Indian Government To Provide Handbook On Cyber Safety To School Children

India’s Union Home Ministry has come out with a booklet on cyber safety for teenagers that tries to address their increased use of smartphones, gadgets, online gaming, social media and fake news.

The 38-page booklet, titled "A Handbook for Students on Cyber Safety", also deals with the problems of cyber bullying, cyber grooming and email fraud.

On incidents of lynching due to fake news, the booklet, published only in English, cautions: "Fake news and hoax messages spread like wildfire on social media (such as Twitter, Facebook, Instagram, Snapchat). It may create law and order problem and may end up causing loss of life in a few cases. Before forwarding or sharing any message on social media or messaging app, check it on other sources also to confirm its authenticity."

The Home Ministry last year set up a Cyber and Information Security division to check the rapid growth of cybercrimes and cyber threats. It now aims to introduce the cyber-crime handbook in schools as a component of the school curriculum.

According to the Indian Computer Response Team (CERT-In), over 53,000 cases of cyber security incidents were reported in 2017 in India, while 1,785 credit or debit cards frauds were recorded, causing a loss of Rs. 71.48 crore last year.

"Cyber grooming is growing as one of the major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with children through social media or messaging platforms with an objective of gaining their trust for sexually abusing and exploiting them... 

“More and more children invest time online to play games, make friends and share updates... Details shared on internet stay online forever as it is extremely difficult to delete the information completely," the booklet said.

On social engineering, the booklet says it is a technique used by cyber criminals to gain one's confidence to get information.

"Depending upon what you like most, a cyber-criminal may try to interact with you for information. Suppose you like to play online games, an impersonator behaves like another child and invites you to talk to him and share information."

The booklet also explains various kinds of cyber-crimes like identity theft, job fraud, email spoofing and how children can overcome them.

It advises teenagers against accepting friend requests from unknown people on social media.

"As a thumb rule, only add people online whom you know offline, asking them never to share personal information like date of birth, address, phone number on social media and not install unwanted software or apps like dating app, online games from unknown sources," says the booklet.

NDTV:

You Might Also Read:

School Training On Child Abuse And Cyber Security

« Supply Chain Attacks Are On The Rise
Hackers Step Out Of The Shadows With Bigger, Bolder Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Stellar Cyber

Stellar Cyber

Stellar Cyber makes Open XDR, the only comprehensive security platform providing maximum protection of applications and data wherever they reside.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

One82

One82

Serving emerging small and medium-sized businesses in California and neighboring regions for over 20 years, One82 has established itself as the most dependable provider of IT support services.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.