0% found this document useful (0 votes)
48 views142 pages

Cyber Safe Girl Circular1725443119118

Girls safety

Uploaded by

oracle plsql
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views142 pages

Cyber Safe Girl Circular1725443119118

Girls safety

Uploaded by

oracle plsql
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 142

Title: Cyber Safe Girl

Version: 6.1
Publisher: Dr Ananth Prabhu G
Co-Authors: Adv Prashant Jhala and Yashavantha Kumar KN, DySP

First Published in India in 2018

Copyright (C) Campus Interview Training Solutions 2023

All rights reserved. Without limiting the rights under copyright reserved
above, no part of this publication may be reproduced, stored or
introduced into a retrieval system, or transmitted, in any form or by any
means (electronic, mechanical, photocopying, recording or otherwise),
without the prior written permission of the copyright owner.

Requests for permission should be directed to


[email protected]

Designed and printed by


Tarjani Communications Pvt. Ltd, Mangaluru

This is a work of fiction, names, characters, businesses, places, events, locales and incidents
are either the products of the author’s imagination or used in a fictitious manner. Any
resemblance to actual persons, living or dead, or actual events is purely coincidental. The
authors and publishers disclaim any liability in connection with the use of the information
provided in this book.
Credits

Sanjay Sahay Ramachandra Rao Arun Chakravarthy Dr Murugan


IPS (Rtd) IPS IPS IPS

Roopa D Dr Vedamurthi Avinash Pandey Amit Vasava


IPS IPS IPS IPS

Narasimha V T M C Kavitha Ravishankar Gopalkrishna K


KSPS KSPS KSP KSP

Special Thanks to

Dr Manjunath Ch A S Murty Dr Varadraj G Sheikh Salim Nisheeth Dixit


Bhandary, MLC ISEA Team Director- Overseas

Vivek Shetty CA Mohan Vishwa Jagadish R Chandra Naveen Kumar Vaikunt Prabhu

Dr Mustafa B Rohan Don Yashwanth A S Chaithra K M Anudeep Karkera


Tech Resource Web Architect Artist
Do you want to invite
Dr Ananth Prabhu G
to address the students of your school /
college or employees of your organisation..?

contact
+91 89515 11111
[email protected]

to follow his regular updates


like the page

www.facebook.com/educatorananth
Topics

1. MOBILE RECHARGE SHOP 20. FAKE PROFILE WITH


SEXTORTION
2. DEBIT CARD CLONING
21. CYBER VULTURES
3. KEYLOGGER
22. APP TRAPS
4. SMS SPOOFING
23. JUICE JACKING
5. CALL SPOOFING
24. WIFI HACKING
6. RANSOMWARE
25. ONLINE RADICALIZATION
7. CYBER STALKING
26. HONEY TRAP
8. PICTURE MORPHING
27. QR CODE SCAM
9. PROFILE HACKING
28. RFID CLONING
10. ONLINE GAMES
29. DRONE SURVEILLANCE
11. JOB CALL LETTER
30. SEARCH ENGINE
12. DEEPFAKES
RESULTS SCAM
13. DATING WEBSITE
14. CAMERA HACKING
15. SOCIAL TROLLING
16. PONZI SCHEME
17. FAKE MATRIMONIAL
PROFILE
18. MOBILE REPAIR SHOP
19. FAKE REVIEWS
Topics

31. IDN HOMOGRAPH ATTACK 42. CONNECTED CAR


32. SCRATCH CARD SCAM 43. DRUG TRAFFICKING
33. SIM SWAP 44. DOXING
34. CRYPTOJACKING 45. CYBER GROOMING
35. VIDEO CONFERENCE SCAM 46. CRYPTO FRAUDS
36. KIDS MOBILE PHONE 47. CYBER SEX TRAFFICKING
37. SMART HOMES 48. CYBERWARFARE
38. MICRO LOANS 49. HACKTIVISM
39. BLUE SNARFING 50. METAVERSE
40. STOLEN PHONE 51. SESSION HIJACKING
ATTACK
41. EXAM MALPRACTICE
52. PROMPT ENGINEERING
53. FILELESS ATTACKS
54. DELIVERY SCAM
55. VIRTUAL KIDNAPPING
56. FORMJACKING
57. CYBERSQUATTING
58. DNS HIJACKING
59. SMS BOMBING
60. INSIDER THREATS
FOREWORD
Cyberspace has become the real
world in today’s society, where cyber
identities hold a greater fascination
than real identities. With the growing
trend of people connecting, expressing
emotions, and conducting transactions
online, it is crucial to be aware of the
vulnerabilities present in cyberspace.
Throughout my extensive tenure as
4 time MLA and Minister of various departments, I have
witnessed numerous instances of girls falling victim to
various cyber offenses. As human relationships increasingly
involve online connections, the impact of cyber offenses
extends far beyond monetary or property loss, often leaving
lasting effects on lives.
I am pleased to see that the Cyber Safe Girl 6.0 resource
simplifies the understanding of girls’ vulnerability in
cyberspace. The engaging illustrations and informative
cartoons ensure the content remains relevant and dynamic.
I am confident that this book will serve as a comprehensive
guide for the majority of girls in the new millennial generation,
empowering them to become savvy users of technology. Let
us hope that this book aids girls in developing their digital
intelligence.
Warm Regards,
U T Khader
Honorable Speaker
Karnataka Legislative Assembly
THE IMPORTANCE OF CYBER SAFETY!
Cyber safety is immeasurably an
important set of rules/guidelines
ideas to be followed while using the
internet. When you use the internet,
you are bound to make connections
with strangers, unknown servers, etc.
If you are not responsible, you can
very easily end up having your identity
stolen, credit ruined and your files gone forever, to name a
few.
Therefore, it is quintessential to follow the best practices to
stay Cyber Safe and browse the internet responsibly.
I am glad that #CyberSafeGirl Version 6.0 has come out very
well and it would definitely help millions of girls and netizens.
The 60 infotoons are very simple and easy to comprehend. I
am sure, it would benefit any one from 9 to 99 years of age!
I also promise to extend my full support for this noble cause.

Warm Regards,
Smt. Rekha Sharma
Chairperson
National Commision for Women, New Delhi
MOBILE RECHARGE SHOP
A Mobile Recharge Shop is a place where scamsters can gain access
to your cellphone number because you have provided it to the
recharge vendor. They will misuse your number to call or text you,
exploit your ignorance or even emotionally manipulate you.

IT Sections Applicable
IPC Sections (to be applied to the Shop Keeper)
IPC Section 354A/BNS 75 - Sexual Harassment and punishment
for Sexual Harassment
IPC Section 354C/ BNS 77 - Voyeurism
IPC Section 383/384/ BNS 308 - Extortion (IF ANY DEMAND)
IPC Section 503/BNS 351 - Criminal Intimidation
IPC Section 506/BN 351 - Punishment for Criminal Intimidation
IPC Section 509/BNS 79 - Word, gesture or act intended to
insult modesty of a woman
IT Act:
IT Act Section 66E - Punishment for violation of privacy

Mobile Number Sale to Stalkers by Recharge Shop:


IPC Sections (to be applied to the Shop Keeper)
IPC Section 109/BNS 49 - Punishment for abetment
IPCSection 114/BNS 54 - Abettor present when offence is
committed
IPC Section 120B/BNS 61 - Punishment for Criminal Conspiracy
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust

Everything comes for a Charge and in case of Recharge, there’s


no Free Charge!

Beti Bachao, Cyber Crime Se


MOBILE RECHARGE SHOP

www.cybersafegirl.com
DEBIT CARD CLONING
Debit Card skimming happens when the PIN is revealed to another
person. A scamster who knows the PIN and has possession of the
card even for a short while can replicate the card with a skimming
/schimming device and withdraw cash.

IT Sections Applicable
IT Act for cloning
Section 43: This section deals with unauthorized access tocomputer
systems, data breaches, and other computer-relatedoffenses.
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
computer resource
Money Transaction followed by cloning:
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating

IT Act Section 66D - Punishment for cheating by personation by


using computer resource.
IT Act Section 72A - This section deals with the punishment for
disclosingpersonal information obtained in the course of providing
servicesunder the terms of lawful contract.
IT Act Section 84A - This section empowers the Central Government
toprescribe modes or methods for encryption.

Cloning may blow up your Earnings!

Beti Bachao, Cyber Crime Se


DEBIT CARD CLONING

www.cybersafegirl.com
KEYLOGGER
It is a malicious program that may be installed on the victim’s
computer for recording computer user keystrokes to steal passwords
and other sensitive information. With Keylogger a scamster will be
able to collect login details and other matter saved in the computer
and have them mailed to a designated email address.

IT Sections Applicable
Key logger installation: IT Act
IT Act Section 43 - Deals with unauthorized access, damage to
computer systems, and data.
IT Act Section 66 - Computer Related Offences
Stealing personal information: IT Act
IT Act Section 66C - Punishment for Identity Theft
Creating fake profile & posting private conversation :
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation by
using computer resources
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in
electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit
act etc., in electronic form & sections of POCSO
IT Act Section 72 - Breach of Confidentiality and Privacy
IT Act Section 79 - Intermediary Liability Protection
IPC Sections:
IT Act Section 354A/BNS 75 - Sexual Harassment and punishment
for Sexual Harassment
If in hard copy, IPC Sections 292/BNS 294, 293/BNS 295
294/BNS 296

Keylogger may empty your Coffer!

Beti Bachao, Cyber Crime Se


KEYLOGGER

www.cybersafegirl.com
SMS SPOOFING
Spoofing is being able to send a message by hiding or changing or
using a completely different sender ID. Typically, when you send
an SMS, your handheld device sends the message with your phone
number as the originator where in you as the sender cannot alter
that number.

IT Sections Applicable
Act of hoax or trick or deceive a communication
IPC Section
IT Act Section 465/BNS 336 - Making a false document( FORGERY)
IT Act Section 419/BNS 319 - Punishment for cheating by personation
IT Act Section 43 - While not directly related to SMS
spoofing, this sectiondeals with unauthorized access to computer
systems, which couldapply if someone gains unauthorized access to
systems for the purposeof carrying out SMS spoofing.
IT Act Section 43A and Section 72A: These sections deal with
thecompensation for failure to protect data and confidentiality
ofinformation. If SMS spoofing leads to a breach of sensitive information,
these sections might come into play.
IT Act Section 66C - This section deals with identity theft. If
SMS spoofing isused to impersonate someone else and commit fraud or
deceiveothers, it could be covered under this section.
IT Act Section 66D - Punishment for cheating by personation
by using computer resource
IT Act Section 66E - This section addresses violations of
privacy and thecapturing, publishing, or transmitting of images of a
private area of anyperson without their consent. If SMS spoofing is used
to invadesomeone’s privacy in this manner, this section could apply.

SMS are Spoofed by Cyber Crooks!

Beti Bachao, Cyber Crime Se


SMS SPOOFING

www.cybersafegirl.com
CALL SPOOFING
Call spoofing happens through apps that enable a person with
criminal intent to change his number and voice to impersonate
another to defraud.

IT Sections Applicable
Act of hoax or trick or deceive a communication
IPC Section
IPC Section 465/BNS 336 - Making a false document( FORGERY)
IPC Section 419/BNS 319 - Punishment for cheating by personation

IT Act Section 66C - Identity Theft : This section of the Information


Technology Act deals with identity theft, which includes dishonestly
orfraudulently making use of the electronic signature, password
or anyother unique identification feature of any other person. Call
spoofingcan fall under the ambit of this section if it involves stealing
someone’sunique identification feature for wrongful gain.

Additionally, IT Act Section 66D - Cheating by Personation using


Computer Resource can also be applied. This section addresses cheating
by personation through the use of a computer resource. If call spoofing is
done with the intention to cheat or deceive someone, it could potentially
fall under this section.

Call Spoofing is always with criminal intent!

Beti Bachao, Cyber Crime Se


CALL SPOOFING

www.cybersafegirl.com
RANSOMWARE
Ransomware is a form of malware that encrypts a victim’s files.
The attacker then demands a ransom from the victim to restore
access to the data. Users are shown instructions as to how to
pay a fee to get the decryption key. The costs can range from a
few hundred rupees to thousands, payable to cybercriminals in
bitcoin.

IT Sections Applicable
Unauthorised access, Denial, Encryption :
IT Act Section 43 - This section deals with unauthorized access,
damage tocomputer systems, and data breaches.
IT Act Section 66 - Computer related offences
Section 66C - This section deals with identity theft.
Section 66D - This section deals with cheating by
impersonation usinga computer resource.
Demand without payment :
IPC Section 384/BNS 308 - Extortion
IT Act Section 386/BNS 308 - This section deals with extortion by a
putting person infear of death or
grievous hurt.
IPC Section 511/BNS 62 - Punishment for attempting to commit
offence punishable with imprisonment
for life or other imprisonment
Demand & payment :
IPC Section 384/BNS 308 - Extortion

Sensitize your Hardware and Software to avoid Ransomware!

Beti Bachao, Cyber Crime Se


RANSOMWARE

www.cybersafegirl.com
CYBER STALKING
Cyberstalking is the use of the Internet or other electronic means to
stalk or harass another by misusing information uploaded on social
networking sites.

IT Sections Applicable
Section 66A - This section previously dealt with the offense of
sendingoffensive messages through communication services. However,
it wasstruck down by the Supreme Court of India in 2015 on grounds
ofbeing vague and overbroad, and violating the right to free speech.

Offline:
IPC Section 354 D/BNS 78 - Stalking

Online :
IPC Section 354 D/BNS 78 - This section was introduced through
the InformationTechnology (Amendment) Act, 2013, and specifically
deals with theoffense of cyberstalking. It states that any person who
monitors theuse by a woman of the internet, email, or any other form
of electroniccommunication, commits the offense of cyberstalking. It
alsocriminalizes actions that cause the woman to fear for her safety
or thesafety of her relatives. Conviction under this section can result
inimprisonment for a term which may extend to three years and a fine.

Cyber Stalking means some is keeping an eye on you


remotely remotely!

Beti Bachao, Cyber Crime Se


CYBER STALKING

www.cybersafegirl.com
PICTURE MORPHING
Morphing the face of a person to the body of another and
publishing it to blackmail or otherwise intimidate the person is
one of the ways by which people who upload photos on social
networking sites can be exploited.

IT Sections Applicable
IPC Sections
IPC Section 292/BNS 294 - Sale etc of Obscene books etc
(if in hardcopy)
IPC Section 465/BNS 336 - Morphing photographs and creating a false
electronic record
IPC Section 469/BNS 336 - Making false electronic document for
causing defamation
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, guesture or act intended to insult
modesty of a woman
IT Act
Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
Section 66E - Punishment for Violation of Privacy
Section 67 - Punishment for publishing or transmitting obscene
material in electronic form
Section 67A - Punishment for publishing or transmitting of material
containing sexually explicit act etc., in electronic form
Section 67B - Punishment for publishing or transmitting of material
depicting children in sexually explicit act etc., in
electronic form & sections of POCSO
Section 72 - Penalty for Breach of Confidentiality and Privacy

For publishing photos containing indecent representation of women:


Section 4 R/W Section 6 of Indecent Representation of Women’s Act, 1986

Morphing is used for Defaming!

Beti Bachao, Cyber Crime Se


PICTURE MORPHING

www.cybersafegirl.com
PROFILE HACKING
Profile Hacking happens when your email or social networking
profile is accessed by a probable stalker who then compromises it.

IT Sections Applicable
IT Act
Section. 43 - Unauthorized access to computer systems,
networks,data.
Section 66 - Computer related offences
Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using password)
Section. 66D - Impersonation cheating through computer
resources.

IPC Section. 379/BNS 303 & 380/BNS 305 :


Theft of data or credentials.
IPC Section. 463/BNS 336, 464/BNS 335, 468/BNS 336 :
Forgery of electronic records for fraud.
IPC Section. 507/BNS 351 :
Criminal intimidation through hacking.

Profile Hacking means Security is Lacking!

Beti Bachao, Cyber Crime Se


PROFILE HACKING

www.cybersafegirl.com
ONLINE GAMES
Girls who are vulnerable to loneliness, low self-esteem and clinical
depression can fall prey to dangerous online games that may become
addictive and further harm them. some dangerous online games like
the blue whale challenge even end in the victim ending her life. This
is a personal as well as social challenge for the others around.
IT Sections Applicable
Information Technology Act, 2000:
Section 43 - This section deals with unauthorized access tocomputer
systems, computer networks, or data. It covers actionssuch as hacking,
introducing viruses, and damaging computersystems.
Section 66 - This section deals with computer-related offenses,including
hacking, identity theft, and other forms of cybercrime
Section 67A - This section deals with the punishment forpublishing or
transmitting sexually explicit content in electronicform.
Section 67B - This section deals with the punishment forpublishing or
transmitting material depicting children in sexuallyexplicit acts.
Section 79 - This section provides safe harbor to intermediaries,including
online platforms and game hosting services, from liability forthird-party
content. However, they are required to adhere to certainconditions,
including taking down illegal content upon receiving notice.

IPC Sections
IPC Section 299/BNS 100 - Culpable homicide
IPC Section 305/BNS 107 - Abetment of suicide of Child or Insane Person
IPC Section 306/BNS 108 - Abetment of suicide
IPC Section 321/BNS 115 - Voluntarily causing hurt
IPC Section 335/BNS 122 - Voluntarily causing grievous hurt on provocation
IPC Section 336/BNS 125 - Act endangering life or personal safety
of others

Before it becomes a game changer of your child’s Future, keep


track what they do on their personal Computers (laptops, iPads,
mobile phones, tabs, desktop etc).

Beti Bachao, Cyber Crime Se


ONLINE GAMES

www.cybersafegirl.com
JOB CALL LETTER
Websites offering jobs need to be checked for veracity and
authenticity. Mails need to be double-checked and verified before
one responds and acts on instructions provided, especially if one is
asked to put in a personal appearance.
IT Sections Applicable
Fake account / ID: IT Act
Section 43A - Compensation for failure to protect data: This sectiondeals
with the liability of a body corporate in case of a breach ofsensitive
personal data due to negligence in implementing andmaintaining
reasonable security practices and procedures.
Section 66C - Punishment for Identity Theft (dishonestly or fraudulently
using a unique identification feature)
Section 66D - Punishment for cheating by personation by using computer
resource
Section 72 - Breach of confidentiality and privacy: This section dealswith
the punishment for breach of confidentiality and privacy.
Section 72A - Punishment for disclosure of information in breach of lawful
contract: This section pertains to the punishment for revealinginformation
in breach of a lawful contract.
IPC
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
IPC Section 465/BNS 336 - Making a false document (DEFINITION SECTION)
IPC Section 468/BNS 336 - Forgery for cheating
IPC Section 471/ BNS 340 - Using forged document as genuine
IPC Section 474/BNS 339 - Procession of forged document
IPC Section 120B/BNS 61 - P unishment for Criminal Conspiracy
IPC Section 34/BNS 3(5) - Acts done by several persons in furtherance of
Common Intention
Abatement for offence
a. On the spot : IPC Section 114 - Abettor present when offence is committed
b. Remotely: IPC Section 109 - Punishment for abetment

Such fake call letters may see you out of your existing job
sooner or later!

Beti Bachao, Cyber Crime Se


JOB CALL LETTER

www.cybersafegirl.com
DEEPFAKES
Deepfake is a technique that is used to combine and superimpose
new images and videos onto source images or videos. It is used to
create videos where the voice or face of another is superimposed
on the original in such a way that the viewer or listener cannot
distinguish or doubt the veracity of it.
IT Sections Applicable
Fake account / ID:
IT Act Section 66C - Punishment for Identity Theft (dishonestly or fraudulently
using a unique identification feature)
Impersonation for cheating :
IT Act Section 66D - Punishment for cheating by personation by using computer
resource.
ITA Section 43A and Section 72A of the Information Technology Act, 2000 -
Compensation for Failure to Protect Data and Privacy: These sectionsdeal with the
compensation payable to an individual whose personal dataand information have
been negligently disclosed, which could beapplicable in cases where deepfakes lead
to privacy breaches.
IPC Section 419 - Punishment for cheating by personation
IPC Section 420 - Cheating
Publishing online:
IT Act Section 67 - Punishment for publishing or transmitting obscene material in
electronic form
IT Act Section 67A - Punishment for publishing or transmitting of material
containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of material depicting
children in sexually explicit act etc., in electronic form & sections of POCSO
IPC
Section 354A/BNS 75 - Sexual Harassment and punishment for Sexual Harassment
Section 465/BNS 336 - Making a false document
Section 499/BNS 356 - Defamation:
Section 500/BNS 356 - Punishment for Defamation:
Section 507/BNS 351 - Criminal Intimidation by an Anonymous communication
SEC 509/BNS 79 – Insulting modesty of women
Stalking: IPC Section 354 D/BNS 78 - Stalking Offline
: IPC Section 354 D/BNS 78 - Stalking Online
IPC Section 120-B/BNS 61 - Punishment for Criminal Conspiracy
IPC Section 34/BNS 3(5) - Acts done by several persons in furtherance of Common
Intention
Abatement for offence:
a. On the spot: IPC Section114/BNS 54 - Abettor present when offence is
committed
b. Remotely: IPC Section109/BNS 49 - Punishment for abetment

Deep Fakes are not noticeable easily and hence have High Stakes!

Beti Bachao, Cyber Crime Se


DEEPFAKES

www.cybersafegirl.com
DATING WEBSITE
Females can be emotionally manipulated by smooth talkers on
dating sites. Any private pictures or texts that they send across
to probable dating companions on such sites are fair game for
unscrupulous persons who can then blackmail them.
IT Sections Applicable
ITA Section 43A - This section deals with the compensation for failure
toprotect data and is relevant for data breaches.
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by using
computer resource.
Section 72A: This section penalizes the disclosure of personalinformation
without consent.
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for
Sexual Harassment
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 354D/BNS 78 - Deals with stalking.
Stalking : Offline - IPC Section 354 D/BNS 78 - Stalking
Online - IPC Section 354 D/BNS 78 – Stalking
Publishing online:
IT Act Section 67 - Punishment for publishing or transmitting obscene
material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic form
& sections of POCSO
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
IPC Section 465/BNS 336 - Making a false document

Looking out for a Date, be careful that you don’t get Check-Mate!

Beti Bachao, Cyber Crime Se


DATING WEBSITE

www.cybersafegirl.com
CAMERA HACKING
Camera hacking happens when photographs of a person are taken
without consent, through malware that got downloaded with an
attachment. Phones with no camera guard can be exploited for such
criminal activities.
IT Sections Applicable
Hacking-
IT Act Section 43 - Penalty for unauthorized access to computer systems,data
disruption, and theft.
IT Act Section 66 - Computer related offences
Section 66B - Punishment for dishonestly receiving stolen computerresources or
communication devices.
Capturing photograph/video:
IPC Section 354C/BNS 77 - Voyeurism
IT Act Section 66E - Punishment for violation of privacy
Creating Fake ID in social media
IT Act Section 66D - Punishment for cheating by personation by using computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
Online Sexual harassment to a woman
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for Sexual Harassment.
IPC Section 354C/BNS 77 - Voyeurism (capturing or transmitting images ofprivate
parts without consent).
Stalking : Offline : IPC Section 354D/BNS 78 - Stalking
Online : IPC Section 354D/BNS 78 - Stalking
Publishing online
IT Act Section 66F - Cyber Terrorism under the IT Act
IT Act Section 67 - Punishment for publishing or transmitting obscene material in
electronic form
IT Act Section 67A - Punishment for publishing or transmitting of material
containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of material
depicting children in sexually explicit act etc., in electronic form & sections of POCSO.
IT Act Section 72 - Breach of Confidentiality and Privacy under the IT Act
IPC Section 507 - Criminal Intimidation by an Anonymous communication
IPC Section 509 - Word, gesture or act intended to insult modesty of a woman

Think before taking your cell phones while using the restroom.
Your privacy may have no room to rest!

Beti Bachao, Cyber Crime Se


CAMERA HACKING

www.cybersafegirl.com
SOCIAL TROLLING
Social Trolling is posting inflammatory messages or visuals about
a person or organisation in an online community with the sole
intention of causing humiliation or nuisance to that person.

IT Sections Applicable
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman

Stalking:
Offline: IPC Section 354D/BNS 78 - Stalking
Online : IPC Section 354D/BNS 78 - Stalking

IT Act Section 66A - Punishment for sending offensive messages


through communication service, etc.
IT Act Section 66C - Punishment for identity theft.
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic form.
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act, etc., in electronic form.

Are you Trolling, the law may be soon following!

Beti Bachao, Cyber Crime Se


SOCIAL TROLLING

www.cybersafegirl.com
PONZI SCHEME
A Ponzi scheme is a fraudulent investing scam promising high rates
of return with little risk to investors. Victims of such schemes are
vulnerable to hackers with malicious intent and fall prey to their
promises of recovery of their losses.

IT Sections Applicable
Sections 3, 4, 5, 6 of Prize Chits and Money Circulation Schemes
(Banning) Act, 1978
Also look up at State Acts eg
Section 9 of the Karnataka Protection of Interest of Depositors In
Financial Establishments Act, 2004
Section 3, 4 of Maharashtra Protection of Interest of Depositors In
Financial Establishments Act, 1999 etc.
SEBI Act, 1992 - Section 11B: This empowers SEBI to
counterfraudulent practices in securities trading, including Ponzi
schemes.
Companies Act, 2013 - Section 447: It penalizes fraud,
encompassingPonzi schemes, with imprisonment and fines.
IPC Section 120B/BNS 61 - Punishment for Criminal Conspiracy
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BNS 318 - Cheating
IPC Section 34/BNS 3(5) - Acts done by several persons in
furtherance of Common Intention

Investing in Ponzi schemes may make you run out of all other
Schemes of life!

Beti Bachao, Cyber Crime Se


PONZI SCHEME

www.cybersafegirl.com
FAKE MATRIMONIAL PROFILE
A fraudster may have registered on a matrimonial site with a fake
profile. The details and profile pic may not be his. He can dupe
a naive girl who falls for his practised charm and believes in the
authenticity of supportive material that he provides to back up his
identity.

IT Sections Applicable
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by using
computer resource
IT Act Section 66E - Punishment for violation of privacy.

IPC Section 415/BNS 318 - Punishment for cheating.


IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BMS 318 - Cheating
IPC Section 464/BNS 335 - Making a false document.
IPC Section 465/BNS 336 - punishment for forgery
IPC Section 468/BNS 336 - Forgery for purpose of cheating.
IPC Section 471/BNS 340 - Using as genuine a forged document.
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication

Marriages are made in Heaven but in the virtual world you end
up paying the cost of messing with Heavenly Affairs!

Beti Bachao, Cyber Crime Se


FAKE MATRIMONIAL PROFILE

www.cybersafegirl.com
MOBILE REPAIR SHOP
Pictures and videos stored in the phone’s gallery can be accessed
by any person once the phone is in his possession. A mobile repair
shop may have a criminal who accesses private pictures or other
data and uploads them on shady sites to make them viral. He may
also use them for blackmailing.
IT Sections Applicable
ITAct Section 43A - This section deals with compensation for
failure to protectsensitive personal data.
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Prohibits identity theft, which includes
impersonatingsomeone with the intent to cause wrongful loss.
IT Act Section 66D - Deals with cheating by impersonation using
computerresources.
IT Act Section 72A - It criminalizes the disclosure of personal
information withoutconsent, intending to cause wrongful loss or gain
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting
of material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic form
& sections of POCSO
IPC Section 506/BNS 351 - Punishment for Criminal Intimidation
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
Indian Copyright Act, 1957 - Section 63B: Online Copyright Infringement
Section 63B deals with the offense of knowingly circumventingtechnological
measures to infringe copyright.

If caution not adhered at such Shops, get ready to take big Hops!

Beti Bachao, Cyber Crime Se


MOBILE REPAIR SHOP

www.cybersafegirl.com
FAKE REVIEWS
A website may dupe customers by putting up fake reviews of
products. They plant glowing reviews and pay for perfect ratings
that attract customers, especially backed by discounted prices.
These products from dubious sites may cause untold harm if used.

IT Sections Applicable
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BMS 318 - Cheating

IT Act Section 43(a) - Compensation for Damage to Computer,


Computer System, etc. (IT Section 66C -
Punishment for Identity Theft (IT Act, 2000)
IT Act Section 66D - Punishment for Cheating by Personation (IT
Act, 2000)
IT Act Section 66F - Punishment for Cyber Terrorism (IT Act, 2000)

Fake Reviews may give you wrong Overviews!

Beti Bachao, Cyber Crime Se


FAKE REVIEWS

www.cybersafegirl.com
FAKE PROFILE WITH SEXTORTION
Public changing rooms may have strategically placed cameras
that capture pics of the users, naturally with criminal intent.
These pics can then be uploaded on a duplicate social media
account with the intention of extortion.
IT Sections Applicable
Capturing photograph/video:
IT Act Section 43 - Unauthorized access to computer systems, data,
orinformation.
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by using
computer resource
Section 66E - Violation of privacy.
IPC Section 415/BNS 318 - Cheating.
IPC Section 416/BNS 319 - Cheating by personation.
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for
Sexual
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 354D/BNS 78 - Stalking.
IPC Section 503/BNS 351 - Criminal intimidation.
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman

A Fake Profile can cause unimaginable consequences!

Beti Bachao, Cyber Crime Se


FAKE PROFILE WITH SEXTORTION

www.cybersafegirl.com
CYBER VULTURES
Cyber-vultures are a merciless breed of hackers who like to feast
on consumers and businesses suffering from any type of attack.
They use this scenario as an opportunity to trick them and swindle
more money.

IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 67 - Punishment for publishing or transmitting
obscene material inelectronic form.
IT Act Section 67A - Punishment for publishing or transmitting of
material containingsexually explicit act, etc., in electronic form.

Impersonation as financial company:


IT Act Section 66D - Punishment for cheating by personation by using
computer resource

Fetching personal/ Banking/wallet details:


IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature/password/electronic
signature)

IPC Section 420/BMS 318 – Cheating

Vultures live on dead bodies, cyber vultures live on people who


have already lost their money (who are dead financially).

Beti Bachao, Cyber Crime Se


CYBER VULTURES

www.cybersafegirl.com
APP TRAPS
The internet could come with a hidden cost. One of these is
preloaded apps that harvest users’ data without their knowledge.
These apps ask for permission to access files and once given, they
may use videos, photos and storage media not only to be mined by
marketers but also for other nefarious purposes.

IT Sections Applicable
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BMS 318 - Cheating

Information Technology Act, 2000 (IT Act):


a. IT Act Section 43A - This section deals with the compensation for
failure toprotect data. Organizations handling sensitive personal data
are required toimplement reasonable security practices to protect such
data. If they fail todo so and a person suffers harm as a result, the
organization could be liableto pay compensation.
b. IT Act Section 66 - This section deals with computer-related
offenses, including unauthorized access, data theft, and damage to
computer systems.

These traps give you a silent rap and take away your sensitive
personal data.

Beti Bachao, Cyber Crime Se


APP TRAPS

www.cybersafegirl.com
JUICE JACKING
Juice Jacking is a type of cyber attack involving a charging port
that doubles as a data connection, typically over USB. This often
involves either installing malware or copying sensitive data from
a smart phone or other computer devices. Charging ports at public
places are prime areas for juice jacking.

IT Sections Applicable
IT Act Section 43 - This section deals with unauthorized access
to computersystems, computer networks, or
resources.
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Punishment for Identity Theft (dishonestly
or fraudulently using a unique identification
feature/password/electronic signature)
IT Act Section 66D - This section pertains to cheating by personation
using acomputer resource.
IT Act Section 66E - This section deals with violation of privacy.
IT Act Section 72 - This section deals with the breach of
confidentiality andprivacy of information.

Data Theft - IPC Section 379/BNS 303

You may end up giving your data by way of Lottery to the


fraudster as against the life of your Battery.

Beti Bachao, Cyber Crime Se


JUICE JACKING

www.cybersafegirl.com
WIFI HACKING
Wifi hacking is essentially cracking the security protocols in a
wireless network, granting full access for the hacker to view, store,
download, or abuse the wireless network. Weak passwords to wifi
networks may enable a hacker to log into the net through the wifi
connection in the vicinity.

IT Sections Applicable
IT Act Section 66 - Computer Related Offences
IT Act Section 66B - Punishment for dishonestly receiving stolen
computer resource or communication device
IT Act Section 66C - Identity Theft
IT Act Section 72 - Breach of Confidentiality and Privacy
Wrongful gain, wrongful loss of internet data:
IPC Section 420/BNS 318 - Cheating
Mischief by internet utility:
IPC Section 425/BNS 324/426/BNS 324 - Mischief
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
Other provisions of Narcotic Drugs and Psychotropic Substances Act,
1985.

To live a highfy virtual life, better secure your Wi-Fi!

Beti Bachao, Cyber Crime Se


WIFI HACKING

www.cybersafegirl.com
ONLINE RADICALIZATION
Young, vulnerable individuals can fall prey to terrorists’ propaganda
while spending time online and browsing the net. The targets of
such extremists are individuals or groups of people who can be
easily led towards terrorist ideologies because of their experiences,
state of mind or sometimes their upbringing.

IT Sections Applicable
IT Act Section 66F - Punishment for Cyber Terrorism
IPC Section 120-B/BNS 61 - Punishment of Criminal Conspiracy
IPC Section 121/BNS 147 - Waging or attempting to wage war, or
abetting waging of war, against the
Government of India
IPC Section 121A/BNS 148 - Conspiracy to commit offences
punishable under Section 121A
IPC Section 122/BNS 1 - Collecting arms, etc., with intention of
waging war against the Government of
India

Don’t get Radicalized, rather be Rationalized!

Beti Bachao, Cyber Crime Se


ONLINE RADICALIZATION

www.cybersafegirl.com
HONEY TRAP
Honey trapping is an investigative practice that uses romantic or
intimate relationships for an interpersonal, political or monetary
purpose to obtain sensitive information. In today’s cyber world,
“Honey Trap” has gained a new dimension on social media platforms
like Facebook, Twitter etc to trap targets by blackmailing them.

IT Sections Applicable
Capturing Picture/Video Over Online:
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
IT Act Section 66E - Punishment for violation of privacy
IT Act Section 67 - Punishment for publishing or
transmitting obscene material in
electronic form
IT Act Section 67A - Punishment for publishing or
transmitting of material containing
sexually explicit act etc., in electronic
form
IT Act Section 67B - Punishment for publishing or
transmitting of material depicting
children in sexually explicit act etc., in
electronic form & sections of POCSO
Demand for ransom (attempt):
IPC Section 385/BNS 308 - Putting person in fear of injury in order
to commit extortion
IPC Section 511/BNS 62 - Punishment for attempting to commit
offence punishable with imprisonment
for life or other imprisonment

With AI, it becomes almost difficult if not impossible to make


out the real from surreal.

Beti Bachao, Cyber Crime Se


HONEY TRAP

www.cybersafegirl.com
QR CODE SCAM
A QR (Quick Response) code is nothing more than a two-dimensional
barcode. This type of code was designed to be read by robots that
keep track of produced items in a factory. As a QR code takes up
a lot less space than a legacy barcode, its usage soon spread and
Hackers took it to their advantage! QR codes are easy to generate
and hard to tell apart from one another. To most human eyes, they
all look the same.

IT Sections Applicable
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BMS 318 - Cheating

Unauthorised Access by installing malware in the background:


IT Act Section 43 - Unauthorized Access
IT Act Section 66 - Computer related offences
IT Act Section 66C - Identity Theft
IT Act Section 66D - Cheating by Personation
IT Act Section 66E - Privacy Violation

Your money may be at stake because the codes or apps


downloaded by you can be fake.

Beti Bachao, Cyber Crime Se


QR CODE SCAM

www.cybersafegirl.com
RFID CLONING
Radio frequency identification, or RFID often abbreviated Radio
Frequency IDentification is method for automatic identification of
objects, where the object IDs read or write data using radio waves.
Each chip contains an identifier stored inside, with unique number
and antenna. Most of these cards can be cloned, easily!

IT Sections Applicable
IT Act Section 66 - Computer Related Offences
Stealing RFID data / RFID Cloning:
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a unique identification feature/
password/electronic signature)
Retaining stolen data & Selling Credit Card Details:
IT Act Section 66B - punishment for dishonestly receiving
stolen computer resource or communication device
IPC Section 420/BNS 318 - Cheating
Creating Replica of Digital ID & accessing server by impersonation:
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation
by using computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation

Use technology only if you can imbibe Cyber Hygiene in your


Genes.

Beti Bachao, Cyber Crime Se


RFID CLONING

www.cybersafegirl.com
DRONE SURVEILLANCE
In aviation and in space, a drone refers to an unpiloted aircraft
or spacecraft. Drones can be equipped with various types of
surveillance equipment that can collect high definition video and
still images day and night. Drones can be equipped with technology
allowing them to intercept cell phone calls, determine GPS
locations, and gather license plate information.

IT Sections Applicable
Following/Stalking/Capturing any PRIVATE AREA pic /video of a women
by DRONE without her consent:
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for
Sexual Harassment
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 354D/BNS 78 - Stalking
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
IT Act Section 66E - Punishment for violation of privacy
Unauthorised access to WI FI by DRONE:
IT Act Section 66 - Computer Related Offences
Stealing personal information via WI FI Cracker:
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a
unique identification feature)
Dropping hazardous materials to house via DRONE:
IPC Section 436/BNS 326 - Mischief by fire or explosive substance
with intent to destroy house, etc.

You are profiled day in and day out without doubt.

Beti Bachao, Cyber Crime Se


DRONE SURVEILLANCE

www.cybersafegirl.com
SEARCH ENGINE RESULTS SCAM
A hacker can create a legitimate-looking website and get it indexed
by various search engines, making it appear in search results based
on the keywords you type. This way, misleading results, fake help
line numbers etc can be displayed, making the user believe them
and fall prey to this Search Engine Optimization (SEO) scam.

IT Sections Applicable
IT Act Section 66 - Computer Related Offences
Replacing Original Contact Details by Fraudster Details:
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation
by using computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
IPC Section 465/BNS 336 - Making a false document
IPC Section 468/BNS 336 - Forgery for the purpose of cheating

Fake numbers of customer care may put you under intensive care.

Beti Bachao, Cyber Crime Se


SEARCH ENGINE RESULTS SCAM

www.cybersafegirl.com
IDN HOMOGRAPH ATTACK
An IDN homograph attack is similar to another type of domain
name spoofing known as typosquatting. Both techniques attempt
to deceive users by using a new domain name that’s similar to
an established name, although they exploit different types of
similarities.

IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating

Crackers replacing Letters & Characters to commit frauds.

Beti Bachao, Cyber Crime Se


IDN HOMOGRAPH ATTACK

www.cybersafegirl.com
SCRATCH CARD SCAM
A user receives a message with a link to a third-party website with
a promise of winning guaranteed money. When the user clicks on
the link, it redirects to a website with a scratch card mimicking the
design of popular Pay Wallets scratch card.

IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 – Cheating

Sharing sensitive Credentials will bring about losses that would


be Substantial

Beti Bachao, Cyber Crime Se


SCRATCH CARD SCAM

www.cybersafegirl.com
SIM SWAP
A SIM swap scam (also known as port-out scam, SIM splitting,
Smishing and simjacking, SIM swapping) is a type of account
takeover fraud. The fraud exploits a mobile phone service
provider’s ability to seamlessly port a telephone number to a device
containing a different SIM. This feature is normally used when a
customer has lost or had their phone stolen, or is switching service
to a new phone.

IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating

Swapping of Sim could lead you to a situation thats Dim

Beti Bachao, Cyber Crime Se


SIM SWAP

www.cybersafegirl.com
CRYPTOJACKING
It is a type of cyberattack in which a hacker co-opts a target’s
computing power to illicitly mine cryptocurrency on the hacker’s
behalf. Cryptojacking can target individual consumers, massive
institutions, and even industrial control systems. It slows down
infected computers, as the mining process takes priority over other
legitimate activities.

IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by
personation using a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by
personation
IPC Section 420/BNS 318 - Cheating
Section of Prevention of Money Laundering Act, 2002 (PMLA),
may apply as per the facts of the case.

Cryptojacking helps hackers in Money Making

Beti Bachao, Cyber Crime Se


CRYPTOJACKING

www.cybersafegirl.com
VIDEO CONFERENCE SCAM
There has been a mass adaptation of online platforms to conduct
meetings, online classes, conferences without giving much
consideration to the security settings of these platforms. This has
paved the way for cyber criminals to take advantage of loopholes
for malicious purposes.

IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity
IT Act Section 67 - Publishing or transmitting obscene
content
IT Act Section 67A - Publishing or transmitting sexually
explicit acts or conduct
Theft
IT Act Section 66D - Punishment for cheating by personation
using a computer resource (as per the
facts of the case)
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating (as per the facts of the case)

Inference of who’s attending such virtual Conference needs to made

Beti Bachao, Cyber Crime Se


VIDEO CONFERENCE SCAM

www.cybersafegirl.com
KIDS MOBILE PHONE
Children are using devices at a younger age and it’s a tricky
situation for most parents since they do not want their child to
come across adult, abusive, or violent content on the internet. Thus,
it’s important to consider setting controls on the devices they use.
Responsible mobile phone use is about managing costs, sticking to
family rules, keeping phones safe and being respectful.

IT Sections Applicable
If Gambling is involved:
The acts may attract Provisions of IT Act Section 69A for blocking
illegal gambling websites.

The Public Gambling Act,1867.


The Foreign Exchange Management Act, 1999 (FEMA).
The Lotteries Regulation Act of 1998.

A few States have made provisions for laws on Gambling.

Exceptions:
1. Horse racing is legal in India
2. Lottery system (in few States)
3. The Public Gambling Act of 1867 exempts skill-based games from
the definition of gambling.

Online games may bring about losses, disrepute and shame

Beti Bachao, Cyber Crime Se


KIDS MOBILE PHONE

www.cybersafegirl.com
SMART HOMES
Smart-home devices hold a treasure trove of personal information,
from your birth date to credit card details, that cybercriminals can
steal via hacking if the devices lack robust protections to thwart
attacks. They can then use the stolen data to launch targeted
attacks to rope you into shady deals.

IT Sections Applicable
Digital outreach may lead to Privacy Breach
IPC Section 354/BNS 74 - Sexual harassment
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 509/BNS 79 - Outraging modesty of women
IT Act Section 66 - Computer related offences
IT Act Section 66E - Punishment for violation of privacy

Digital outreach may lead to Privacy Breach

Beti Bachao, Cyber Crime Se


SMART HOMES

www.cybersafegirl.com
MICRO LOANS
Fly-by-night micro lending illegal app-based financiers are thriving.
These moneylenders target younger customers who look for quick
loans for consumption purposes. Those failing to pay up will have
their photos shared in their family and workplace social media
groups, a tactic that has driven many to desperation.

IT Sections Applicable
IPC Section 420/BNS 318 - Cheating
IPC Section 503/BNS 351/ 506/BNS 351 - Criminal Intimidation
IPC Section 383/BNS 308 - Extortion
IPC Section 306/BNS 108 - Abetment of Suicide
IPC Section 499/BNS 356 / 500/BNS 356 - Defamation
IPC Section 120B/BNS 61 - Criminal Conspiracy
IPC Section 34/BMS 3(5) - Common Intention
Sections of Reserve Bank of India Act, 1934
(as per the facts of the case)

App based micro loans are Unsecured and the borrower


becomes Insecure

Beti Bachao, Cyber Crime Se


MICRO LOANS

www.cybersafegirl.com
BLUE SNARFING
It is a device hack performed when a wireless, Bluetooth-enabled
device is in discoverable mode. Bluesnarfing allows hackers to
remotely access Bluetooth device data, such as a user’s calendar,
contact list, emails and text messages. This attack is perpetrated
without the victim’s knowledge.

IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation
using a computer resource
(as per the facts of the case)
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating (as per the facts of the case)

Hacker may use your Bluetooth to route your information and


cause you blues

Beti Bachao, Cyber Crime Se


BLUE SNARFING

www.cybersafegirl.com
STOLEN PHONE
A stolen phone can leave you feeling helpless and scrambling.
Mobile phones and the data they hold are very valuable to thieves.
And for similar reasons - they hold so much important personal
information of real and sentimental value - a theft can be a huge
loss for the owner.

IT Sections Applicable
IPC Section 378/BNS 303/ 379/BNS 303 – Theft
This section deals with theft andcovers the unlawful taking of movable
property, including stolen phones.
IPC Section 406/BNS 316
This section pertains to criminal breach of trust.
IPC Section 411/BNS 317
This section deals with dishonestly receiving stolen property.
IT Act Section 66 - Computer related offences
IT Act Section 66 - This sectionaddresses identity theft and
unauthorized use of electronic signatures,
passwords, or any other unique identification
feature.
IT Act Section 66D - This section pertainsto cheating by personation
using computer resources.

Lost cell phone, it may affect your cells and hormone

Beti Bachao, Cyber Crime Se


STOLEN PHONE

www.cybersafegirl.com
EXAM MALPRACTICE
Examination malpractice is defined as any deliberate act of
wrongdoing, contrary to the rules of examinations designed to give
a candidate an undue advantage. Also known as cheating, these
days students resort to hi-tech examination malpractice (otherwise
called e-cheating or digital cheating) in various levels of the
educational system.

IT Sections Applicable
Information Technology Act, 2000 - Section 66: This section deals
withcomputer-related offenses, including unauthorized access to
computersystems.
Information Technology Act, 2000 - IT Act Section 43: This section
coverspenalties for unauthorized access, damages to computer systems,
and databreaches.
Indian Penal Code, 1860 - IT Act Section 420: This section deals
with cheating anddishonestly inducing delivery of property.
Prevention of Unfair Means Act (PUMA): While not a cyber law, this
act isrelevant as it addresses unfair practices during exams.
UGC Regulations / University Rules: Universities and educational
institutionsoften have their own rules and regulations to prevent exam
malpractice.

Short cuts may cut short your career.

Beti Bachao, Cyber Crime Se


EXAM MALPRACTICE

www.cybersafegirl.com
CONNECTED CAR
Connected cars are part of the ‘internet of things’, a phrase
that refers to everyday items being connected to the internet
with the intention of making life easier. The connected car is
becoming software-defined, network-aware, and ultra-connected,
transmitting data and “interacting” with the road and every other
vehicle around it, increasing the chances of getting hacked!

IT Sections Applicable
IPC Section 354D/BNS 78 - This Section also covers online stalking
that is to say monitoring her use of the internet, email or other forms of
electronic communications & 66 R/W 43 (a), if he causes DOS then 43(f).
Information Technology Act, 2000 :
IT Act Section 43 - Unauthorized access to computer systems and data.
Section 66 - Computer-related offenses, including hacking and
datatheft.
IT Act Section 66B - Punishment for dishonestly receiving stolen
computer resources or communication devices.
Motor Vehicles Act, 1988 :
Various sections related to road safety, licensing, registration, and
liabilityin case of accidents involving connected vehicles.
Privacy Laws :
Personal Data Protection Bill (proposed) or any relevant amendments
toexisting laws. These laws would govern the collection, storage,
processing, and sharing of personal data by connected vehicles.
Consumer Protection Laws :
Consumer Protection Act, 2019: Pertinent sections related to
productliability and consumer rights in case of defects or malfunctions
inconnected car systems.

While using IoT-Internet of Things also use your IoT-Intelligence


of Thinking.

Beti Bachao, Cyber Crime Se


CONNECTED CAR

www.cybersafegirl.com
DRUG TRAFFICKING
The last decade has seen the emergence of new internet technologies
that have acted as important facilitators of online drug markets.
The internet now hosts a range of virtual marketplaces (both on
the surface and deep web) for selling and buying illicit substances.
Greater connectivity, global outreach and easily accessible forums
are some of the reasons for their popularity.

IT Sections Applicable
Sections of NDPS (sections would apply depending upon the quantity that she
was in possession of at the time of the raid, it could be for personal consumption
or commercial quantity, and sections would also apply as to whether she was
also supplying or trading/dealing/facilitating of the banned substances)

NDPS Act:
Section 8(c) - Prohibition of Certain Operations
Section 18 - Punishment for contravention in relation to manufactured
drugsand preparations
Section 21 - Punishment for contravention in relation to poppy straw
Section 27A - Punishment for financing illicit traffic and harbouring
offenders

Use of prohibited drugs when depressed, you may have your


freedom to right to life and right to personal liberty get
suppressed.

Beti Bachao, Cyber Crime Se


DRUG TRAFFICKING

www.cybersafegirl.com
DOXING
To dox someone means to release their personal or private
information that may prove harmful or embarrassing. This can
happen in the real world, but the internet has made it easier both
to find and release this information to a wide audience. Doxing may
reveal someone’s personal information like their home address or
workplace, social security or phone number, private correspondence
or pictures, criminal history, IP address, or other details.

IT Sections Applicable
IT Act Section 66C - Identity Theft (Information Technology Act,
2000): Thissection deals with the punishment for identity theft.
IT Act Section 66D - Cheating by Personation (Information
Technology Act, 2000): This section addresses the offense of cheating
by personation using acomputer resource
IT Act Section 72 - Breach of Confidentiality and Privacy
(Information Technology Act, 2000): This section deals with the
punishment for unauthorized access tocomputer material, including
personal data, and the breach of confidentialityand privacy.
IPC Section 354D/BNS 78 - Stalking (Indian Penal Code, 1860):
While not specific tocybercrime, this section criminalizes stalking
IPC Section 509/BNS 79 - Word, Gesture or Act Intended to Insult
the Modesty of aWoman (Indian Penal Code, 1860): Again, not
specific to cybercrime, thissection could be relevant if the doxxing
includes the sharing of explicit orprivate material with the intent to
insult or harm the victim.

As in Boxing, in Doxing too an accused could launch a knockout


punch causing irreparable injury to the victim.

Beti Bachao, Cyber Crime Se


DOXING

www.cybersafegirl.com
CYBER GROOMING
Cyber grooming is the process of ‘befriending’ a young person online
“to facilitate online sexual contact and/or a physical meeting with
them with the goal of committing sexual abuse. Cyber grooming
is when someone (often an adult) befriends a child online and
builds an emotional connection with future intentions of sexual
abuse, sexual exploitation or trafficking. The main goals of cyber
grooming are: to gain trust from the child, to obtain intimate
and personal data from the child (often sexual in nature—such as
sexual conversations, pictures, or videos) in order to threaten and
blackmail for further inappropriate material.

IT Sections Applicable
Sections of POCSO,
IPC Section 292/BNS 294
IT Act Section 66E - Violation of Privacy: This section deals with
capturing,transmitting, or publishing private images of a person without
theirconsent, leading to the violation of their privacy
IT Act Section 67B - Publishing or Transmitting Obscene Material:
Thissection addresses the publishing or transmitting of sexually explicit
material, including messages, images, or videos, which can be used
astools for grooming activities.
IT Act Section 67C - Preservation and Retention of Information by
Intermediaries
IT Act Section 67A - Punishment for Publishing or Transmitting of
Material Containing Sexually Explicit Act
IT Act Section 67 - Publishing or Transmitting of Material Containing
sexually explicit act, etc. in electronic form

Browse the internet with utmost Morality (principles concerning


the distinction between right and wrong or good and bad
behaviour) else you are sure to be encountered with cyber crimes
with Mathematical Certainty.

Beti Bachao, Cyber Crime Se


CYBER GROOMING

www.cybersafegirl.com
CRYPTO FRAUDS
Scammers are always looking for new ways to steal your money,
and the massive growth of cryptocurrency in recent years has
created plenty of opportunities for fraud. There are many types of
crypto scams. Some of the most common include: Fake Websites,
Pump and Dump Scams, Phishing Scams, Fake Apps, Fake celebrity
endorsements, Giveaway scams, cloud mining scams and initial
offering scams.

IT Sections Applicable
IT Act Section 43(a) - This section deals with unauthorized accessto
computer systems and data breaches
IT Act Section 66C - This section pertains to identity theft
andcould be applied to cases where individuals' identities are stolen
forfraudulent purposes related to cryptocurrencies.
IT Act Section 66D - This section addresses cheating bypersonation by
using computer resources and communication devices.
IPC Section 420/BNS 318 - Although not part of the ITAct, Section
420 of the IPC covers cheating and dishonestly inducingdelivery of
property.

Check your Avenues (a strategy for making money, a financial


approach or method) else there could be reduction in your
Revenues.

Beti Bachao, Cyber Crime Se


CRYPTO FRAUDS

www.cybersafegirl.com
CYBER SEX TRAFFICKING
Cybersex trafficking, or online sexual exploitation, is a cybercrime
and a form of modern slavery. Cybersex trafficking is when a victim
is forced into sexual exploitation using coercion, force, or fraud,
and their abuse is streamed live on the internet via webcam, video,
photography, or other digital media.

IT Sections Applicable
IPC Section 499/BNS 356, IPC Section 506/BNS 351, IPC Section
509/BNS 79, IPC Section 354A/BNS 75, IPC Section 370/BNS 143,
347 IPC Section 347/BNS 127, 357 IPC Section 357/BNS 135
IPC Section 370A - Trafficking of persons for exploitation, which
includestrafficking for sexual exploitation through electronic means.
Disclosing sexually explicit or filthy content Section 292 of IPC.
Sections of Immoral Traffic (Prevention) Act 1956 also known as PITA
(Preventionof Immoral Trafficking Act).

67 & 67A IT Act:


IT Act Section 67B - Prohibition of publishing or transmitting
sexuallyexplicit material in electronic form, which includes content
thatpromotes or facilitates cyber sex trafficking.

While surfing the internet and making connections, be Mindful


else it could take you from Sublime to Ridicule (from something
that is very good or very serious to something very bad or silly).

Beti Bachao, Cyber Crime Se


CYBER SEX TRAFFICKING

www.cybersafegirl.com
CYBERWARFARE
Cyberwarfare is the use of cyber attacks against an enemy state,
causing comparable harm to actual warfare and/or disrupting vital
computer systems. Some intended outcomes could be espionage,
sabotage, propaganda, manipulation or economic warfare.
IT Sections Applicable
IT Act Section 43 - Deals with unauthorized access to
computersystems and data breaches.
IT Act Section 66 - Addresses computer-related offenses,
includinghacking.
IT Act Section 66F - Focuses on cyber terrorism, which can
berelevant to cyber warfare activities.
IT Act Section 70 A - This section was introduced through an
amendment in 2008 toprovide the government with powers to
issue directions forensuring the security of cyberspace. It empowers
thegovernment to take measures for identification, analysis,
andprevention of cyber threats.
IT Act Section 69 - This section grants the Indian government
the power tointercept, monitor, and decrypt any information
generated,transmitted, received, or stored in any computer resource if
itis necessary for national security or for maintaining publicorder.

IPC Section 121/BNS 147. 66E, 66 R/W 43(a) (c) (e) (f)
Sections of Unlawful Activities (Prevention) Act, 1967 (UAPA).
In Maharashtra- Sections of The Maharashtra Control of Organised
Crime Act, 1999 (MCOCA).
Sections of Prevention of Terrorism Act, 2002.

Right to Remedy shall be Rejected if for the offence of Hacking


an accused gets Convicted.

Beti Bachao, Cyber Crime Se


CYBERWARFARE

www.cybersafegirl.com
HACKTIVISM
Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism
is the act of hacking, or breaking into a computer system, for
politically or socially motivated purposes. The individual who
performs an act of hacktivism is said to be a hacktivist. The
hacktivist who does such acts, such as defacing an organization’s
website or leaking that organization’s information, aims to send a
message through their activities and gain visibility for a cause they
are promoting.

IT Sections Applicable
Information Technology Act, 2000 - Section 43: This section deals
withunauthorized access to computer systems, data, or networks.
Information Technology Act, 2000 - Section 66: This section
addressescomputer-related offenses, including hacking and unauthorized
access.
Information Technology Act, 2000 - Section 66F: This section
specificallytargets cyber terrorism and related activities.
Information Technology Act, 2000 - Section 70: This section
empowers thegovernment to secure cyberspace by issuing directions for
the interception,monitoring, or decryption of any information through
any computer resource.
IPC Section 120A/BNS 61, IPC Section 121/BNS 147
IPC Section 122/BNS 149, IPC Section 153/BNS 192
IPC Section 153A/BNS 196, IPC Section 107/BNS 45

Think about you and do not allow someone else to think for you.

Beti Bachao, Cyber Crime Se


HACKTIVISM

www.cybersafegirl.com
METAVERSE
The metaverse is a 3D version of the Internet and computing at
large. The metaverse is “an integrated network of 3D virtual
worlds.” These worlds are accessed through a virtual reality
headset - users navigate the metaverse using their eye movements,
feedback controllers or voice commands. The headset immerses the
user, stimulating what is known as presence, which is created by
generating the physical sensation of actually being there.

IT Sections Applicable
IPC Section 354/BNS 74, IPC Section 506/BNS 351
sections of POCSO, section 67B IT Act
Right to Privacy is now a Fundamental Right under Article 21 of the
Constitution of India.
Data Protection and Privacy Laws: Laws regulating the collection,
storage,processing, and sharing of personal data could apply to user
interactionswithin the metaverse. In India, this might include compliance
with the Personal Data Protection Bill, once enacted into law.
Intellectual Property Laws: Laws governing copyrights, trademarks,
andpatents could extend to creations within the metaverse, such as
virtual goods,artwork, and designs.
Online Conduct and Harassment Laws: Just as in the real world,
laws againstharassment, hate speech, and cyberbullying could apply to
interactions in the metaverse.
Digital Transactions and Consumer Protection Laws: If virtual goods
andservices are bought and sold within the metaverse, laws related to
digital transactions and consumer rights might be relevant.
Cybersecurity Laws : Laws related to cybersecurity and hacking could
apply tounauthorized access, data breaches, and other security incidents
within themetaverse.

Be well versed that Metaverse is not the real Universe.

Beti Bachao, Cyber Crime Se


METAVERSE

www.cybersafegirl.com
SESSION HIJACKING ATTACK
In a session hijacking attack, cybercriminals gain unauthorized
access to an active user session by exploiting vulnerabilities in
web applications or networks. By taking control of the session,
they can impersonate the user, access sensitive information, or
conduct unauthorized actions, compromising the user’s privacy
and security.

IT Sections Applicable
IT Act Section 43 - This section deals with unauthorized access to
computersystems, data theft, and other computer-related offenses.
IT Act Section 66C - This section specifically addresses identity theft.
If asession hijacking attack is carried out with
the intention ofimpersonating an individual or causing financial or
reputational harmto them, this section could be invoked.
IT Act Section 66D - This section covers cheating by impersonation
using acomputer resource.
IT Act Section 66E - This section deals with violation of privacy.
IT Act Section 72 - This section protects the confidentiality and
privacy ofinformation handled by service providers.

Don’t let cyber intruders hijack your online ride;


secure your sessions and protect your stride.

Beti Bachao, Cyber Crime Se


SESSION HIJACKING ATTACK

www.cybersafegirl.com
PROMPT ENGINEERING
Prompt engineering refers to the manipulation of users through
carefully crafted messages or prompts to deceive them into revealing
sensitive information or performing unintended actions. This social
engineering technique is commonly used in phishing attacks, where
cybercriminals trick individuals into disclosing passwords, personal
data, or financial details.

IT Sections Applicable
IT Act Section 43 - Unauthorized access to computer systems.
IT Act Section 66 - Computer-related offenses, including hacking.
IT Act Section 67 - Punishment for publishing or transmitting
obscene materialin electronic form.
IT Act Section 69 - Power to issue directions for interception or
monitoring ordecryption of any information
through any computer resource.
IT Act Section 72 - Breach of confidentiality and privacy.
IT Act Section 79 - Intermediaries not to be liable in certain cases.
IT Act Section 84A - Modes or methods for encryption. The
Central Government may, for secure use of
the electronic medium and for promotion of
e-governance and e-commerce, prescribe the
modes ormethods for encryption.
IT Act Section 85 - Offenses by companies.

Stay cautious and alert, so prompt engineering


won't make you divert.

Beti Bachao, Cyber Crime Se


PROMPT ENGINEERING

www.cybersafegirl.com
FILELESS ATTACKS
This attack evades traditional antivirus and detection systems by
executing malicious code directly in computer memory, without
leaving traces on the file system. These stealthy attacks exploit
vulnerabilities in software, making them harder to detect and
providing cybercriminals with remote access to systems for data
theft, surveillance, or launching further attacks.

IT Sections Applicable
IT Act Section 43 (Unauthorized Access) - This section deals with
unauthorized access to computer systems, data, or networks.
IT Act Section 43A (Compensation for Data Breach) - This section
deals with the compensation for improper disclosure of personal
information.
IT Act Section 66 (Computer-Related Offenses) - This section covers
various computer-related offenses, including hacking.
IT Act Section 66B (Punishment for Receiving Stolen Computer
Resourcesor Communication Devices) - If fileless attacks involve
receiving stolen computer resources or communication devices, this
section might be invoked.
IT Act Section 66C (Identity Theft) - If a fileless attack leads to
identity theft, this section might apply.
IT Act Section 66E (Violation of Privacy) - In cases where privacy is
violated through fileless attacks, this section might be invoked.
IT Act Section 66F (Cyber Terrorism) - If the fileless attack is
carried out with the intent of causing terror or destabilizing critical
infrastructure, this section could apply.

Silent and sneaky, fileless foes;


fortify your defenses and block their throes.

Beti Bachao, Cyber Crime Se


FILELESS ATTACKS

www.cybersafegirl.com
DELIVERY SCAM
A delivery scam involves cybercriminals sending fake notifications
or tracking information to deceive recipients into believing they
have a package or delivery pending. The scam aims to trick victims
into revealing personal information, clicking on malicious links,
or paying fake shipping fees, leading to financial loss or data
compromise.

IT Sections Applicable
IT Act Section 43 - Penalty for unauthorized access, damage
to computer systems, etc.
IT Act Section 66 - Computer-related offenses, including
cheating by personation using a
computer resource.
IPC Section 419/BNS 319 - Punishment for cheating by personation.
IPC Section 420/BNS 318 - Cheating and dishonestly inducing
delivery of property.

Don't fall for the scammer's snare;


verify before you click 'Accept' or 'Share'.

Beti Bachao, Cyber Crime Se


DELIVERY SCAM

www.cybersafegirl.com
VIRTUAL KIDNAPPING
This is a psychological extortion scheme where perpetrators
manipulate victims into believing a loved one has been kidnapped,
demanding ransom to ensure their release. Though no actual
abduction occurs, the emotional distress and fear generated can
lead victims to comply with the demands.

IT Sections Applicable
Information Technology Act, 2000
IT Act Section 66C - This section deals with identity theft, which
could be relevant if someone’s identity is
misused in a virtual kidnapping scenario.
IT Act Section 66D - This section covers cheating by impersonation
using a computer resource, which could apply if
the perpetrator impersonates the victim.
Indian Penal Code (IPC)
IPC Section 503/BNS 351
This section deals with criminal intimidation, which could be relevant if
threats are made in a virtual kidnapping scenario.
IPC Section 506/BNS 351
This section deals with criminal intimidation by threat of injury to a
person’s reputation, etc.

Guard your virtual realm with might;


virtual kidnappers shall lose the fight.

Beti Bachao, Cyber Crime Se


VIRTUAL KIDNAPPING

www.cybersafegirl.com
FORMJACKING
It is an attack that involves injecting malicious code into
e-commerce websites’ payment forms. The code steals payment
card details or personal information entered by customers during
online transactions, allowing cybercriminals to engage in payment
fraud or identity theft.

IT Sections Applicable
Information Technology Act, 2000:
IT Act Section 43 - This section deals with unauthorized access to
computersystems and data breaches.
IT Act Section 43A - This section deals with the compensation for
failure toprotect sensitive personal data.
IT Act Section 66 - This section deals with computer-related
offenses,including hacking.
IT Act Section 66C - This section deals with identity theft.

Indian Penal Code, 1860:


IPC Section 420/BNS 318 - This section deals with cheating and
dishonestly inducingdelivery of property.
IPC Section 463/BNS 336 - This section deals with forgery.
IPC Section 464/BNS 335 - This section deals with making a false
document.

Protect your forms with utmost care;


formjackers won’t find their share.

Beti Bachao, Cyber Crime Se


FORMJACKING

www.cybersafegirl.com
CYBERSQUATTING
It refers to the practice of registering domain names similar to
established brands or trademarks with the intent to profit from the
brand’s reputation or sell the domain back to the rightful owner
at an inflated price. This can lead to brand dilution, reputation
damage, and confusion among consumers.

IT Sections Applicable
IT Act Section 2(1)(r) - Defines “domain name,” which is crucial in
understanding the context of cybersquatting.
IT Act Section 43 - This section deals with penalties and
compensation for damage to computer
systems
IT Act Section 66-D - This section covers the offense of cheating by
impersonation using a computer resource
IT Act Section 66-A - Although this section was struck down by
the Supreme Court of India in 2015 for being
unconstitutional,
IT Act Section 79 - While not directly focused on cybersquatting,
this section deals with intermediary liability.
IT Act Section 81 - This section ensures that the provisions of
the IT Act have an overriding effect, not with
standing anything inconsistent in any other
law for the time being in force.

Stake your claim in the digital space;


cybersquatters will find no place.

Beti Bachao, Cyber Crime Se


CYBERSQUATTING

www.cybersafegirl.com
DNS HIJACKING
This attack involves altering the Domain Name System (DNS)
settings of a computer or network, redirecting legitimate traffic to
malicious websites. By intercepting and manipulating DNS queries,
attackers can lead users to phishing pages, distribute malware, or
engage in other malicious activities.

IT Sections Applicable
IT Act Section 43 - This section deals with unauthorized access
tocomputer systems and data.
IT Act Section 66 - This section deals with computer-related offenses
likehacking, which could cover unauthorized
access, interference, ordamage to computer
systems.
IT Act Section 66C- This section deals with identity theft. If
someoneuses another person’s identity to commit
an offense related toDNS hijacking, this section
could be invoked.
IT Act Section 66D - This section covers cheating by personation
usingcomputer resources.
IT Act Section 66E - This section deals with violation of privacy.
IT Act Section 72 - This section protects the privacy and
confidentiality ofinformation stored in a
computer resource.

Don’t let your online path divert; secure your DNS, stay alert.

Beti Bachao, Cyber Crime Se


DNS HIJACKING

www.cybersafegirl.com
SMS BOMBING
It is a form of harassment where attackers overwhelm a victim’s
mobile device with a large number of unwanted text messages,
disrupting normal communication and potentially causing
psychological distress. This attack aims to disrupt the victim’s peace
of mind or sabotage their ability to use their phone.

IT Sections Applicable
IT Act Section 66C - Identity theft : This section deals with
punishment foridentity theft, which includes dishonestly using
another person’selectronic signature, password, or any other unique
identificationfeature.
IT Act Section 66D - Cheating by personation using
computer resource :
This section addresses the act of cheating by personation using
acomputer resource, and it prescribes penalties for such actions.
IT Act Section 43 - Penalty and compensation for damage to
computer, computer system, etc. : This section deals with penalties
forunauthorized access to computer systems, data breaches, and
causingdamage to computer resources.
IT Act Section 66 - Computer-related offenses : This section covers
variousoffenses related to computer systems, including hacking,
unauthorizedaccess, and introduction of viruses.

Bombarded by texts, it’s no fun;


safeguard your phone, block the SMS gun.

Beti Bachao, Cyber Crime Se


SMS BOMBING

www.cybersafegirl.com
INSIDER THREATS
Refers to security risks posed by individuals with legitimate access to
an organization’s systems, networks, or sensitive information. These
threats may arise from employees, contractors, or business partners
who intentionally or unintentionally misuse their privileges to steal
data, commit fraud, or compromise the organization’s security.

IT Sections Applicable
IT Act Section 43A - Compensation for Data Breach
IT Act Section 66C - Identity Theft
IT Act Section 66D - Cheating by Personation by using
Computer Resource
IT Act Section 72 - Breach of Confidentiality and Privacy
IT Act Section 72A - Punishment for Disclosure of
Information in Breach of Law
IPC Section 408/BNS 316 - Criminal Breach of Trust by Clerk or
Servant

Be cautious of those who reside within;


trust but verify, and potential harm will thin.

Beti Bachao, Cyber Crime Se


INSIDER THREATS

www.cybersafegirl.com
DO’S AND DON’TS OF CYBER SAFETY
By Adv. Prashanth Jhala

TIPS TO STAY CYBER SAFE


1. KEEP SOFTWARE UPDATED:
Regularly update your operating system, applications, and devices to
ensure you have the latest security patches and bug fixes.

2. BEWARE OF PHISHING:
Be cautious of suspicious emails, links, and attachments. Avoid sharing
personal information or clicking on unfamiliar links.

3. SECURE YOUR WI-FI NETWORK:


Set a strong password for your Wi-Fi network, enable WPA3 encryption,
and change the default router login credentials.

4. USE A VIRTUAL PRIVATE NETWORK (VPN):


When using public Wi-Fi or accessing sensitive information, use a
reputable VPN to encrypt your internet connection and protect your
data.

5. SECURE SOCIAL MEDIA PROFILES:


Review your privacy settings on social media platforms to control who
can see your posts, and be mindful of the information you share publicly.

6. REGULARLY REVIEW ACCOUNT ACTIVITY:


Check your online accounts for any suspicious activity and log out from
devices you no longer use.

7. SECURE PHYSICAL DEVICES: Lock your devices with a PIN, password,


or biometric authentication. Consider enabling features like “Find My
Device” to help locate and remotely wipe your device if lost.

Beti Bachao, Cyber Crime Se


8. USE SECURE NETWORKS:
Avoid conducting sensitive transactions or accessing confidential
information over public Wi-Fi networks, as they may be less secure.

9. EDUCATE YOURSELF:
Stay informed about the latest cybersecurity threats and best practices
to ensure you’re adapting to new security challenges.

10. REGULARLY MONITOR FINANCIAL STATEMENTS:


Keep an eye on your bank and credit card statements for any unauthorized
transactions, and report any discrepancies immediately.

11. USE SECURE PASSWORDS:


Create strong, unique passwords for each of your accounts. Avoid using
easily guessable information like birthdays or names, and consider using
a combination of letters, numbers, and symbols.

12. IMPLEMENT FIREWALL PROTECTION:


Enable a firewall on your devices to control incoming and outgoing
network traffic, adding an extra layer of defense against unauthorized
access.

13. DISABLE UNNECESSARY SERVICES:


Turn off any unnecessary services or features on your devices to reduce
potential vulnerabilities and attack vectors.

14. REGULARLY AUDIT APP PERMISSIONS:


Review the permissions granted to apps on your devices and revoke any
that don’t seem necessary for the app’s function.

15. SECURE CLOUD STORAGE:


If you use cloud storage services, enable strong encryption and utilize
two-factor authentication to safeguard your data.

www.cybersafegirl.com
16. BE CAUTIOUS WITH DOWNLOADS:
Only download files and software from reputable sources. Avoid
downloading files from unknown websites or clicking on suspicious links.

17. SECURE PHYSICAL DOCUMENTS:


Keep physical documents containing sensitive information in a secure
location, and shred any documents you no longer need.

18. USE BIOMETRIC AUTHENTICATION:


Whenever possible, enable biometric authentication methods like
fingerprint or facial recognition for an additional layer of security.

19. SECURE IOT DEVICES:


If you have smart home devices, change their default passwords, update
their firmware regularly, and isolate them on a separate network if
possible.

20. CREATE A DIGITAL ESTATE PLAN:


Prepare a plan for your online accounts and digital assets in case of
incapacity or death, including instructions for how to handle them.

Beti Bachao, Cyber Crime Se


WHERE TO REPORT
THE CYBER-CRIMES
 Report all your cyber-crimes to your local police station that has the
jurisdiction over your residence or your office premises, as the case
maybe.
 Cities having a Cyber Police Station established, cyber-crimes may be
reported there and they generally have jurisdiction over the entire city
(to be checked and verified before filing).
 Online portals are also available in mega cities to register
cyber-crimes complaints. At the national level, we have
https://cybercrime.gov.in/
 Districts and Mofussil areas where cyber police stations are not
established, would ideally have a Cyber Cell which
would register such complaints of cyber-
crimes.
 In absence of a cyber police station or a
cyber cell, victims may approach a high-
ranking police officer in a District or a
City (Superintendent of Police or Deputy
Commissioner of Police, as the case may be)
to take directions with regards to registration of
a cyber-crimes.
 Every State, City, District may have a different
mechanism available to register the complaints
of cyber-crimes which needs to be checked with
appropriate authorities.
 You may also call the National Cyber Crime
Helpline number 1930 and lodge a complaint.

www.cybersafegirl.com
GOOGLE ANDROID HARDENING CHECKLIST
By Yashavantha Kumar K.N, DySP
Basic Security
1 Update operating system to the latest version
2 Do not Root the device
3 Do not install applications from third party app stores
4 Enable device encryption
5 Disable ‘Developer Actions’
6 Use an application/service to provide remote wipe functionality
7 Enable Android Device Manager
8 Erase all data before return, repair, or recycle
Authentication Security
9 Set a PIN and automatically lock the device when it sleeps
10 Set an alphanumeric password
11 Set Auto-Lock Timeout
12 Disable ‘Make Passwords Visible’
13 Erase data upon excessive passcode failures
Browser Security
14 Show security warnings for visited sites
15 Disable ‘Form Auto-Fill’
16 Do not automatically remember passwords
17 Disable browser plug-ins
18 Turn on Do Not Track
Network Security
19 Turn off Bluetooth when not in use
20 Disable network notification
21 Forget Wi-Fi networks to prevent automatic rejoin
Additional Security Settings1
22 Turn off Location Services
23 Use a third party application to password protect applications with
sensitive data
24 Limit the number of text (SMS) and multimedia messages (MMS) saved
25 Disallow cookies in Chrome browser
26 Disable JavaScript in Chrome browser
27 Use TextSecure to encrypt SMS messages
Beti Bachao, Cyber Crime Se
APPLE IOS HARDENING CHECKLIST
Basic Security
1 Update operating system to the latest version
2 Do not Jailbreak iOS to sideload applications
3 Enable Automatic Downloads of App Updates
4 Enable remote wipe functionality
5 Enable Find My iPhone
6 Encrypt device backups through iTunes
7 Erase all data before return, repair, or recycle
Authentication Security
8 Require a passcode or password
9 Enable TouchID with a complex password
10 Set Auto-Lock Timeout
11 Disable Grace Period for Screen Lock
12 Erase data upon excessive passcode failures
13 Enable Data Protection
Browser Security
14 Enable Fraud Warning in Safari
15 Disable AutoFill for sensitive information
16 Block cookies from third parties
17 Turn on Do Not Track
Network Security
18 Turn off Ask to Join Networks
19 Turn off AirDrop when not in use
20 Turn off Bluetooth when not in use
21 Turn off Personal Hotspot when not in use
22 Forget Wi-Fi networks to prevent automatic rejoin
Additional Security Settings1
23 Turn off Location Services
24 Restrict access to Location Services, Contacts, Photos, etc.
25 Disable access to Control Center on Lock Screen
26 Disable TouchID
27 Enable Private Browsing in Mobile Safari as needed
28 Disable JavaScript in Mobile Safari

These security settings are proactive in nature but are intended for devices where
there exists a very high need for security, as they may negatively impact the user
experience and interfere with the functionality and utility of many applications.
www.cybersafegirl.com
OFFENCES AND RELEVANT PENAL SECTIONS
Cyber Crimes Mapping with Information Technology Act, 2000,
Information Technology (Amendment) Act, 2008,
IPC and Special and Local Laws.
Applicable section(s) and Applicable section(s)
Sl.
Nature of complaint punishments under ITA 2000 & under other laws and
No
ITAA 2008 punishment
1 Mobile phone lost/stolen - Section 379 IPC
3 years imprisonment or
fine or both
2 Receiving stolen IT Act Section 66 B of ITAA 2008 Section 411 IPC
computer/ mobile phone/data 3 years imprisonment or Rupees one 3 years imprisonment or
(data or computer or mobile lakh fine or both fine or both
phone owned by you is found in
the hands of someone else.)
3 Data owned by you or your IT Act Section 66 of ITAA 2008 Section 379 IPC
company in any form is stolen 3 years imprisonment or fine up to 3 years imprisonment or
rupees five lakh or both fine or both
4 A password is stolen and used IT Act Section 66C of ITAA 2008 Section 419 IPC
by someone else for fraudulent 3 years imprisonment and fine up to 3 years imprisonment
purpose. Rupees one lakh or fine
IT Act Section 66D ITAA 2008 Section 420 IPC
3 years imprisonment and fine up to 7 years imprisonment
Rupees one lakh and fine
6 An e-mail is read by IT Act Section 66 of ITAA 2008
someone else by 3 years imprisonment or fine up to
fraudulently making use of Rupees five lakh or both
password IT Act Section 66C of ITAA 2008
3 years imprisonment and fine up to
Rupees one lakh
7 A biometric thumb IT Act Section 66C of ITAA 2008
impression is misused 3 years imprisonment and fine up to
IT Act Rupees one lakh
8 An electronic signature or Section 66C of ITAA 2008
digital signature is misused 3 years imprisonment and fine up to
Rupees one lakh
10 A Phishing e-mail is sent IT Act Section 66D of ITAA 2008 Section 419 IPC
out in your name, asking 3 years imprisonment and fine up to 3 years imprisonment or
for login credentials Rupees one lakh fine or both
11 Capturing, publishing, or IT Act Section 66E of ITAA 2008 Section 292 IPC
transmitting the image of 3 years imprisonment or fine not 2 years imprisonment
the private area without exceeding Rupees two lakh or both and fine Rupees 2000
any person’s consent or and 5 years and rupees
knowledge 5000 for second and
subsequent conviction
12 Tampering with computer IT Act Section 65 of ITAA 2008
source Documents 3 years imprisonment or fine up to
Rupees two lakh or both
IT Act Section 66 of ITAA 2008
3 years imprisonment or fine up to
Rupees five lakh or both
13 Data Modification IT Act Section 66 of ITAA 2008
3 years imprisonment or fine up to
Rupees five lakh or both

Beti Bachao, Cyber Crime Se


14 Sending offensive Section 500 IPC
messages through 2 years or fine or both
communication service, Section 504 IPC
etc. 2 years or fine or both
Section 506 IPC
2 years or fine or both
— if threat be to cause
death or grievous hurt,
etc. — 7 years or fine
or both
Section 507 IPC
2 years along with
punishment under IT Act
Section 506 IPC
Section 508 IPC
1 year or fine or both
Section 509 IPC
1 years or fine or both of
IPC as applicable
15 Publishing or transmitting IT Act Section 67 of ITAA 2008 Section 292 IPC
obscene material in first conviction — 3 years and 5 lakh 2 years imprisonment and
electronic form Second or subsequent conviction— fine Rupees 2000 and 5 years
5 years and up to 10 lakh and rupees 5000 for second
and subsequent conviction
16 Publishing or transmitting IT Act Section 67A of ITAA 2008 Section 292 IPC
of material containing first conviction —5 years and up 2 years imprisonment
sexually explicit act, etc., in to 10 lakh and fine Rupees 2000
electronic form Second or subsequent conviction— and 5 years and rupees
7 years and up to 10 lakh 5000 for second and
subsequent conviction
17 Punishment for publishing IT Act Section 67B of ITAA 2008 Section 292 IPC
or transmitting of material first conviction —5 years and up 2 years imprisonment
depicting children in to 10 lakh and fine Rupees 2000
sexually explicit act, etc., in Second or subsequent conviction - and 5 years and rupees
electronic form 7 years and up to 10 lakh 5000 for second and
subsequent conviction
18 Misusing a Wi-Fi IT Act Section 66
connection for acting 3 years imprisonment or fine up to
against the state Rupees five lakh or both
IT Act Section 66F
life imprisonment of ITAA 2008
19 Planting a computer virus IT Act Section 66
that acts against the state 3 years imprisonment or fine up to
Rupees five lakh or both
66F - life imprisonment
20 Conducting a denial of Section 66 of ITAA 2008
service attack against a 3 years imprisonment or fine up to
government computer Rupees five lakh or both
Section 66F of ITAA 2008— life
imprisonment of
21 Stealing data from a IT Act Section 66 of ITAA 2008
government computer that 3 years imprisonment or fine up to
has significance from national Rupees five lakh or both, 66F - life
security perspective imprisonment
22 Not allowing the authorities IT Act Section 69 of ITAA 2008
to decrypt all communication that imprisonment up to 7 years and fine
passes through your computer or
network.
23 Intermediaries not providing access IT Act Section 69 of ITAA 2008
to information stored on their imprisonment up to 7 years and fine
computer to the relevant authorities

www.cybersafegirl.com
24 Failure to Block Web sites, IT Act Section 69A of ITAA 2008
when ordered imprisonment up to 7 years and fine
25 Sending threatening Section 506 IPC
messages by e-mail 2 years or fine or both
25 Word, gesture or act Section 509 IPC
intended to insult the 1 years or fine or both —
modesty of a woman IPC as applicable
26 Sending defamatory Section 500 IPC
messages by e-mail 2 years or fine or both
27 Bogus Web sites, cyber IT Act Section 66D of ITAA 2008 Section 419 IPC
frauds 3 years imprisonment and fine 3 years imprisonment
up to Rupees one lakh or fine
Section 420 IPC
7 years imprisonment
and fine
28 E-mail Spoofing IT Act Section 66C of ITAA 2008 Section 465 IPC
3 years imprisonment and fine 2 years or fine or both
up to Rupees one lakh Section 468 IPC
7 years imprisonment
and fine
29 Making a false document IT Act Section 66D of ITAA 2008 Section 465 IPC
3 years imprisonment and fine 2 years or fine or both
up to Rupees one lakh
30 Forgery for purpose of IT Act Section 66D of ITAA 2008 Section 468 IPC
cheating 3 years imprisonment and fine 7 years imprisonment
up to Rupees one lakh and fine
31 Forgery for purpose of IT Act Section 66D of ITAA 2008 Section. 469 IPC
harming reputation 3 years imprisonment and fine 3 years and fine
up to Rupees one lakh
32 E-mail Abuse Sec. 500 IPC
2 years or fine or both
33 Punishment for criminal Sec. 506 IPC
intimidation 2 years or fine or both
— if threat be to cause
death or grievous hurt,
etc. — 7 years or fine
or both
34 Criminal intimidation by an Sec. 507 IPC
anonymous communication 2 years along with
punishment
under section 506 IPC
35 Copyright infringement IT Act Section 66 of ITAA 2008 Sec. 63, 63B Copyrights
3 years imprisonment or fine up to Act 1957
Rupees five lakh or both
36 Theft of Computer Sec. 379 IPC
Hardware 3 years imprisonment or
fine or both
37 Online Sale of Drugs NDPS Act
38 Online Sale of Arms Arms Act

Disclaimer: The above-mentioned explanations made herein are to the best of our
knowledge and interpretations and are purely for academic and information purpose
only. They may be used as a guiding force. They should not be construed as legal opinion
by any stretch of imagination. We are thankful to all the stake holders for uploading
information which we may have used for education purpose only.
Beti Bachao, Cyber Crime Se
www.cybersafegirl.com
HELPLINE NUMBERS

Cyber Crime Helpline : 1930

National Emergency Number : 112

Police : 100

Women Helpline : 1091

Mental Health Helpline : 1800-599-0019

iCall Suicide Helpline : 9152987821

Fire : 101

Ambulance : 102

Disaster Management Service : 108

Beti Bachao, Cyber Crime Se

You might also like