kratikal.com
Open in
urlscan Pro
34.93.237.227
Public Scan
Submitted URL: https://www.kratikal.com/blog/cyber-jagrukta-divas-mha-initiative?utm_source=emails&utm_medium=email_marketing&utm_campai...
Effective URL: https://kratikal.com/blog/cyber-jagrukta-divas-mha-initiative/?utm_source=emails&utm_medium=email_marketing&utm_campa...
Submission: On October 26 via api from US — Scanned from DE
Effective URL: https://kratikal.com/blog/cyber-jagrukta-divas-mha-initiative/?utm_source=emails&utm_medium=email_marketing&utm_campa...
Submission: On October 26 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://kratikal.com/blog/
<form role="search" method="get" class="search-form" action="https://kratikal.com/blog/">
<label for="">
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
POST https://kratikal.com/blog/wp-comments-post.php
<form action="https://kratikal.com/blog/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> Required fields are marked <span class="required">*</span></p>
<p class="comment-form-comment"><label for="comment">Comment</label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
<p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"></p>
<p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" type="email" value="" size="30" maxlength="100" aria-describedby="email-notes" required="required"></p>
<p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="url" value="" size="30" maxlength="200"></p>
<p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
I comment.</label></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="7093" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
</form>
POST https://campaigns.zoho.com/weboptin.zc
<form class="zh_formcont" method="POST" id="zcampaignOptinForm" target="_zcSignup" action="https://campaigns.zoho.com/weboptin.zc">
<div style="padding-right: 50px; box-sizing: border-box">
<div style="background-color: rgb(255, 235, 232); padding: 10px; color: rgb(210, 0, 0); font-size: 11px; margin: 0px 15px; border: 1px solid rgb(255, 217, 211); width: 100%; position: relative; display: none" id="errorMsgDiv"
changetype="SIGNUP_ERROR"> Please correct the marked field(s) below. </div>
</div>
<div id="SIGNUP_TEXT" name="SIGNUP_TEXT" changeitem="SIGNUP_TEXT" changetype="SIGNUP_TEXT" class="csrdrag zh_magicforhedone"
style="position: relative; left: 38px; top: 41px; color: rgb(255, 255, 255); width: 485px; font-size: 24px; font-family: Tahoma"></div>
<div class="zh_magicforhedtwo csrdrag" id="SIGNUP_DESC" name="SIGNUP_DESC" changeitem="SIGNUP_DESC" changetype="SIGNUP_HEADER"
style="position: relative; height: 82px; left: 50px; top: 40px; font-family: Tahoma; color: rgb(255, 255, 255); width: 374px; font-size: 18px"></div>
<div class="zh_frominpcont" style="height: 44px; width: 277px"> <input class="zh_forminput csrdrag" name="CONTACT_EMAIL" changetype="CONTACT_EMAIL" changeitem="SIGNUP_FORM_FIELD" type="text" id="CONTACT_EMAIL" placeholder="Email" autocomplete="off"
style="font-size: 16px; left: -96px; top: 82px; color: rgb(0, 0, 0)"> </div>
<div class="zh_frombtncont" style="height: 48px; width: 187px"> <input class="zh_forminputbtn csrdrag" type="button" name="SIGNUP_SUBMIT_BUTTON" changetype="SIGNUP_SUBMIT_BUTTON" id="zcWebOptin" value="Yes, count me in!"
style="position: relative; left: -53px; top: 86px; background-color: rgb(255, 255, 255); font-family: Tahoma; color: rgb(68, 67, 67); border-color: rgb(255, 137, 20); text-transform: none; font-size: 16px"
onclick="saveOptin(this,false,function(){},'#sf3z4bf8a0af3698f010cb508d345bcfcbe4ba8976a6a7598db014be12d4b325ca06[data-type="signupform_0"] ',event);"> </div>
<div><!-- Do not edit the below Zoho Campaigns hidden tags -->
<input type="hidden" id="fieldBorder" value="" onload=""><input type="hidden" name="zc_trackCode" id="zc_trackCode" value="ZCFORMVIEW"><input type="hidden" id="submitType" name="submitType" value="optinCustomView">
<input type="hidden" name="zx" id="cmpZuid" value="12853a144">
<input type="hidden" name="zcvers" value="2.0"><input type="hidden" id="mode" name="mode" value="OptinCreateView"><input type="hidden" id="document_domain" value="">
<input type="hidden" id="zc_Url" value="akue-zgph.maillist-manage.com">
<input type="hidden" id="new_optin_response_in" value="0">
<input type="hidden" id="duplicate_optin_response_in" value="0">
<input type="hidden" id="zcFormType" name="zcFormType" value="POPUPFORM">
<input type="hidden" id="zc_formIx" name="zc_formIx" value="3z4bf8a0af3698f010cb508d345bcfcbe4ba8976a6a7598db014be12d4b325ca06">
<!-- End of the campaigns hidden tags -->
<input type="hidden" id="ZCMP_close" value="1">
</div><input type="text" style="display:none !important;" name="qs" class="ih"><input type="text" style="display:none !important;" name="lf" class="ih" value="1666798555100"><input type="hidden" name="di" value="1143587195371215991666798555101">
</form>
Text Content
Skip to content * Home * About Us * Contact Us * Partners * * * * * Kratikal Blogs Information Hub For Cyber Security Experts KRATIKAL BLOGS One stop platform of the latest cyber security news, reports, trends, stats and much more! * * * * * Menu * All Blogs * Cyber Security * Phishing * Cyber Security Buffs * Ransomware * News Shots * CEO’s Desk Search for: Categories Cyber Awareness CYBER JAGRUKTA DIVAS: A MINISTRY OF HOME AFFAIRS INITIATIVE June 16, 2022June 25, 2022 8 mins read * * * * > आज का संकल्प, कल की सुरक्षा India is among the fastest growing countries in the world in terms of digitization and technological advancement. Over the past few years, the Indian government has employed several programmes and schemes to ensure the proper fulfilment of the infrastructural requirements to facilitate such growth. However, with rapid technological development and increased use of the internet comes the growing risk of cybercrimes. This has generated a huge demand for a proper cybersecurity framework. The two most important growth parameters that determine the strength of cybersecurity infrastructure are security and sustainability. The current cybersecurity landscape of India needs to evolve in tandem with the increasing rate of cybercrimes. Recognizing this need, the Indian government has rolled out initiatives such as Cyber Surakhsit Bharat, Cyber Jagrukta Divas, Cyber Suraksha Kendra, etc., to support the growth and development of the country’s cybersecurity infrastructure. The government also observed that 60% of the cyber crime complaints are related to financial fraud. To address the situation, the MHA launched the Citizen Financial Cyber Fraud Reporting & Management System (CFCFRMS), which will act as an immediate response mechanism for stopping and preventing the theft of funds by threat actors. In addition, the government recognizes the fact that human negligence and lack of awareness amongst employees are the prominent causes of cybercrimes in the country. To address this issue, the Cyber Jagrukta Divas initiative was launched by the Ministry of Home Affairs. So, here is all you need to know about this promising initiative. WHAT IS CYBER JAGRUKTA DIVAS? Cyber Jagrukta Divas is a government initiative that has been brought under the I4C scheme to raise cybersecurity awareness among public sector undertakings (PSUs), panchayat raj institutions (PRIs), universities, schools, etc. The exact guidelines relayed by the Home Ministry are that the above-mentioned institutions must carry out an awareness campaign on the first Wednesday of each month for at least an hour. The MHA has asked the offices and branches of all the states and union territories to observe Cyber Jagrukta Divas and prepare a comprehensive “Annual Action Plan“ that will act as a nodal guideline for year-round awareness campaigns. The Cyber Jagrukta Divas initiative will be administered by the MHA under the purview of the I4C scheme. The government has also made provisions in its budgetary proposal for the acknowledgment of 5-10 employees from each organisation, who have made exceptional contributions to generating cybersecurity awareness against cybercrimes. The Ministries are also asked to recognize the officials as “Cyber Star of the Month” as a reward and motivation to appreciate their effort. WHAT IS THE I4C SCHEME? The Indian Cyber Crime Coordination Centre (I4C) was incorporated and established by the Ministry of Home Affairs to empower and strengthen the capabilities of regulatory and law enforcement agencies. The I4C scheme is responsible for acting as a nodal point in the fight against cyber attacks. The departments under this scheme are provided with the responsibility of conducting research and development to identify the needs and problems of law enforcement agencies, incorporating the forensic tools and techniques developed in collaboration with research or academic institutions. TOPICS TO BE COVERED UNDER CYBER JAGRUKTA DIVAS The Ministry of Home Affairs has suggested a set of topics that must be covered under the annual action plan for generating cybersecurity awareness in organisations. These topics are divided into four major units. The annual action plan that is required to be prepared by every organisation must comprise these four units. However, each of the institutions has the flexibility to choose amongst the given topics for developing their action plan. UNIT 1: CYBER CRIMES AND SAFETY The topics covered in the first unit are: * Introduction to cybercrimes * Kinds of cybercrimes: phishing, identify theft, cyber stalking, cyber obscenity, computer vandalism, ransomware, identity theft * Spotting fake apps and fake news on social media and the internet (fake email messages, fake post, fake whatsapp messages, fake customer care/toll-free numbers, fake jobs) * Internet ethics, internet addiction, ATM scams, online shopping threats, lottery emails/SMS, debit/credit card fraud, email security, mobile phone security * Mobile apps security, USB storage device security * Mobile connectivity security attacks (Bluetooth, Wi-Fi, Mobile as USB) * Preventive measures to be taken in cyber space, reporting of cybercrime * Forgery and fraud from mobile devices * Cyber risk associated with varied online activities and protection therefrom * Work on different digital platforms safely * Online cybercrimes against women and impersonation scams * Safety in online financial transactions UNIT 2: CONCEPT AND USE OF CYBER HYGIENE IN DAILY LIFE * Browser security, desktop security, UPI security, juice jacking, Google map security, OTP fraud * IoT security, Wi-Fi security, spotting fake apps on social media and internet (fake email messages, fake post, fake whatsapp messages, fake customer care/toll free numbers, fake jobs) * Internet ethics, internet addiction, ATM scams, online shopping threats, lottery emails/SMS, loan frauds * How to avoid social engineering attacks, debit/credit card fraud, email security, mobile phone security, mobile apps security, USB storage device security, data security * Mobile connectivity security attacks (Bluetooth, Wi-Fi), mobile as USB, broadband internet security * Preventive measures to be taken in cyberspace, reporting of cyber crime UNIT 3: INTRODUCTION TO SOCIAL NETWORKS * Social network and its contents like blogs * Safe and proper use of social networks, inappropriate content on social networks * Flagging and reporting of inappropriate content UNIT 4: ELECTRONIC PAYMENTS AND SAFEGUARD THEREIN * Concept of e-payments, ATM and tele banking * Immediate payment systems, Mobile money transfer and e-wallets * Unified Payment Interface (UPI) * Cybercrimes in electronic payments * KYC: Concept, cases, and safeguards WHY DID THE HOME MINISTRY LAUNCH THIS INITIATIVE? There are several factors that encouraged the ministry to launch this cybersecurity initiative. Some of the major ones are: RISING NUMBER OF CYBER ATTACKS IN THE COUNTRY * In May 2021, Air India suffered a data breach (through a supply chain attack) and the personal data of 4.5 million passengers was compromised. * In the same month, test results and personally identifiable information (PII) of 190,000 CAT applicants were leaked on the dark web. * The personally identifiable information (PII) of 500,000 Indian police officers was leaked and sold in February 2021. * In January 2021, the COVID-19 test results of at least 1500 patients were leaked with all their personal information, which was regarded as a breach of the Indian healthcare system. * Recently, over 70 Indian government and private websites were hacked by a hacktivist group named “DragonForce Malaysia” and religious extremist messages were displayed. GROWING INTENSITY OF HYBRID WARFARE In early 2022, Russia invaded Ukraine and the war is still going on. However, the war is being fought not only on the battlefield but also in cyberspace. This has raised alarms for all countries to not only prepare themselves against their enemies through weapons but also incorporate robust cyber security infrastructure to defend against cyber attacks. In hybrid warfare, state-sponsored threat actors can cripple the digital system of the target country. So, India needs to establish a robust cyber security framework to protect its critical infrastructure. LAYING FOUNDATION OF THE NATION’S CYBER SECURITY STRATEGY The government of India is still far from establishing a clear National Cyber Security Strategy. In addition to the introduction of the Cyber Jagrukta Divas initiative, the government has put into place several ongoing initiatives and policies to address the issue of rising cybercrimes. The government, through its various ministries, is looking to transform the reactive mechanism for responding to cyber crimes into a proactive approach toward cyber security. The government is working on transforming cybersecurity best practices and guidelines into strategies through various initiatives and regulatory bodies. SECURING GOVERNMENT ORGANISATIONS State and central PSUs are the organisations primarily targeted by the Cyber Jagrukta Divas initiative. The motive of the initiative is to secure government institutions and to prevent any kind of damage to these organisations. The initiative will prepare organisations to defend themselves against prominent cyber threats such as ransomware attacks, DDoS attacks, phishing, spoofing, BEC attacks, etc. The primary goal of the Cyber Jagrukta Divas initiative is to raise cyber awareness among the employees of government organisations as employees serve as the first line of defence against cyber attacks. “CYBER HYGIENE” IS THE GOAL OF CYBER JAGRUKTA DIVAS The Home Ministry has come up with the Cyber Jagrukta Divas initiative to improve the cyber hygiene of the country’s institutions, especially those regulated by the government. This initiative will facilitate the capacity building of government organisations and their employees to handle the issues related to cybercrime. The MHA is also looking into this initiative as an opportunity to spread cybersecurity awareness regarding how to report cyber crime. The government has established a couple of cyber crime portals to address the fraud and breaches in a systematic manner. In the long run, this initiative will make the employees of government organisations vigilant and cyber aware. KUMAR SHANTANU See author's posts BY KUMAR SHANTANU View all of Kumar Shantanu's posts. POST NAVIGATION Next: Master Directions to NBFCs by RBI Next: Government Institutions in India: A Popular Target for Hackers RELATED POST WOMAN LOSES RS. 95,000 BY CALLING FAKE SWIGGY GO HELPLINE September 13, 2019May 5, 2022 3 mins Read REASONS WHY ORGANIZATIONS SHOULD CHOOSE THREATCOP June 3, 2019 3 mins Read THOUSANDS OF PAYMENT CARDS’ INFORMATION STOLEN FROM MORE THAN 105 E-COMMERCIAL WEBSITES May 11, 2019May 5, 2022 3 mins Read LOG4SHELL: THE NEW ZERO-DAY VULNERABILITY IN LOG4J December 15, 2021February 11, 2022 7 mins Read LEAVE A COMMENT CANCEL REPLY Your email address will not be published. Required fields are marked * Comment Name * Email * Website Save my name, email, and website in this browser for the next time I comment. WHY US Kratikal Tech. Pvt. Ltd. is the trusted standard for companies and individuals acquiring services to protect their brands, business and dignity from baffling Cyber attacks. ADDRESS A-130, Second Floor, Sector-63, Noida For Sales: sales@kratikal.com | +91 8826990982 For Career: hr@kratikal.com | +91 9319394613 Copyright © 2020 All Rights Reserved. Copyright © 2020 All Rights Reserved. Share Tweet Share Share Email Share Kratikal Tech Pvt. Ltd. classic_popup_15 Please correct the marked field(s) below. Vielen Dank für Ihre Registrierung