Machine Translated by Google MAIN ASPECTS OF CYBER CRIME PREVENTION Rules that will help you avoid becoming a victim of cybercrime http:// apr.gov.by/news/relevant/130471.html Tests on cyberbullying https://www.mts.by/unicef/testing/ Test Assess your risk of becoming a victim of a cyber fraudster https://madte.st/wwbDI6Hz Leaflets https://www.mvd.gov.by/ru/media/photo/326 https://www.belta.by/infographica/view/kiberprestupnost-v-belarusi-24963/ The presentation was prepared by Elena Alikovna, methodologist of the department of information technologies in education of the educational institution "MGOIRO" Machine Translated by Google Cybercrime is a criminal activity whose purpose is is the unauthorized use of a computer, computer network, or network device. Most cybercrimes are committed by cybercriminals or hackers who make money from it. Cybercriminal activities are carried out by individuals or organizations. Machine Translated by Google CYBER SECURITY Cybersecurity is the process of using security measures to ensure privacy, integrity and availability of data. The goal of cybersecurity is data protection. Fighting cybercrime (belta.by) Machine Translated by Google Information security is the preservation and protection of information, as well as its most important elements, including systems and equipment designed to use, store and transmit this information. Machine Translated by Google In the Criminal Code of the Republic of Belarus contains a number of articles providing for criminal liability for cybercrimes: •Article 212 “Theft through the use of computer equipment”; •Article 349 “Unauthorized access to computer information”; •Article 350 “Modification of computer information”; •Article 351 “Computer sabotage”; •Article 352 “Illegal acquisition of computer information”; •Article 353 “Manufacture or sale of special means for gaining unauthorized access to a computer system or network”; •Article 354 “Development, use or distribution of malicious programs”; •Article 355 “Violation of the rules for operating a computer system or network” Machine Translated by Google Types of Cyber Crimes • Email and Internet fraud • Identity fraud (theft and misuse of personal information) information) • Theft of financial or bank card data • Theft and sale of corporate data • Cyber blackmail (demanding money to prevent a cyber attack) • Ransomware attacks (a type of cyber blackmail) • Cryptojacking (mining cryptocurrency using other people’s resources without their knowledge owners) • Cyber espionage (unauthorized access to data of government or commercial organizations) Machine Translated by Google Types of Internet fraud: ÿ ÿ Account Hacking (Email Fraud and Internet Fraud) ÿ Phishing (Vishing) (Identity Fraud (theft and malicious use of personal information)) ÿ Cyberbullying (Cyberbullying) ÿ Suspicious Dating (Grooming) ÿ Swatting (introduction) emergency services are misled) ÿ Objectionable content ÿ Theft of financial or bank card data ÿ Theft and sale of corporate data ÿ Cyber blackmail (demanding money to prevent a cyber attack) ÿ Ransomware attacks (a type of cyber blackmail) ÿ Cryptojacking (mining cryptocurrency using someone else's owners) resources without their knowledge ÿ Cyber espionage (unauthorized access to government or commercial organizations) ÿ Gambling ÿ Wasting parental money ÿ Viruses Machine Translated by Google Come on Phishing is a type of fraud whose goal is to obtain confidential data for access to various services (email, social network page, online banking, etc.). logins and passwords Source This is achieved by sending mass emails on behalf of popular brands, as well as personal messages within various services, for example, on behalf of banks or within social networks. The letter often contains a direct link to a site that is externally indistinguishable from the real one, or to a site with a redirect. Machine Translated by Google Phishing: how it works www.vkontakte.ru www. vkomtakte.ru www.vk.ru www.vvk.ru www.paypa1.com www.paypal.com Machine Translated by Google Vishing Vishing is one of the methods of fraud using social engineering, which consists in the fact that attackers, using telephone communication and playing a certain role (bank employee, buyer, etc.), under various pretexts, lure confidential information from the payment card holder or induce to perform certain actions with your card account / payment card. Machine Translated by Google Sit down Smishing is a type of phishing via SMS. Scammers send the victim an SMS message containing a link to a phishing site and motivating her to enter this site. Alternatively, the victim is asked to send confidential information in a reply SMS message, concerning payment details or personal access parameters for information and payment resources on the Internet. Machine Translated by Google Scam SCAM - A type of Internet fraud when an attacker first gains the user's trust and then deceives him. Most often, scammers meet their victims on social networks, forums or dating sites. Machine Translated by Google Cyber attack A cyber attack - or hacker attack - is a malicious intervention in a company’s information system, hacking of websites and applications, personal accounts and devices. The main goals are to benefit from using this data or blackmailing the owners. There are entire hacker groups that hack websites, infrastructures and services Machine Translated by Google Cyberbullying Cyberbullying is a type of bullying using Internet technologies, including insults, threats, slander, compromising information and blackmail, using personal messages or public channel. This is intimidation, humiliation, bullying, physical or psychological terror, carried out in a virtual environment using the Internet and mobile phone and aimed at causing fear in another and thereby subjugating him. While regular bullying uses verbal and physical acts of violence, including psychological violence, cyberbullying does not require personal presence. All actions are carried out using emails, messages in instant messengers and social networks, as well as by posting photos and video materials containing information harmful to the victim’s reputation on the public network. Machine Translated by Google Swatting Matching is a tactic of harassment, which is implemented by sending a false call to a particular service. For example, people report mining attacks with the goal of causing confusion and panic in a specific place. Source Machine Translated by Google Digital hygiene Digital hygiene is a set of rules, following which a person ensures information security (not anonymity, but protection) on the Internet. Machine Translated by Google Cybersecurity Reference Materials ÿ http://www.mogileviro.by/?page_id=6798 Machine Translated by Google Links to supporting material. Sample handouts for cybersecurity awareness. ÿ • Prevention leaflets • Website of the Ministry of Internal Affairs of the Republic of Belarus • Cybercrime in Belarus • How to avoid becoming a victim of vishing • How to avoid becoming a victim of phishing • How to avoid becoming a victim of Internet scammers • How to avoid becoming a victim of a cybercriminal. Bank card protection Machine Translated by Google How to avoid becoming a victim of cybercrime • Regularly update your software and operating system, including antivirus software • Use complex passwords • Do not open attachments in spam emails • Do not click on links in spam emails or sites you do not trust • Do not provide personal information without making sure transmission channel security • Contact the company directly if you receive a suspicious request • Carefully check the addresses of the websites you visit • Carefully review your bank statements Cyberlikbez (mvd.gov.by) The main reason for cybercrimes is insufficient digital literacy of citizens Machine Translated by Google Top 8 dirty schemes CALL FROM THE BANK RAISING MONEY FOR TREATMENT LETTER FROM A FRIEND CHEAP THINGS APARTMENTS FOR RENT BUSY SHOPPER DRAWINGS AND LOTTERIES (=GIVING AWAY FOR FREE) JUST CALL ME Machine Translated by Google Basic rules for “communicating” with telephone scammers Basic rule: do not provide data Call back Ask a security question No links Do not transfer money Do not call Don't read spam emails back Transfer error: contact the bank Check sources All these rules are basic when dealing with scammers, but new ways of deception are invented every day. Machine Translated by Google If you nevertheless become a victim of cybercriminals, you must contact the main department for combating cybercrime of the criminal police of the Ministry of Internal Affairs by phone: 102 8-(0222)-295-324 8-(0222)-295-319 Machine Translated by Google There is no universal protection against threats. ÿ Machine Translated by Google A joint project between MTS and the United Nations Children's Fund (UNICEF) to prevent cyberbullying among children and adolescents MTS and UNICEF launched a joint campaign “For a Safe Childhood” (mts.by)