Indian Government To Provide Handbook On Cyber Safety To School Children

India’s Union Home Ministry has come out with a booklet on cyber safety for teenagers that tries to address their increased use of smartphones, gadgets, online gaming, social media and fake news.

The 38-page booklet, titled "A Handbook for Students on Cyber Safety", also deals with the problems of cyber bullying, cyber grooming and email fraud.

On incidents of lynching due to fake news, the booklet, published only in English, cautions: "Fake news and hoax messages spread like wildfire on social media (such as Twitter, Facebook, Instagram, Snapchat). It may create law and order problem and may end up causing loss of life in a few cases. Before forwarding or sharing any message on social media or messaging app, check it on other sources also to confirm its authenticity."

The Home Ministry last year set up a Cyber and Information Security division to check the rapid growth of cybercrimes and cyber threats. It now aims to introduce the cyber-crime handbook in schools as a component of the school curriculum.

According to the Indian Computer Response Team (CERT-In), over 53,000 cases of cyber security incidents were reported in 2017 in India, while 1,785 credit or debit cards frauds were recorded, causing a loss of Rs. 71.48 crore last year.

"Cyber grooming is growing as one of the major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with children through social media or messaging platforms with an objective of gaining their trust for sexually abusing and exploiting them... 

“More and more children invest time online to play games, make friends and share updates... Details shared on internet stay online forever as it is extremely difficult to delete the information completely," the booklet said.

On social engineering, the booklet says it is a technique used by cyber criminals to gain one's confidence to get information.

"Depending upon what you like most, a cyber-criminal may try to interact with you for information. Suppose you like to play online games, an impersonator behaves like another child and invites you to talk to him and share information."

The booklet also explains various kinds of cyber-crimes like identity theft, job fraud, email spoofing and how children can overcome them.

It advises teenagers against accepting friend requests from unknown people on social media.

"As a thumb rule, only add people online whom you know offline, asking them never to share personal information like date of birth, address, phone number on social media and not install unwanted software or apps like dating app, online games from unknown sources," says the booklet.

NDTV:

You Might Also Read:

School Training On Child Abuse And Cyber Security

« Supply Chain Attacks Are On The Rise
Hackers Step Out Of The Shadows With Bigger, Bolder Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.