SIGNS AND PUNISHMENTS OF CYBER ATTACK



Red Flags of a Potential Cyber Attack

1.     Standard programs and files that will not open or work.
2.    Files have been deleted, or contents have changed without your involvement.
3.    You find that passwords have unexpectedly changed.
4.    Unknown software appears or suddenly begins installing.
5.    The computer is connecting to the internet frequently when you are not using it.
6.    Your internet searches are being redirected.
7.    Extra browser windows may appear or turn off without your involvement.
8.    Unrecognized anti-virus software scans randomly appear.
9.    Additional toolbars are added to your internet browser.
10.  Frequent pop-ups load when you access the internet.
11.   Your mouse/pointer moves on your screen intelligently on its own.
12.  Your task manager, registry editor, anti-malware, and anti-virus software appear to be disconnected or disabled.
13.  Your e-mail contacts begin to receive e-mails from you, which you did not send.
14.  Money disappears from your bank account.
15.  You receive invoices or find payments made for purchases you did not make.
16.  If an unduly strange pdf file is found to be running in your task manager,
17.  If your mouse moves between programs and makes selections. A computer is functioning automatically without internal input
18.  Files Suddenly become encrypted and barring access to them until victims pay the requested amounts of money,
19.  If your browser begins redirecting to somewhere else other than its usual homepage that’s set up in preferences or goes to strange places when people attempt to use the internet,
20. If you realized that streaming videos suddenly start buffering or failed to play and web pages take forever to load
21.  If your router's DNS default settings have been changed suddenly,
22. Your computer is slowing down
23.  Annoying ads are displayed
24. Crashes
25. Internet traffic suspiciously increases
26. Your browser homepage changed without your input
27. Unusual messages show unexpectedly
28. Your security solution is disabled
29. Your friends say they receive strange messages from you
30. Unfamiliar icons are displayed on your desktop
31.  Unusual error messages
32.  You can’t access the Control Panel
33.  You get the error on the browser
34. You get suspicious shortcut files



                                                             


Punishments for Cyber attack

1.Damage to computer, computer system, etc.- Compensation not exceeding one crore rupees to the person so affected
2.Tampering with computer source documents- Imprisonment up to three years, or with fine which may extend up to two lakh rupees; or with both
3.Hacking with computer systems, Data altercation etc. - Imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
4.Retains any stolen computer resource or communication device- Imprisonment for a term which may extend to three years or with fine which may extend to rupees one lakh or with both
5.Fraudulent use of electronic signature -Imprisonment for a term which may extend to three years and also be liable to fine which may extend to rupees one lakh
6.Cheats by personating by using computer resource- Imprisonment for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees
7.Un-authorised access to protected system Imprisonment for a term which may extend to ten years and shall also be liable to fine




Comments

  1. Amazing efforts to make everyone aware about cyber crimes.

    ReplyDelete
  2. Very useful...Especially punishments are not usually shared....Such will keep today's youth away from such crime..

    ReplyDelete
  3. Productive and protective things 👍👍

    ReplyDelete
  4. It's a great one.
    Keep it up.
    Awareness is the most important step in order to keep us safe from such crimes.

    ReplyDelete
  5. It's a very useful blog to go through. I found a lot of helpful information. Thanks a lot.

    ReplyDelete
  6. Very Informative ,Good work from all the contributers working for this blog

    ReplyDelete
  7. In a tech savy world it's important to know the cyber threats and their signs!

    ReplyDelete

Post a Comment

Popular posts from this blog

CYBER PROTECTION METHODS

TYPES OF CYBER THREATS AND CYBER ATTACKS

STEPS TO BE TAKEN BY A CYBER ATTACK VICTIM