Follow the Teaching Practices, Values and Methodology of The Shri Ram Schools through its collaboration with Shri Educare Limited

8A - Aarushi - Cyber Security and Cyber Crime of UAE

#LETSFIGHTITTOGETHER

Aarushi Rachakonda | Blog Post- IDS Project


Introduction

Before we get to the depths of the topic today, let a learn in brief of what is meant by cybercrime and cybersecurity, the buzz words of today, that to which will be on the country of United Arab Emirates (UAE) (we’ll get to that a bit later).

When we hear the word cybercrime, we get a negative vibe, meaning that it probably does not have a constructive impact. Well, yes that is true. Cybercrime, also known as a computer crime, is when a person or a group of people perform certain activities using a PC or any other device which create illegal ends like, committing fraud, trafficking in child pornography and intellectual property, stealing identities, violating privacy, etc. In other words, it is criminal based activity that targets or uses a computer to breach someone, hack into someone’s private accounts or to simply steal your personal information.

The word cybersecurity, unlike the word cybercrime, is a way in which we can make sure that cyber attacks like phishing, email spoofing, etc. are prevented, but in real terms, cybersecurity is an application that processes and controls to protect different devices which could be vulnerable to cyber-attacks. Its intentions are to reduce the risk of cyber-attacks and protect devices against unauthorized corruption of networks, etc.


More About Cybercrime

In general, cybercrime is defined as either a crime involving computing against a digital target or a crime in which a computing system is used to commit criminal offenses.

As a broad category of crime, cybercrime includes such disparate sorts of activities as illegal access of data, use of computer communications to commit fraud, or the ransoming of systems via digital means.

Cybercrime may also be referred to as computer crime.

There are many types of cybercrime:

  • Phishing
  • Identity Theft
  • Hacking
  • Child Pornography
  • Cyber Bullying
  • Ransomware
  • Malware
  • Email and Website Spoofing
  • Unauthorized System Access
  • Social Network Fraud

Each of these types of cybercrime is related to malicious malware. They are all fake ids, fake websites and so on, but the list for the types of cybercrime is endless, though I have made you aware of a few of them.

Importance of Cybersecurity

Cybersecurity is the most important part of staying and being safe on the internet as the etiquettes of social media and other platforms should be maintained as it shows your dignity and honesty, not only in real life but also on social platforms.

The importance of cybersecurity is that is protects and secures all categories of data from theft and damage, it also includes the sensitive data, personally identifiable information, protected health information, personal information, intellectual property, data, and governmental and industry information systems.

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. A strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an organization's or user's systems and sensitive data.

There are many ways in which you can make sure no one fissures your personal data:


  • Two- step verification
  • Install a firewall
  • Strengthen your passwords
  • Install anti- malware software
  • A VPN is a great way to protect sensitive data
  • Keep your software updated
  • And so on and so forth

These are just a few ways to protect your devices, though if you are careful of what you click on and what you reply to, you are good to go.

Staying Safe Online By-Saiokshitha Morampudi 8A

There are many people who get hacked online because of the people giving their personal identity or even their personal information. People get emails and promotions and spill out all the tea from them not knowing whither if all these platforms are true or fake. Some websites can also steal your information.

United Arab Emirates is a very protective country in the case of cyber security. let us know few tips on which United Arab Emirates follow to protect their citizens from frauds.

STAYING SAFE ONLINE

United Arab Emirates follows few policies which are essential to all citizens. These policies are given below.

Have a password that has special characters- This is a very easy step that you can do in online security. It is to have passwords that contain special characters or symbols. You can add to this by including capital letters and numbers. Use all these elements but be careful about making your passwords too complex. Make sure you write them down somewhere.

NEVER give your credit card information to advertisements- These advertisements can be fake. Never fall for things such as discounts on particular items or on services. These all are traps to get your personal information.

Avoid using "Login via Facebook" on apps- Everything depends on the website or app that you are logging in to. The worst that could happen is that the information you put on Facebook can be edited into a different version and can scam websites and apps.

CONCLUSION

And know we can conclude that UAE is a county where all citizens strictly follow all the Cyber Security rules for their benefit. Therefore it is safe to say that UAE is a very protective country were all locks can be sealed to each individual without getting spilled to another.

Importance of Cyber Security -By: Saishree T.S 8A

Safety is the number two priority for humans right after physiological needs of air, water, food, clothing in Maslow’s triangle. But security is not limited to stable employment and health but also extends to security in the online and digitally connected world today. Today we hear about several attacks on privacy, leaks of personal information, ransomware attacks and hacks that disrupt our lives. Recently French IT service provider Sopra Steria was attacked by ransomware on 20th October 2020 that encrypted all of its data. Even in today’s news, we heard about hackers demanding 70 million dollars from US IT company Kaseya, that provides service to many US companies. Cyber attackers have sponsorships and have more ideas on how to do phishing attacks, data breach and ransomware attacks. Ransomware attacks rose 148% in March and the average ransomware payment rose by 33% to $111,605 as compared to Q4 2019. (Source: Fintech News). With COVID-19, the office, home and outside networks have blended that makes data theft and cyber-attacks easier. This leads to loss of millions of dollars for breached organizations and significant hardships including loss of privacy and loss of savings for individuals. Hence it is much more critical at this time to pay attention to the various forms of attacks and protect our citizens, organizations and society as a whole.

Technology influence

Mobile devices are a boon to the society as well as cybercriminals. In addition, these devices do not have strong security controls that making it easy for attackers to target these devices. Cybercriminals can target mobile devices to steal credentials, send malicious advertisements and also install surveillance applications that monitor the activity from the phone devices. Different malware types are popular for their ability to switch off Google Protect security features of android devices in order to steal financial details from users. Over a very short time, the number of cyber-attacks targeting mobile devices has escalated due to increased use of mobile banking technology. Mobile devices also have location sensors, access to security PIN and emails that making it easy for stealing all the information about the users. Cybercriminals can track money transactions, steal financial information and threaten victims by wiping out their bank accounts. These devices also have access to contact lists that makes spreading attacks easier to other social networks. It is critical that when we buy mobile technology, we must ensure it has the necessary security controls for sharing information, encryption of data, ability to track devices and wipe them remotely

Children as targets

One of the major targets for cybercrime are teenagers and children of various age groups. Children spend more time online and it is estimated that a child goes online every half second for the first time. Also, the increased opportunity with possession of smart phones, computers, gaming consoles and smart televisions, children are exposed to a wide range of internet activity both good and bad. Chat rooms are one of the common places for sexual predators who take advantage of young people by threatening them or abusing them. Also, children can be victims of cyber marketing and result in privacy breach as children may unintentionally share their information with strangers which may be later used in undesirable ways. Also often times these mechanisms are hard to monitor for parents resulting in widespread attacks.

One of the common types of cybercrimes is cyberbullying among peers or folks in the same social media group. These acts result in depression, mental stress and can even lead to suicidal attempts.

This not only directly impacts children who are victims of such crimes it also exposes other children who are passively witnessing the same. The other common type of attack is sexual exploitation of children who are forced to produce or distribution of explicit content. Also, children imitate others to produce their own explicit imagery and may end in the wrong hands in the internet. So, it is important to monitor our children as well as educate our children to avoid such abuses.

Role of parents, teachers and children

Teachers and parents must educate themselves about these cybercrime methodologies so that they can spread that awareness to children as well as other peers in their parent and teacher groups. It is critical for schools to have curriculum to formally educate children about the dangers of cybersecurity so that they can protect themselves as monitoring can be hard. In addition, teachers and parents must have regular conversations with children to check on what they are up to when they are using computers and mobile phones. It is also a good idea to limit the time that children spend on the computers and mobile devices by engaging them in other physical activities. Also, parents must exercise the right security controls on these devices so that children don’t accidentally trip over and become victims of these attacks. One of the few techniques is to ensure that the networks are protected with passwords, setting up multi-factor authentication including the parents' phones in the authorization process, monitoring and rate limiting the usage of data. In addition, have a good peer network and counsellors can go a long way in protecting children from becoming victims of cybercrimes.

In summary, cybercrimes are a new age topic that needs attention from all parties to avoid major loss in the society. We must continuously take steps to protect ourselves from these attacks given online usage is a basic necessity at this time.

SEC_RITY Is Not Complete With U! - By Shravya

Password Protection - Things to Keep In Mind

Password is a secret word or a secret identity used to confirm user’s identity.

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity.

Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical.

In general password is a sequence of letters and digits used to protect the device. Sometimes the characters are even numeric, the corrsponding secret is called a PIN ( personal identification number). Despite its name it doesn’t need to be an actual word. A remembered secret consisting of a sequence of words or other texts separated by spaces is called as a passphrase.

A passphrase is similar to that of a password but with longer added security


HOW TO PROTECT PASSWORDS?

There are 8 ways to protect passwords:

Don’t pick a weak password: as astonishing as it seems people are using “123456” as the passwords. It has been ranked as the weakest passwords for years. When a site asks you to keep passwords it is suggested that the password should be at least 12 characters long, and avoid simple passwords that are easily guessed.


Use multifactor authentication: an increasing number of online services that are around sensitive information offer an option for an additional step between entering your password and accessing your account.

If BIOMETRICS is an option, TAKE it: smartphones, tablets, and laptops are increasingly letting you log in with a fingerprint instead of a password. That’s not only more secure it even prevents you from forgetting your password.

Different accounts need different passwords: it’s certainly easier to use the same password on multiple sites, remember that doing so can increase your vulnerability. Not only can hackers use that password to access other important accounts of yours, you’re also opening yourself up to scrutiny from a larger number of people trying to crack many different sites


Consider a password manager. Password managers keep track of the various usernames and passwords you use on various sites, not only boosting safety but saving you time by automatically filling in the username/password fields. They’ll also synchronize your passwords across different devices, meaning you won’t be stumped if you log onto a site from your smartphone but registered on your laptop.



Don’t share your password. This seems like common sense, but a staggering number of people still freely give their passwords to others. It is said that 31% of millenials are likely to share theirs.

Don’t fall for phishing. Approach your email with scepticism. Delete notes — especially those with attachments — from people you don’t know. And never click on attachments that seem suspicious, even if you do know the sender.

Always update your software: It seems we’re notified almost daily about some program or another that requires an update. After a while, it’s seemingly easier to put it off. But by doing so, we’re putting ourself at risk.

WHAT SHOULD WE KEEP IN OUR MIND WHILE CHOOSING AN EFFECTIVE PASSWORD?

The password should have atleast 12 characters or minimum: we need to chose a strong password that’s long enough there’s no minimum length everyone agrees on.

The password should include NUMBERS, CAPITAL LETTERS, AND LOWER-CASE LETTERS, SYMBOLS: using different types of characters to make the password even harder to crack.

Ex: BigHouse#321

The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words.

Password Protection - What to keep in mind -Ishita.K

What are Passwords?

Passwords are very important. They help your personal accounts stay private and secure, you should know what makes a strong password so that you can have maximum security.


Why is Password Security Important?

If you’re repeatedly using the same passwords or using weak passwords can leave you vulnerable to hackers. If a hacker cracks your passwords, they could gain access to your social media accounts, bank accounts, emails and other accounts that have personal data.


Tips to Make Your Passwords Strong:

  • Make your Password Long
  • Include Numbers, Symbols, Upper Case and Lower Case Letters
  • Avoid using your personal information
  • Start using a Password Manager
  • Change your Password Regularly

8B- Prabhav Arjun Wadkar - Cyberbullying

 

Krish and Karan were classmates but they did not get along too well. They were jealous of each other and did not leave an opportunity to put the other one down. Krish was smart and popular in his class and Karan wanted to undo that. Krish had recently started an Youtube channel and all the other classmates had subscribed to it. Karan, however, jealous of Krish’s popularity started creating Youtube accounts with pseudo names and started posting hate messages on Krish’s videos. He would say nasty things about Krish.

Since the COVID pandemic, their school has been conducting classes online and Krish would login with fake accounts and post nasty things about Krish. When the teacher blocked permissions for unauthorised accounts, Karan started muting Krish when he spoke in the class or evict Krish for the class. All this hurt Krish a lot and he did not know how to deal with this unknown enemy.

What Krish has been experiencing is a growing trend and is called as CYBERBULLYING. Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted.

Krish is not alone, the number of such cases where teens are being bullied by anonymous users on internet is increasing alarmingly. Based on a survey, kids in India have been cyber bullied the most with the numbers increasing year on year.

8B-Aarav Batham-Password Protection

PASSWORD - 2008aarav123!
Hmm... This is too easy to crack.
PASSWORD - 2008AARAv135!
No,no,no. This is just too easy.
PASSWORD - J1801saheb12!

Why can't I find a good password plus now he will know where I will live. Nooooo. Alas I am doomed.

What you saw up here is a common dilemma many people face. What password to keep. Password protection is taken very lightly nowadays and now anyone barely even uses passwords because of fingerprint and facial recognition. So, we all keep a password like - name123!, which is very easy to hack. But in this blog, we will adventure through the lands of passwordiana and cross the river of protectionisi to find the ultimate password.

Finding the ultimate password is all about, believe it or not, about psychology. The method of tricking the hacker into thinking one thing and then writing the other. Making passwords using important dates, names of people you know or even your flat number is a big no no. Then how to make a good, strong and easy to remember password. Given below are two methods you can use to create a strong password.

Method One -

YOU don't create one. In a land of technology, the first thing in your find must be to use a password maker app like LastPass. But once you research even more you will find out that in big password randomizer apps, every one is given a random non repetitive password which is allotted by a number. Suppose say that you are No.16384583. You might think that if you didn't make a password, you didn't create a digital footprint. Well, you are wrong, kinda. You might not be leaving a footprint but LastPass is. The hackers might not be able to figure out the password from your laptop but might still be able to access your allotment. This is possible because all of the allotments are stored on the cloud. There is an upside to this. LastPass uses bank-grade encryption (256-bit AES) and TLS certification to protect all data stored in a user's LastPass vault which makes it very difficult for the hackers to access your allotment.

Method 2 -

This method is probably the one you're going to choose if you have watched any Terminator movie. Can't trust those pesky T-1000, can you ? Making a perfect password is easy if you know what to to do. For example, you can use passwords like – MAth_834@1? or 2O2Ois_the@worst313

The passwords need to have more that 8 characters and need to include some or the other type of relevance to you so that it's easy to remember. For example, in the password - jacksonP@1_1, you get to remember it easily but if you post too much about Percy Jackson on social media, that might be a problem. If you are using any relevance in your password do ensure that it is random so that the hackers might not just have a lucky guess and open up your information.

8B-Bhargava Mohan and Vishal Koguri- Cyber security

We get phone calls that we have received Rs. 5000 in our Amazon transactions. They seem like frauds today and we are going to roll our certain examples that prove that these people are trying to fool and defraud you. It is a clear case to explain fake and unsafe bank charges in a remarkable and effortless way just like a cakewalk and also in a minimalistic manner. There are three main people in the transaction, the fraud which is the money mule, the customer care and the anonymous person who plans the fraud. The money mule is the person who illegally transfers a call to the fake person which goes directly to the scamming customer care and finally the anonymous person, who gets the money from the scammer and they make up their own deals. Such people who try to fool and defraud people using the tried and tested method of hacking are known as fraudsters. These people may ask you for your passwords and personal details and with the help of one password they can hack multiple websites of yours.

To prevent all these hazardous issues, we need to deeply ask who are they and we should check our bank accounts and transactions hence we should be significantly cautious about such dangerous things as they cause an insignificant and a grave issue in the family. Always keep a password that is tough for the scammers to find out, but keep a password that you remember but do not do the same mistake repeatedly as the hacker is not a fool. Use different patterns of passwords for each website so that it will be tricky for the hacker to find the passwords. To spice things up if you are busy with some tedious work, at the same time to keep things like a piece of cake, there is a device known as the BO detector which generates a random satellite password which can be used for your bank accounts and any other type of transactions. To prevent such threatening issues, we should be double the time cautious than what we were and keep a powerful password as it should be an ICW exam for the hacker. There should be a few uppercase letters, a few lowercase letters along with a powerful concoction of numbers and symbols is the true, competitive and a tough board examination for the hacker.

Wi-Fi is the pinnacle for people for a network connection which should be as strong as a metal. When a Wi-Fi connection is hacked it can cause severe damage to the computer which in order crashes the computer. To prevent such damaging Wi-Fi hacking we need to install a VPN (Very Powerful Network) which not only boosts your network to the best of its capabilities but also prevents a malicious user to enter your Wi-Fi network.

Thank you so much for reading this blog. We hope that you had found this piece useful and instructive. Namaste!

Created by Bhargava and Vishal grade 8B (The Shri Ram Universal School)

8B-Dhruvika Saini - Cyber Security

OVERVIEW

A definition of cyberbullying is an aggressive, intentional act or behavior that is carried out by an individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself.There are many variations of the definition,"the process of using the Internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person."Cyberbullying is often similar to traditional bullying, with some notable distinctions. Victims of cyberbullying may not know the identity of their bully, or why the bully is targeting them, based on the online nature of the interaction. The harassment can have wide-reaching effects on the victim, as the content used to harass the victim can be spread and shared easily among many people and often remains accessible long after the initial incident.

The terms "cyberharassment" and "cyberbullying" are sometimes used synonymously, though some people use the latter to refer specifically to harassment among minors or in a school setting.

Cyberstalking is a form of online harassment in which the perpetrator uses electronic communications to stalk a victim. This is considered more dangerous than other forms of cyberbullying because it generally involves a credible threat to the victim's safety. Cyberstalkers may send repeated messages intended to threaten or harass, and they may encourage others to do the same, either explicitly or by impersonating their victim and asking others to contact them.

Means of cyber bullying

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature is called Cyber Bullying.

Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. ... Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.

Cyberbullying can take place on social media sites such as Facebook, Myspace, and Twitter.

Cyberbullying involves repeated behavior with intent to harm.

Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group).

Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, pejorative labels hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person.

Law Enforcement

SCHOOLS:

The safety of online privacy issues in schools is increasingly becoming a focus of state legislative action.’In 2012, a group of teenagers in a design class New Haven, Connecticut developed an application to help fight bullying, "Back Off Bully" (BOB). This is an anonymous resource for computer, smart phone or iPad, designed so when someone witnesses or is the victim of bullying, they can immediately report the incident. The app asks questions about time, location and how the bullying is happening, as well as provides positive action and empowerment regarding the incident. The reported information goes to a database, where it may be studied by administrators.

PROTECTION:

There are laws that only address online harassment of children or focus on child predators, as well as laws that protect adult cyberstalking victims, or victims of any age. Currently, there are 45 cyberstalking laws on the books. While some sites specialize in laws that protect victims age 18 and under.

Several states, including Florida, California, and Missouri have passed laws against cyberbullying. California prohibits the use of an electronic device to cause someone to fear for their life.

HARMFUL EFFECTS

Cyberbullying causes psychological, emotional and physical stress. Each person's response to being bullied is unique, but research has shown some general tendencies. StopBullying.gov reports that youth who are bullied have a higher risk of depression and anxiety.

Victims may have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, including being scared, frustrated, angry, and depressed.[4] Cyberbullying may be more harmful than traditional bullying, because there is no escaping it.

AWARENESS

The Cybersmile Foundation is a cyberbullying charity committed to tackling all forms of online bullying, abuse, and hate campaigns. It was founded in 2010 in response to the increasing number of cyberbullying related incidents of depression, eating disorders, social isolation, self-harm and suicides devastating lives around the world. Cybersmile provides support to victims and their friends and families through social media interaction, email and helpline support. They also run an annual event, Stop Cyberbullying Day, to draw attention to the issue.

n 2007, YouTube introduced the first Anti-Bullying Channel for youth (BeatBullying), using the assistance of celebrities to tackle the problem.

Some Real life Incidents

In March 2010, a 17-year-old girl named Alexis Skye Pilkington was found dead in her room by her parents. Her parents claimed that after repeated cyberbullying, she was driven to suicide.

Another 13-year-old took her life due to cyberbullying. She’s suffered from epilepsy and her classmates taunted her for that. This in-school bullying continued through online platforms and forums. They’d often tell herself to kill herself because of her condition.

At one point, a classmate left her a voicemail saying “I hope you died.” Hailee couldn’t take the bullying anymore and killed herself.

8B-Sreshta Posani - Searching Safe!

Wasting time researching and finding out extraneous information? Not being able to find out what you're truly looking for? If yes, then you are in the right place! Most people struggle while researching because there are a lot of websites on the internet that come up, which might not be what you're looking for. Even though it is...how can you be sure that it’s reliable?

Isn't it frustrating having to tell students repeatedly not to search on common browsers? Well, you're in luck! Today I will be sharing with you a few trustworthy sites for kids and students to use and also share suggestions on how to search to the point so that there'll be no more wasting of your precious time!

First of all, there are several kid-safe sites that give estimable reliable information to children along with intricate details and pictures. A few of them are - Kiddle, Kidrex, Britannica, Safe Search Kids, Wonderopolis, Kidzsearch, Brainpop, Kid's Search Engine. The above websites are very secure and provide appropriate information for kids to dig into.

Searching carefully on the Web is a very important aspect of our daily life nowadays. Particularly for students and teens! But searching smartly is equally important! It helps us get our work done quickly and efficiently.

  • While researching, quit using lengthy sentences as if speaking to a person. Try using brief and crisp sentences or even words.
  • Fit in a few keywords that trigger your whole query.
  • While browsing, you don't have to use punctuation.
  • Exclude irrelevant words and phrases.
  • Do not use 'stop words' like (how, what, where, and, the, etc.) unless absolutely essential.
  • When you are still not attaining what you need.... don't give up! Try searching with new words!

Hope you found these tips useful! Don't forget to try out the above-mentioned kids-safe sites.

8B-Varnika Vaish - Blog on Passwords

As the world turns more ‘virtual’ than ‘real’ - everything is online: from classes to offices to shopping and wallets and, not to forget, the social media.

With each and every one of these comes a password. While it is fun to use social media, we must stop for a moment to think: “Are my passwords secure?” and “How do I keep my passwords safe?”

To find the answers to these questions, we must first know what a password is. A password is a set of figures that can be used to gain access to something and must be kept private. A hacker could try to steal your password to use it to access your personal information, or accounts, to post something bad in your name or to disrupt your reputation, to steal money from your bank account, and many other things.

A secure password must contain both uppercase and lowercase letters, special symbols and characters, and numbers. The longer, the better. Try not to connect it to any personal information. Passwords like ABCD123 or 123456 are an absolute no - no. Hackers could easily crack such passwords. Also, try not to use the same password for all your accounts, else if the hacker finds one of your passwords, he/she will have access to all your accounts. Remember to change your password regularly. Some websites can tell you how secure your password is while you are making one.

Sometimes a hacker might put a Trojan or a Virus in your device which gets activated when you are about to enter sensitive information. It then sends it to the hacker. A virtual keyboard is a good way to avoid this. Most Trojans can only record information that has been typed by the keys on the keyboard. A Virtual Keyboard is a keyboard on the screen in which the letters are not in QWERTY arrangement and are jumbled. Every time you open a virtual keyboard it jumbles the letters in a different way. Using a virtual keyboard can confuse the Trojan and it will not be able to record the password that has been written. Virtual Keyboards are advisable when you are signing into a bank account from a public device. Public devices are more prone to being attacked by hackers.

A lot of websites have a 2-step verification where apart from entering the password, an OTP (One Time Password) is also sent to the mobile/email, connected with the account. This must be entered to continue to access your account. Even if the hacker gets the password, it will be useless as he does not have the mobile/email access on which the OTP has been sent.

Hackers normally try to crack passwords to bank accounts. Once they do, they log into the bank account and then transfer money to their own account. To prevent this, some banks ask for a second password (mostly known as Transaction Password), that is used when money is transferred to another account. This way the hacker will be unable to transfer money, even if he does manage to find the password to the bank account. Thus, if on a public device,

  • Given an option, use Virtual Keyboard.
  • Remember to sign out of your account once you are done using it.
  • Clear browsing history/Cache of that machine.

Remember, only enter passwords on secure sites which usually start with https:// that you know are safe and can be trusted.

8C Kartik Shinde - HOW TO STAY SAFE IN THE ONLINE WORLD

The life and working style of everyone has changed during the Pandemic, So The whole world now uses technology to communicate, learn, work, etc. Everyone uses technology now, So how do we stay safe?, We even had to ensure that we were safe even during the times when the virus wasn’t there?, It’s just that the world isn’t as it was. Now it’s just that the people do things virtually instead of doing it physically, but it still doesn’t mean it is safer, it is still vulnerable, So how do we stay safe?

“If the challenge exits so does the solution” a quote by Rona Mlnark. This quote somewhat relates to the challenges we are facing.

Steps To Follow

We have to be safe and there are many ways we can stay safe even virtually, Staying safe virtually can also be termed “Cyber Security”, Cyber security is basically defending phones, laptops, servers, networks, and data from any malicious attacks.

There are many ways as I have told, So I’ll help you understand and learn it.

The first thing I would like to tell is if the device is a phone, Laptop, Tab, Etc. Always keep a strong password example of it is “jelly22fi$h” this password won’t be easy to unlock.

The second thing I would suggest is using a antivirus software which detects and prevents the virus from harming the computer.

Third, Do not click on any links during surfing the web, they might contain viruses, etc. Always click on links which are encrypted (lock on the website). And avoid clicking on links in emails from unknown users.

Fourth, Avoid using Wi-Fi in public places. Always enable 2 factor auth so that the hacker can’t easily login into your account 2 factor auth secures the data even more as logging in then requires 2 steps to verify only then the person will be able to login. These are some of the ways you by which you can stay safe and not be a victim of cyber-crime. So let’s us not fall in to traps, We can easily tackle these things, just follow the steps I have told you regarding Cyber Security, and you are safe.

8C-Maitri Ratnam - Cyber crime

The most common problem faced by us: Cybercrime

“At the end of the day, the goals are simple: safety and security”. This line was said by Jodi Rell. This line is so true in our lives. Nothing is more important than safety and security. Today we are going to address one of the most common problems: Cybercrime. We use computer and other electronic devices almost everyday. So, let’s understand what is cybercrime.

What is Cyber Crime?

Cybercrime is the greatest threat to a computer. It is a criminal act that either targets or uses a computer, a computer network or a networked device. It might be carried by a single person or an organization. Cybercrime either aims to damage users for profit, political or personal reasons. Some cybercrimes are targeted on one person, others are performed randomly (whoever falls to their prey). Some well-known examples of cybercrime malware attacks, phishing, e-mail spoofing, cyber stalking, etc.

What are the types of Cybercrime?

There are various types of cybercrime. They may be email and internet fraud, identity fraud, financial or card payment data, theft and sale of corporate data, cyber extortion, crypto jacking or cyberespionage.

How to protect ourselves from cybercrime?

Now we come to the most important part which most of us don’t follow- How to protect ourselves from cybercrime. We should always keep our electronic devices safe and secure. As one small mistake is only needed for a hacker to cause a cybercrime. A computer without a lock is like calling hackers to hack our computer.

There are 5 important ways to protect ourselves from cybercrime.

  • We should use an anti-virus software and keep it updated.
  • We should keep strong passwords.
  • Another important way in which hackers harm our devices is by sending document and links which when opened will download malwares in your computer. So don’t open links and documents sent by a sender which you don’t know.
  • Do not give personal information.
  • If you are asked for data by a company who has called you, hang up the call. Call them by the number given in the official website.
  • Make sure you follow all these given steps and no hacker will be able to cause any harm to you or your devices.

8C-Siddharth Goyal - Does your password go to the gym

Is your password strong enough to bench press millions of hackers? Yes, you heard it right, there are millions of users aiming to steal your data and information. One way to avoid this is making use of strong passwords.

Millions of hackers use botnet to try and login to your devices or accounts. They use softwares that generate billions of possible passwords until they generate the correct one. This can be avoided using strong passwords that you should be VERY, VERY hard to guess.

TIPS-

  • NEVER reveal your passwords to anyone.
  • If you get a mail asking for your password, contact the organisation in a different manner to cross-check.
  • Use strong passwords with uppercase, lower case, numbers and symbols, but make it so that you can remember.
  • NEVER reveal your passwords to anyone.
  • If you get a mail asking for your password, contact the organisation in a different manner to cross-check.
  • Use strong passwords with uppercase, lower case, numbers and symbols, but make it so that you can remember.
  • Use unique passwords for different sites, apps, softwares and accounts.
  • Maintain a password log book.
  • If you feel your password has been revealed or someone has found out, immediately contact the organisation or change your password.
  • Make sure to change your password every 2-3 months.

Follow all of these and there is very little chance of your passwords being guessed and your accounts being breached.

8C-Tanvi Basani-Password Protection.what to keep in mind

Does your mom ever give you candy or a treat if you've been a good kid? If she does, then you'd probably want to keep it someplace safe so your siblings don’t get their hands on it. Maybe hide it behind your clothes or put it in a locked box and save it for later. Now let's say, one day you're completely exhausted and all you need is a little sugar to get you back on track. You go up to your room, close the door, take the key you've been hiding under your pillow, open the box only to find the wrapper and tiny sticky bits of leftover chocolate. How would you feel? Devastated right? The internet is a place where we keep important information, sometimes even personal. If it is leaked, then it will cause huge problems. In order to keep our information safe, we must have strong passwords.

Here is the list of most common things which you can follow to keep your password safe, secure and protected.Keep strong password -The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words. Your password should be as strong as tungsten. Now that’s really strong.

Creating uncrackable passwords. - Make your passwords uncrackable and difficult like those questions on your math test that you just can't seem to get right.

The password has to be something that the hacker would never be able to guess. And if he does, that means he's a genius or your password was too obvious.

Change your password

Well, you don't need to keep changing your passwords every 60 or 90 days, it was a long-accepted practice, people use to make a schedule and keep changing their password time to time. But now you can use the same password unless you suspect that your passwords have been exposed. Hence, you don't need to periodically change them.