Indian Government To Provide Handbook On Cyber Safety To School Children

India’s Union Home Ministry has come out with a booklet on cyber safety for teenagers that tries to address their increased use of smartphones, gadgets, online gaming, social media and fake news.

The 38-page booklet, titled "A Handbook for Students on Cyber Safety", also deals with the problems of cyber bullying, cyber grooming and email fraud.

On incidents of lynching due to fake news, the booklet, published only in English, cautions: "Fake news and hoax messages spread like wildfire on social media (such as Twitter, Facebook, Instagram, Snapchat). It may create law and order problem and may end up causing loss of life in a few cases. Before forwarding or sharing any message on social media or messaging app, check it on other sources also to confirm its authenticity."

The Home Ministry last year set up a Cyber and Information Security division to check the rapid growth of cybercrimes and cyber threats. It now aims to introduce the cyber-crime handbook in schools as a component of the school curriculum.

According to the Indian Computer Response Team (CERT-In), over 53,000 cases of cyber security incidents were reported in 2017 in India, while 1,785 credit or debit cards frauds were recorded, causing a loss of Rs. 71.48 crore last year.

"Cyber grooming is growing as one of the major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with children through social media or messaging platforms with an objective of gaining their trust for sexually abusing and exploiting them... 

“More and more children invest time online to play games, make friends and share updates... Details shared on internet stay online forever as it is extremely difficult to delete the information completely," the booklet said.

On social engineering, the booklet says it is a technique used by cyber criminals to gain one's confidence to get information.

"Depending upon what you like most, a cyber-criminal may try to interact with you for information. Suppose you like to play online games, an impersonator behaves like another child and invites you to talk to him and share information."

The booklet also explains various kinds of cyber-crimes like identity theft, job fraud, email spoofing and how children can overcome them.

It advises teenagers against accepting friend requests from unknown people on social media.

"As a thumb rule, only add people online whom you know offline, asking them never to share personal information like date of birth, address, phone number on social media and not install unwanted software or apps like dating app, online games from unknown sources," says the booklet.

NDTV:

You Might Also Read:

School Training On Child Abuse And Cyber Security

« Supply Chain Attacks Are On The Rise
Hackers Step Out Of The Shadows With Bigger, Bolder Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies