An Eye Over the Internet

An Eye Over the Internet: The Internet is a huge space where we can find virtually anything we could possibly want. There can’t be any restrictions on what is provided when asked since it effectively supplies us with information. Many times, material that isn’t appropriate for the user is provided with the qualifier that “you might also like.”  A mature audience knows what to see in order to get what they have asked for, but the rise in the reach of the internet as a resource for information has also invited some young and curious minds that avail this source as a mode of entertainment, communication, connectivity and education.

what is illegal to watch on the internet in india 2021

Naturally, as the audience grows, so does the users’ vulnerability to safety. This amplifies cyber risks, misuses linked to a lack of understanding and cyberbullying.

The Indian government has taken a step ahead in educating users of all demographics about the benefits of safe surfing by requiring all internet service providers to have parental control filters in place to safeguard them from such risks.

Parental Control Filters

Parental controls are features that may be found in Digital Television Services, Computer and Video Games, Mobile Devices, and Software that enable parents to limit their children’s access to material. These settings were designed to help parents limit what their children can see.

Parental Control

Because of the increasing accessibility of the Internet, there has been a growth in the need for Parental Control Techniques that restrict material throughout the years. According to a 2014 ICM study, over a quarter of people under the age of 12 have been exposed to Online Pornography. Restrictions are especially useful when youngsters are accidentally exposed to unsuitable information.

Monitoring might be useful in reducing Cyberbullying on the Internet. Cyberbullying may be more damaging to the Victim’s psychological well-being than traditional bullying. Previous research has found that around 75% of teenagers have been victims of cyberbullying. A lack of parental restrictions in the home may allow children to participate in cyberbullying or become a victim of it.

Methods of Parental Control

There are several methods for implementing parental controls for banning websites. Add-on Parental Control Software may monitor API in order to view apps such as a web browser or Internet chat application and interfere based on specified criteria, such as a match in a database of forbidden phrases. Almost all Parental Control Software includes a password or other kind of authentication to prevent unauthorised users from deactivating it.

Techniques employing a proxy server are also employed.  A web browser is configured to deliver requests for web content to the proxy server rather than the intended web server. The proxy server then retrieves the web page from the server on the browser’s behalf and sends it to the browser.

Local Cyber Security Threat | USB Port Lock and Key

Proxy servers can analyse the data being transmitted and received and interfere based on different factors pertaining to the content of the page or the URL being requested, such as utilising a database of prohibited terms or URLs.

Parental control gadgets that are network-based have recently developed. To prevent improper online material, these devices that function as Firewall Routers employ packet filtering, DNS Response Policy Zone (RPZ), and Deep Packet Inspection (DPI). These techniques have been employed in Commercial and Governmental Communication Networks.

Mobile device Surveillance

an eye over the Internet | USB Port Lock and Key

The growing usage of mobile devices with full-featured internet browsers and downloaded applications has generated a need for parental controls on these gadgets. Cell Phones, Tablets, and e-Readers are examples of mobile devices that have Parental Controls. Verizon was the first carrier to offer age-appropriate content filters, as well as the first to offer generic content filters, in November 2007, realising that mobile devices were used to access a wide range of material, from movies and music to short-code shows and websites.

Mobile device software allows parents to limit which applications their child can access while also allowing parents to monitor Text Messages, Phone Logs, MMS Pictures, and other transactions occurring on their child’s mobile device; to allow parents to set time limits on mobile device usage; and to track the exact location of their children as well as monitor calls and the content of messages.

This programme also allows parents to monitor their Children’s Social Media Profiles. Parents may examine Postings, Photos, and Interactions in Real Time. Another feature of this new program is the ability to track bullying.

Most Internet Service Providers provide free filtering solutions to limit internet surfing possibilities and prevent inappropriate information. Implementing parental controls and addressing internet safety are important steps to safeguard children from harmful material.

How to: Protection

The possibility of getting trapped in a situation where the user is not aware of the severity of the attack. In order to understand what and how the threat is going to act will not only give you a get-away, but also could suggest a precaution for the next time around. Some Physical security measures as well as Software measures can help you greatly.

USB Port Protection

The Universal Serial Bus (USB) was developed to replace the numerous connections on the back of PCs, alleviate usability concerns with current interfaces, and simplify device software settings. External devices might potentially benefit from faster transfer rates thanks to USB. From the original USB, which was launched in 1994, to USB 3.1, which was published in 2013, this technology has seen significant advancements in terms of performance and storage. However, as USB devices, particularly flash drives, have evolved, so have the threats and risks they bring.

The fact is that most computers can be maintained virus-free with a little information and common sense. Children can be educated about the hazards of accessing dubious files and moving data between a work computer and a personal device. Most individuals are unaware that viruses may be transmitted via a variety of media, including music and image files.

Anyone can use USB drives to gain access to sensitive information kept on a computer or network. It may infect one or more USB drives with a virus or Trojan, that when run, will provide hackers with access to logins, passwords, and information on the user’s computer or the network the computer is connected to. The hacker may then leave the infected USB unattended on the oor, in or next to a cluster machine, in hallways, restrooms or any areas with a relatively high volume of traffic. A user who nds a USB drive will often install the device on their computer or on a cluster machine to search for identical information that can be used to locate the owner of the USB device.

It cannot be disconnected from the USB port without a key. This is similar to a two-in-one security lock.

Unsecured USB ports pose major challenges to information systems security. Exposed ports on servers, routers, laptops, computers and portable devices are at extreme risk for a security breach. USB flash drives, due to their small size and ubiquity, contribute hugely to data leakage and system compromise through infection from a computer  virus  or other  malicious  software. Infected USB flash drives can be crash your computers, Servers & network.

Local Cyber Security Threats

Local cybersecurity threats included rootkits and removable tools like malicious USB drives and other offline methods. As per the Kaspersky survey it is found that the 45% of Indian users were affected by local cybersecurity threats in 2020. Which can be reduced by the locking the exposed USB Ports with Physical USB Port Lock and Key which provided by the DataSec. USB Port Lock and Key deter the unauthorized access of USB ports. Users can also prevents the various virus attacks like W32.Pioneer.CZ1, W32.Ramnit.A …  etc

Knowing the nature of the threats from USB Ports

W32.Pioneer.CZ1 was identified as the top Windows Malware in 2021, with over 10 million detections.

W32.Pioneer.CZ1

Threat Level: Medium

Category: File Infector

Method of Propagation: Removable or network drives

Behaviour:  The malware injects its code to files present on disk and shared network. It decrypts malicious dll present in the file & drops it. This dll performs malicious activities and collects system information & sends it to a CNC server

W32.Ramnit.A

Threat Level: Medium

Category: File Infector

Method of Propagation: USB Drives, other malware, Exploit Kits, Spoofing the URL,

and Bundled applications

Behaviour

This malware has several components embedded within it. After installer is dropped or downloaded, it drops its various components in memory or disk.

Each component has specified task. This will also speed up the process of infection.

• It infects all running processes.

• It also infects HTML files by appending script in it while in the case of PE file infection it appends itself in the file.

• It modifies registry entries to ensure

W32.Sality.U

Threat Level: Medium

Category: File Infector

Method of Propagation: Removable or network drives

Behavior

Injects its code into all running system processes. It then spreads further by

nfecting the executable files on local, removable, and remote shared drives.

• Tries to terminate security applications and deletes all files related to any

security software installed on the system.

• Steals confidential information from the infected system

Worm.Autoit.Sohanad.S

Threat Level: Medium

Category: Worm

Method of Propagation: Infected USB & network drives

Behavior

It arrives to your computer through Messaging apps, infected USB or network.

• It has ability to spread quickly.

After arrival it creates copy of itself as exe with typical windows folder icon.

• User mistakenly executes this exe assuming it as a folder and then it spreads

over network.

• It infects every connected USB drive too.

In conclusion

To summarize, as large and beneficial as the internet is, so are the problems if we don’t know what we’re entering into. When we can identify and keep aware about the implications of arbitrarily clicking on a “not-so-bad-looking” link, the Internet becomes a fun and healthy environment. These links may not only provide a means for hackers to survive with your information, but they may also endanger children and lead to cyberbullying or even extortion. There are several methods to educate yourself about such assaults, stay safe, and avoid playing with them.

With Corona physically sweeping over the world, we may also encounter software dangers that mimic the deadly virus. In some circumstances, it may be preferable to avoid such downloading files via unfamiliar web browsers, or even mindlessly browsing over a recognized website that may be contaminated.

Stay Safe Stay Woke.

Leave a Reply