Cyber Crime Police Station
Cyber Crime Police station, Idukki was officially opened on 01-11-2020 by Sri Pinarai Vijayan Hon'ble Chief Minister of Kerala, as per G.O. No.198/2020/Home dated 22-10-2020 through video conference by the pandemic situation of Covid-19. A public meeting held at the station premises in the presence of Sri Karuppasamy. R IPS District Police Chief, Idukki. This police station is functioning in the 2nd floor of Civil Station Building, Kuyilimala. Idukki district comes under the jurisdiction of this Police Station. (click here to view map)
Tips to conduct Safe & Secure online Classes
Cyber Security Tips
Following security tips helps an individual to use his Computer and related accessories securely and efficiently.Remember these tips while you are working with a computer , or using a mobile phone , or while accessing Internet. >
Use anti-virus software.
A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!
Be a responsible cyber citizen.
If you use the Internet, you're a citizen of a global community—a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws.
Do not open email from unknown sources.
Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension—even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe.
Back-up your computer regularly.
Help your family back up all household computers onto external media such as CD’s or diskettes.
Regularly download security protection update “patches”.
Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own.
Use passwords for protection
You wouldn't leave sensitive documents laying out for prying eyes; likewise, you need to put away the information stored on your computer in a safe place: locked behind a password in your own user account.
Even if you are a true Luddite and never intend to go online, you'll still want to password protect your computer. That's because if you have a snoopy houseguest or if a thief picks up your laptop, they could get at your information as you sleep if it's not password protected. Set up a separate user account for others to surf on so you keep your sensitive information private.
HOW TO: For Windows-based machines, go into the control panel, choose user accounts and follow the instructions. Mac users must create a password upon using the computer for the first time and they can change their password settings by going into system preferences. There they can disable automatic login. (If you get stuck, ask a trusted techie for assistance. That goes for all these tips.)
Get your guard up
Before merging with the information superhighway, you're going to want to make sure that all the existing security settings your computer comes with are turned on. If you want to go out and buy added protection later, that's great. Just make sure you have basic protection enabled before going online.
First, fire up the firewall. Your computer should come with a firewall, or perhaps a software package came bundled with your purchase that includes a firewall. It's basically a set of programs that work together to enforce the safety rules you outline when you choose a security level. The firewall is the gatekeeper for Internet activity. The default setting is usually on, but you'll want to verify that it's on if you don't see the firewall icon when you turn on the computer.
Go into the control panel to find the security settings, says Jennifer Leach, a consumer education specialist with the Federal Trade Commission. The higher you set your security, the more you are going to screen out, dangerous and harmless. According to Leach, medium to medium-high is fine for most people.
"If you're extremely cautious and you want to set it high, your friends might start telling you you're not getting their e-mails or you might see Web pages aren't loading. I think if you set them pretty low, a lot of stuff's going to creep through," she says.
Avoid going public
Public cafes are great for surfing, but you really need to recognize the risk of inputting confidential information. There's not much you can do to improve information safety at a public computer. You're at greater risk because you're dependent upon on a third party for security.
"Someone else who came in before me might have put in a flash stick that is gathering information," says Miner.
"I would seriously consider if you want to use a shared computer that remotely relates to confidential or identity information," Marcus says, "simply because you don't know if it's got a keyword logger or if all the tracking is turned on on that machine.
"It's a large risk that people really need to weigh. If there's no other access available and there's no other way of getting it done, you take the risk. But if it can wait until you can get home, it might behoove you to wait."
Watch your phones and PDAs
Remember, smart phones and PDAs are computers too, which raises two real risks: software security breaches and physical security breaches, such as when you lose the phone. Luckily, consumers can proactively find solutions to keep cell phones safe, just as on home computers.
You should always password lock your phone in case it goes MIA. That will make it harder for a thief to get at your information. Then, call your operator to have the phone locked, if possible, or your subscription canceled.
Threats to mobile software are growing, so it's important to protect yourself by downloading security software to your smart phone or PDA. Traditionally, crackers, the nickname for criminal hackers, haven't been much of a threat to cell phones because older models were essentially dumb boxes, but now the devices are getting smart -- and so are thieves.
"Nowadays, we are carrying around what is essentially a mini-PC that also happens to be a phone," says Sunner. "Because it is that much smarter, it of course is that much more open to abuse. I think, from that perspective, all the same paranoia I would use with my PC, I would apply to my phone as well."
If you're going to engage in mobile banking, even though banks are trying to protect their customers on their end, you should have some sort of mobile security just as you have on your home computer, says Miner.
"The average consumer trusts their device. But as soon as you start putting confidential information -- passwords, identifiers -- that you're then going to send to the bank, that now becomes information either on your cell phone, at risk, or over the air, at risk," he says.
"People should know that what's sent over to them can be pulled out of the air," says Leach. "PDAs should never be used to send Social Security numbers or financial information. Same with cell phones, actually. I hear people all the time in public giving things, that first of all, anyone could overhear, but also that anyone with that kind of scanner could pull out of the air."
Be aware of the kinds of information you send over a PDA because it might not have the kinds of protections that you think it does. When in doubt, get to a landline or a secure computer.
Clean up by yourself
Before selling or recycling your old computers, mobile phones , or storage devices such as pen drives etc wipe the system with some softwares which delete the data permanently. Simply deleting files and emptying the trash bin doesn't mean they can't be recovered by anyone motivated to uncover them.