Indian Government To Provide Handbook On Cyber Safety To School Children

India’s Union Home Ministry has come out with a booklet on cyber safety for teenagers that tries to address their increased use of smartphones, gadgets, online gaming, social media and fake news.

The 38-page booklet, titled "A Handbook for Students on Cyber Safety", also deals with the problems of cyber bullying, cyber grooming and email fraud.

On incidents of lynching due to fake news, the booklet, published only in English, cautions: "Fake news and hoax messages spread like wildfire on social media (such as Twitter, Facebook, Instagram, Snapchat). It may create law and order problem and may end up causing loss of life in a few cases. Before forwarding or sharing any message on social media or messaging app, check it on other sources also to confirm its authenticity."

The Home Ministry last year set up a Cyber and Information Security division to check the rapid growth of cybercrimes and cyber threats. It now aims to introduce the cyber-crime handbook in schools as a component of the school curriculum.

According to the Indian Computer Response Team (CERT-In), over 53,000 cases of cyber security incidents were reported in 2017 in India, while 1,785 credit or debit cards frauds were recorded, causing a loss of Rs. 71.48 crore last year.

"Cyber grooming is growing as one of the major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with children through social media or messaging platforms with an objective of gaining their trust for sexually abusing and exploiting them... 

“More and more children invest time online to play games, make friends and share updates... Details shared on internet stay online forever as it is extremely difficult to delete the information completely," the booklet said.

On social engineering, the booklet says it is a technique used by cyber criminals to gain one's confidence to get information.

"Depending upon what you like most, a cyber-criminal may try to interact with you for information. Suppose you like to play online games, an impersonator behaves like another child and invites you to talk to him and share information."

The booklet also explains various kinds of cyber-crimes like identity theft, job fraud, email spoofing and how children can overcome them.

It advises teenagers against accepting friend requests from unknown people on social media.

"As a thumb rule, only add people online whom you know offline, asking them never to share personal information like date of birth, address, phone number on social media and not install unwanted software or apps like dating app, online games from unknown sources," says the booklet.

NDTV:

You Might Also Read:

School Training On Child Abuse And Cyber Security

« Supply Chain Attacks Are On The Rise
Hackers Step Out Of The Shadows With Bigger, Bolder Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.