We are dedicated to providing students with a comprehensive guide to the world of cyber security. Our website is designed to be a one-stop-shop for all your cyber security needs.
We have carefully curated a collection of 30+ cyber security tools, each of which is written in Python and JavaScript and utilizes socket programming and networking. Our tools cover a wide range of topics, from text encryption-decryption to keylogging, image steganography, reverse shells, and even a Cyber Attack-Impact Assessment tool.
As a department, we believe that cyber security is an essential component of modern-day life, and we want to help you protect yourself and your data from the increasing threat of cyber attacks. Whether you are a beginner or an experienced cyber security professional, our website has something for everyone.
This website is the result of a major project led by Mohd Ibrahim Saleem and his team members Rishka Bajaj, Saad Ahmed, and Kashish Parmar. They have contributed their skills and knowledge to the college's Cybersecurity department to help improve its offerings.
So take a look around, explore our tools, and learn more about the world of cyber security. We hope that our website will help you better understand the importance of cyber security and equip you with the knowledge and tools you need to stay safe in today's digital world.
A matter of concern !
Technological advances are changing the world in ways that could not have been imagined. The emergence of advanced digital innovations are providing new opportunities to connect and learn, and have begun influencing every aspect of human life. Children and young people have shown greater ability to adapt and adopt digital devices and innovations, which augurs well for the future. They use the devices and apps for a variety of functions, including self-expression, communication, networking, research, entertainment, and much more. The internet has enabled children to become active social agents and to mobilise for social, ecological and other causes. They are increasingly able to project their voices with unprecedented reach. However, an assumption is often made that young people have superior skills with digital technology, which surpass those of their parents and teachers. It may or may not be right. Many young people are confident in using a wide range of technologies and often turn to the internet for information. They seem able to learn to operate unfamiliar hardware or software very quickly and may take on the role of teaching adults how to use computers and the internet. But the confidence with digital technology can also be misleading. Many of them frequently struggle when applying them to research tasks. They can find it difficult to work out whether information on an unfamiliar website is trustworthy, and rely on their chosen search engine’s rankings for their selection of material. They may not understand how search terms work or of the powerful commercial forces that can result in a particular company being top of the search engine’s list. They may not be aware of the lurking risks and threats and the fact that some of their actions can invite them trouble. Furthermore, the digital skills and knowledge are not evenly spread amongst all young people. Dearth of research on the subject has prevented a nuanced analysis of who are most likely to lag behind in the opportunities afforded by technological advances. However, there is general agreement among those working on cyber safety and security among children and young people that gender is a major impediment. Social norms have impeded girls’ access to opportunities, including the access and use of digital devices and the internet. Many of them belonging to socially or economically marginalised families in rural, semi-urban and urban areas have either no access, or limited, or supervised access to digital technologies, which could enable them to exercise their agency, autonomy and rights in an increasingly interconnected world. The exploration of new vistas and acquisition of rich experiences online require a strong element of caution. After all, every light has its shadow. The technologies can be misused or overused in ways that are detrimental to the users and even non-users. UNICEF in its Child Online Protection in India report in 2016 had presented the following typology of risks and threats.
What is Digital Security ?
Different kinds of Threats
Viruses on digital devices are malicious programme codes that can corrupt the system and destroy the data within the computer
Malware is a type of malicious software designed to gain unauthorized access or to cause damage to a computer without the knowledge of the owner, stealing and even deleting sensitive data, altering or hijacking computer functions to monitor users’ computer activity
Ransomware is a type of malicious software designed to extort money from the user. The attacker locks the victim’s computer system files or blocks access to files or the computer system typically through encryption until the ransom is paid. Paying the ransom is no guarantee that the files will be recovered or the system will be restored.
A hacker is someone who will gain entry into a computer
without permission, with the intention to use or
exploit
technology to cause harm, steal or destroy the data
contained in it.
Usually hackers are well versed with computer technologies by using various applications or programmes that penetrate the defence mechanism employed by the target computer and send back the sensitive information like usernames, passwords, IP addresses and using them to gain access into the computer itself. These applications or programmes can be in the form of Trojans, worms, malware and viruses, which will install in the system and compromise its security. After all, if the hacker can gain administrative rights, they’re free to do anything with the data contained in the compromised computer system. Several public locations like shopping malls and airports among others offer their customers free access to public Wi-Fi. But public Wi-Fi networks also enable cyber criminals to spy on unwary customers, take advantage of this convenience and intercept their data. They can access sensitive information of users’ banking credentials, account passwords and other valuable information.
Preventing And Countering Threats
And Risks
Web browsers, plugins (Java and Adobe Products) and even Office Suites. It is the most common way hackers and malware try to gain access to devices and your information
Privacy settings on social media platforms enable you to select who can access your posts online. Try to restrict access of your profile to your friends only. Remember what you post online remains there almost forever.
Treat all Wi-Fi links with suspicion. Public Wi-Fi is inherently insecure — so be cautious. The Wi-Fi link could also be a bogus link set up by a cybercriminal trying to capture valuable, personal information from unsuspecting users. Don’t connect to an unknown or unrecognised wireless access point. Try to use known Wi-Fi links, which are password protected.
Use your mobile phone to create VPN If you need to access any websites that store or require the input of any sensitive information consider accessing them via your mobile phone network, instead of the public Wi-Fi connection.
Avoid logging into websites where there’s a chance that your identity, passwords or personal information may be compromised — for example, online banking services or any websites that store your credit card information.
These devices can sometimes be hacked and used to take pictures or videos of you without your consent. Put a sticker over your webcam, laptop camera, or phone camera when they are not in use.
Do's and Dont's
Strong, unique but easy to remember, and private passwords are essential for dealing with unauthorised access to online accounts. The passwords, when shared with other person(s), can be misused. They may be stolen by unauthorized users to collect and misuse your personal information. Learn how to create strong passwords and passphrases. A password must be difficult to guess. But you should be able to remember it. Writing passwords somewhere is not advisable. Memorise it. Your password is given to you to maintain your privacy. Go for an extra layer of security by opting for two-factor authentication (2FA), also known as two-step verification or dual factor authentication. This security process requires the user to provide two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access. Log out of your account when you plan to be inactive even for a short while. Always keep your system locked whenever it is not in use.
Most email providers offer filtering services.
The use of Rich Text Format instead of the standard .DOC
format will retain the formatting but not any macros. This
may prevent you from sending virus to others if you are
already infected by it.
• Update anti-virus software regularly.
• Adjust the settings in the web-browser. It may limit some
functionality but can provide the best protection from
malicious content.
• Enable email accounts for multi-factor authentication. Email
is the gateway to almost every other account a user may
have. When someone loses or forgets an account password,
the reset is sent to his or her email.
• Gauge the credibility of the website by checking the URL,
lock.
• Look out for warning signals given by web browsers about
exposure to a malicious website or content. Such warnings
can protect the user from malware, phishing and identity
theft. These warnings given by most of the commonly used
browsers like Chrome, Internet Explorer, etc. Remember to
update your browsers regularly to avoid missing out on such
updates.
• Exercise caution while giving details about personal
information when registering for access to email accounts,
social networks and chat rooms, and free game downloads.
What you write is clearly your prerogative. But do remember that any production, consumption and distribution of content which involves other person's defamation is illegal.
Digital literacy is the ability to use digital technology safely while staying within the bounds of social responsibility. It allows students, who are increasingly getting access to digital devices and the internet, to learn how to minimise risks and maximise benefits that come with using digital technologies.
Digital security is the collective term that describes the resources employed to protect your online identity, data, and other assets. These tools include web services, antivirus software, smartphone SIM cards, biometrics, and secured personal devices.
Digital law can be defined as the legal rights and restrictions governing technology use. Most users are unaware of the possible consequences of their online activities thereby need to be made aware of the rules and legal implications of using the internet.