Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

PROJECT ON :

CYBERCRIME SECURITY
AWARENESS

Done by:
Navin.S
Sanjay.J
Solomonraja.S
Manisha.N
ABSTRACT:

Information security awareness can play an important role in


facing cyber-attacks by intruders. The main goal of this paper is
to analyse the information security awareness among academic
staff, researchers, undergraduate students and employee
within educational environments in the Middle East in an
attempt to understand the level of awareness of information
security, the associated risks and overall impact on the
institutions. The results reveal that the participants do not have
the requisite knowledge and understanding of the importance
of information security principles and their practical application
in their day-to-day work. This situation can however be
corrected through
Comprehensive awareness and training programs as well as
adopting all the necessary safety measures at all levels of the
institution to ensure that the students, academic staff and
employees are trustworthy, technology savvy and keep their
data safe. Without such training programs and awareness,
there will be negative consequences on IT systems and their
application usage, as well as on users’ personal security now
and in the future. From the weaknesses identified in this
survey, some essential recommendations are put forward to
remedy the situation.
INTRODUCTION

The crime that involves and uses computer devices and


Internet, is known as cybercrime.
Cybercrime can be committed against an individual or a group;
it can also be committed against government and private
organizations. It may be intended to harm someone’s
reputation, physical harm, or even mental harm.
Cybercrime can cause direct harm or indirect harm to whoever
the victim is.
However, the largest threat of cybercrime is on the financial
security of an individual as well as the government.
Cybercrime causes loss of billions of USD every year.
CYBER SECURITY

Cyber security is a potential activity by which information and


other communication systems are protected from and/or
defended against the unauthorized use or modification or
exploitation or even theft.
Likewise, cyber security is a well-designed technique to protect
computers, networks, different programs, personal data, etc.,
from unauthorized access.
All sorts of data whether it is government, corporate, or
personal need high security; however, some of the data, which
belongs to the government defense system, banks, defense
research and development organization, etc. Are highly
confidential and even small amount of negligence to these data
may cause great damage to the whole nation. Therefore, such
data need security at a very high level.
HOW TO SECURE DATA?

Let us now discuss how to secure data. In order to make your


security system strong, you need to pay attention to the
following –
● Security Architecture
● Network Diagram
● Security Assessment Procedure
● Security Policies
● Risk Management PPolic
● Backup and Restore Procedures
● Disaster Recovery Plan
● Risk Assessment Procedures
Once you have a complete blueprint of the points mentioned
above, you can put better security system to your data and can
also retrieve your data if something goes wrong.
Methodology

Primary data: self-created data, surveys, experiments


specifically designed to understand and
Solve the research problem.
Secondary Data: Using existing data generated by major
government institutions, healthcare
Facilities, etc. As part of organisational records. The data is then
pulled from more disparate
Data files.
PRIMARY DATA
Data collection from questionnaire
(Survey conducted via Google form of 87
people and Recorded)
AGE

Option Percentage
18-20 66.7
20-30 33.3
WHAT IS THE BEST WAY TO PROTECT
YOUR PERSONAL DATA?

Option Percentage
Use strong passwords 90.8
Share personal 9.2
information on social
media
WHAT IS PHISHING ATTACK?
Options Percentage
A fishing competition 37
A type of scam where 69
hackers steal your
information
HOW CAN YOU RECOGNISED A PHISHING EMAIL?

Option Percentage
It contains a 64.4
suspicious link
It comes from a 35.6
known and
trusted sources
What is a firewall

Option Percentage
A tool for sharing 33.3
lage files
A barrier that 66.7
blocks hackers
from accessing
your computer
Which of the following is a secure way to connect
to a public wifi network?
Option Percentage
Use a virtual private 83
network (VPN)
Share your personal 17
information with
anyone who ask
Why it is important to update your computer’s
operating system and software
Option Percentage
To fix security 87.8
vulnerabilities
To create new bugs 18.2
What are two factor authentication (2FA) and
multifactor authentication(MFA)

Option Percentage
Additional securities 88.6
beyond a username
and password
Ways to bypass 11.4
security measures
What is social engineering
Option Percentage
The use of social 70.5
media to hack into
computers
Ways to bypass 29.5
security measures
REVIEW OF LITERATURE

Cyber security has advanced greatly in recent years In order to


keep up with the rapid changes that Occur in cyberspace.cyber
security refers to the Methods that country or organisation can
use to Safeguard its products and information in
Cyberspace.Two decades ago term ‘cyber security ‘was barely
Recognized by the general public.Cyber Security is not just a
problem that affects individuals But it also Applies to an
organisation’s or a Government. Everything has recently been
dignized Cybernetics Employing a variety of technologies Such
as cloud computing, smartphones,and internet Of things
Techniques,among others. Cyber-attack Are raising concerns
about privacy, security,and Financial Compensation. Cyber
security is a set of Technologies, processes, and practices aimed
at Preventing Attacks, damage,and illegal access to Networks,
computer, programmes,and data.ThePrimary goal of This
article is to conduct a thorough
SECONDARY DATA
Source: internet
TYPES OF CYBERCRIME
Let us now discuss the major types of cybercrime –
● Hacking
It is an illegal practice by which a hacker breaches The
computer’s security system of someone for Personal interest.
● Unwarranted mass-surveillance
Mass surveillance means surveillance of a
Substantial fraction of a group of people by the Authority
especially for the security purpose, but
If someone does it for personal interest, it is Considered as
cybercrime.
● Child pornography
It is one of the most heinous crimes that is Brazenly practiced
across the world. Children are Sexually abused and videos are
being made and Uploaded on the Internet.
● Child grooming
It is the practice of establishing an emotional Connection with a
child especially for the purpose Of child-trafficking and child
prostitution.
● Copyright infringement
If someone infringes someone’s protected Copyright without
permission and publishes that With his own name, is known as
copyright Infringement.
● Money laundering
Illegal possession of money by an individual or an Organization
is known as money laundering. It Typically involves transfers of
money through Foreign banks and/or legitimate business. In
other Words, it is the practice of transforming

E-INFRASTRUCTURE
Further, e-infrastructure helps to integrate various
Technologies including different computer systems, Internet
broadband channels, computing power, Data storage, data
sharing, and many more. To meet the growing challenges of
globalization and Also cope-up with the sustainable growth of
Information and communication technology, it is Essentially
required to integrate these systems by Developing better e-
infrastructure.
E-Infrastructure in India
In today’s world, e-infrastructure is the key element For the
development of a society. E-infrastructure facilitates competent
equipment And favorable resources and opportunities that are
Essentially needed to for the safety, security, and Development
of a society.
INITIATIVES TAKEN SO FAR...
By understanding the growing demand and Challenges, the
Department of Information Technology formulated a ‘National
Policy on Universal Electronic Accessibility’.
The policy was approved by the union cabinet in 2013.The
major strategies adopted in the implementation Of the policy
have been taken from the Press Information Bureau
Government of India Cabinet October 3, 2013 –
Creating awareness on universal electronics Accessibility and
universal design. Capacity building and infrastructure
development. Setting up of model electronics and ICTs centres
for Providing training and demonstration to special Educators
and physically as well as mentally Challenged persons.
Conducting research and development, use of Innovation,
ideas, technology etc. Whether Indigenous or outsourced from
aabroad .
Developing programme and schemes with greater Emphasis
for differently abled women/children.
Developing procurement guidelines for electronics And ICTs for
accessibility and assistive needs.
●ITIR
For the exclusive growth of E-infrastructure in India, the
Government of India has formulated the policy on ‘Information
Technology Investment Regions (ITIRs) in 2008.
As per the policy, ITIRs will be self-contained integrated
township with the purpose to accelerated growth of
Information Technology, Information Technology Enabled
Service, and Electronic Hardware Manufacturing units.
Further, the policy has recommended to assign Minimum area
of 40 sq. Km for ITIR. However, out Of the total demarcated
area, 40% should be Reserved for the processing zone and the
Remaining area for the non-processing zone.
The processing zone will include –
Information Technology/Information Technology Enabled
Services
Electronic Hardware Manufacturing Units
Logistics and other services and required infrastructure.
On the other hand, the non-processing area will Include –
Residential area
Commercial area
Other social and institutional infrastructure
●National Knowledge Network
In 2009, in order to create an infrastructure that can fulfil the
future requirements, the concept of ‘National Knowledge
Network’ (NKN) is conceptualized.
The concept of NKN is designed to Encourage, Enable, Enrich,
and Empower the user community to test and implement the
innovative ideas without any restrictions.
Further, the NKN will provide better –
Network design
Security requirements
Service requirements
Operational requirements

CONCLUSION
Cybersecurity is important because it protects all Categories of
data from theft and damage. This Includes sensitive data,
personally identifiable Information (PII), protected health
information (PHI), personal information, intellectual property,
Data, and governmental and industry information Systems.
BIBLIOGRAPHY
 https://www.tutorialspoint.com/
fundamentals_of_science_and_technology/
einfrastructure_in_india.htm
 https://www.tutorialspoint.com/
fundamentals_of_science_and_technology/
cyber_crime_and_cyber_security.htm
 https://www.britannica.com/technology/data-science
 https://www.upguard.com/blog/cybersecurity-
important#:~:text=Cybersecurity%20is%20important
%20because%20it,governmental%20and%20industry
%20information%20systems.

You might also like