Cyber Safe Girl Circular1725443119118
Cyber Safe Girl Circular1725443119118
Version: 6.1
Publisher: Dr Ananth Prabhu G
Co-Authors: Adv Prashant Jhala and Yashavantha Kumar KN, DySP
All rights reserved. Without limiting the rights under copyright reserved
above, no part of this publication may be reproduced, stored or
introduced into a retrieval system, or transmitted, in any form or by any
means (electronic, mechanical, photocopying, recording or otherwise),
without the prior written permission of the copyright owner.
This is a work of fiction, names, characters, businesses, places, events, locales and incidents
are either the products of the author’s imagination or used in a fictitious manner. Any
resemblance to actual persons, living or dead, or actual events is purely coincidental. The
authors and publishers disclaim any liability in connection with the use of the information
provided in this book.
Credits
Special Thanks to
Vivek Shetty CA Mohan Vishwa Jagadish R Chandra Naveen Kumar Vaikunt Prabhu
contact
+91 89515 11111
[email protected]
www.facebook.com/educatorananth
Topics
Warm Regards,
Smt. Rekha Sharma
Chairperson
National Commision for Women, New Delhi
MOBILE RECHARGE SHOP
A Mobile Recharge Shop is a place where scamsters can gain access
to your cellphone number because you have provided it to the
recharge vendor. They will misuse your number to call or text you,
exploit your ignorance or even emotionally manipulate you.
IT Sections Applicable
IPC Sections (to be applied to the Shop Keeper)
IPC Section 354A/BNS 75 - Sexual Harassment and punishment
for Sexual Harassment
IPC Section 354C/ BNS 77 - Voyeurism
IPC Section 383/384/ BNS 308 - Extortion (IF ANY DEMAND)
IPC Section 503/BNS 351 - Criminal Intimidation
IPC Section 506/BN 351 - Punishment for Criminal Intimidation
IPC Section 509/BNS 79 - Word, gesture or act intended to
insult modesty of a woman
IT Act:
IT Act Section 66E - Punishment for violation of privacy
www.cybersafegirl.com
DEBIT CARD CLONING
Debit Card skimming happens when the PIN is revealed to another
person. A scamster who knows the PIN and has possession of the
card even for a short while can replicate the card with a skimming
/schimming device and withdraw cash.
IT Sections Applicable
IT Act for cloning
Section 43: This section deals with unauthorized access tocomputer
systems, data breaches, and other computer-relatedoffenses.
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
computer resource
Money Transaction followed by cloning:
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
www.cybersafegirl.com
KEYLOGGER
It is a malicious program that may be installed on the victim’s
computer for recording computer user keystrokes to steal passwords
and other sensitive information. With Keylogger a scamster will be
able to collect login details and other matter saved in the computer
and have them mailed to a designated email address.
IT Sections Applicable
Key logger installation: IT Act
IT Act Section 43 - Deals with unauthorized access, damage to
computer systems, and data.
IT Act Section 66 - Computer Related Offences
Stealing personal information: IT Act
IT Act Section 66C - Punishment for Identity Theft
Creating fake profile & posting private conversation :
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation by
using computer resources
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in
electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit
act etc., in electronic form & sections of POCSO
IT Act Section 72 - Breach of Confidentiality and Privacy
IT Act Section 79 - Intermediary Liability Protection
IPC Sections:
IT Act Section 354A/BNS 75 - Sexual Harassment and punishment
for Sexual Harassment
If in hard copy, IPC Sections 292/BNS 294, 293/BNS 295
294/BNS 296
www.cybersafegirl.com
SMS SPOOFING
Spoofing is being able to send a message by hiding or changing or
using a completely different sender ID. Typically, when you send
an SMS, your handheld device sends the message with your phone
number as the originator where in you as the sender cannot alter
that number.
IT Sections Applicable
Act of hoax or trick or deceive a communication
IPC Section
IT Act Section 465/BNS 336 - Making a false document( FORGERY)
IT Act Section 419/BNS 319 - Punishment for cheating by personation
IT Act Section 43 - While not directly related to SMS
spoofing, this sectiondeals with unauthorized access to computer
systems, which couldapply if someone gains unauthorized access to
systems for the purposeof carrying out SMS spoofing.
IT Act Section 43A and Section 72A: These sections deal with
thecompensation for failure to protect data and confidentiality
ofinformation. If SMS spoofing leads to a breach of sensitive information,
these sections might come into play.
IT Act Section 66C - This section deals with identity theft. If
SMS spoofing isused to impersonate someone else and commit fraud or
deceiveothers, it could be covered under this section.
IT Act Section 66D - Punishment for cheating by personation
by using computer resource
IT Act Section 66E - This section addresses violations of
privacy and thecapturing, publishing, or transmitting of images of a
private area of anyperson without their consent. If SMS spoofing is used
to invadesomeone’s privacy in this manner, this section could apply.
www.cybersafegirl.com
CALL SPOOFING
Call spoofing happens through apps that enable a person with
criminal intent to change his number and voice to impersonate
another to defraud.
IT Sections Applicable
Act of hoax or trick or deceive a communication
IPC Section
IPC Section 465/BNS 336 - Making a false document( FORGERY)
IPC Section 419/BNS 319 - Punishment for cheating by personation
www.cybersafegirl.com
RANSOMWARE
Ransomware is a form of malware that encrypts a victim’s files.
The attacker then demands a ransom from the victim to restore
access to the data. Users are shown instructions as to how to
pay a fee to get the decryption key. The costs can range from a
few hundred rupees to thousands, payable to cybercriminals in
bitcoin.
IT Sections Applicable
Unauthorised access, Denial, Encryption :
IT Act Section 43 - This section deals with unauthorized access,
damage tocomputer systems, and data breaches.
IT Act Section 66 - Computer related offences
Section 66C - This section deals with identity theft.
Section 66D - This section deals with cheating by
impersonation usinga computer resource.
Demand without payment :
IPC Section 384/BNS 308 - Extortion
IT Act Section 386/BNS 308 - This section deals with extortion by a
putting person infear of death or
grievous hurt.
IPC Section 511/BNS 62 - Punishment for attempting to commit
offence punishable with imprisonment
for life or other imprisonment
Demand & payment :
IPC Section 384/BNS 308 - Extortion
www.cybersafegirl.com
CYBER STALKING
Cyberstalking is the use of the Internet or other electronic means to
stalk or harass another by misusing information uploaded on social
networking sites.
IT Sections Applicable
Section 66A - This section previously dealt with the offense of
sendingoffensive messages through communication services. However,
it wasstruck down by the Supreme Court of India in 2015 on grounds
ofbeing vague and overbroad, and violating the right to free speech.
Offline:
IPC Section 354 D/BNS 78 - Stalking
Online :
IPC Section 354 D/BNS 78 - This section was introduced through
the InformationTechnology (Amendment) Act, 2013, and specifically
deals with theoffense of cyberstalking. It states that any person who
monitors theuse by a woman of the internet, email, or any other form
of electroniccommunication, commits the offense of cyberstalking. It
alsocriminalizes actions that cause the woman to fear for her safety
or thesafety of her relatives. Conviction under this section can result
inimprisonment for a term which may extend to three years and a fine.
www.cybersafegirl.com
PICTURE MORPHING
Morphing the face of a person to the body of another and
publishing it to blackmail or otherwise intimidate the person is
one of the ways by which people who upload photos on social
networking sites can be exploited.
IT Sections Applicable
IPC Sections
IPC Section 292/BNS 294 - Sale etc of Obscene books etc
(if in hardcopy)
IPC Section 465/BNS 336 - Morphing photographs and creating a false
electronic record
IPC Section 469/BNS 336 - Making false electronic document for
causing defamation
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, guesture or act intended to insult
modesty of a woman
IT Act
Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
Section 66E - Punishment for Violation of Privacy
Section 67 - Punishment for publishing or transmitting obscene
material in electronic form
Section 67A - Punishment for publishing or transmitting of material
containing sexually explicit act etc., in electronic form
Section 67B - Punishment for publishing or transmitting of material
depicting children in sexually explicit act etc., in
electronic form & sections of POCSO
Section 72 - Penalty for Breach of Confidentiality and Privacy
www.cybersafegirl.com
PROFILE HACKING
Profile Hacking happens when your email or social networking
profile is accessed by a probable stalker who then compromises it.
IT Sections Applicable
IT Act
Section. 43 - Unauthorized access to computer systems,
networks,data.
Section 66 - Computer related offences
Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using password)
Section. 66D - Impersonation cheating through computer
resources.
www.cybersafegirl.com
ONLINE GAMES
Girls who are vulnerable to loneliness, low self-esteem and clinical
depression can fall prey to dangerous online games that may become
addictive and further harm them. some dangerous online games like
the blue whale challenge even end in the victim ending her life. This
is a personal as well as social challenge for the others around.
IT Sections Applicable
Information Technology Act, 2000:
Section 43 - This section deals with unauthorized access tocomputer
systems, computer networks, or data. It covers actionssuch as hacking,
introducing viruses, and damaging computersystems.
Section 66 - This section deals with computer-related offenses,including
hacking, identity theft, and other forms of cybercrime
Section 67A - This section deals with the punishment forpublishing or
transmitting sexually explicit content in electronicform.
Section 67B - This section deals with the punishment forpublishing or
transmitting material depicting children in sexuallyexplicit acts.
Section 79 - This section provides safe harbor to intermediaries,including
online platforms and game hosting services, from liability forthird-party
content. However, they are required to adhere to certainconditions,
including taking down illegal content upon receiving notice.
IPC Sections
IPC Section 299/BNS 100 - Culpable homicide
IPC Section 305/BNS 107 - Abetment of suicide of Child or Insane Person
IPC Section 306/BNS 108 - Abetment of suicide
IPC Section 321/BNS 115 - Voluntarily causing hurt
IPC Section 335/BNS 122 - Voluntarily causing grievous hurt on provocation
IPC Section 336/BNS 125 - Act endangering life or personal safety
of others
www.cybersafegirl.com
JOB CALL LETTER
Websites offering jobs need to be checked for veracity and
authenticity. Mails need to be double-checked and verified before
one responds and acts on instructions provided, especially if one is
asked to put in a personal appearance.
IT Sections Applicable
Fake account / ID: IT Act
Section 43A - Compensation for failure to protect data: This sectiondeals
with the liability of a body corporate in case of a breach ofsensitive
personal data due to negligence in implementing andmaintaining
reasonable security practices and procedures.
Section 66C - Punishment for Identity Theft (dishonestly or fraudulently
using a unique identification feature)
Section 66D - Punishment for cheating by personation by using computer
resource
Section 72 - Breach of confidentiality and privacy: This section dealswith
the punishment for breach of confidentiality and privacy.
Section 72A - Punishment for disclosure of information in breach of lawful
contract: This section pertains to the punishment for revealinginformation
in breach of a lawful contract.
IPC
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
IPC Section 465/BNS 336 - Making a false document (DEFINITION SECTION)
IPC Section 468/BNS 336 - Forgery for cheating
IPC Section 471/ BNS 340 - Using forged document as genuine
IPC Section 474/BNS 339 - Procession of forged document
IPC Section 120B/BNS 61 - P unishment for Criminal Conspiracy
IPC Section 34/BNS 3(5) - Acts done by several persons in furtherance of
Common Intention
Abatement for offence
a. On the spot : IPC Section 114 - Abettor present when offence is committed
b. Remotely: IPC Section 109 - Punishment for abetment
Such fake call letters may see you out of your existing job
sooner or later!
www.cybersafegirl.com
DEEPFAKES
Deepfake is a technique that is used to combine and superimpose
new images and videos onto source images or videos. It is used to
create videos where the voice or face of another is superimposed
on the original in such a way that the viewer or listener cannot
distinguish or doubt the veracity of it.
IT Sections Applicable
Fake account / ID:
IT Act Section 66C - Punishment for Identity Theft (dishonestly or fraudulently
using a unique identification feature)
Impersonation for cheating :
IT Act Section 66D - Punishment for cheating by personation by using computer
resource.
ITA Section 43A and Section 72A of the Information Technology Act, 2000 -
Compensation for Failure to Protect Data and Privacy: These sectionsdeal with the
compensation payable to an individual whose personal dataand information have
been negligently disclosed, which could beapplicable in cases where deepfakes lead
to privacy breaches.
IPC Section 419 - Punishment for cheating by personation
IPC Section 420 - Cheating
Publishing online:
IT Act Section 67 - Punishment for publishing or transmitting obscene material in
electronic form
IT Act Section 67A - Punishment for publishing or transmitting of material
containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of material depicting
children in sexually explicit act etc., in electronic form & sections of POCSO
IPC
Section 354A/BNS 75 - Sexual Harassment and punishment for Sexual Harassment
Section 465/BNS 336 - Making a false document
Section 499/BNS 356 - Defamation:
Section 500/BNS 356 - Punishment for Defamation:
Section 507/BNS 351 - Criminal Intimidation by an Anonymous communication
SEC 509/BNS 79 – Insulting modesty of women
Stalking: IPC Section 354 D/BNS 78 - Stalking Offline
: IPC Section 354 D/BNS 78 - Stalking Online
IPC Section 120-B/BNS 61 - Punishment for Criminal Conspiracy
IPC Section 34/BNS 3(5) - Acts done by several persons in furtherance of Common
Intention
Abatement for offence:
a. On the spot: IPC Section114/BNS 54 - Abettor present when offence is
committed
b. Remotely: IPC Section109/BNS 49 - Punishment for abetment
Deep Fakes are not noticeable easily and hence have High Stakes!
www.cybersafegirl.com
DATING WEBSITE
Females can be emotionally manipulated by smooth talkers on
dating sites. Any private pictures or texts that they send across
to probable dating companions on such sites are fair game for
unscrupulous persons who can then blackmail them.
IT Sections Applicable
ITA Section 43A - This section deals with the compensation for failure
toprotect data and is relevant for data breaches.
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by using
computer resource.
Section 72A: This section penalizes the disclosure of personalinformation
without consent.
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for
Sexual Harassment
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 354D/BNS 78 - Deals with stalking.
Stalking : Offline - IPC Section 354 D/BNS 78 - Stalking
Online - IPC Section 354 D/BNS 78 – Stalking
Publishing online:
IT Act Section 67 - Punishment for publishing or transmitting obscene
material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic form
& sections of POCSO
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
IPC Section 465/BNS 336 - Making a false document
Looking out for a Date, be careful that you don’t get Check-Mate!
www.cybersafegirl.com
CAMERA HACKING
Camera hacking happens when photographs of a person are taken
without consent, through malware that got downloaded with an
attachment. Phones with no camera guard can be exploited for such
criminal activities.
IT Sections Applicable
Hacking-
IT Act Section 43 - Penalty for unauthorized access to computer systems,data
disruption, and theft.
IT Act Section 66 - Computer related offences
Section 66B - Punishment for dishonestly receiving stolen computerresources or
communication devices.
Capturing photograph/video:
IPC Section 354C/BNS 77 - Voyeurism
IT Act Section 66E - Punishment for violation of privacy
Creating Fake ID in social media
IT Act Section 66D - Punishment for cheating by personation by using computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
Online Sexual harassment to a woman
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for Sexual Harassment.
IPC Section 354C/BNS 77 - Voyeurism (capturing or transmitting images ofprivate
parts without consent).
Stalking : Offline : IPC Section 354D/BNS 78 - Stalking
Online : IPC Section 354D/BNS 78 - Stalking
Publishing online
IT Act Section 66F - Cyber Terrorism under the IT Act
IT Act Section 67 - Punishment for publishing or transmitting obscene material in
electronic form
IT Act Section 67A - Punishment for publishing or transmitting of material
containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of material
depicting children in sexually explicit act etc., in electronic form & sections of POCSO.
IT Act Section 72 - Breach of Confidentiality and Privacy under the IT Act
IPC Section 507 - Criminal Intimidation by an Anonymous communication
IPC Section 509 - Word, gesture or act intended to insult modesty of a woman
Think before taking your cell phones while using the restroom.
Your privacy may have no room to rest!
www.cybersafegirl.com
SOCIAL TROLLING
Social Trolling is posting inflammatory messages or visuals about
a person or organisation in an online community with the sole
intention of causing humiliation or nuisance to that person.
IT Sections Applicable
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
Stalking:
Offline: IPC Section 354D/BNS 78 - Stalking
Online : IPC Section 354D/BNS 78 - Stalking
www.cybersafegirl.com
PONZI SCHEME
A Ponzi scheme is a fraudulent investing scam promising high rates
of return with little risk to investors. Victims of such schemes are
vulnerable to hackers with malicious intent and fall prey to their
promises of recovery of their losses.
IT Sections Applicable
Sections 3, 4, 5, 6 of Prize Chits and Money Circulation Schemes
(Banning) Act, 1978
Also look up at State Acts eg
Section 9 of the Karnataka Protection of Interest of Depositors In
Financial Establishments Act, 2004
Section 3, 4 of Maharashtra Protection of Interest of Depositors In
Financial Establishments Act, 1999 etc.
SEBI Act, 1992 - Section 11B: This empowers SEBI to
counterfraudulent practices in securities trading, including Ponzi
schemes.
Companies Act, 2013 - Section 447: It penalizes fraud,
encompassingPonzi schemes, with imprisonment and fines.
IPC Section 120B/BNS 61 - Punishment for Criminal Conspiracy
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BNS 318 - Cheating
IPC Section 34/BNS 3(5) - Acts done by several persons in
furtherance of Common Intention
Investing in Ponzi schemes may make you run out of all other
Schemes of life!
www.cybersafegirl.com
FAKE MATRIMONIAL PROFILE
A fraudster may have registered on a matrimonial site with a fake
profile. The details and profile pic may not be his. He can dupe
a naive girl who falls for his practised charm and believes in the
authenticity of supportive material that he provides to back up his
identity.
IT Sections Applicable
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by using
computer resource
IT Act Section 66E - Punishment for violation of privacy.
Marriages are made in Heaven but in the virtual world you end
up paying the cost of messing with Heavenly Affairs!
www.cybersafegirl.com
MOBILE REPAIR SHOP
Pictures and videos stored in the phone’s gallery can be accessed
by any person once the phone is in his possession. A mobile repair
shop may have a criminal who accesses private pictures or other
data and uploads them on shady sites to make them viral. He may
also use them for blackmailing.
IT Sections Applicable
ITAct Section 43A - This section deals with compensation for
failure to protectsensitive personal data.
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Prohibits identity theft, which includes
impersonatingsomeone with the intent to cause wrongful loss.
IT Act Section 66D - Deals with cheating by impersonation using
computerresources.
IT Act Section 72A - It criminalizes the disclosure of personal
information withoutconsent, intending to cause wrongful loss or gain
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting
of material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic form
& sections of POCSO
IPC Section 506/BNS 351 - Punishment for Criminal Intimidation
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
Indian Copyright Act, 1957 - Section 63B: Online Copyright Infringement
Section 63B deals with the offense of knowingly circumventingtechnological
measures to infringe copyright.
If caution not adhered at such Shops, get ready to take big Hops!
www.cybersafegirl.com
FAKE REVIEWS
A website may dupe customers by putting up fake reviews of
products. They plant glowing reviews and pay for perfect ratings
that attract customers, especially backed by discounted prices.
These products from dubious sites may cause untold harm if used.
IT Sections Applicable
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BMS 318 - Cheating
www.cybersafegirl.com
FAKE PROFILE WITH SEXTORTION
Public changing rooms may have strategically placed cameras
that capture pics of the users, naturally with criminal intent.
These pics can then be uploaded on a duplicate social media
account with the intention of extortion.
IT Sections Applicable
Capturing photograph/video:
IT Act Section 43 - Unauthorized access to computer systems, data,
orinformation.
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by using
computer resource
Section 66E - Violation of privacy.
IPC Section 415/BNS 318 - Cheating.
IPC Section 416/BNS 319 - Cheating by personation.
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for
Sexual
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 354D/BNS 78 - Stalking.
IPC Section 503/BNS 351 - Criminal intimidation.
IPC Section 507/BNS 351 - Criminal Intimidation by an Anonymous
communication
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
www.cybersafegirl.com
CYBER VULTURES
Cyber-vultures are a merciless breed of hackers who like to feast
on consumers and businesses suffering from any type of attack.
They use this scenario as an opportunity to trick them and swindle
more money.
IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 67 - Punishment for publishing or transmitting
obscene material inelectronic form.
IT Act Section 67A - Punishment for publishing or transmitting of
material containingsexually explicit act, etc., in electronic form.
www.cybersafegirl.com
APP TRAPS
The internet could come with a hidden cost. One of these is
preloaded apps that harvest users’ data without their knowledge.
These apps ask for permission to access files and once given, they
may use videos, photos and storage media not only to be mined by
marketers but also for other nefarious purposes.
IT Sections Applicable
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BMS 318 - Cheating
These traps give you a silent rap and take away your sensitive
personal data.
www.cybersafegirl.com
JUICE JACKING
Juice Jacking is a type of cyber attack involving a charging port
that doubles as a data connection, typically over USB. This often
involves either installing malware or copying sensitive data from
a smart phone or other computer devices. Charging ports at public
places are prime areas for juice jacking.
IT Sections Applicable
IT Act Section 43 - This section deals with unauthorized access
to computersystems, computer networks, or
resources.
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Punishment for Identity Theft (dishonestly
or fraudulently using a unique identification
feature/password/electronic signature)
IT Act Section 66D - This section pertains to cheating by personation
using acomputer resource.
IT Act Section 66E - This section deals with violation of privacy.
IT Act Section 72 - This section deals with the breach of
confidentiality andprivacy of information.
www.cybersafegirl.com
WIFI HACKING
Wifi hacking is essentially cracking the security protocols in a
wireless network, granting full access for the hacker to view, store,
download, or abuse the wireless network. Weak passwords to wifi
networks may enable a hacker to log into the net through the wifi
connection in the vicinity.
IT Sections Applicable
IT Act Section 66 - Computer Related Offences
IT Act Section 66B - Punishment for dishonestly receiving stolen
computer resource or communication device
IT Act Section 66C - Identity Theft
IT Act Section 72 - Breach of Confidentiality and Privacy
Wrongful gain, wrongful loss of internet data:
IPC Section 420/BNS 318 - Cheating
Mischief by internet utility:
IPC Section 425/BNS 324/426/BNS 324 - Mischief
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
Other provisions of Narcotic Drugs and Psychotropic Substances Act,
1985.
www.cybersafegirl.com
ONLINE RADICALIZATION
Young, vulnerable individuals can fall prey to terrorists’ propaganda
while spending time online and browsing the net. The targets of
such extremists are individuals or groups of people who can be
easily led towards terrorist ideologies because of their experiences,
state of mind or sometimes their upbringing.
IT Sections Applicable
IT Act Section 66F - Punishment for Cyber Terrorism
IPC Section 120-B/BNS 61 - Punishment of Criminal Conspiracy
IPC Section 121/BNS 147 - Waging or attempting to wage war, or
abetting waging of war, against the
Government of India
IPC Section 121A/BNS 148 - Conspiracy to commit offences
punishable under Section 121A
IPC Section 122/BNS 1 - Collecting arms, etc., with intention of
waging war against the Government of
India
www.cybersafegirl.com
HONEY TRAP
Honey trapping is an investigative practice that uses romantic or
intimate relationships for an interpersonal, political or monetary
purpose to obtain sensitive information. In today’s cyber world,
“Honey Trap” has gained a new dimension on social media platforms
like Facebook, Twitter etc to trap targets by blackmailing them.
IT Sections Applicable
Capturing Picture/Video Over Online:
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
IT Act Section 66E - Punishment for violation of privacy
IT Act Section 67 - Punishment for publishing or
transmitting obscene material in
electronic form
IT Act Section 67A - Punishment for publishing or
transmitting of material containing
sexually explicit act etc., in electronic
form
IT Act Section 67B - Punishment for publishing or
transmitting of material depicting
children in sexually explicit act etc., in
electronic form & sections of POCSO
Demand for ransom (attempt):
IPC Section 385/BNS 308 - Putting person in fear of injury in order
to commit extortion
IPC Section 511/BNS 62 - Punishment for attempting to commit
offence punishable with imprisonment
for life or other imprisonment
www.cybersafegirl.com
QR CODE SCAM
A QR (Quick Response) code is nothing more than a two-dimensional
barcode. This type of code was designed to be read by robots that
keep track of produced items in a factory. As a QR code takes up
a lot less space than a legacy barcode, its usage soon spread and
Hackers took it to their advantage! QR codes are easy to generate
and hard to tell apart from one another. To most human eyes, they
all look the same.
IT Sections Applicable
IPC Section 406/BNS 316 - Punishment for Criminal Breach of Trust
IPC Section 420/BMS 318 - Cheating
www.cybersafegirl.com
RFID CLONING
Radio frequency identification, or RFID often abbreviated Radio
Frequency IDentification is method for automatic identification of
objects, where the object IDs read or write data using radio waves.
Each chip contains an identifier stored inside, with unique number
and antenna. Most of these cards can be cloned, easily!
IT Sections Applicable
IT Act Section 66 - Computer Related Offences
Stealing RFID data / RFID Cloning:
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a unique identification feature/
password/electronic signature)
Retaining stolen data & Selling Credit Card Details:
IT Act Section 66B - punishment for dishonestly receiving
stolen computer resource or communication device
IPC Section 420/BNS 318 - Cheating
Creating Replica of Digital ID & accessing server by impersonation:
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation
by using computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
www.cybersafegirl.com
DRONE SURVEILLANCE
In aviation and in space, a drone refers to an unpiloted aircraft
or spacecraft. Drones can be equipped with various types of
surveillance equipment that can collect high definition video and
still images day and night. Drones can be equipped with technology
allowing them to intercept cell phone calls, determine GPS
locations, and gather license plate information.
IT Sections Applicable
Following/Stalking/Capturing any PRIVATE AREA pic /video of a women
by DRONE without her consent:
IPC Section 354A/BNS 75 - Sexual Harassment and punishment for
Sexual Harassment
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 354D/BNS 78 - Stalking
IPC Section 509/BNS 79 - Word, gesture or act intended to insult
modesty of a woman
IT Act Section 66E - Punishment for violation of privacy
Unauthorised access to WI FI by DRONE:
IT Act Section 66 - Computer Related Offences
Stealing personal information via WI FI Cracker:
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a
unique identification feature)
Dropping hazardous materials to house via DRONE:
IPC Section 436/BNS 326 - Mischief by fire or explosive substance
with intent to destroy house, etc.
www.cybersafegirl.com
SEARCH ENGINE RESULTS SCAM
A hacker can create a legitimate-looking website and get it indexed
by various search engines, making it appear in search results based
on the keywords you type. This way, misleading results, fake help
line numbers etc can be displayed, making the user believe them
and fall prey to this Search Engine Optimization (SEO) scam.
IT Sections Applicable
IT Act Section 66 - Computer Related Offences
Replacing Original Contact Details by Fraudster Details:
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation
by using computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
IPC Section 465/BNS 336 - Making a false document
IPC Section 468/BNS 336 - Forgery for the purpose of cheating
Fake numbers of customer care may put you under intensive care.
www.cybersafegirl.com
IDN HOMOGRAPH ATTACK
An IDN homograph attack is similar to another type of domain
name spoofing known as typosquatting. Both techniques attempt
to deceive users by using a new domain name that’s similar to
an established name, although they exploit different types of
similarities.
IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
www.cybersafegirl.com
SCRATCH CARD SCAM
A user receives a message with a link to a third-party website with
a promise of winning guaranteed money. When the user clicks on
the link, it redirects to a website with a scratch card mimicking the
design of popular Pay Wallets scratch card.
IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 – Cheating
www.cybersafegirl.com
SIM SWAP
A SIM swap scam (also known as port-out scam, SIM splitting,
Smishing and simjacking, SIM swapping) is a type of account
takeover fraud. The fraud exploits a mobile phone service
provider’s ability to seamlessly port a telephone number to a device
containing a different SIM. This feature is normally used when a
customer has lost or had their phone stolen, or is switching service
to a new phone.
IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation using
a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating
www.cybersafegirl.com
CRYPTOJACKING
It is a type of cyberattack in which a hacker co-opts a target’s
computing power to illicitly mine cryptocurrency on the hacker’s
behalf. Cryptojacking can target individual consumers, massive
institutions, and even industrial control systems. It slows down
infected computers, as the mining process takes priority over other
legitimate activities.
IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by
personation using a computer resource
IPC Section 419/BNS 319 - Punishment for cheating by
personation
IPC Section 420/BNS 318 - Cheating
Section of Prevention of Money Laundering Act, 2002 (PMLA),
may apply as per the facts of the case.
www.cybersafegirl.com
VIDEO CONFERENCE SCAM
There has been a mass adaptation of online platforms to conduct
meetings, online classes, conferences without giving much
consideration to the security settings of these platforms. This has
paved the way for cyber criminals to take advantage of loopholes
for malicious purposes.
IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity
IT Act Section 67 - Publishing or transmitting obscene
content
IT Act Section 67A - Publishing or transmitting sexually
explicit acts or conduct
Theft
IT Act Section 66D - Punishment for cheating by personation
using a computer resource (as per the
facts of the case)
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating (as per the facts of the case)
www.cybersafegirl.com
KIDS MOBILE PHONE
Children are using devices at a younger age and it’s a tricky
situation for most parents since they do not want their child to
come across adult, abusive, or violent content on the internet. Thus,
it’s important to consider setting controls on the devices they use.
Responsible mobile phone use is about managing costs, sticking to
family rules, keeping phones safe and being respectful.
IT Sections Applicable
If Gambling is involved:
The acts may attract Provisions of IT Act Section 69A for blocking
illegal gambling websites.
Exceptions:
1. Horse racing is legal in India
2. Lottery system (in few States)
3. The Public Gambling Act of 1867 exempts skill-based games from
the definition of gambling.
www.cybersafegirl.com
SMART HOMES
Smart-home devices hold a treasure trove of personal information,
from your birth date to credit card details, that cybercriminals can
steal via hacking if the devices lack robust protections to thwart
attacks. They can then use the stolen data to launch targeted
attacks to rope you into shady deals.
IT Sections Applicable
Digital outreach may lead to Privacy Breach
IPC Section 354/BNS 74 - Sexual harassment
IPC Section 354C/BNS 77 - Voyeurism
IPC Section 509/BNS 79 - Outraging modesty of women
IT Act Section 66 - Computer related offences
IT Act Section 66E - Punishment for violation of privacy
www.cybersafegirl.com
MICRO LOANS
Fly-by-night micro lending illegal app-based financiers are thriving.
These moneylenders target younger customers who look for quick
loans for consumption purposes. Those failing to pay up will have
their photos shared in their family and workplace social media
groups, a tactic that has driven many to desperation.
IT Sections Applicable
IPC Section 420/BNS 318 - Cheating
IPC Section 503/BNS 351/ 506/BNS 351 - Criminal Intimidation
IPC Section 383/BNS 308 - Extortion
IPC Section 306/BNS 108 - Abetment of Suicide
IPC Section 499/BNS 356 / 500/BNS 356 - Defamation
IPC Section 120B/BNS 61 - Criminal Conspiracy
IPC Section 34/BMS 3(5) - Common Intention
Sections of Reserve Bank of India Act, 1934
(as per the facts of the case)
www.cybersafegirl.com
BLUE SNARFING
It is a device hack performed when a wireless, Bluetooth-enabled
device is in discoverable mode. Bluesnarfing allows hackers to
remotely access Bluetooth device data, such as a user’s calendar,
contact list, emails and text messages. This attack is perpetrated
without the victim’s knowledge.
IT Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation
using a computer resource
(as per the facts of the case)
IPC Section 419/BNS 319 - Punishment for cheating by personation
IPC Section 420/BNS 318 - Cheating (as per the facts of the case)
www.cybersafegirl.com
STOLEN PHONE
A stolen phone can leave you feeling helpless and scrambling.
Mobile phones and the data they hold are very valuable to thieves.
And for similar reasons - they hold so much important personal
information of real and sentimental value - a theft can be a huge
loss for the owner.
IT Sections Applicable
IPC Section 378/BNS 303/ 379/BNS 303 – Theft
This section deals with theft andcovers the unlawful taking of movable
property, including stolen phones.
IPC Section 406/BNS 316
This section pertains to criminal breach of trust.
IPC Section 411/BNS 317
This section deals with dishonestly receiving stolen property.
IT Act Section 66 - Computer related offences
IT Act Section 66 - This sectionaddresses identity theft and
unauthorized use of electronic signatures,
passwords, or any other unique identification
feature.
IT Act Section 66D - This section pertainsto cheating by personation
using computer resources.
www.cybersafegirl.com
EXAM MALPRACTICE
Examination malpractice is defined as any deliberate act of
wrongdoing, contrary to the rules of examinations designed to give
a candidate an undue advantage. Also known as cheating, these
days students resort to hi-tech examination malpractice (otherwise
called e-cheating or digital cheating) in various levels of the
educational system.
IT Sections Applicable
Information Technology Act, 2000 - Section 66: This section deals
withcomputer-related offenses, including unauthorized access to
computersystems.
Information Technology Act, 2000 - IT Act Section 43: This section
coverspenalties for unauthorized access, damages to computer systems,
and databreaches.
Indian Penal Code, 1860 - IT Act Section 420: This section deals
with cheating anddishonestly inducing delivery of property.
Prevention of Unfair Means Act (PUMA): While not a cyber law, this
act isrelevant as it addresses unfair practices during exams.
UGC Regulations / University Rules: Universities and educational
institutionsoften have their own rules and regulations to prevent exam
malpractice.
www.cybersafegirl.com
CONNECTED CAR
Connected cars are part of the ‘internet of things’, a phrase
that refers to everyday items being connected to the internet
with the intention of making life easier. The connected car is
becoming software-defined, network-aware, and ultra-connected,
transmitting data and “interacting” with the road and every other
vehicle around it, increasing the chances of getting hacked!
IT Sections Applicable
IPC Section 354D/BNS 78 - This Section also covers online stalking
that is to say monitoring her use of the internet, email or other forms of
electronic communications & 66 R/W 43 (a), if he causes DOS then 43(f).
Information Technology Act, 2000 :
IT Act Section 43 - Unauthorized access to computer systems and data.
Section 66 - Computer-related offenses, including hacking and
datatheft.
IT Act Section 66B - Punishment for dishonestly receiving stolen
computer resources or communication devices.
Motor Vehicles Act, 1988 :
Various sections related to road safety, licensing, registration, and
liabilityin case of accidents involving connected vehicles.
Privacy Laws :
Personal Data Protection Bill (proposed) or any relevant amendments
toexisting laws. These laws would govern the collection, storage,
processing, and sharing of personal data by connected vehicles.
Consumer Protection Laws :
Consumer Protection Act, 2019: Pertinent sections related to
productliability and consumer rights in case of defects or malfunctions
inconnected car systems.
www.cybersafegirl.com
DRUG TRAFFICKING
The last decade has seen the emergence of new internet technologies
that have acted as important facilitators of online drug markets.
The internet now hosts a range of virtual marketplaces (both on
the surface and deep web) for selling and buying illicit substances.
Greater connectivity, global outreach and easily accessible forums
are some of the reasons for their popularity.
IT Sections Applicable
Sections of NDPS (sections would apply depending upon the quantity that she
was in possession of at the time of the raid, it could be for personal consumption
or commercial quantity, and sections would also apply as to whether she was
also supplying or trading/dealing/facilitating of the banned substances)
NDPS Act:
Section 8(c) - Prohibition of Certain Operations
Section 18 - Punishment for contravention in relation to manufactured
drugsand preparations
Section 21 - Punishment for contravention in relation to poppy straw
Section 27A - Punishment for financing illicit traffic and harbouring
offenders
www.cybersafegirl.com
DOXING
To dox someone means to release their personal or private
information that may prove harmful or embarrassing. This can
happen in the real world, but the internet has made it easier both
to find and release this information to a wide audience. Doxing may
reveal someone’s personal information like their home address or
workplace, social security or phone number, private correspondence
or pictures, criminal history, IP address, or other details.
IT Sections Applicable
IT Act Section 66C - Identity Theft (Information Technology Act,
2000): Thissection deals with the punishment for identity theft.
IT Act Section 66D - Cheating by Personation (Information
Technology Act, 2000): This section addresses the offense of cheating
by personation using acomputer resource
IT Act Section 72 - Breach of Confidentiality and Privacy
(Information Technology Act, 2000): This section deals with the
punishment for unauthorized access tocomputer material, including
personal data, and the breach of confidentialityand privacy.
IPC Section 354D/BNS 78 - Stalking (Indian Penal Code, 1860):
While not specific tocybercrime, this section criminalizes stalking
IPC Section 509/BNS 79 - Word, Gesture or Act Intended to Insult
the Modesty of aWoman (Indian Penal Code, 1860): Again, not
specific to cybercrime, thissection could be relevant if the doxxing
includes the sharing of explicit orprivate material with the intent to
insult or harm the victim.
www.cybersafegirl.com
CYBER GROOMING
Cyber grooming is the process of ‘befriending’ a young person online
“to facilitate online sexual contact and/or a physical meeting with
them with the goal of committing sexual abuse. Cyber grooming
is when someone (often an adult) befriends a child online and
builds an emotional connection with future intentions of sexual
abuse, sexual exploitation or trafficking. The main goals of cyber
grooming are: to gain trust from the child, to obtain intimate
and personal data from the child (often sexual in nature—such as
sexual conversations, pictures, or videos) in order to threaten and
blackmail for further inappropriate material.
IT Sections Applicable
Sections of POCSO,
IPC Section 292/BNS 294
IT Act Section 66E - Violation of Privacy: This section deals with
capturing,transmitting, or publishing private images of a person without
theirconsent, leading to the violation of their privacy
IT Act Section 67B - Publishing or Transmitting Obscene Material:
Thissection addresses the publishing or transmitting of sexually explicit
material, including messages, images, or videos, which can be used
astools for grooming activities.
IT Act Section 67C - Preservation and Retention of Information by
Intermediaries
IT Act Section 67A - Punishment for Publishing or Transmitting of
Material Containing Sexually Explicit Act
IT Act Section 67 - Publishing or Transmitting of Material Containing
sexually explicit act, etc. in electronic form
www.cybersafegirl.com
CRYPTO FRAUDS
Scammers are always looking for new ways to steal your money,
and the massive growth of cryptocurrency in recent years has
created plenty of opportunities for fraud. There are many types of
crypto scams. Some of the most common include: Fake Websites,
Pump and Dump Scams, Phishing Scams, Fake Apps, Fake celebrity
endorsements, Giveaway scams, cloud mining scams and initial
offering scams.
IT Sections Applicable
IT Act Section 43(a) - This section deals with unauthorized accessto
computer systems and data breaches
IT Act Section 66C - This section pertains to identity theft
andcould be applied to cases where individuals' identities are stolen
forfraudulent purposes related to cryptocurrencies.
IT Act Section 66D - This section addresses cheating bypersonation by
using computer resources and communication devices.
IPC Section 420/BNS 318 - Although not part of the ITAct, Section
420 of the IPC covers cheating and dishonestly inducingdelivery of
property.
www.cybersafegirl.com
CYBER SEX TRAFFICKING
Cybersex trafficking, or online sexual exploitation, is a cybercrime
and a form of modern slavery. Cybersex trafficking is when a victim
is forced into sexual exploitation using coercion, force, or fraud,
and their abuse is streamed live on the internet via webcam, video,
photography, or other digital media.
IT Sections Applicable
IPC Section 499/BNS 356, IPC Section 506/BNS 351, IPC Section
509/BNS 79, IPC Section 354A/BNS 75, IPC Section 370/BNS 143,
347 IPC Section 347/BNS 127, 357 IPC Section 357/BNS 135
IPC Section 370A - Trafficking of persons for exploitation, which
includestrafficking for sexual exploitation through electronic means.
Disclosing sexually explicit or filthy content Section 292 of IPC.
Sections of Immoral Traffic (Prevention) Act 1956 also known as PITA
(Preventionof Immoral Trafficking Act).
www.cybersafegirl.com
CYBERWARFARE
Cyberwarfare is the use of cyber attacks against an enemy state,
causing comparable harm to actual warfare and/or disrupting vital
computer systems. Some intended outcomes could be espionage,
sabotage, propaganda, manipulation or economic warfare.
IT Sections Applicable
IT Act Section 43 - Deals with unauthorized access to
computersystems and data breaches.
IT Act Section 66 - Addresses computer-related offenses,
includinghacking.
IT Act Section 66F - Focuses on cyber terrorism, which can
berelevant to cyber warfare activities.
IT Act Section 70 A - This section was introduced through an
amendment in 2008 toprovide the government with powers to
issue directions forensuring the security of cyberspace. It empowers
thegovernment to take measures for identification, analysis,
andprevention of cyber threats.
IT Act Section 69 - This section grants the Indian government
the power tointercept, monitor, and decrypt any information
generated,transmitted, received, or stored in any computer resource if
itis necessary for national security or for maintaining publicorder.
IPC Section 121/BNS 147. 66E, 66 R/W 43(a) (c) (e) (f)
Sections of Unlawful Activities (Prevention) Act, 1967 (UAPA).
In Maharashtra- Sections of The Maharashtra Control of Organised
Crime Act, 1999 (MCOCA).
Sections of Prevention of Terrorism Act, 2002.
www.cybersafegirl.com
HACKTIVISM
Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism
is the act of hacking, or breaking into a computer system, for
politically or socially motivated purposes. The individual who
performs an act of hacktivism is said to be a hacktivist. The
hacktivist who does such acts, such as defacing an organization’s
website or leaking that organization’s information, aims to send a
message through their activities and gain visibility for a cause they
are promoting.
IT Sections Applicable
Information Technology Act, 2000 - Section 43: This section deals
withunauthorized access to computer systems, data, or networks.
Information Technology Act, 2000 - Section 66: This section
addressescomputer-related offenses, including hacking and unauthorized
access.
Information Technology Act, 2000 - Section 66F: This section
specificallytargets cyber terrorism and related activities.
Information Technology Act, 2000 - Section 70: This section
empowers thegovernment to secure cyberspace by issuing directions for
the interception,monitoring, or decryption of any information through
any computer resource.
IPC Section 120A/BNS 61, IPC Section 121/BNS 147
IPC Section 122/BNS 149, IPC Section 153/BNS 192
IPC Section 153A/BNS 196, IPC Section 107/BNS 45
Think about you and do not allow someone else to think for you.
www.cybersafegirl.com
METAVERSE
The metaverse is a 3D version of the Internet and computing at
large. The metaverse is “an integrated network of 3D virtual
worlds.” These worlds are accessed through a virtual reality
headset - users navigate the metaverse using their eye movements,
feedback controllers or voice commands. The headset immerses the
user, stimulating what is known as presence, which is created by
generating the physical sensation of actually being there.
IT Sections Applicable
IPC Section 354/BNS 74, IPC Section 506/BNS 351
sections of POCSO, section 67B IT Act
Right to Privacy is now a Fundamental Right under Article 21 of the
Constitution of India.
Data Protection and Privacy Laws: Laws regulating the collection,
storage,processing, and sharing of personal data could apply to user
interactionswithin the metaverse. In India, this might include compliance
with the Personal Data Protection Bill, once enacted into law.
Intellectual Property Laws: Laws governing copyrights, trademarks,
andpatents could extend to creations within the metaverse, such as
virtual goods,artwork, and designs.
Online Conduct and Harassment Laws: Just as in the real world,
laws againstharassment, hate speech, and cyberbullying could apply to
interactions in the metaverse.
Digital Transactions and Consumer Protection Laws: If virtual goods
andservices are bought and sold within the metaverse, laws related to
digital transactions and consumer rights might be relevant.
Cybersecurity Laws : Laws related to cybersecurity and hacking could
apply tounauthorized access, data breaches, and other security incidents
within themetaverse.
www.cybersafegirl.com
SESSION HIJACKING ATTACK
In a session hijacking attack, cybercriminals gain unauthorized
access to an active user session by exploiting vulnerabilities in
web applications or networks. By taking control of the session,
they can impersonate the user, access sensitive information, or
conduct unauthorized actions, compromising the user’s privacy
and security.
IT Sections Applicable
IT Act Section 43 - This section deals with unauthorized access to
computersystems, data theft, and other computer-related offenses.
IT Act Section 66C - This section specifically addresses identity theft.
If asession hijacking attack is carried out with
the intention ofimpersonating an individual or causing financial or
reputational harmto them, this section could be invoked.
IT Act Section 66D - This section covers cheating by impersonation
using acomputer resource.
IT Act Section 66E - This section deals with violation of privacy.
IT Act Section 72 - This section protects the confidentiality and
privacy ofinformation handled by service providers.
www.cybersafegirl.com
PROMPT ENGINEERING
Prompt engineering refers to the manipulation of users through
carefully crafted messages or prompts to deceive them into revealing
sensitive information or performing unintended actions. This social
engineering technique is commonly used in phishing attacks, where
cybercriminals trick individuals into disclosing passwords, personal
data, or financial details.
IT Sections Applicable
IT Act Section 43 - Unauthorized access to computer systems.
IT Act Section 66 - Computer-related offenses, including hacking.
IT Act Section 67 - Punishment for publishing or transmitting
obscene materialin electronic form.
IT Act Section 69 - Power to issue directions for interception or
monitoring ordecryption of any information
through any computer resource.
IT Act Section 72 - Breach of confidentiality and privacy.
IT Act Section 79 - Intermediaries not to be liable in certain cases.
IT Act Section 84A - Modes or methods for encryption. The
Central Government may, for secure use of
the electronic medium and for promotion of
e-governance and e-commerce, prescribe the
modes ormethods for encryption.
IT Act Section 85 - Offenses by companies.
www.cybersafegirl.com
FILELESS ATTACKS
This attack evades traditional antivirus and detection systems by
executing malicious code directly in computer memory, without
leaving traces on the file system. These stealthy attacks exploit
vulnerabilities in software, making them harder to detect and
providing cybercriminals with remote access to systems for data
theft, surveillance, or launching further attacks.
IT Sections Applicable
IT Act Section 43 (Unauthorized Access) - This section deals with
unauthorized access to computer systems, data, or networks.
IT Act Section 43A (Compensation for Data Breach) - This section
deals with the compensation for improper disclosure of personal
information.
IT Act Section 66 (Computer-Related Offenses) - This section covers
various computer-related offenses, including hacking.
IT Act Section 66B (Punishment for Receiving Stolen Computer
Resourcesor Communication Devices) - If fileless attacks involve
receiving stolen computer resources or communication devices, this
section might be invoked.
IT Act Section 66C (Identity Theft) - If a fileless attack leads to
identity theft, this section might apply.
IT Act Section 66E (Violation of Privacy) - In cases where privacy is
violated through fileless attacks, this section might be invoked.
IT Act Section 66F (Cyber Terrorism) - If the fileless attack is
carried out with the intent of causing terror or destabilizing critical
infrastructure, this section could apply.
www.cybersafegirl.com
DELIVERY SCAM
A delivery scam involves cybercriminals sending fake notifications
or tracking information to deceive recipients into believing they
have a package or delivery pending. The scam aims to trick victims
into revealing personal information, clicking on malicious links,
or paying fake shipping fees, leading to financial loss or data
compromise.
IT Sections Applicable
IT Act Section 43 - Penalty for unauthorized access, damage
to computer systems, etc.
IT Act Section 66 - Computer-related offenses, including
cheating by personation using a
computer resource.
IPC Section 419/BNS 319 - Punishment for cheating by personation.
IPC Section 420/BNS 318 - Cheating and dishonestly inducing
delivery of property.
www.cybersafegirl.com
VIRTUAL KIDNAPPING
This is a psychological extortion scheme where perpetrators
manipulate victims into believing a loved one has been kidnapped,
demanding ransom to ensure their release. Though no actual
abduction occurs, the emotional distress and fear generated can
lead victims to comply with the demands.
IT Sections Applicable
Information Technology Act, 2000
IT Act Section 66C - This section deals with identity theft, which
could be relevant if someone’s identity is
misused in a virtual kidnapping scenario.
IT Act Section 66D - This section covers cheating by impersonation
using a computer resource, which could apply if
the perpetrator impersonates the victim.
Indian Penal Code (IPC)
IPC Section 503/BNS 351
This section deals with criminal intimidation, which could be relevant if
threats are made in a virtual kidnapping scenario.
IPC Section 506/BNS 351
This section deals with criminal intimidation by threat of injury to a
person’s reputation, etc.
www.cybersafegirl.com
FORMJACKING
It is an attack that involves injecting malicious code into
e-commerce websites’ payment forms. The code steals payment
card details or personal information entered by customers during
online transactions, allowing cybercriminals to engage in payment
fraud or identity theft.
IT Sections Applicable
Information Technology Act, 2000:
IT Act Section 43 - This section deals with unauthorized access to
computersystems and data breaches.
IT Act Section 43A - This section deals with the compensation for
failure toprotect sensitive personal data.
IT Act Section 66 - This section deals with computer-related
offenses,including hacking.
IT Act Section 66C - This section deals with identity theft.
www.cybersafegirl.com
CYBERSQUATTING
It refers to the practice of registering domain names similar to
established brands or trademarks with the intent to profit from the
brand’s reputation or sell the domain back to the rightful owner
at an inflated price. This can lead to brand dilution, reputation
damage, and confusion among consumers.
IT Sections Applicable
IT Act Section 2(1)(r) - Defines “domain name,” which is crucial in
understanding the context of cybersquatting.
IT Act Section 43 - This section deals with penalties and
compensation for damage to computer
systems
IT Act Section 66-D - This section covers the offense of cheating by
impersonation using a computer resource
IT Act Section 66-A - Although this section was struck down by
the Supreme Court of India in 2015 for being
unconstitutional,
IT Act Section 79 - While not directly focused on cybersquatting,
this section deals with intermediary liability.
IT Act Section 81 - This section ensures that the provisions of
the IT Act have an overriding effect, not with
standing anything inconsistent in any other
law for the time being in force.
www.cybersafegirl.com
DNS HIJACKING
This attack involves altering the Domain Name System (DNS)
settings of a computer or network, redirecting legitimate traffic to
malicious websites. By intercepting and manipulating DNS queries,
attackers can lead users to phishing pages, distribute malware, or
engage in other malicious activities.
IT Sections Applicable
IT Act Section 43 - This section deals with unauthorized access
tocomputer systems and data.
IT Act Section 66 - This section deals with computer-related offenses
likehacking, which could cover unauthorized
access, interference, ordamage to computer
systems.
IT Act Section 66C- This section deals with identity theft. If
someoneuses another person’s identity to commit
an offense related toDNS hijacking, this section
could be invoked.
IT Act Section 66D - This section covers cheating by personation
usingcomputer resources.
IT Act Section 66E - This section deals with violation of privacy.
IT Act Section 72 - This section protects the privacy and
confidentiality ofinformation stored in a
computer resource.
Don’t let your online path divert; secure your DNS, stay alert.
www.cybersafegirl.com
SMS BOMBING
It is a form of harassment where attackers overwhelm a victim’s
mobile device with a large number of unwanted text messages,
disrupting normal communication and potentially causing
psychological distress. This attack aims to disrupt the victim’s peace
of mind or sabotage their ability to use their phone.
IT Sections Applicable
IT Act Section 66C - Identity theft : This section deals with
punishment foridentity theft, which includes dishonestly using
another person’selectronic signature, password, or any other unique
identificationfeature.
IT Act Section 66D - Cheating by personation using
computer resource :
This section addresses the act of cheating by personation using
acomputer resource, and it prescribes penalties for such actions.
IT Act Section 43 - Penalty and compensation for damage to
computer, computer system, etc. : This section deals with penalties
forunauthorized access to computer systems, data breaches, and
causingdamage to computer resources.
IT Act Section 66 - Computer-related offenses : This section covers
variousoffenses related to computer systems, including hacking,
unauthorizedaccess, and introduction of viruses.
www.cybersafegirl.com
INSIDER THREATS
Refers to security risks posed by individuals with legitimate access to
an organization’s systems, networks, or sensitive information. These
threats may arise from employees, contractors, or business partners
who intentionally or unintentionally misuse their privileges to steal
data, commit fraud, or compromise the organization’s security.
IT Sections Applicable
IT Act Section 43A - Compensation for Data Breach
IT Act Section 66C - Identity Theft
IT Act Section 66D - Cheating by Personation by using
Computer Resource
IT Act Section 72 - Breach of Confidentiality and Privacy
IT Act Section 72A - Punishment for Disclosure of
Information in Breach of Law
IPC Section 408/BNS 316 - Criminal Breach of Trust by Clerk or
Servant
www.cybersafegirl.com
DO’S AND DON’TS OF CYBER SAFETY
By Adv. Prashanth Jhala
2. BEWARE OF PHISHING:
Be cautious of suspicious emails, links, and attachments. Avoid sharing
personal information or clicking on unfamiliar links.
9. EDUCATE YOURSELF:
Stay informed about the latest cybersecurity threats and best practices
to ensure you’re adapting to new security challenges.
www.cybersafegirl.com
16. BE CAUTIOUS WITH DOWNLOADS:
Only download files and software from reputable sources. Avoid
downloading files from unknown websites or clicking on suspicious links.
www.cybersafegirl.com
GOOGLE ANDROID HARDENING CHECKLIST
By Yashavantha Kumar K.N, DySP
Basic Security
1 Update operating system to the latest version
2 Do not Root the device
3 Do not install applications from third party app stores
4 Enable device encryption
5 Disable ‘Developer Actions’
6 Use an application/service to provide remote wipe functionality
7 Enable Android Device Manager
8 Erase all data before return, repair, or recycle
Authentication Security
9 Set a PIN and automatically lock the device when it sleeps
10 Set an alphanumeric password
11 Set Auto-Lock Timeout
12 Disable ‘Make Passwords Visible’
13 Erase data upon excessive passcode failures
Browser Security
14 Show security warnings for visited sites
15 Disable ‘Form Auto-Fill’
16 Do not automatically remember passwords
17 Disable browser plug-ins
18 Turn on Do Not Track
Network Security
19 Turn off Bluetooth when not in use
20 Disable network notification
21 Forget Wi-Fi networks to prevent automatic rejoin
Additional Security Settings1
22 Turn off Location Services
23 Use a third party application to password protect applications with
sensitive data
24 Limit the number of text (SMS) and multimedia messages (MMS) saved
25 Disallow cookies in Chrome browser
26 Disable JavaScript in Chrome browser
27 Use TextSecure to encrypt SMS messages
Beti Bachao, Cyber Crime Se
APPLE IOS HARDENING CHECKLIST
Basic Security
1 Update operating system to the latest version
2 Do not Jailbreak iOS to sideload applications
3 Enable Automatic Downloads of App Updates
4 Enable remote wipe functionality
5 Enable Find My iPhone
6 Encrypt device backups through iTunes
7 Erase all data before return, repair, or recycle
Authentication Security
8 Require a passcode or password
9 Enable TouchID with a complex password
10 Set Auto-Lock Timeout
11 Disable Grace Period for Screen Lock
12 Erase data upon excessive passcode failures
13 Enable Data Protection
Browser Security
14 Enable Fraud Warning in Safari
15 Disable AutoFill for sensitive information
16 Block cookies from third parties
17 Turn on Do Not Track
Network Security
18 Turn off Ask to Join Networks
19 Turn off AirDrop when not in use
20 Turn off Bluetooth when not in use
21 Turn off Personal Hotspot when not in use
22 Forget Wi-Fi networks to prevent automatic rejoin
Additional Security Settings1
23 Turn off Location Services
24 Restrict access to Location Services, Contacts, Photos, etc.
25 Disable access to Control Center on Lock Screen
26 Disable TouchID
27 Enable Private Browsing in Mobile Safari as needed
28 Disable JavaScript in Mobile Safari
These security settings are proactive in nature but are intended for devices where
there exists a very high need for security, as they may negatively impact the user
experience and interfere with the functionality and utility of many applications.
www.cybersafegirl.com
OFFENCES AND RELEVANT PENAL SECTIONS
Cyber Crimes Mapping with Information Technology Act, 2000,
Information Technology (Amendment) Act, 2008,
IPC and Special and Local Laws.
Applicable section(s) and Applicable section(s)
Sl.
Nature of complaint punishments under ITA 2000 & under other laws and
No
ITAA 2008 punishment
1 Mobile phone lost/stolen - Section 379 IPC
3 years imprisonment or
fine or both
2 Receiving stolen IT Act Section 66 B of ITAA 2008 Section 411 IPC
computer/ mobile phone/data 3 years imprisonment or Rupees one 3 years imprisonment or
(data or computer or mobile lakh fine or both fine or both
phone owned by you is found in
the hands of someone else.)
3 Data owned by you or your IT Act Section 66 of ITAA 2008 Section 379 IPC
company in any form is stolen 3 years imprisonment or fine up to 3 years imprisonment or
rupees five lakh or both fine or both
4 A password is stolen and used IT Act Section 66C of ITAA 2008 Section 419 IPC
by someone else for fraudulent 3 years imprisonment and fine up to 3 years imprisonment
purpose. Rupees one lakh or fine
IT Act Section 66D ITAA 2008 Section 420 IPC
3 years imprisonment and fine up to 7 years imprisonment
Rupees one lakh and fine
6 An e-mail is read by IT Act Section 66 of ITAA 2008
someone else by 3 years imprisonment or fine up to
fraudulently making use of Rupees five lakh or both
password IT Act Section 66C of ITAA 2008
3 years imprisonment and fine up to
Rupees one lakh
7 A biometric thumb IT Act Section 66C of ITAA 2008
impression is misused 3 years imprisonment and fine up to
IT Act Rupees one lakh
8 An electronic signature or Section 66C of ITAA 2008
digital signature is misused 3 years imprisonment and fine up to
Rupees one lakh
10 A Phishing e-mail is sent IT Act Section 66D of ITAA 2008 Section 419 IPC
out in your name, asking 3 years imprisonment and fine up to 3 years imprisonment or
for login credentials Rupees one lakh fine or both
11 Capturing, publishing, or IT Act Section 66E of ITAA 2008 Section 292 IPC
transmitting the image of 3 years imprisonment or fine not 2 years imprisonment
the private area without exceeding Rupees two lakh or both and fine Rupees 2000
any person’s consent or and 5 years and rupees
knowledge 5000 for second and
subsequent conviction
12 Tampering with computer IT Act Section 65 of ITAA 2008
source Documents 3 years imprisonment or fine up to
Rupees two lakh or both
IT Act Section 66 of ITAA 2008
3 years imprisonment or fine up to
Rupees five lakh or both
13 Data Modification IT Act Section 66 of ITAA 2008
3 years imprisonment or fine up to
Rupees five lakh or both
www.cybersafegirl.com
24 Failure to Block Web sites, IT Act Section 69A of ITAA 2008
when ordered imprisonment up to 7 years and fine
25 Sending threatening Section 506 IPC
messages by e-mail 2 years or fine or both
25 Word, gesture or act Section 509 IPC
intended to insult the 1 years or fine or both —
modesty of a woman IPC as applicable
26 Sending defamatory Section 500 IPC
messages by e-mail 2 years or fine or both
27 Bogus Web sites, cyber IT Act Section 66D of ITAA 2008 Section 419 IPC
frauds 3 years imprisonment and fine 3 years imprisonment
up to Rupees one lakh or fine
Section 420 IPC
7 years imprisonment
and fine
28 E-mail Spoofing IT Act Section 66C of ITAA 2008 Section 465 IPC
3 years imprisonment and fine 2 years or fine or both
up to Rupees one lakh Section 468 IPC
7 years imprisonment
and fine
29 Making a false document IT Act Section 66D of ITAA 2008 Section 465 IPC
3 years imprisonment and fine 2 years or fine or both
up to Rupees one lakh
30 Forgery for purpose of IT Act Section 66D of ITAA 2008 Section 468 IPC
cheating 3 years imprisonment and fine 7 years imprisonment
up to Rupees one lakh and fine
31 Forgery for purpose of IT Act Section 66D of ITAA 2008 Section. 469 IPC
harming reputation 3 years imprisonment and fine 3 years and fine
up to Rupees one lakh
32 E-mail Abuse Sec. 500 IPC
2 years or fine or both
33 Punishment for criminal Sec. 506 IPC
intimidation 2 years or fine or both
— if threat be to cause
death or grievous hurt,
etc. — 7 years or fine
or both
34 Criminal intimidation by an Sec. 507 IPC
anonymous communication 2 years along with
punishment
under section 506 IPC
35 Copyright infringement IT Act Section 66 of ITAA 2008 Sec. 63, 63B Copyrights
3 years imprisonment or fine up to Act 1957
Rupees five lakh or both
36 Theft of Computer Sec. 379 IPC
Hardware 3 years imprisonment or
fine or both
37 Online Sale of Drugs NDPS Act
38 Online Sale of Arms Arms Act
Disclaimer: The above-mentioned explanations made herein are to the best of our
knowledge and interpretations and are purely for academic and information purpose
only. They may be used as a guiding force. They should not be construed as legal opinion
by any stretch of imagination. We are thankful to all the stake holders for uploading
information which we may have used for education purpose only.
Beti Bachao, Cyber Crime Se
www.cybersafegirl.com
HELPLINE NUMBERS
Police : 100
Fire : 101
Ambulance : 102