A malice called Corruption

Corruption is a term which we all got familiar with since the time when we were in school. When said in layman terms it refers to a form of criminal activity, sense of dishonesty or an evil act committed by an individual or group. However, the thing which makes it even worse is that it compromises with the rights and privileges of others. Moreover, corruption does not necessarily include activities like bribery or embezzlement, it can take place in many ways. Often, it is mainly the people in positions of authority who are believed to be susceptible to corruption. Let us first look at the ways through which corruption is committed.

Methods of Corruption

Bribery is one of the most common method of corruption which involves an improper use of favours and gifts in exchange for personal gain. Furthermore, the types of favours are diverse, they can range from money, gifts, company shares to even sexual favours, entertainment, and political benefits. Personal gain can also become a reason while giving preferential treatment or while overlooking crime.

Embezzlement is another kind of corruption which refers to the act of withholding assets for the purpose of theft. Furthermore, this financial fraud can take place by one or more individuals who were entrusted with these assets. The graft is a global form of corruption and basically refers to an illegal use of a politician’s authority for personal gain. Furthermore, a popular way for graft is misdirecting public funds for the personal benefit of politicians. Extortion is another major method of corruption through which an individual means to obtain property, money or services illegally. Extortion is obtained by coercing individuals or organizations. Hence, it can also be considered quite similar to blackmail.

Favouritism and nepotism is also quite an old form of corruption which is still used by some people. In this method, a person favours their own relatives and friends to jobs instead of deserving candidates. This biased approach naturally makes it an unfair practice. Another common method of corruption is abuse of discretion. In this method a person misuses one’s power and authority. For instance, when a judge unjustly dismisses a criminal’s case, he is committing abuse of discretion.

Finally, influence peddling in one more method through which corruption spreads. It refers to illegally using one’s influence with the government or other authorized individuals in order to obtain preferential treatment or favour.

How to stop Corruption?

It is high time, when one needs to take a strong stand against corruption and put an end to it. Though with the current state of deep-rooted corruption, cleaning would be not be an easy job. However, even if a few people start with the motto of one person and one day at a time, this corruption virus can be tackled rightfully. One effective way of preventing corruption can be to provide the government employs a better salary and due respect. Sometimes, the reason due to which government employees’ resort to corruptive ways is because they receive pretty low salaries. Consequently, high salaries, better respect and regular inspections can boost up their will for working transparently and reduce their resolve to engage in bribery.

Since the workload is pretty high and the employees are comparatively fewer in most of the government offices, this gives them an opportunity to slow down the work. Hence, they get a chance to indulge in bribery to in return for faster work delivery. Therefore, increasing the number of young and more efficient workers can be another suitable way of curbing corruption.

In general, tough laws are also pretty important for stopping Corruption. When there will be strict punishments for guilty individuals, the probability of people committing evil deeds can be relatively less. However, with this step, there should also be an efficient and quick implementation of these strict laws.Applying cameras in workplaces is another excellent way to prevent individuals from indulging in corruption due to fear of being caught.

At the end, the major way which can stop this deadly corruption virus from spreading further is to throw our personal greed as well as selfish motives away and rather think collectively for all of the Indian citizens.

Always remember, when stayed united, it is harder to fall!

-By: Muskan Aggarwal

IRRESPONSIBLE INTERNET BEHAVIOUR

In today’s era, Internet is one of the most used and most important aspect of the daily digital life of humans. Internet has seeped into our lives to such an extent that we possibly can’t even imagine our lives without it. This inclusion of internet in our day to day lives has proven to be very beneficial to us all but that doesn’t mean that there has been no adverse effect on the society. This means that the internet has both positive and negative effects.

               In reality, the Internet was made with a goal only to deliver positive results and not negative results. But this is totally dependent on the users of internet. If the users use it in a way such as to yield positive results, i.e. use it responsibly, then it has a positive impact whereas if not used in a responsible manner, i.e. use it irresponsibly then negative results are bound to be received. Today is the era of social media and interconnectedness. We are connected to people all over the world through the internet in a such a way that human history has never seen before. Social media has a very strong hold in the real world society. Social media is being used to spread news, information, used to communicate feelings to the world, used to express individual opinions and views, used to share emotions and much more.

 But most people use internet in a very irresponsible manner, and this irresponsible behavior is affecting the whole human society and everything in it, starting from social lives to business lives and everything else. By studies it has been found that 41% of employees in any organization use the unrestricted internet facilities given to very irresponsibly, like using to watch adult content, gambling, and even using phishing websites (maybe intentionally or unintentionally). This may lead to unintentional damage to the company’s internal network as it may even lead to breaches in the network. Likewise, there are children using internet on their home PCs and smartphones mostly. These children need to be taught and made to understand about the consequences of irresponsible internet behavior and how to behave responsibly, in a safe, ethical and respectful way.

The easiest way to encourage responsible internet behavior is to promote responsible digital citizenship. Every single person who indulges on the internet for anything is a digital citizen. Being a responsible digital citizen means having the online social skills to take part in online community life in an ethical and respectful way.

Responsible digital citizenship also means:

  • Behaving lawfully – for e.g. it’s a crime to hack, steal, illegally download or cause damage to other people’s work, identity or property online.
  • Protecting privacy of self and others.
  • Recognizing one’s own rights and responsibilities when using digital media.
  • Thinking about how our online activities affect ourselves, other people we know, and the wider online community.

Things like the above need to be kept in mind of each and every internet user in order to achieve proper responsible internet behavior. Internet cannot be made a safe place for communities until each and every member strives to behave responsibly.

BY: Sandeep Choudhury, MSc Cybersecurity, AUR

The Ultimate Guide to Hacking

The debate on two categories of hacking is an on-going process. In both the types of hacking, the hacker gains access to resources and information. Generally, the term hacking is attached to the notion of illegal activity. Commonly raised question is that do these two categories really differ if the same function is performed in both? The difference is more moral in nature rather than technical. It is more of a question of morally right or wrong while the technical difference between the two is zero.

At its simplest, hacking is gaining access to a digital device, computer system, or network in an unauthorized or unintended way.

Hacking has a wide variety of applications—both good and bad—but it’s easy to see how hacking could be used for malicious purposes. Thus, we can tell the difference between ethical and unethical lies behind the ‘intentions of the hacker’.

What is Ethical Hacking?

An ethical hacker, also known as a white hat hacker, is a cybersecurity expert who tries to find security vulnerabilities to gain access to a digital device, computer system, or network.

The goal of ethical hacking is to evaluate the existing security system and find ways to strengthen and improve protection. When an ethical hacker finds vulnerabilities in a company’s software, the company can then resolve the issues before a malicious hacker can exploit them.

A true ethical hacker only starts hacking after receiving explicit permission from the owner.

Example 1: White Hat Hackers

What is Unethical Hacking?

Black hat hackers are those who hack illegally for self-gain or malicious purposes. This includes anyone who steals, leaks, accesses data, or disrupts computer devices and systems for malicious intent, financial gain, or any other motive.

The term “black hat” actually stems from old western movies where the criminal would be identified by his black attire and the hero would be recognized by his white hat.

Example 2: Black Hat Hackers

Is Ethical Hacking Legal?

In most of the world, existing laws on ethical hacking are ambiguous and don’t clearly cover all possible scenarios.

Both hackers and companies must take steps to protect themselves and make sure no laws are being broken.

In general, the best way for both parties to make sure they are legally in the clear is to sign a written agreement that defines the job that the ethical hacker is being hired to do.

One of the main differences between legal and illegal hacking is whether the hacking was authorized or unauthorized.

Becoming an Ethical Hacker

The real-world examples in the previous section show how a hacking code of ethics can make the difference between a hacker’s actions earning a $10,000 reward or a prison sentence.

Following ethical hacking guidelines is the only way to safely and legally get started as a hacker. It is also much easier to make money as an ethical hacker than as a black hat or grey hat.

With the current booming demand for skilled ethical hackers creating jobs and driving up salaries, the outlook for aspiring white hat hackers has never been brighter.

Real Life Example

One of the most famous cases is Kevin Mitnick, an incredibly talented American black hat hacker who is believed to have gained unauthorized access to hundreds of devices and networks over several decades.

Mitnick evaded authorities for many years, but he was finally caught, arrested, and sentenced to five years in prison after a high-profile FBI pursuit in 1995.

Today, Mitnick is an extremely successful security consultant who has provided ethical hacking services to some of the largest companies in the world. The former black hat hacker’s story is both fascinating and inspirational to anyone who is considering a career in hacking.

Thanks to a growing awareness about the benefits of ethical hacking, there are a ton of resources and opportunitiesout there for ethical hackers to take advantage of.

Conclusion

Thus, it is safe to say that hackers break into systems entirely to check for gaps in it and rectify them to update the systems whereas crackers break into the systems with the intention of exploiting them and for personal gains. This is not only unethical but is also an illegal and criminal activity. White Hats are employed by organizations to carry out hacking after being subjected to a legal contract. On the other hand, Black Hats do not succumb to any approval or agreement as they intend to violate the security of any system that they desire. While a cracker encroaches on personal data and information and uses is to his own advantage, the hacker commits the same action to help a company or an individual to ward off attacks from these crackers.

By: Aman Mishra , MSc CyberSec.

ODD EVEN

The odd-even scheme was launched by the Delhi Government on November 4 to combat the hazardous smog that has enveloped the national capital. The scheme has been launched for 12 days from November 4-15, 2019.  

The first day of the odd-even rule reportedly resulted in a major dip in the air pollution levels in Delhi. The Central Pollution Control Board (CPCB) data showed that the odd-even scheme teamed up with high wind speed brought down the air pollution in Delhi by almost 82 percent. Both PM10 and PM2.5 levels fell drastically by 6 pm on November 4. 

Under the odd-even rule, only vehicles with odd last digit registration numbers will ply on the roads on odd days and vehicles with even last digit registration numbers will be allowed on the roads on the even days.

Also read: Public Health Emergency Declared in Delhi

The odd-even scheme has been implemented in Delhi to fight air pollution after a gap of almost three years. The National Capital has been reeling with ‘severe plus’ air quality level since the past few days.

Odd-even Delhi Timings 2019

The odd-even rule will be applicable from 8 am to 8 pm on all days till November 15, 2019, except on Sunday.

Odd-Even in Delhi

According to the odd-even in Delhi, cars with odd numbers will be allowed to run on odd days and cars with even numbers will be allowed on the even days.

Odd Even in Delhi 2019 Dates

All cars with even numbers will be allowed in Delhi between 8 am-8 pm on November 4, 6, 8, 12, 14, while all cars with odd numbers will be allowed in Delhi on November 5, 7, 9, 11, 13 and 15. All cars will be allowed on Sunday, November 10, 2019.

Odd-Even Dates 2019: Full Table

Date Odd-Even Rule Dates
November 4 Even
November 5 Odd
November 6 Even
November 7 Odd
November 8 Even
November 9 Odd
November 10 All cars
November 11 All cars
November 12 All cars
November 13 Odd
November 14 Even
November 15 Odd

Odd-Even Rule in Delhi: Ten key facts

1. The odd-even rule begins in Delhi with an even day, November 4, hence only even-numbered cars will be allowed on the Delhi roads.

2. The odd-even rule has been implemented in Delhi for 12 days and it will continue till November 15.

3. The odd-even timings are only from 8 am in the morning to 8pm in the evening. After that, all cars are allowed on the roads.

4. The main aim of the odd-even rule is to combat the alarming rise in air pollutants in the national capital and de-congest the city.

5. The penalty for violating the odd-even rule includes a fine of Rs 4000.  The penalty was earlier Rs 2000 but it has been increased this time as per the amended Motor Vehicle Act.

6. The Delhi Chief Minister has requested the cab aggregators- Ola and Uber to deactivate surge pricing during the 12-day odd-even rule in Delhi.

7. The auto drivers have also been asked to go by the meter during the implementation of the odd-even scheme.

8. The Delhi Government announced that it will hire around 2,000 private buses to boost the public transport system during the odd-even scheme. Currently, around 5,600 buses are plying in the national capital under the cluster bus scheme.

9. The DMRC will also be conducting 61 additional trips during this period taking the total number of metro trips to 5,100 through 294 trains.

10. Delhi CM Arvind Kejriwal also ordered staggered office timings at all Delhi government offices. The Delhi government offices will open at 9.30 am and 10.30 am during the odd even scheme.

Odd-Even Rule Exemptions: Who is exempted?

The odd-even rule will not apply for two-wheelers, women drivers alone or with a child under the age of 12 years. The private vehicles transporting school children in uniform during school time and vehicles of persons with physical disabilities will also be exempted from the odd-even rule.

The odd-even exemption list also includes the vehicles of VVIPs/VIPs- the President, Vice President, Prime Minister, Chief Justice of India, Lok Sabha Speaker, State Governors, Union Ministers, Opposition Leaders in Lok Sabha and Rajya Sabha, Chief Ministers of states and UTS and Supreme Court Judges.

The other odd-even exemptions include vehicles of Delhi’s Lieutenant Governor, Deputy Chairman Rajya Sabha, Deputy Lok Sabha Speaker, Delhi High Court Judges, UPSC Chairperson, Chief Election Commissioner, Election Commissioners, Comptroller and Auditor General of India and the Lokayukta.

The emergency enforcement vehicles and defence, paramilitary and embassy vehicles will also be exempted. Electric vehicles have also been exempted.

Odd-Even Rule in Delhi: Who is not exempted?

– The vehicles of Delhi Chief Minister Arvind Kejriwal and his Cabinet Ministers.

– The privately-owned CNG vehicles. The private CNG vehicles have not been exempted this year.

– The four-wheelers driven by men, private CNG vehicles.

– The non-goods vehicles from other states or MLAs of other states.

What is odd-even rule?

The odd-even rule is a road rationing system under which vehicles with odd and even number plates are allowed on the roads on alternate days.

This is the third time that the odd-even rule has been enforced in Delhi. It was introduced for the first time in 2016 for 15 days from January 1-15 and April 15-30, 2016.

The Delhi Government decided to re-introduce the odd-even rule to combat the deteriorating air quality in Delhi.

Delhi has been enveloped in toxic smog with extremely severe PM10 and PM2.5 levels reportedly due to bursting of firecrackers on Diwali and illegal burning of crop stubble in Punjab and Haryana.

The Environment Pollution (Prevention and Control) Authority had declared a public health emergency in Delhi-NCR on November 1, when Delhi’s air quality level hit the ‘severe plus’ category.

The Delhi government ordered the closure of all schools till November 5 and banned all construction activities temporarily and bursting of crackers for the entire winter period.

Despite light rains on Saturday and Sunday, the air quality in Delhi remained ‘severe’ in the morning on November 4, with the air pollution hitting the 500 mark in many places in the capital.

Social Media Privacy

What is Social Media?

Oxford Dictionary defines Social Media as “websites and applications that enable users to create and share content or to participate in social networking.”.

Examples of Social Media Websites:

Some of the most popular social media websites, with over 100 million registered users, include Facebook (and its associated Facebook Messenger), YouTube, WeChat, Instagram, QQ, QZone, Weibo, Twitter, Tumblr, Telegram, Baidu Tieba, LinkedIn, LINE, Snapchat, Pinterest, Viber and VK, reddit and more.

What is Privacy?

Oxford Dictionary defines privacy as “a state in which one is not observed or disturbed by other people”.

What is Social Media Privacy?

Social Media Privacy is “the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences”.

Steps to ensure Social Media Privacy:

  1. Do not fill every information on social media profile: This is because the more you share your details online the more it spreads.
  2. Turn on private browsing: This must be done so that no other person can see your browsing history and keep a track on you.
  3. Keep your social activities private: This should be done so that no one can stalk you. Also, your life is private so you should not post a lot of pictures.
  4. Stay off-grid: Keep your device’s location off so that your social media websites can not track your location which someone can misuse it.
  5. Keep read receipt in disable mode: Keep the read receipt option on your social websites off.
  6. Choose your audience wisely: Select the audience of your post so that unknown or people who may hurt you cannot view your stories/posts.
  7. Use unique passwords of each social media platform so that all your social media accounts don’t get hacked at once.
  8. Keep an eye on your mailbox and block or avoid unknown senders.
  9. Lock your phones: Keep a password like pattern, biometric, etc. to keep your social media account safe.
  10. Choose who you make your friend in virtual world: This is because not everyone you meet is n Angel.
  11. Do not follow each and every links you see: Do not follow every link you see on your wall or your friends sends you.
  12. Changing the friend request settings: Change your friend request settings to only those who has any of mutual friend can send you request.

What to do if your data gets leaked:

            First of all, open up and say about it to the one you trust and who will not disclose it anyone.

            Then go to cyber police and register complain so that they can work to catch the culprit. Do not go to any Tom, Dick and Harry.

End User Security

You are as strong as the weakest link in a chain. This may surprise you but it is true that Humans are the weakest link in chain of security. Yes, the most intelligent animal on the earth himself is the most vulnerable one in terms of security and privacy. The main reason for this is the fact that humans themselves pose threat to each other. Driven by the feelings of anger, hatred and greed they can become each other’s foe and with the intent to cause harm can intrude the privacy of other person and compromise their security.

The victim person cannot stop someone from trying to harm but if
proper care is taken, he can safe guard himself. Living in digital era where technology has formed a major part of our lives, user should be aware about the attacks that can occur and what measures should be taken to in order to prevent these attacks. One of the most common type of attack is social engineering; which means someone can access your online accounts, delete your most personal data, and otherwise ruin your digital life without having to write a single line of code.

This may already sound scary but what makes them even more scary is the fact that these are pretty easy to carry out and all they require is a little bit of your public information.

So, what should we do to safeguard ourselves from these? First and foremost is stop revealing facts about your life to strangers. What may appear a harmless information to you can be exploited by an attacker in order to harm you.

For example, many people base their passwords on their hobbies, that they openly
disclose on social media and can be known by anyone who views their online profiles. Moreover, the habit of reusing same passwords everywhere should be stopped. Memorizing several passwords is difficult, true but it is better than compromising privacy. One should beware of mails and messages asking to disclose personal information on account of a lottery / reward etc. that have been won.

It doesn’t matter if these scams ask for seemingly harmless information. Anything that is used to verify your identity on various platforms — where you grew up, your pet’s name, your current address — can be used to gain access to your data. Another type of attack that happens on end users is Client-side attacks. Client-side attacks require the user to do something, like download an image, open a link, install an update that will then run the code in their machine. The client-side attacks require user interaction that’s why information safeguarding is very important. The attacker gathers the information about an individual’s applications and who they are as a person. To do client-side attack successfully,one needs to know the friends of a person, what network and website they use, and what website they trust. In client-side attack, when the attacker gathers information,history focus is the person, rather than their applications or operating system. A way to safeguard yourself from these is to not visit unknown websites and not opening attachments from unknown people.

Moreover, Pirated software should not be downloaded as they may have a malware and can cause harm to your system or can access your personal information.

Physical attacks on users also happen most commonly. Physical attacks mean the attacks that maybe carried out by an attacker physically like he/she maybe a friend or pretend to be a friend abd physically get enough access into your life to break down into your cyber-privacy

Being alert and not revealing your passwords to others is a way to prevent this. Also while entering passwords make sure you cover the key board so that other person can not see it. Make passwords complicated by adding special characters with text which are not easy to guess and take a lot more effort to break down. And above all trust no one with your passwords because the weakest link in security is the human factor or we can say the end user is the weakest link and that is what attackers are counting on.

100 percent privacy and security can never be guaranteed but the only way to ensure enough privacy and security is to stay self aware and alert by ourselves. There are hundreds of guides available throughout the internet that give sufficient information about ensuring end user security. One should go through them in order to ensure his/her own security and be always aware. Security is nothing if one doesnt know what to do in order to ensure it.

So stay aware! Stay cyber-safe.

Design a site like this with WordPress.com
Get started