Skip to playerSkip to main content
  • 4 months ago
साइबर क्राइम से बचने के लिए मोबाइल हाइजीन बेहद जरूरी है. क्या है यह नवीनतम प्रौद्योगिकी, जानिए इस रिपोर्ट में.

Category

🗞
News
Transcript
00:00Cyber operation is going to be a day and a day.
00:03The two of us are working on cyber operations.
00:07We have been working on our research on the US and its own research.
00:11And people are also doing research on how to save cyber and cyber security.
00:16We are talking about them and we know what they are doing.
00:19What is the most important thing about cyber crime?
00:23How do you give it a good time to people?
00:26First of all, thank you for inviting me.
00:30First of all, if the cyber fraud is over,
00:34or if the cyber fraud is over,
00:38then if you have a little doubt,
00:42first of all, the person who has contacted you, cut it.
00:46And the cyber crime doesn't mean that
00:48any person will say that cyber crime is over or not.
00:52It will happen by chance.
00:56If someone has sent OTP,
00:58or someone has sent a link,
01:00or someone has sent an application,
01:02which has manipulated you,
01:04and then you have tapped it.
01:08So the main thing is that
01:10you should think about it before you tap it.
01:12Like prevention is better than cure,
01:16if you are tapping something,
01:18or if you are opening a link,
01:20or if you are opening a link,
01:22or if you are opening a link,
01:24or if you are opening a link,
01:26first of all,
01:28you should think about it.
01:30If you think about it,
01:32because of my data,
01:34it will not leak.
01:36Mobile hygiene?
01:38Mobile hygiene and cyber hygiene
01:40is a new concept.
01:42So what do we do in mobile hygiene?
01:44With your consent,
01:46we take your device,
01:47either mobile,
01:48or laptop,
01:49or any issue.
01:50We connect it to our device,
01:52and we have some special tools
01:54that come through packets
01:56that come through your phone.
01:58What we are sending,
02:00is not a file,
02:01it is a block of packets.
02:03So what do we do?
02:04We capture one packet.
02:05We record one packet.
02:07We record one packet.
02:09After monitoring the traffic,
02:11and we analyze it.
02:13Then we see that
02:15some malicious or suspicious
02:17will not be found.
02:18If there is a record,
02:19then we do not down
02:21and then process it.
02:23Now,
02:24we notice that
02:25we have a system
02:26that we have to work
02:27with a system
02:28and that we have to work
02:29with a system.
02:30So,
02:31cities are still still still
02:32and we need to work together
02:33and have to work together.
02:34So,
02:35our concept is that
02:36any device is safe
02:37and being able to work.
02:38How do we do?
02:39How do you have a situation?
02:41How do you have an experience?
02:43So,
02:44what do you have to work?
02:46I am a master's first.
02:49I was going to do BCA.
02:51I completed 12 years in Columbus College and graduated in Meghalaya, Assam, which was a computer application.
03:00After that, I realized that cyber security is a big field in which I can create a career.
03:09After that, I did a diploma and advanced diploma.
03:13After doing advanced diploma and research, I realized that there is no such education that I should.
03:20So, I was able to explore outside.
03:23When I was able to explore outside, I was able to explore some websites.
03:27I was able to see that it's okay.
03:29Like in the US.
03:31So, I applied for Germany.
03:33But I was able to find computer science in Germany, which I didn't want.
03:37After that, I was able to get to the US.
03:39So, I switched to the US.
03:41I was able to complete my master's in cyber security for 2 years.
03:44After 2 months, I returned.
03:46There are opportunities there.
03:49But now, as I saw some news.
03:52When I was there, I was able to explore the news in the 2000s.
03:56In the 2000s, it was going on.
03:58So, I saw that many people had a scam with digital arrest.
04:02Then, Bitcoin frauds.
04:04Then, UPI scams and cyber frauds.
04:07So, I thought, why should I serve outside?
04:10Why should I serve my country?
04:12So, that's why I started my little consultancy here.
04:16Through which, I am also providing services to people.
04:19Oh, I have no idea of the need to get, but I feel like Cyber.
04:24How do you feel like Cyber is in Siberia?
04:25Then, people will be able to help you.
04:27If you say that.
04:28Yeah.
04:29If people get the one at home with the exit, they will help you.
04:31We will have to start the awareness campioning.
04:34Now we are visiting food, you guys have been in the press club and we are going to get everyone from DCS.
04:41Everyone is going to talk through awareness. Once it gets clear, you can contact us.
04:47We have also thought that in school and colleges we have students too.
04:51First of all, I would say that if you are a child or a child, everyone has a phone.
04:55We know what to do, you know.
04:58After an age, people don't know what to do.
05:00They know that their phone is running, it's entertainment.
05:03But they can take care of it.
05:06There are 5 types of methods that you can use mobile.
05:10The first method is that if you live anywhere,
05:13whatever you are sharing, whatever you are sharing,
05:16whatever you are asking for your permission, take care of it.
05:19Second, you don't have to connect Wi-Fi everywhere.
05:22You don't have to go anywhere.
05:23Some people ask that Wi-Fi has to connect.
05:25They have to exchange directly.
05:27You don't have to go anywhere.
05:28Third, you don't need to talk on the internet or on record.
05:32Because all your data is leaked.
05:35What you are talking about is that information is leaked.
05:37Fourth, any unknown number, unknown link,
05:40or any way that you don't know,
05:43something comes to your phone,
05:45so you don't tap it.
05:46Why does it not have a photo?
05:47What happens a lot of times?
05:49It's hacked through a lot.
05:50And last but not least,
05:52you don't have to connect your phone to anyone.
05:54It's a very trustable thing for someone.
05:57So, you listened to how you have to keep your phone
05:59and how you have to connect with cybercrime.
06:01It's called ETVBH.
06:02This was the site ofrhizal and telephalism.
06:04This was a great question.
06:10Please, after that,
06:14Thank you very much,
06:15and we,
06:17Many別 росс.
06:28You,
Be the first to comment
Add your comment

Recommended