Experiment 1
Experiment 1
DATE:
OBJECTIVE
To create a comprehensive checklist that can be used to ensure all necessary steps are taken
when dealing with different cybercrime scenarios, including reporting cybercrime at a police
station, reporting online, using social media platforms securely, and ensuring secure net
banking.
PROCEDURE
a) Reporting Cybercrime at a Cybercrime Police Station
Checklist:
1. Gather Evidence:
Print screenshots of any malicious messages or emails.
Save copies of any relevant files or documents.
Record details of the incident (dates, times, and descriptions).
2. Identify the Relevant Cybercrime Police Station:
Find the nearest cybercrime police station.
Note down the contact details and address.
3. Prepare Personal Identification Documents:
Carry a government-issued ID (passport, driver's license, etc.).
Have any other relevant identification ready (proof of address, etc.).
4. Draft a Written Complaint:
Include all relevant details about the incident.
Clearly mention any financial losses or personal damages.
5. Visit the Cybercrime Police Station:
Submit the written complaint.
Provide all collected evidence.
Request a copy of the complaint for your records.
6. Follow Up:
Get the contact details of the officer handling your case.
Regularly check on the status of your complaint.
SCREEENSHOTS
SUSPICIOUS MESSAGE
COMPLAINT LETTER
b) Reporting Cybercrime Online
HOME PAGE
REGISTER A COMPLAINT
TERMS AND CONDITIONS
CITIZEN LOGIN
REPORT
TELEGRAM
d) Secure Net Banking
REGISTRATION
FORGET PASSWORD
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL
CONCLUSION
Following these checklists one can ensure that one is taking all necessary precautions and
steps when dealing with cybercrime scenarios, whether reporting to authorities or securing
one’s online activities.
EXPERIMENT: 2
DATE:
OBJECTIVE
To demonstrate the steps for reporting phishing emails, handling email phishing attacks, and
preventive measures, as well as the mechanisms for reporting and redressal of violations and
misuse of social media platforms.
PROCEDURE
a) Reporting Phishing Emails, Email Phishing Attacks, and Preventive Measures
[i]. Reporting Phishing Emails:
Steps:
1. Do Not Click on Links or Download Attachments:
Avoid interacting with any links or attachments in the suspected phishing email.
2. Verify the Sender:
Check the sender’s email address carefully for any discrepancies.
Contact the sender through a known and trusted communication channel if the
email appears to be from a legitimate contact.
3. Report the Email to Your Email Provider:
Most email providers have an option to report phishing. Look for options such as
“Report Phishing” or “Mark as Phishing” in the email interface.
4. Forward the Email to Anti-Phishing Organizations:
Forward the email to organizations such as the Anti-Phishing Working Group
(APWG) at reportphishing@apwg.org.
5. Notify Your IT Department:
If the phishing email is received on a work email, notify your IT department
immediately.
[ii]. Handling Email Phishing Attacks:
Steps:
1. Disconnect from the Internet:
If you clicked on a suspicious link, disconnect from the internet to prevent further
data transmission.
2. Run a Security Scan:
Use antivirus software to scan your device for any malware or malicious files.
3. Change Passwords:
Change passwords or any accounts that might have been compromised.
Use a different, strong password for each account.
4. Enable Two-Factor Authentication:
Activate 2FA on all accounts for additional security.
5. Monitor Accounts for Unusual Activity:
Keep an eye on your accounts for any unauthorized transactions or changes.
[iii]. Preventive Measures:
Steps:
1. Educate Yourself and Others:
Stay informed about the latest phishing techniques.
Conduct regular training sessions for employees in recognizing phishing emails.
2. Use Email Filters:
Enable spam filters to reduce the number of phishing emails that reach your inbox.
3. Verify Links and Attachments:
Hover over links to see the actual URL before clicking.
Do not open attachments from unknown sources.
4. Secure Your Accounts:
Use strong, unique passwords and enable 2FA on all accounts.
5. Regularly Update Software:
Keep your operating system, antivirus, and applications up-to-date to protect against
vulnerabilities.
b) Reporting and Redressal Mechanism for Violations and Misuse of Social Media
Platforms
[i]. Reporting Violations and Misuse on Social Media:
Steps:
1. Identify the Violation:
Recognize the type of violation, such as harassment, hate speech, misinformation, etc.,
2. Gather Evidence:
Take screenshots or record the offending content.
3. Report Directly on the Platform:
Use the platform’s reporting tools to report the content. Look for options such as
“Report Post” or “Report User”.
4. Provide Detailed Information:
When reporting, provide as much detail as possible to help the platform understand
the nature of the violation.
5. Follow Up:
Check the starts of your report regularly through the platform’s support system.
[ii]. Redressal Mechanism:
Steps:
1. Review the Platform’s Policies:
Understand the platform’s community guidelines and terms of service to know what
constitutes a violation.
2. Contact Support:
If the platform does not take action on your report, contact customer support the help
center for further assistance.
3. Seek Legal Advice:
If the issue persists or is severe, consider seeking legal advice on further actions you
can take.
4. Engage Law Enforcement:
For serious violations such as threats or harassment, report the incident to local law
enforcement.
5. Utilize Third-Party Services:
Use third-party services that specialize in online abuse and harassment for additional
support and resources.
SCREENSHOTS
b) Reporting and Redressal Mechanism for Violations and Misuse of Social Media
Platforms
CONCLUSION
By following the outlined procedures, individuals can effectively report phishing emails and
attacks, take preventive measures against phishing, and handle violations and misuse of social
media platforms. These steps help protect personal information and ensure a safer online
environment.
EXPERIMENT: 3
DATE:
OBJECTIVE
To provide a comprehensive guide on managing privacy and security settings for popular
social media platforms, mobile wallets, and Unified Payments Interface (UPI) to enhance user
protection.
PROCEDURE
a) Privacy and security setting for popular social media platform, Mobile Wallet and UPI.
b) Application permissions in mobile phone.
I. Social Media Platforms
[i]. Facebook
Steps:
1. Privacy Settings:
Go to Settings & Privacy > Settings > Privacy.
Adjust settings such as who can see your posts, who can send you friend requests,
and who can look you up using your email or phone number.
2. Security Settings:
Go to Settings & Privacy > Settings > Security & Login.
Enable two-factor authentication (2FA).
Set up alerts for unrecognized logins.
Review and manage devices where you’re logged in.
[ii]. Twitter
Steps:
1. Privacy Settings:
Go to Settings & Privacy > Privacy & Safety.
Adjust settings for tweets visibility, location information, and direct messages.
Protect your tweets so only approved followers can see them.
2. Security Settings:
Go to Settings & Privacy > Security & Account Access > Security.
Enable 2FA.
Review and manage connected apps and devices.
[iii]. Instagram
Steps:
1. Privacy Settings:
Go to Profile > Settings > Privacy.
Set your account to private.
Manage story, post, and activity visibility.
2. Security Settings:
Go to Profile > Settings > Security.
Enable 2FA.
Review login activity and manage devices.
SCREENSHOTS
a) Privacy and security setting for popular social media platform, Mobile Wallet and UPI
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL
CONCLUSION
By managing privacy and security settings effectively, users can enhance their protection on
social media platforms, mobile wallets, and UPI. Regularly reviewing and updating these
settings helps maintain a secure online presence and safeguard personal information.
EXPERIMENT: 4
DATE:
OBJECTIVE
To implement and enforce robust security measures through password management and two-
factor authentication, thereby protecting system and mobile access from unauthorized entry.
PROCEDURE
a) Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User).
[i]. BIOS
Steps:
1. Access BIOS Setup:
Restart your computer and enter BIOS setup by pressing the key (e.g., F2, Del, Esc)
specified during the boot process.
2. Locate Password Settings:
Navigate to the “Security” or “Password” tab in the BIOS menu.
3. Set BIOS Password:
Choose the option to set a “Supervisor” or “Admin” password (for BIOS access).
Enter the desired password and confirm it.
4. Save and Exit:
Save the changes and exit the BIOS setup.
[ii]. Administrator
Steps:
1. Access User Accounts:
Open Control Panel (or Settings) and navigate to “User Accounts” or “Accounts”.
2. Change Password:
Select the administrator account.
Click on Change Password or Create a Password.
Enter the current password (if any) and set a new password.
3. Save Changes:
Confirm the new password and save the changes.
[iii]. Standard User
Step:
1. Create or Manage Account:
Go to “User Accounts” in Control Panel or Settings.
2. Create Standard User Account:
If the standard user account does not exist, create one.
Select the standard user account and choose “Change Password or “Create a
Password”
Set the desired password and save the changes.
SCREENSHOTS
a) Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User).
BIOS
ADMINISTRATOR
b) Setting and configuring two factor authentication in the Mobile phone.
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL
CONCLUSION
Thus, the password policies for BIOS, administrator, and standard user accounts have been
successfully set and managed, along with the configuration of two-factor authentication on
the mobile phone, enhancing overall security and access control.
EXPERIMENT: 5
DATE:
OBJECTIVE
To ensure the security and integrity of systems and networks by maintaining up-to-date
security patches and managing Wi-Fi security settings on both computers and mobile devices,
thereby protecting against vulnerabilities and unauthorized access.
PROCEDURE
a) Security patch management and updates in computer and mobile.
[i]. Computer
Steps:
1. Windows Update (Windows OS):
Open Settings and go to “Update & Security”.
Click on “Check for updates”.
Install available updates and restart if necessary.
2. Software Updates:
For other software, open the program and check for updates in the help or settings.
Download and install updates as prompted.
[ii]. Mobile
Steps:
1. System Updates:
Go to your phone’s settings.
Navigate to “Software Update” or “System Update”.
Check for updates and install them.
2. App Updates:
Open the app store.
Go to the “Updates” section and update all apps.
2. Wi-Fi Settings:
On your phone, go to Wi-Fi settings and choose secure networks.
Forget any networks you no longer use.
SCREENSHOTS
a) Security patch management and updates in computer and mobile.
COMPUTER
MOBILE
b) Wi-Fi security management in computer and mobile.
COMPUTER
MOBILE
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL
CONCLUSION
Thus, security patch management and updates have been effectively demonstrated, along with
Wi-Fi security management, ensuring that both computers and mobile devices are protected
from vulnerabilities and unauthorized access.
EXPERIMENT: 6
DATE:
OBJECTIVE
To safeguard computers from malware, viruses, and unauthorized access by installing and
properly configuring anti-virus software and a host firewall, ensuring comprehensive
protection against digital threats
PROCEDURE
Install and configure computer Anti-virus & Computer Host Firewall.
[i]. Anti-virus
Steps:
1. Choose an Anti-virus Software:
Select a reputable anti-virus software (e.g., Norton, McAfee, Bitdefender).
2. Download and Install:
Download the software from the official website.
Run the installer and follow the prompts to complete the installation.
3. Initial Setup and Scan:
After installation, open the anti-virus software.
Update the virus definitions.
Perform a full system scan.
[ii]. Computer Host Firewall
Steps:
1. Windows Firewall:
Go to Control Panel > System and Security > Windows Defender Firewall.
Click on “Turn Windows Defender Firewall on or off”.
Ensure the firewall is enabled for both private and public networks.
2. Configuring Firewall Rules:
Go to “Advanced settings” to configure inbound and outbound rules.
Add or modify rules based on your security needs.
3. Third-Party Firewall:
If using third-party firewall software, follow the installation and configuration
instructions provided by the software.
SCREENSHOTS
Install and configure computer Anti-virus & Computer Host Firewall.
ANTI-VIRUS: SETUP
FIREWALL: CUSTOMIZATION
FIREWALL: CONFIGURING
CRITERIA MARK
Understanding of
Cybercrime Concepts
Presentation and
Organization
Time Management
and Use of Sources
TOTAL
CONCLUSION
Thus, the anti-virus software and host firewall have been successfully installed and
configured, providing enhanced protection against digital threats.
Overall Record Completion Status
Completed
Date of Completion
Faculty Signature