0% found this document useful (0 votes)
4 views43 pages

Experiment 1

Uploaded by

richardchild40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views43 pages

Experiment 1

Uploaded by

richardchild40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 43

EXPERIMENT: 1

DATE:

OBJECTIVE
To create a comprehensive checklist that can be used to ensure all necessary steps are taken
when dealing with different cybercrime scenarios, including reporting cybercrime at a police
station, reporting online, using social media platforms securely, and ensuring secure net
banking.

PROCEDURE
a) Reporting Cybercrime at a Cybercrime Police Station
Checklist:
1. Gather Evidence:
 Print screenshots of any malicious messages or emails.
 Save copies of any relevant files or documents.
 Record details of the incident (dates, times, and descriptions).
2. Identify the Relevant Cybercrime Police Station:
 Find the nearest cybercrime police station.
 Note down the contact details and address.
3. Prepare Personal Identification Documents:
 Carry a government-issued ID (passport, driver's license, etc.).
 Have any other relevant identification ready (proof of address, etc.).
4. Draft a Written Complaint:
 Include all relevant details about the incident.
 Clearly mention any financial losses or personal damages.
5. Visit the Cybercrime Police Station:
 Submit the written complaint.
 Provide all collected evidence.
 Request a copy of the complaint for your records.
6. Follow Up:
 Get the contact details of the officer handling your case.
 Regularly check on the status of your complaint.

b) Reporting Cybercrime Online


Checklist:
1. Gather Evidence:
 Collect screenshots of the malicious activity.
 Save any relevant emails or messages.
 Record important details (date, time, and description).
2. Visit the Official Cybercrime Reporting Portal:
 Go to the designated website for reporting cybercrimes.
 Ensure the site is legitimate and secure.
3. Fill Out the Online Complaint Form:
 Enter all required personal information accurately.
 Provide detailed information about the cybercrime incident.
4. Upload Evidence:
 Attach all relevant screenshots and documents.
 Ensure files are in the accepted formats.
5. Submit the Complaint:
 Review all entered information for accuracy.
 Submit the complaint and note down the reference number.
6. Follow Up:
 Monitor email for updates or further instructions.
 Use the reference number to track the status of the complaint.

c) Using Popular Social Media Platforms Securely


Checklist:
1. Enable Two-Factor Authentication:
 Activate 2FA on all social media accounts.
 Use an authenticator app or SMS for added security.
2. Review Privacy Settings:
 Set profiles to private.
 Control who can see your posts and personal information.
3. Use Strong Passwords:
 Create unique, complex passwords for each account.
 Use a password manager to keep track.
4. Be Wary of Suspicious Links and Messages:
 Do not click on unknown links.
 Report any suspicious messages or accounts.
5. Regularly Monitor Account Activity:
 Check for unfamiliar logins or changes.
 Update security settings regularly.
6. Educate Yourself on Phishing Scams:
 Learn how to identify phishing attempts.
 Never share personal information with unverified sources.

d) Secure Net Banking


Checklist:
1. Use Strong and Unique Passwords:
 Set a strong password for your banking account.
 Change passwords regularly.
2. Enable Two-Factor Authentication:
 Activate 2FA for an additional security layer.
 Use an authenticator app or SMS.
3. Keep Your Computer and Mobile Secure:
 Install and update antivirus software.
 Regularly update operating systems and apps.
4. Avoid Public Wi-Fi for Banking Transactions:
 Use a secure, private network for all banking activities.
 Consider using a VPN for added security.
5. Monitor Your Account Regularly:
 Check for any unauthorized transactions.
 Set up alerts for unusual account activity.
6. Log Out After Every Session:
 Always log out after completing transactions.
 Avoid saving passwords on shared devices.
7. Be Aware of Phishing Scams:
 Verify emails and messages claiming to be from your bank.
 Never share personal banking details through email or text.

SCREEENSHOTS

a) Reporting Cybercrime at a Cybercrime Police Station

SUSPICIOUS MESSAGE
COMPLAINT LETTER
b) Reporting Cybercrime Online

HOME PAGE

REGISTER A COMPLAINT
TERMS AND CONDITIONS

CITIZEN LOGIN
REPORT

c) Using Popular Social Media Platforms Securely

TELEGRAM
d) Secure Net Banking

TERMS AND CONDITIONS

REGISTRATION
FORGET PASSWORD
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL

CONCLUSION
Following these checklists one can ensure that one is taking all necessary precautions and
steps when dealing with cybercrime scenarios, whether reporting to authorities or securing
one’s online activities.
EXPERIMENT: 2

DATE:

OBJECTIVE
To demonstrate the steps for reporting phishing emails, handling email phishing attacks, and
preventive measures, as well as the mechanisms for reporting and redressal of violations and
misuse of social media platforms.

PROCEDURE
a) Reporting Phishing Emails, Email Phishing Attacks, and Preventive Measures
[i]. Reporting Phishing Emails:
Steps:
1. Do Not Click on Links or Download Attachments:
 Avoid interacting with any links or attachments in the suspected phishing email.
2. Verify the Sender:
 Check the sender’s email address carefully for any discrepancies.
 Contact the sender through a known and trusted communication channel if the
email appears to be from a legitimate contact.
3. Report the Email to Your Email Provider:
 Most email providers have an option to report phishing. Look for options such as
“Report Phishing” or “Mark as Phishing” in the email interface.
4. Forward the Email to Anti-Phishing Organizations:
 Forward the email to organizations such as the Anti-Phishing Working Group
(APWG) at reportphishing@apwg.org.
5. Notify Your IT Department:
 If the phishing email is received on a work email, notify your IT department
immediately.
[ii]. Handling Email Phishing Attacks:
Steps:
1. Disconnect from the Internet:
 If you clicked on a suspicious link, disconnect from the internet to prevent further
data transmission.
2. Run a Security Scan:
 Use antivirus software to scan your device for any malware or malicious files.
3. Change Passwords:
 Change passwords or any accounts that might have been compromised.
 Use a different, strong password for each account.
4. Enable Two-Factor Authentication:
 Activate 2FA on all accounts for additional security.
5. Monitor Accounts for Unusual Activity:
 Keep an eye on your accounts for any unauthorized transactions or changes.
[iii]. Preventive Measures:
Steps:
1. Educate Yourself and Others:
 Stay informed about the latest phishing techniques.
 Conduct regular training sessions for employees in recognizing phishing emails.
2. Use Email Filters:
 Enable spam filters to reduce the number of phishing emails that reach your inbox.
3. Verify Links and Attachments:
 Hover over links to see the actual URL before clicking.
 Do not open attachments from unknown sources.
4. Secure Your Accounts:
 Use strong, unique passwords and enable 2FA on all accounts.
5. Regularly Update Software:
 Keep your operating system, antivirus, and applications up-to-date to protect against
vulnerabilities.

b) Reporting and Redressal Mechanism for Violations and Misuse of Social Media
Platforms
[i]. Reporting Violations and Misuse on Social Media:
Steps:
1. Identify the Violation:
 Recognize the type of violation, such as harassment, hate speech, misinformation, etc.,
2. Gather Evidence:
 Take screenshots or record the offending content.
3. Report Directly on the Platform:
 Use the platform’s reporting tools to report the content. Look for options such as
“Report Post” or “Report User”.
4. Provide Detailed Information:
 When reporting, provide as much detail as possible to help the platform understand
the nature of the violation.
5. Follow Up:
 Check the starts of your report regularly through the platform’s support system.
[ii]. Redressal Mechanism:
Steps:
1. Review the Platform’s Policies:
 Understand the platform’s community guidelines and terms of service to know what
constitutes a violation.
2. Contact Support:
 If the platform does not take action on your report, contact customer support the help
center for further assistance.
3. Seek Legal Advice:
 If the issue persists or is severe, consider seeking legal advice on further actions you
can take.
4. Engage Law Enforcement:
 For serious violations such as threats or harassment, report the incident to local law
enforcement.
5. Utilize Third-Party Services:
 Use third-party services that specialize in online abuse and harassment for additional
support and resources.

SCREENSHOTS

a) Reporting Phishing Emails, Email Phishing Attacks, and Preventive Measures

REPORTING PHISHING EMAILS

EMAILS PHISHING ATTACKS


PREVENTIVE MEASURES

b) Reporting and Redressal Mechanism for Violations and Misuse of Social Media
Platforms

REPORTING VIOLATIONS AND MISUSE ON SOCIAL MEDIA


CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL

CONCLUSION
By following the outlined procedures, individuals can effectively report phishing emails and
attacks, take preventive measures against phishing, and handle violations and misuse of social
media platforms. These steps help protect personal information and ensure a safer online
environment.
EXPERIMENT: 3
DATE:

OBJECTIVE
To provide a comprehensive guide on managing privacy and security settings for popular
social media platforms, mobile wallets, and Unified Payments Interface (UPI) to enhance user
protection.

PROCEDURE
a) Privacy and security setting for popular social media platform, Mobile Wallet and UPI.
b) Application permissions in mobile phone.
I. Social Media Platforms
[i]. Facebook
Steps:
1. Privacy Settings:
 Go to Settings & Privacy > Settings > Privacy.
 Adjust settings such as who can see your posts, who can send you friend requests,
and who can look you up using your email or phone number.
2. Security Settings:
 Go to Settings & Privacy > Settings > Security & Login.
 Enable two-factor authentication (2FA).
 Set up alerts for unrecognized logins.
 Review and manage devices where you’re logged in.
[ii]. Twitter
Steps:
1. Privacy Settings:
 Go to Settings & Privacy > Privacy & Safety.
 Adjust settings for tweets visibility, location information, and direct messages.
 Protect your tweets so only approved followers can see them.
2. Security Settings:
 Go to Settings & Privacy > Security & Account Access > Security.
 Enable 2FA.
 Review and manage connected apps and devices.
[iii]. Instagram
Steps:
1. Privacy Settings:
 Go to Profile > Settings > Privacy.
 Set your account to private.
 Manage story, post, and activity visibility.
2. Security Settings:
 Go to Profile > Settings > Security.
 Enable 2FA.
 Review login activity and manage devices.

II. Mobile Wallets


[i]. PayPal
Steps:
1. Privacy Settings:
 Go to Settings > Privacy.
 Manage who can see your profile information and transactions.
2. Security Settings:
 Go to Settings > Security.
 Enable 2FA.
 Set up security questions for account recovery.
 Monitor and manage authorized devices and sessions.
[ii]. Google Wallet
Steps:
1. Privacy Settings:
 Go to Settings > Privacy & Security.
 Control who can see your activity and transactions.
2. Security Settings:
 Go to Settings > Security.
 Enable screen lock for the app.
 Set up and enable 2FA.
 Monitor and manage connected accounts and devices.
[iii]. Apple Pay
Steps:
1. Privacy Settings:
 Apple Pay is designed with privacy in mind so ensure your device settings align
with your privacy preferences.
2. Security Settings:
 Ensure your device has a passcode or biometric security enabled.
 Enable 2FA for your Apple ID.
 Monitor transaction history and report any suspicious activity.

III. Unified Payments Interface (UPI)


[i]. BHIM UPI
Steps:
1. Privacy Settings:
 Ensure that your UPI ID and transaction details are not shared publicly.
2. Security Settings:
 Enable app lock and set a strong PIN.
 Regularly update your UPI PIN and do not share it with anyone.
 Monitor transaction history and report any suspicious activity immediately.
[ii]. Google Pay:
Steps:
1. Privacy Settings:
 Go to Settings > Privacy & Security.
 Manage who can see your UPI transactions.
2. Security Settings:
 Go to Settings > Security.
 Enable screen lock for the app.
 Set up and enable 2FA.
 Monitor and manage connected bank accounts and devices.
[iii]. PhonePe
Steps:
1. Privacy Settings:
 Go to Settings > Privacy.
 Control who can see your transactions and profile information.
2. Security Settings:
 Go to Settings > Security.
 Enable app lock and set a strong UPI PIN.
 Regularly update your UPI PIN and do not share it with anyone.
 Monitor transaction history and report any suspicious activity immediately.

SCREENSHOTS
a) Privacy and security setting for popular social media platform, Mobile Wallet and UPI

SOCIAL MEDIA PLATFORM: TELEGRAM

MOBILE WALLET: AIRTEL


UPI: GOOGLE PAY
b) Application permissions in mobile phone.

CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL

CONCLUSION
By managing privacy and security settings effectively, users can enhance their protection on
social media platforms, mobile wallets, and UPI. Regularly reviewing and updating these
settings helps maintain a secure online presence and safeguard personal information.
EXPERIMENT: 4
DATE:

OBJECTIVE
To implement and enforce robust security measures through password management and two-
factor authentication, thereby protecting system and mobile access from unauthorized entry.

PROCEDURE
a) Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User).
[i]. BIOS
Steps:
1. Access BIOS Setup:
 Restart your computer and enter BIOS setup by pressing the key (e.g., F2, Del, Esc)
specified during the boot process.
2. Locate Password Settings:
 Navigate to the “Security” or “Password” tab in the BIOS menu.
3. Set BIOS Password:
 Choose the option to set a “Supervisor” or “Admin” password (for BIOS access).
 Enter the desired password and confirm it.
4. Save and Exit:
 Save the changes and exit the BIOS setup.

[ii]. Administrator
Steps:
1. Access User Accounts:
 Open Control Panel (or Settings) and navigate to “User Accounts” or “Accounts”.
2. Change Password:
 Select the administrator account.
 Click on Change Password or Create a Password.
 Enter the current password (if any) and set a new password.
3. Save Changes:
 Confirm the new password and save the changes.
[iii]. Standard User
Step:
1. Create or Manage Account:
 Go to “User Accounts” in Control Panel or Settings.
2. Create Standard User Account:
 If the standard user account does not exist, create one.
 Select the standard user account and choose “Change Password or “Create a
Password”
 Set the desired password and save the changes.

b) Setting and configuring two factor authentication in the Mobile phone.


Steps:
1. Choose a 2FA Method:
 Decide whether to use SMS, email, or an authenticator app (e.g., Google
Authenticator, Authy).
2. Install Authenticator App (if applicable):
 Download and install a chosen authenticator app from your app store.
3. Enable 2FA for Accounts:
 Go to the security settings of the account you want to protect (e.g., Google,
Facebook, etc.,).
 Find the 2FA or Two-Step Verification section.
4. Set Up 2FA:
 Follow the prompts to link your phone number or set up the authenticator app.
 For apps, scan the QR code provided or enter the setup key manually.
5. Verification:
 Enter the code sent via SMS or generated by the authenticator app to verify and
complete the setup.

SCREENSHOTS
a) Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User).
BIOS

ADMINISTRATOR
b) Setting and configuring two factor authentication in the Mobile phone.
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL

CONCLUSION
Thus, the password policies for BIOS, administrator, and standard user accounts have been
successfully set and managed, along with the configuration of two-factor authentication on
the mobile phone, enhancing overall security and access control.
EXPERIMENT: 5
DATE:

OBJECTIVE
To ensure the security and integrity of systems and networks by maintaining up-to-date
security patches and managing Wi-Fi security settings on both computers and mobile devices,
thereby protecting against vulnerabilities and unauthorized access.

PROCEDURE
a) Security patch management and updates in computer and mobile.
[i]. Computer
Steps:
1. Windows Update (Windows OS):
 Open Settings and go to “Update & Security”.
 Click on “Check for updates”.
 Install available updates and restart if necessary.
2. Software Updates:
 For other software, open the program and check for updates in the help or settings.
 Download and install updates as prompted.
[ii]. Mobile
Steps:
1. System Updates:
 Go to your phone’s settings.
 Navigate to “Software Update” or “System Update”.
 Check for updates and install them.
2. App Updates:
 Open the app store.
 Go to the “Updates” section and update all apps.

b) Wi-Fi security management in computer and mobile.


[i]. Computer
Steps:
1. Secure Wi-Fi Connection:
 Ensure the Wi-Fi network uses WPA3 (preferred) or WPA2 encryption.
 Use a strong password for the Wi-Fi network.
2. Network Settings:
 Access router settings via a web browser (usually by typing the router’s IP address).
 Change default admin username and password.
 Disable WPS (Wi-Fi Protected Setup) if not needed.
 Update router firmware regularly.
[ii]. Mobile
Steps:
1. Connect to Secure Networks:
 Avoid connecting to open or unsecured networks.
 Use a VPN when connecting to public Wi-Fi.

2. Wi-Fi Settings:
 On your phone, go to Wi-Fi settings and choose secure networks.
 Forget any networks you no longer use.

SCREENSHOTS
a) Security patch management and updates in computer and mobile.
COMPUTER

MOBILE
b) Wi-Fi security management in computer and mobile.
COMPUTER

MOBILE
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL

CONCLUSION
Thus, security patch management and updates have been effectively demonstrated, along with
Wi-Fi security management, ensuring that both computers and mobile devices are protected
from vulnerabilities and unauthorized access.
EXPERIMENT: 6
DATE:

OBJECTIVE
To safeguard computers from malware, viruses, and unauthorized access by installing and
properly configuring anti-virus software and a host firewall, ensuring comprehensive
protection against digital threats

PROCEDURE
Install and configure computer Anti-virus & Computer Host Firewall.
[i]. Anti-virus
Steps:
1. Choose an Anti-virus Software:
 Select a reputable anti-virus software (e.g., Norton, McAfee, Bitdefender).
2. Download and Install:
 Download the software from the official website.
 Run the installer and follow the prompts to complete the installation.
3. Initial Setup and Scan:
 After installation, open the anti-virus software.
 Update the virus definitions.
 Perform a full system scan.
[ii]. Computer Host Firewall
Steps:
1. Windows Firewall:
 Go to Control Panel > System and Security > Windows Defender Firewall.
 Click on “Turn Windows Defender Firewall on or off”.
 Ensure the firewall is enabled for both private and public networks.
2. Configuring Firewall Rules:
 Go to “Advanced settings” to configure inbound and outbound rules.
 Add or modify rules based on your security needs.
3. Third-Party Firewall:
 If using third-party firewall software, follow the installation and configuration
instructions provided by the software.

SCREENSHOTS
Install and configure computer Anti-virus & Computer Host Firewall.
ANTI-VIRUS: SETUP

ANTI-VIRUS: QUICK SCAN

FIREWALL: CUSTOMIZATION
FIREWALL: CONFIGURING
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL

CONCLUSION
Thus, the anti-virus software and host firewall have been successfully installed and
configured, providing enhanced protection against digital threats.
Overall Record Completion Status

Completed

Date of Completion

Faculty Signature

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy