Mobile Phone Cyber Security


 

Introduction:

We are living in digital era, mobile phone is not only making calls, and sending massages but also like computer work. It hold large amounts of data or information like personal  photos, emails details, passwords, bank account details, and important credentials  much more. Mobile phone has easy to handle but many people overlook the need to secure their phones. If not right secure measure, your important personal data is vulnerable to digital attacks, data stolen, and scams.

We will need to aware and literate device safety. The essential steps secure our mobile phone from cyber-attacks and threats, offering details tips in understanding language. Here you will find easy to handling tips to ensure your phone device puts safe and secure.

 

 Mobile phone secure Settings, which is important.

These are first line settings…

Screen Lock:

 It is very essential and effective path to put your mobile phone secure is through setting up a Screen Lock. Setting a PIN, Pattern, password, or biometric lock (fingerprint or facial recognition) is important to keep your phone safe. For the most protection, use strong pass word that’s difficult for others to guess.


Set Two-Factor Authentication:

 It is an additional layer of secure for your accounts. It’s provide deep safety. And reduces the threats possibility of your account being hacked. Fix 2FA on your email, social media, and on banking apps like UPI apps, Google pay etc. to add a strong layer of security.


Auto Blocker :

Auto blocker keeps your phone safe by blocking treats and other suspicious activity. Blocks commands by USB cable malicious chargers, computers, and other devices won’t be able to send commands to your phone when connected using a USB cable.

Emergency Contacts :

Emergency contacts are people you trust to help you in an emergency. They will be contacted if you start emergency sharing. You can also show them on the Lock Screen for quick access in an emergency.

Secure Browsing Practices: While Online

We are use mobile phone for to browse the internet, whether it is for shopping, reading articles, news or seeing social media. Yet, not all domain/websites are safe and your mobile phone is often used to browse the internet, whether it’s for checking social media, shopping, or reading the news. However, not all websites are safe. Here are practices to stay secure while we are online.

Avert Public Wi-Fi for Financial and Sensitive Transactions:
 While it might be suitable to use public Wi-Fi in malls, big restaurant or airports, public networks are not secure. Hackers might be easily access data sent over these networks. Avert logging into financial and sensitive personal transactions apps using public Wi-Fi.  If you in essential situation need to use a if you absolutely need to use a public Wi-Fi, consider using a Virtual Private Network-VPN to encrypt your internet connection and stay your data private.`

When you browse, check HTTPS in the URL/ website. Ensure the URL starts with "https://" (not just "http://"). The "s"   reflects "secure," and it indicates that the website encrypts your data to protect it from being intercepted by fraudsters.

Create a separate e-mail address for online buying to prevent harmful emails, spam of sales promotions, or misleading offers.

Don’t use a USB or other external device owned by some other person.

Don’t switch on your GPS/location setting when in public places or in sensitive settings.

Avoid clicking at the prompt of the Remember Password feature whenever it is prompted by various browsers/apps.

Conclusion:

Mobile Phone is a strong and important tool, but it’s only as safety as the precaution taking by you. Always aware when u online. Don’t click also connect unknown. You can safe your device and data by practicing good secure habits. Think before click….

 

 

 

 

 

Indian Cyber Laws


Introduction:

What is Cyber Law? In order to arrive at an acceptable definition of the term Cyber Law. We must first understand the meaning of the term law.

 Law encompasses the rules of conduct:

-that have been approved by the government and,

-which are in force over a certain territory and,

-which must be obeyed by all persons on that territory. Violation of these rules will lead to government action such as imprisonment or fine or an order to pay compensation.

The term cyber or cyberspace has today come to signify everything related to computers, and the internet including:

Algorithms

Apps

Artificial intelligence  

Bitcoin &other crypto-currencies

Block chain

Blogs

Cloud Computing

Computer Databases

Computer Software

Cookies

Credit, debit &cash cards

Cryptography

Cyber Crime

Cyber Crime investigation

Cyber Forensics

Cyber Security

Cyber Terrorism

Cyber Warfare

Dark web

Data breaches

Digital Evidence

Domain Names

Drones and UAV’s

E-Courts

E-governance

E-tenders

Ecommerce

Electronic Contracts

Electronic Payment Systems

Electronic Voting machines

Email

Hacking- Whitehat, grayhat, blackhat

Hactivism

Internet of things

Malware

Mobile Wallets

Smart Homes

Software Licenses

Source code

Video conferencing

Web hosting

Website policies

Cheque and cheque Truncation  in the electronic form  

 

Thus, a simplified definition of " Cyber law is that is the Law governing cyber space".


Indian cyber Laws:

1.     Information Technology Act, 2000

2.     Bhartiya Nyay Sahinta, 2023 (provision document or electronic record)

3.     Bhartiya Sakshya Adhiniyam,2023 (provision digital evidence)

4.     Bhartiya Nagrik Surkshya Sahinta,2023 

5.     The Bankers Book Evidence Act,1891

6.     Civil Procedure Code, 1908

7.   Payment and Settlement Systems Act,2007

8.    Negotiable Instruments (Amendments and miscellaneous Provisions) Act,2002  (Only provision apply for electronic cheque and truncated cheques)

 Cyber Laws is  having judicial framework and Quasi-judicial framework.

1, Judicial Framework for Cyber Law  in India:

     JMSC-JMFC-CJM-ASC/SC-HC- SC

2. Quasi-Judicial Framework for Cyber Law in India:

Adjudicating Controller officer –Telecom Disputes Settlement and Appellate Tribunal- HC- SC

Power to investigate offences:

1. As per the Information Technology Act Section 78 and Section 80 : Notwithstanding anything contained in the Code of Criminal Procedure 1973 or BNSS a Police officer not below the rank of Inspector shall investigate any offence defined under Chapter XI of  Information Technology Act .

2. As per the Information Technology Act Section 28 empowers the following to investigate any contravention of the Act and allied rules and regulations:

1.     The Controller

2.     Any officer authorize by the Controller.

3. Rule 4(1) of the Information Technology (Qualification and Exp, of AO) rules, 2003 authorizes the Adjudication Officer to get a matter or report investigated from:

1. An officer in the Office of Controller or

2. CERT-IN or

3. the concerned  Police Inspector.......


 

 

Computer Literacy For Secure Online


Computer


 ðŸ‘‰ Introduction:

We are know very well, all cyber fraud create by computer, computer network or computer system. If computer is a main medium of online fraud, so we should have first priority to know, what is a computer? If know about computer, you will lesson get how to save from online illegal activities, and how to conduct with computer.

 

👉As per Indian law….

 

What is computer?

Computer means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output processing storage computer software, or communication facilities which are connected or related to the computer in a computer system or computer network.

Simply put, a computer has the following characteristics:

1.     It is a high-speed data processing device or system.

2.     It may be electronic, magnetic, optical etc.

3.     It performs logical, arithmetic, and memory functions

4.   These functions are performed by manipulations of electronic, magnetic or optical impulses.

👉 Computer includes:

1.     All input facilities,

2.     All output facilities,

3.     All processing facilities,

4.     All storage Facilities

5.     All  computer software facilities, and

6.     All communication facilities, which are connected or related to the compute in a computer system or network.

 

👉 Considering the wide definition given to the term computer by the IT Act the following are examples of Computer:

1.     Desktop personal computer

2.     Mobile phones

3.     Microwave ovens

4.     Computer printers

5.     Scanners

6.     Installed computer software

7.     Automatic Teller Machine (ATM)

8.     SMART” homes which can be controlled through the Internet.


👉 Findings:

For all person, all sector officers and staff cannot away from digital era digital education. It will be mandate computer literacy for secure life. So we have to interest in digital things and learn how to use with safety for our enjoying and fantastic daily life. It is in your hand. We know, we are going to fully depending on machine, software and hardware as like Computer. Digital / Computer literacy is the most powerful medium for safety life and developing himself.

 

 

Important Provisions of Information Technology Amendment Act 2008

Mapping of the offences against the relevant provisions of Information Technology Amendment Act 2008



Sr. No.

Nature of Complaint

Applicable section and punishment under IT Amendment  Act 2008

1

Hacking of Email

Section 66 

3 yrs.  Imprisonment of fine up to Rupees five lakh or both.

 Section 66C –

3 yrs.  imprisonment of fine up to Rupees one lakh  

2

Skimming of Credit Card/ Debit Card

Section 66C –

3 yrs.  imprisonment of fine up to Rupees one lakh.

Section 66 D

3 yrs.  imprisonment of fine up to Rupees one lakh. 

3

Creating impersonating websites for cheating e.g. Job frauds

Section 66C –

3 yrs.  imprisonment of fine up to Rupees one lakh.

Section 66 D

3 yrs.  imprisonment of fine up to Rupees one lakh.

 

4

Receiving Stolen data

Section 66 B–

3 yrs.  imprisonment or Rupees one lakh fine  or both. 

 

5

Identity Theft (election card, Aadhaar Card detail etc.)

Section 66 C–

3 yrs.  imprisonment of fine up to Rupees one lakh. 

 

6

A Phishing E-mail is sent in the name of bank asking card number, expiry date, CVV number

Section 66 D

3 yrs.  imprisonment of fine up to Rupees one lakh. 

 

7

Capturing, publishing of transmitting the image of the private area without any person’s consent or knowledge

Section 66 E

3 yrs.  imprisonment  or fine not exceeding Rupees two lakh or both.

 

7

Sending phishing mail to compromise government network with virus, APT’s worms etc.

Section 66

3 yrs.  imprisonment or fine up to Rupees five lakh or both.

Section 66 F

Life imprisonment.

 

8

Publishing of transmitting obscene material in electronic form.

Section 66

3 yrs.  Imprisonment and 5 lakh fine.

 

9

Publishing or transmitting of material containing sexually explicit act etc., in electronic form

Section 67 A

5 yrs.  Imprisonment and up to 10 lakh fine. 

 

10

Publishing or transmitting of material depicting children in sexually explicit act etc., in electronic from

Section 67 B-

5 yrs. imprisonment and up to 10 lakh fine. 

 

11

Stealing data from armed forces, state/Central government computers that  have data or information related to national security

Section 66-

3 yrs. imprisonment or fine up to Rupees five lakh or both. 

Section 66 F -

Life imprisonment. 

12

Not allowing the authorities to decrypt all communication that passes through your computer or network

Section 69-

 Imprisonment up to 7 years and fine.

 

13

Email Spoofing of a person and cheating

Section 66 C–

3 yrs. imprisonment of fine up to Rupees one lakh.

 

14

Posting defamatory messages on social media

Not provision in  IT Act,

But mentioned  in Bhartiya Nyaya Sahinta 2023- Section 356(2)

15

Source code theft or modification of source code or data or information without authorization

Section 66 C–

3 yrs. imprisonment of fine up to Rupees one lakh.

 

 

 


Drone Technology

 Drone 


A drone is an unmanned aerial vehicle (UAV) or remotely piloted aircraft.

History of Drone Technology:

"Drones have come a long way! The first drone, the "Aerial Target" (1916), was a British-made pilotless aircraft. In the 1930s, the US developed the "Radio plane OQ-2" for military use. Modern drones emerged in the 1990s with GPS and autopilot systems.

 

General Provisions:

1. Drone Operator Permit: Drone operators must obtain a Drone Operator Permit or Remote pilot certificate (RPC) from the Directorate General of Civil Aviation DGCA.

2. Unique Identification Number: All drones must have a Unique Identification Number issued by the DGCA.

3. All drones except Nano drones (Weighing less than 250 grams) must be registered with the Directorate General of Civil Aviation (DGCA).

4. The drone operator must be at least 18 years old and not more than 65 years

5. The operator must have passed Class 10th or equivalent examination.

6. The operator must undergo drone pilot training from a DGCA

7. Drones cannot fly above 400 feet (120 meters) above ground level.

8. Drone operators must maintain a visual line of sight with the drone at all times.

 

Uses of Drone:

Today, drones are used for  military use, agriculture, construction, logistics, media and disaster management, law enforcement and public safety, monitoring climate change, carrying out search operations in natural disasters, delivering goods,, photography filming geographic mapping traffic management , bomb detection (digital smelling technology ) bomb disposal, crowd monitoring etc.

Now a day drone based applications being explored in India for human being facilities on-

1.         Media and entertainment

2.         Mining

3.         Infrastructure

4.         Energy and utilities

5.         Agriculture

6.         Insurance

 

Classification of Drone /unmanned aircraft Systems

    Drones are categorized into five types

1. Nano UAV: Weighing less than or equal to 250 grams.

2. Micro UAV: Weighing more than 250 grams, but less than or equal to 2 kgs

3. Small UAV: Weighing more than 2 kgs, but less than or equal to 25 kgs

4. Medium UAV: Weighing more than 25 kgs, but less than or equal to 150 kgs

5. Large UAV: Weighing more than 150 kgs

 

Conclusion :

Drone technology have been increasing uses in various sector. The drone laws and regulations are in place to ensure safe and responsible drone operations. Drone operators must comply with the provisions of Indian Laws. Failure to comply can result in penalties, including fines and imprisonment as per Indian Act and Rule.

 

 

Mobile Phone Cyber Security

  Introduction: We are living in digital era, mobile phone is not only making calls, and sending massages but also like computer work. I...