Practical = 9 Aim :- Test browser security using the following tools and report your findings: Qualys Browser Check, Cloudflare ESNI Checker, Privacy Analyzer, Panopticlick , AmIUnique . Step = 1 :- Go to any Browser Step = 2 :- Type Privacy Analyzer Step = 3 :- Click on the first link Step = 4 :- Then you will reach at that page Step = 5 :- Start All this tests :1. Basic Info 2. Autofill Leak Test 3. User Account Tests 4. Browser Capability Test 5. Fingerprint analysis Step = 6 :- When finish all the tests then your Browser security Is finish. Practical = 10 Aim :- Test your email data breach which can be used for identity theft using following tools: 1. https://www.f-secure.com/en/home/free tools/identitytheft-checker 2. https://haveibeenpwned.com/ Step = 1 :- Click on this link. Step = 2 :- The website Will ask for your e-mail Which is use for test. Step = 3 :- Click on Check for Breaches (For the first link ) Step = 4 :- Click on pwned? ( For the second link ) Step = 5 :- Check if see this result then the e-mail is safe :- 0 BREACHES for E-mail. No report was sent. (For the first link ) Step = 6 :- Check if see this result then the e-mail is safe :- Good news — no pwnage found! No breached accounts and no pastes (subscribe to search sensitive breaches) (For the second link ) Practical = 12 Aim :- Secure your mobile device 1. Prevent installation of third-party applications. 2. Check permissions given to the installed application and evaluate whether the given permission is actually required by that application i.e., message application should not have permission to access camera 3. To prevent your device from connecting to poorly configured or insecure networks disable auto-connect in wifi settings. 4. Turn off location services, Bluetooth, wifi, mobile data as and when it is not required 5. Configure backup and restore data settings on your mobile device # Protect Mobile 1 . Do not install any third party applications 2 . step = 1 Go to your mobile setting step = 2 Search Permissions step = 3 Go to Permissions step = 4 Check the all permissions to given applications and modify it 3 . step = 1 Go to wi-fi on your mobile step = 2 Go to wi-fi assistant step = 3 Go to select the best network automatically step = 4 Turn off it 4 . Turn off all network communications When it’s Don’t need 5 . # take backup for all your data Link all your data with e-mail id And access at the any way any time Practical = 13 Aim :- Use Google password manager available at given link https://passwords.google.com/ to save, manage, protect and create strong passwords. # passwords.google.com Step = 1 Click on this link Step = 2 Then you will reach at that page Step = 3 Then you will see your all passwords Step = 4 Show all passwords and make it strong Practical = 14 Aim :- Demonstrate a phishing attack simulation with the GoPhish tool. Phishing Simulation with GoPhish GoPhish Gophish is an open-source attack simulation that allows pen testers or security organizations to generate real-world phishing attacks easily. Step = 1 :- Getting Started with GoPhish. Step = 2 :- Setup a GoPhish Virtual Machine. Step = 3 :- Install GoPhish. Step = 4 :- Setting up your Phishing Campaign. Step = 5 :- Configure the Sending Profile Step = 6 :- Create a User Group Step = 7:- Create a Landing Page Step = 8 :- Create an Email Template Step = 9 :- Create the Campaign And then result will be apper. On the GoPhish dashboard, we can see results in real-time, and track the progress of our campaign. Practical = 15 Aim :- Test website authenticity and possible phishing websites using VirusTotal, Google Transparency Report, URLVoid, or any other tools. Identify ways to report Fraudulent or Scam Websites. Method = 1 Step = 1 :- Open any web brouser. Step = 2 :- Type transparencyreport.google.com Step = 3 :- Type the website URL which Want to check. Step = 4 :- The status of website was apper in the brouser. Method = 2 Step = 1 :- Open any web brouser. Step = 2 :- Type urlvoid.com Step = 3 :- Type the website URL which Want to check. Step = 4 :- The status of website was apper in the brouser. Practical = 16 Aim :- Configure all privacy settings for social networks with which you have an account and review your entire profile. 1 :- Instagram Go to setting Go to privacy and security And check all privacy and security Setting Improve all more. 2 :- Facebook Go to setting Go to privacy and security And check all privacy and security Setting Improve all more. 3 :- Twitter Go to setting Go to privacy and security And check all privacy and security Setting Improve all more. Practical – 17 AIM :- Survey recent social media scams like lottery scams, job scams and prepare a report for the following: ● What is the attacker trying to gain? ● Who is being scammed? ● What are the consequences for the person being scammed? ● Why does the scam work successfully? ● What awareness is required which could avoid the scam? ( 1 ) What is the attacker trying to gain? Cyber attacks are designed to cause damage. They can have various objectives, including the following: Financial gain. Most cyber attacks today, especially those against commercial entities, are launched by cybercriminals for financial gain. These attacks often aim to steal sensitive data, such as customer credit card numbers or employee personal information, which the cybercriminals then use to access money or goods using the victims’ identities. Malicious attackers are increasingly targeting internet-connected systems and web applications that aren’t properly protected, particularly as more people work from home because of the COVID-19 pandemic. For example, nearly 60% of 520 security professionals surveyed in 2020 by threat intelligence vendor DomainTools said their organizations had seen a moderate to dramatic increase in attempted cyber attacks. Similarly, cybersecurity vendor CrowdStrike spotted about 41,000 network intrusion attempts at its threat-detection customers in the first half of 2020, versus 35,000 in all of 2019. ( 2 ) Who is being scammed ? Young people are falling victim to online scams at a higher rate than ever before, but older generations are losing the most money to them. That’s according to a report from fraud prevention firm SEON, which analyzed data collected in 2020 by the FBI’s SEON’s “Gen-Z Fraud Report” found that people younger than 20 had the biggest year-over-year increase in fraud reports between 2019 and 2020. The 23,186 young people who reported fraud represented an 116% increase from the previous year. Their collective losses totaled about $70.98 million, or about $3,000 per person, in 2020. ( 3 ) What are the consequences for the person being scammed? Fraud can have a devastating impact on these victims and increase the disadvantage, vulnerability and inequality they suffer. Fraud can also cause lasting mental and physical trauma for victims. Fraud also results in lost opportunities for individuals and businesses. ( 4 ) Why does the scam work successfully? To succeed a scammer exploits human vulnerabilities finding ideal targets by cycling through large groups of people. For every thousand emails sent out, the cybercriminal may get only a handful of responses, but only one or two replies is enough to translate to hundreds or thousands of dollars. ( 5 ) What awareness is required which could avoid the scam? Keep your passwords and pin numbers in a safe place. Be very careful about how much personal information you share on social media sites. Scammers can use your information and pictures to create a fake identity or to target you with a scam. Keep your mobile devices and computers secure. Practical – 18 AIM :- Study a government Cybercrime portal to prepare a report on cybercrime and its laws. What is cybercrime? Cybercrime is any criminal activity that involves a computer, network device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them. Others use computers or networks to spread malware, illegal information, images or other materials. Some cybercrimes do both – i.e., target computers to infect them with a computer virus, which is then spread to other machines and, sometimes, entire networks. A primary effect of cybercrime is financial. Cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment card information. Cyber crime laws in India : In terms of cybersecurity, there are five main types of laws that must be followed. Cyber laws are becoming increasingly important in countries such as India which have extremely extensive internet use. There are strict laws that govern the use of cyberspace and supervise the use of information, software, electronic commerce, and financial transactions in the digital environment. India’s cyber laws have helped to enable electronic commerce and electronic governance to flourish in India by safeguarding maximum connectivity and minimizing security concerns. This has also made digital media accessible in a wider range of applications and enhanced its scope and effectiveness. Information Technology Act, 2000 (IT Act) Overview of the Act :- The IT Act is prominent in the entire Indian legal framework, as it directs the whole investigation process for governing cyber crimes. Following are the appropriate sections: Section 43:This section of the IT Act applies to individuals who indulge in cyber crimes such as damaging the computers of the victim, without taking the due permission of the victim. In such a situation, if a computer is damaged without the owner’s consent, the owner is fully entitled to a refund for the complete damage. Section 66: Applies to any conduct described in Section 43 that is dishonest or fraudulent. There can be up to three years of imprisonment in such instances, or a fine of up to Rs. 5 lakh. Section 66B:- This section describes the penalties for fraudulently receiving stolen communication devices or computers, and confirms a possible three-year prison sentence. Depending on the severity, a fine of up to Rs. 1 lakh may also be imposed. Section 66C:- The focus of this section is digital signatures, password hacking, and other forms of identity theft. Thi section imposes imprisonment upto 3 years along with one lakh rupees as a fine. Section 66D:- This section involves cheating by personation using computer Resources. Punishment if found guilty can be imprisonment of up to three years and/or up-to Rs 1 lakh fine. Section 66E:Taking pictures of private areas, publishing or transmitting them without a person’s consent is punishable under this section. Penalties, if found guilty, can be imprisonment of up to three years and/or up-to Rs 2 lakh fine. Section 66F:Acts of cyber terrorism. An individual convicted of a crime can face imprisonment of up to life. An example: When a threat email was sent to the Bombay Stock Exchange and the National Stock Exchange, which challenged the security forces to prevent a terror attack planned on these institutions. The criminal was apprehended and charged under Section 66F of the IT Act. Section 67:- This involves electronically publishing obscenities. If convicted, the prison term is up to five years and the fine is up to Rs 10 lakh. Practical = 19 Aim :- Prepare a report on how to report cybercrime online Step = 1 :- Click on this link then you will reach At that page where ever cyber-crime report. Link :- File A Consumer Complaint Online in Consumer Court/Forum (onlinelegalindia.com) Step = 2 :- Scroll that page and then you will see File Consumer Complaint Online Step = 3 :- Fill ditails and press next button. Step = 4 :- Click On the Submit Button. And then your report is reached the Cyber Crime Office. Practical = 20 Aim :- Prepare a report on online acceptable behavior against unethical behavior. For the unethical behavior Report you must have this thing :- 1. Investigate the unethical behaviour 2. Compile proof 3. File a claim with HR 4. Fill out the reports 5. Keep it to yourself If you have this things then report online. If you have not this things then collect this things , And report after collect.