ãò¾¢Öõ yy ôáð§Àñ¨¼ ÀÂýÀÎò¾¡¾ §¿Ãò¾¢ø ¸¦ÉìÊÅ¢ðʨÂ
À⺣Ģì¸Ä¡õ. «ôÀʧ ŢðÎÅ¢¼ §Åñ¼¡õ.
yy Ô±ŠÀ¢ À¢Ã¡ð§Àñð §Á¡¼ò¨¾ ÀÂýÀ¡ðÎìÌô À¢ý yy ¯í¸Ù¨¼ÂÐ ¨Å·¨À¡¸ þÕìÌõ ¿¢¨Ä¢ø ¦¾Ã¢Â¡¾,
ÊŠ¸¦Éì𠦺öÐ ¸ÆüȢŢ¼Ä¡õ ¿õÀ¸ÁüÈ ¦¿ð¦Å¡÷ì̼ý þ¨½ì¸ §Åñ¼¡õ.
yy ôáð§Àñð þ¨½Â §ÀñðÅ¢ò ÀÂýÀ¡ðÎ ¸ñ¸¡½¢ôÒì
56
www.infosecawareness.in
Like us on
Facebook
https://www.facebook.com/infosecaware-
nesss
Subscribe us on
YouTube
https://www.youtube.com/channel/
UCWPBKQryyVvydUy4rYsbBfA
Follow us on
Twitter
https://twitter.com/CDAC_ISEA
Disclaimer
We have taken at most care for correctness of language with available experts and still if you find
any mistakes or any suggestions for content correctness, you may please write to
isea@cdac.in <mailto:isea@cdac.in>
¦À¡ÚôÒò ÐÈôÒ
ÅøÖ¿÷¸Ç¢ý §ÁüÀ¡÷¨Å¢ø ¦Á¡Æ¢Â¢Âø ¾¢Õò¾í¸¨Ç º¢Ãò¨¾Ô¼ý
§Áü¦¸¡ñÎû§Ç¡õ,
²§¾Ûõ À¢¨Æ ÁüÚõ ¾¢Õò¾í¸û §Áü¦¸¡ûÇ §ÅñÎõ ±É Å¢ÕõÀ¢É¡ø
isea@cdac.in ±ýÈ Á¢ýÉïºÄ¢ø ¦¾Ã¢Å¢ì¸ §¸ðÎ즸¡ûÇôÀθ¢ÈÐ
For any queries on Information Security
Call us on Toll Free No.
Supported by