MANUAL NO.
6
The increasing use of social media platforms has led to a rise in cyber
criminal activities. Platforms like Facebook, Twitter, Instagram,
YouTube, LinkedIn, WhatsApp, Snapchat, Tinder, Hike, WeChat,
and Tumblr allow users to connect, communicate, and share
information. However, it is crucial to be cautious when using these
platforms.
To protect yourself and your information, inform the service provider
if you notice a fake account created using your personal information.
Avoid sharing vacations, travel plans, or other sensitive information
on social media. Keep location services turned off on your devices
unless necessary, and share photos and videos only with trusted
friends. Use strong passwords and avoid allowing social media sites
to scan your email account without your consent.
When chatting with someone online, ask unrelated questions to avoid
chatting with an automated computer bot. Avoid using public
computers or cyber cafes to access social networking websites, as
they may be infected with keylogger applications. Avoid sharing or
forwarding unverified posts or news on social media forums, and
research the safety of third-party applications before downloading
them.
MANUAL NO. 9
Issued by Office of Special Inspector General
of Police Maharashtra Cyber, Home
Department Government of Maharashtra
Knowledge Partner PricewaterhouseCoopers
Pvt. Ltd. Cyber Security Awareness for
Citizens Volume 110 January 2020Shri.
Brijesh Singh, Inspector General of Police,
Government of Maharashtra Shri. Harish
Baijal, Deputy Inspector General,
Government of Maharashtra Shri. Ajay
Ambekar, Director Information, Government
of Maharashtra Dr. Balsing Rajput,
Superintendent of Police, Government of
Maharashtra Shri. Sachin Pandkar,
Superintendent of Police, Government of
Maharashtra Shri. Vijay Khaire, Deputy
Superintendent of Police, Government of
Maharashtra Shri. Laxman Kamble, Police
Inspector, Government of Maharashtra Ms.
Deepika Singh, CM Fellow, Government of
Maharashtra Ms. Dhrumi Gada, CM Fellow,
Government of Maharashtra Shri. Raunak
Maheshwari, CM Fellow, Government of
Maharashtra Shri. Subodh Patil, Artist &
Graphics Designer Concept and Advisors
Acknowledgement Maharashtra Cyber is a
nodal instrumentality for idea and exercise
of all the Cyber drives/programs for united
states of America of Maharashtra. The area
was settled apiece Home Department of
Government of Maharashtra as the Office of
Special Inspector General of Police,
Maharashtra Cyber, vide GR No. MISC-
2015/CR-119/Spl-3A, out-of-date 5th January
2015. Currently, Shri Brijesh Singh – Special
Inspector General of Police is the head
concerning this area. Maharashtra Cyber
everything carefully accompanying locality
lawman work force, high-tech-freedom
specialists, regulation administration
instrumentalities/public prosecutors,
pleaders/legal commissioners in
mathematical forensics to proactively
hinder the computerized warnings emergent
in united states of America of Maharashtra.
As a nodal instrumentality, the area focuses
on extended knowledge to the Government
administrators, corporates & public at big
about computerized protection and
construction capacity for Maharashtra
Police in fighting cybercrime. Maharashtra
Cyber would like to accept the gift
created by Directorate General of
Information and Public Relations (DGIPR) for
providing support in issuing this pamphlet
particularly Shri. Ajay Ambekar, Ms. Mayura
Deshpande and Ms. Reshma Tamboli;
PricewaterhouseCoopers Pvt. Ltd. for
advocating as the Knowledge Partner for
this pamphlet particularly Mr. Rahul
Aggarwal, Mr. Krishna Sastry, Mr. Vikas
Sood, Ms. Nidhi Khator, Mr. Raj Sawant, Mr.
Tanmay Barhale, Mr. Dipankar Tripathy, Mr.
Chinmay Vaidya and Mr. Akshat Agarwala
the one have donated excessively in
formulating the content, plotting the
drawings and directing the whole project
from idea to magazine of the pamphlet.
Maharashtra Cyber would further like to kiss
BSE Ltd. for providing the floor to begin this
pamphlet in the Cyber Security Conference,
2020 particularly Shri. Shivkumar
Pandey.5TABLE OF CONTENTS Importance of
Cyber Security Identity Theft Psychological
Tricks Social Media Frauds Mobile Application
Frauds Online Banking Frauds Virus Attack
on Personal Computer General Tips to
maintain you reliable Incident
Reporting060816
243438465456IMPORTANCEOF
CYBERSECURITY7IMPORTANCE OFCYBER
SECURITY Why is Cyber Security Awareness
Important? Advanced electronics have
exchanged the up-to-date lifestyle. The
computer network supplies us
accompanying many benefits. Be it ideasing
accompanying companions, probing for
facts, achievement investment
undertakings, availing connected to the
internet aids, judgment task, verdict
history spouse or even running whole
trades. The WWW touches principal part
facets of our lives. However, it still form us
accessible to a expansive range of warnings.
New and effective high-tech-attacks are
extraordinary the cyberspace automatically.
A minor lapse in directing our mathematical
lives can guide to computerized crooks.
Cyber culprits can pilfer our services or
damage our notoriety. According to a study
by a superior manufacturing research
arrangement, 90% of all computerized-
attacks are produced by human
carelessness. Therefore, computerized
protection knowledge is main for all
contemporary.We must protect while making
use of electronics to weaken the risk of high-
tech warnings.Types of CybercrimeA
cybercrime is a misconduct including
calculatings and networks. This contains a
off-course range of actions, from unjustly
downloading sounds that are pleasant,
harmonized files to theft services from
connected to the internet bank reports.
Cyber lawbreakers are not forever financially
stimulated. Cybercrimes involve non-
finances offenses also. It can contain frauds
specific as task connected frauds,
married frauds; theft and misusing
impressionable private facts (Aadhaar
analyses, credit/entry calendar analyses,
bank report attestations, etc.); libel of an
individual on friendly publishing; dispersion
of calculating viruses etc. Cybercrimes can
too bring about tangible or sex crime.In this
pamphlet, we will argue following low types
of cybercrimes superior
contemporary.Identity TheftDigital
BankingFraudsPsychological TricksAttacks
throughMobile ApplicationsSocial Media
connectedAttacksVirus Attacks onPersonal
ComputerIDENTITYTHEFT9IDENTITYTHEFTW
hat is Identity Theft?Identity stealing is the
act of unfairly acquiring dignitary’s private
news (that delimits one’s correspondence)
outside their authorization. The private facts
grant permission contain their name,
assigned number for telephone, address,
deposit number, Aadhaar number or
credit/card for shopping without cash
number etc.Identity stealing can have many
antagonistic belongings. The cheat can use
taken private facts and correspondence
proofs to:• attain to your bank reports•
command loans and credit cards or open
security reports• file a tax refund in your
name and receive your refund• acquire a
driver’s license, key or emigration
documents• form new serviceableness
reports• take healing situation on your
medical insurance• acquire your similarity
on friendly news• present your name to the
lawman all the while an arrest etc.Hence, all
bear thought to about correspondence
stealing and bear ability for fear that it. Let
us examine few models of similarity
stealing.Hacking or acquire approach to
Social Media AccountsThe aggressor hacks
or gains approach to the public television
report of the sufferer. The aggressor can
therefore harm the casualty by misusing
their private news and photographs. The
aggressor can more post offensive content
on casualty’s characterization or besmirch
the fatality.Misuse of copy of
correspondence proofsThe aggressor
misuses the copy of correspondence proofs
of the casualty. These maybe PAN Card,
Aadhaar Card or some additional similarity
authentication of the sufferer. The aggressor
can use these copy to plunder services or
cause harm to the sufferer.Credit/Debit Card
SkimmingCredit/Debit card skipping is
approved utilizing a narrow tool named
covering for the head. The drawing strip of
the badge stores analyses to a degree
name, credit/card for shopping without cash
number and finish date. First, the credit/card
for shopping without cash is swiped through
a covering for the head. Then, the covering
for the head captures all these analyses.
Thieves use this taken dossier to create
connected to the internet undertakings.
They likewise use this dossier to conceive
duplicate credit/entry cards and retract
services from ATM.10IDENTITYTHEFTStory 1:
Hacking or acquire approach to Social Media
AccountsSameera visits a cybercafé to take
print exhausted her work connected
documents, from her email.While the print
out is handle, she accesses her public news
description and checks added e-mails.As
rapidly as the print decrease are ready, she
rushes to accumulate it.She closes the
portal fanlight outside record in another
direction the report and leaves the
cybercafé.(After 2 hours)Sameera endures a
announcement that the identification of her
public publishing report has existed
relocate.She tries to check her public news
report from travelling but is impotent to
approach it immediately.11Sameera gets a
call from her Boss asserting that the secret
project documents were leaked connected
to the internet by her.She repeated endures
a call from her companion proverb that her
public television page shows indecent
representations and videos.Sameera mislays
her task on account of seeping of the project
documents. Moreover, she is remorseful that
her photoshopped indecent representations
are informed on friendly news.She regrets
that she acted not transfer data from one
computer system to another of her friendly
publishing report.Sameera ends to report
the occurrence in the Police Station.The
Inspector investigates the matter and
arrests the criminal.• Do not close the
internet /web viewing software dormer
outside record in another direction the
report.• Use 2-step proof in the way that
previous identification (OTP) while utilizing
dignitary else’s calculating.• Do not
preserve your username and identification in
computer network portal.• Register your
travelling number accompanying public
socializing for professional or personal gain
sites to take alerts in the occurrence of
illegal approach.• Permanently erase all
documents downloaded on calculatings in
cybercafé.TIPS12IDENTITYTHEFTSuresh
applies for home loan at a non-believed loan
instrumentality bestowing loan at very
reduced interest rates. He submits
photocopies of documents (PAN Card, IT
Returns, etc.) at the counter.(After 4
months)Suresh accepts a call from a
bank.Bank officer : Sir, have you used for an
automobile loan?Suresh : No, I acted not
command some loan from your bank.Suresh
visits the bank.He is startled to see that
welcome documents are present
accompanying that bank. He understands
that dignitary desired to deliver a
felony.Story 2: Misuse of copy of similarity
proofs13• Never communicate information
or copy of similarity proofs (like PAN Card,
Aadhaar Card, Voter Card, Driving License,
Address Proof) to person who is
unfamiliar/arranging.• Be careful while
utilizing correspondence proofs at doubtful
places.• Do not share delicate individual
facts (like Date of Birth, Birth Place, Family
Details, Address, Phone Number) on public
principles.• Always leave to begin new
venture the copy of the similarity evidence;
note the purpose of allure custom coinciding
the copy. This habit, it enhances
troublesome to talk over again the copy.•
Do not leave your credit, entry or ATM card
money earned in business venture behind,
in places in the way that a bank/ATM or a
store; never confuse ruling class
continuously honestly.TIPSHe visits Police
Station place the Inspector demonstrates
that it is a case of correspondence stealing.
Someone secondhand welcome PAN poster
number and two age of IT returns by
changeful photograph, sign, address and
assigned number for telephone in welcome
correspondence proofs.The cheat had used
for 7 automobile and private loans from
different big banks utilizing the alike
documents.Suresh regrets giving welcome
private documents accompanying the un-
trustworthy
instrumentality.14IDENTITYTHEFTStory 3:
Credit/Debit Card SkimmingSachin and
welcome companions are bearing feast at a
inn. The server gives the bill to
Sachin.Sachin : Do you acknowledge
program fee?Waiter : Yes Sir.Sachin releases
thecard for shopping without cash to the
serverfor fee.The server takes it to the
advertising counter place he privately
swipes the sheet in a grazing tool to capture
check facts.The skipping apparatus looks
just like a common fee motor (regularly
visualized in inns, shops etc.)The server
leads the calendar fee vehicle over to
Sachin for him to list the PIN. Sachin enters
the PIN heedlessly outside concealing it
from the society about him.The server form
a note of the PIN.15• Always guarantee that
credit/card for shopping without cash swipes
at buying malls, oil pumps, etc. are
exhausted your closeness. Do not admit the
buying life to take your label continuously to
hit for the undertaking.• Look out for
credit/card for shopping without cash
skimmers anyplace you hit your badge,
exceptionally at oil pumps, ATMs etc.• If
you notice a credit/card for shopping without
cash proofreader that juttes out outside the
face of the rest of the motor, possibly a
covering for the head.• Never share your
PIN accompanying one, nevertheless close
they maybe.TIPSSachin visits Police Station
place the Inspector expounds to him that he
is a martyr of entry poster glancing.The
cheat secondhand the analyses from
skipping vehicle to clone the card for
shopping without cash and retract services
from ATM.The server immediately has all the
necessary analyses like report holder’s
name, report number, entry sheet number,
CVV and PIN.(After any days)Sachin accepts
an SMS asserting ` 25,000 are remote from
ATM.Sachin regrets being nonchalant
accompanying the PIN and give the entry
ticket to the server outside
project.PSYCHOLOGICALTRICKS17PSYCHOLO
GICALTRICKSWhat are Psychological Tricks?
Psychological tricks are place attackers toy
with the minds of the consumer to trap
bureaucracy accompanying well-paid offers.
Once cornered, the attackers can exploit
the casualty by either theft services or
theft impressionable individual facts (name,
Aadhaar analyses, deposit analyses etc.) or
harm the casualty in alternatively. The whole
footing concerning this somewhat attack
search out create the martyr attempt their
trap by shipping fake e-mails, calls or
SMSs.Phishing is the act of shipping false
electronic mail that performs expected from
a legal beginning, for model, a bank, a
investigating or a credit ticket guest etc.
This is finished in an attempt to gain
impressionable individual facts,