Indian Government To Provide Handbook On Cyber Safety To School Children

India’s Union Home Ministry has come out with a booklet on cyber safety for teenagers that tries to address their increased use of smartphones, gadgets, online gaming, social media and fake news.

The 38-page booklet, titled "A Handbook for Students on Cyber Safety", also deals with the problems of cyber bullying, cyber grooming and email fraud.

On incidents of lynching due to fake news, the booklet, published only in English, cautions: "Fake news and hoax messages spread like wildfire on social media (such as Twitter, Facebook, Instagram, Snapchat). It may create law and order problem and may end up causing loss of life in a few cases. Before forwarding or sharing any message on social media or messaging app, check it on other sources also to confirm its authenticity."

The Home Ministry last year set up a Cyber and Information Security division to check the rapid growth of cybercrimes and cyber threats. It now aims to introduce the cyber-crime handbook in schools as a component of the school curriculum.

According to the Indian Computer Response Team (CERT-In), over 53,000 cases of cyber security incidents were reported in 2017 in India, while 1,785 credit or debit cards frauds were recorded, causing a loss of Rs. 71.48 crore last year.

"Cyber grooming is growing as one of the major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with children through social media or messaging platforms with an objective of gaining their trust for sexually abusing and exploiting them... 

“More and more children invest time online to play games, make friends and share updates... Details shared on internet stay online forever as it is extremely difficult to delete the information completely," the booklet said.

On social engineering, the booklet says it is a technique used by cyber criminals to gain one's confidence to get information.

"Depending upon what you like most, a cyber-criminal may try to interact with you for information. Suppose you like to play online games, an impersonator behaves like another child and invites you to talk to him and share information."

The booklet also explains various kinds of cyber-crimes like identity theft, job fraud, email spoofing and how children can overcome them.

It advises teenagers against accepting friend requests from unknown people on social media.

"As a thumb rule, only add people online whom you know offline, asking them never to share personal information like date of birth, address, phone number on social media and not install unwanted software or apps like dating app, online games from unknown sources," says the booklet.

NDTV:

You Might Also Read:

School Training On Child Abuse And Cyber Security

« Supply Chain Attacks Are On The Rise
Hackers Step Out Of The Shadows With Bigger, Bolder Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.