Anda di halaman 1dari 50

Cybercafe

Alternatively referred to as an Internet cafe, PC bangs, or Net


cafe.

Cybercafe is a place to use computers to access the Internet, play


games, create documents, chat with friends using voice and video, as
well as a number of other computer-related tasks.

Typically, the computer and Internet access is provided for an hourly or


daily fee.

The cybercafe first came into existence in July 1991 in San Francisco, when
Wayne Gregori started up the SFnet Coffeehouse Network. He built and set
up 25 coin operated computer stations in multiple coffeehouses in San
Francisco. The Binary Cafe was the first cybercafe in Canada, started up in
June 1994. Today, there are thousands of cybercafes all over the world,
providing the computer and Internet access that people need to go about
their daily lives.

An Internet caf, also known as a cybercaf, is a place which provides Internet access to the
public, usually for a fee. These businesses usually provide snacks and drinks, hence the caf in the
name. The fee for using a computer is usually charged as a time-based rate.
History[edit]

SF Net logo circa 1993, San Francisco, Calif.

Cyberia: one of the world's first Internet cafs, London, 1994

A solar powered Internet caf in San Juan del Sur, Nicaragua.

An Internet caf in Kulim, Kedah, Malaysia.

The first online caf in South Korea called Electronic Caf opened in front of Hongik University in
March 1988 by Ahn Sang-Su and Keum Nuri in Seoul. It had two 16bit computers connected
to Online service networks through telephone lines. Online service users offline meetings were held
in the Electronic Caf, which served as a place that connected online and offline activities. The
opening of the online caf in Korea was 23 years ahead of other countries. [1]

The online caf phenomenon in the United States was started in July 1991 by Wayne Gregori in San
Francisco when he began SFnet Coffeehouse Network. Gregori designed, built and installed 25
coin-operated computer terminals in coffeehouses throughout the San Francisco Bay Area. The caf
terminals dialed into a 32 line Bulletin Board System that offered an array of electronic services
including FIDOnet mail and, in 1992, Internet mail.[2]

The concept of a caf with full Internet access (and the name Cybercaf) was invented in early 1994
by Ivan Pope. Commissioned to develop an Internet event for an arts weekend at the Institute of
Contemporary Arts (ICA) in London, and inspired by the SFnet terminal based cafes, Pope wrote a
proposal outlining the concept of a caf with Internet access.

After an initial run in late 1993 as a caf showcasing computers, a bar called CompuCaf was
established in Helsinki, Finland in the spring of 1994 featuring both Internet access and a robotic
beer seller.[3]

Around June 1994, The Binary Cafe, Canada's first Internet caf, opened in Toronto, Ontario.

Inspired partly by the ICA event, a commercial establishment of this type, called Cyberia, opened on
September 1, 1994 in London, England. In January 1995, CB1 Caf in Cambridge, installed an
Internet connection and is the longest running Internet Caf in the UK, still operating today.[4]

The first public, commercial American Internet caf was conceived and opened by Jeff Anderson and
Alan Weinkrantz in August 1994, at Infomart in Dallas, Texas and was called The High Tech Cafe.[5]

Three Internet cafs subsequently opened in the East Village neighborhood of New York City:
Internet Cafetm, opened by Arthur Perley, the @Cafe, and the Heroic Sandwich.[6] In 1996, the Internet
caf Surf City opened in downtown Anchorage, Alaska.

A variation of Internet caf called PC bang (similar to LAN gaming centers) became extremely
popular in South Korea when StarCraft was released in 1997. Although computer
and broadband penetration per capita were very high, young people went to PC bangs to play
multiplayer games.
Characteristics[edit]

Internet Cafe, Alice Springs, Australia in 2005

Internet cafs are located worldwide, and many people use them when traveling to
access webmail and instant messaging services to keep in touch with family and friends. Apart from
travelers, in many developing countries Internet cafs are the primary form of Internet access for
citizens as a shared-access model is more affordable than personal ownership of equipment and/or
software. A variation on the Internet caf business model is the LAN gaming center, used
for multiplayer gaming. These cafs have several computer stations connected to a LAN. The
connected computers are custom-assembled for gameplay, supporting popular multiplayer games.
This is reducing the need for video arcades and arcade games, many of which are being closed
down or merged into Internet cafs. The use of Internet cafs for multiplayer gaming is particularly
popular in certain areas of Asia like India, China, Taiwan, Hong Kong, South Korea and
the Philippines. In some countries, since practically all LAN gaming centers also offer Internet
access, the terms net cafe and LAN gaming center have become interchangeable. Again, this
shared-access model is more affordable than personal ownership of equipment and/or software,
especially since games often require high end and expensive PCs.

There are also Internet kiosks, Internet access points in public places like public
libraries, airport halls, sometimes just for brief use while standing.

Many hotels, resorts, and cruise ships offer Internet access for the convenience of their guests; this
can take various forms, such as in-room wireless access, or a web browser that uses the in-room
television set for its display (usually in this case the hotel provides a wireless keyboard on the
assumption that the guest will use it from the bed), or computer(s) that guests can use, either in the
lobby or in a business center. As with telephone service, in the US most mid-price hotels offer
Internet access from a computer in the lobby to registered guests without charging an additional fee,
while fancier hotels are more likely to charge for the use of a computer in their "business center."

For those traveling by road in North America, many truck stops have Internet kiosks, for which a
typical charge is around 20 cents per minute.[7]

Internet cafs come in a wide range of styles, reflecting their location, main clientele, and
sometimes, the social agenda of the proprietors. In the early days they were important in projecting
the image of the Internet as a 'cool' phenomenon.
Evolution[edit]

Internet cafs are a natural evolution of the traditional caf. Cafs started as places for information
exchange, and have always been used as places to read the paper, send postcards home, play
traditional or electronic games, chat to friends, find out local information.

As Internet access is in increasing demand, many pubs, bars and cafs have terminals, so the
distinction between the Internet caf and normal caf is eroded. In some,
particularly European countries, the number of pure Internet cafs is decreasing since more and
more normal cafs offer the same services. However, there are European countries where the total
number of publicly accessible terminals is also decreasing. An example of such a country
is Germany. The cause of this development is a combination of complicated regulation, relatively
high Internet penetration rates, the widespread use of notebooks, tablets and smartphones and the
relatively high number of wireless internet hotspots. Many pubs, bars and cafs in Germany offer
wireless internet, but no terminals since the Internet caf regulations do not apply if no terminal is
offered. Additionally, the use of Internet cafs for multiplayer gaming is very difficult in Germany
since the Internet caf regulations and a second type of regulations which was originally established
for video arcade centres applies to this kind of Internet cafs. It is, for example, forbidden for people
under the age of 18 to enter such an Internet caf, although particularly people under 18 are an
important group of customers for this type of Internet caf.

While most Internet cafs are private businesses many have been set up to help bridge the 'digital
divide', providing computer access and training to those without home access. For example, the UK
government has supported the setting up of 6000 telecentres.

In Asia, gaming is very popular at the Internet cafs. This popularity has helped create a strong
demand and a sustainable revenue model for most Internet cafs. With growing popularity, there
also comes with this a responsibility as well. In fighting for competitive market share, the Internet
cafs have started charging less and hence are adopting alternate means to maximize revenue. This
includes selling food, beverages, game and telephone cards to its patrons.

By 2010, a variation of the internet caf known as a "sweepstakes parlor" had become widespread
in certain regions of the United States. These facilities offer entries in a contest to customers who
purchase internet usage. The result of the customers' entries are revealed using software installed
on the computer terminals, which may simulate the appearance and operation of casino games such
as a slot machine. Although meant to resemble it, these sweepstakes and software are designed in
such a way that they could legally be considered sweepstakes rather than gambling. Sweepstakes
parlors have faced scrutiny by local governments, who have argued that despite arguments claiming
otherwise, sweepstakes parlors are a form of illegal gambling, and their patrons are more interested
in playing the sweepstakes than actually using their purchased internet time. A large number of
these locations have faced raids by officials, while a number of states have enacted laws meant to
ban them.[8][9][10]
Legal issues[edit]

A notice about anti-terrorism related ID requirements on the door of an Italian Internet caf. (Florence, May
2006)

In 2003 the EasyInternetcaf chain was found liable for copyright infringement occurring when
customers used its CD-burning service to burn illegally downloaded music to their own CDs.[11]

In 2005 Italy began requiring entities such as Internet cafs to collect photocopies of the passports
of Internet, phone, or fax-using customers as a result of anti-terrorism legislation passed in July of
that year.[12]

Venues[edit]
Australia[edit]
Netcafe opened in St Kilda at the Deluxe Caf on April 4, 1995, inspired by the internet caf
phenomenon that was going on in Seattle. As Australias First Internet Caf, founders included Gavin
Murray, Rita Arrigo and Christopher Beaumont. Direct from Londons Cyberia we were joined by
Kathryn Phelps and partnerships with Adam Goudie of Standard Computers for hardware and
Michael Bethune from Australia Online, Australias First ISP for of course our Internet Access. In
1995 it was delivered via a standard analogue phone line using a 9600 Baud US Robotics Modem.

Brazil[edit]
In Brazil, the initial concept brought by Monkey Paulista was based on the business model used by
Internet cafs in South Korea, since this was the first house LAN to exist in Brazil, inaugurated in
So Paulo, starting its activities in 1998. The company closed in 2010. However, just a week later for
reasons of bureaucracy, the company Lan Game @ The House[13] was opened and today is the first
LAN house of Brazil in activity. Today it is seen as the country as a way to test new technologies and
demonstration of games and products.

Mainland China[edit]
This section does not cite any sources. Please help improve this section by adding
citations to reliable sources. Unsourced material may be challenged
and removed. (December 2010) (Learn how and when to remove this template message)
According to the "Survey of China Internet Caf Industry" by the People's Republic of China Ministry
of Culture in 2005, Mainland China has 110,000 Internet cafs, with more than 1,000,000 employees
contributing 18,500,000,000 yuan to P.R. China's GDP. More than 70% of Internet caf visitors are
from 18 to 30 years old. 90% are male, 65% are unmarried, and 54% hold a university degree. More
than 70% of visitors play computer games. 20% of China's Internet users go to Internet cafs.

Internet cafes allow individuals to go about the Internet anonymous, faster, and cheaper than at
home. Large Internet cafes of major cities in China are expensive and heavily regulated by
Government officials. Large Internet cafes are used by wealthy elite for business transactions and
social gatherings. The majority of Internet cafes are small privately owned cafes comprising 90% of
the market. (China Tightening Control, 2003) The majority of Internet cafes are unregistered
because they do not meet the requirements of government standards or they do not want to go
through the lengthy process of registering. According to Hong and Huang only 200 out of 2,400
cafes are registered in Beijing. The Chinese government is cracking down on the number of
unregistered Internet cafes because some users spread propaganda, slander, allow pornography,
and allow underage users. Crack downs by Chinese Government Officials banned 17,488 Internet
Cafes in 2002 and another 27,000 were banned in 2003. (J. Hong, L. Huang) Internet cafes that are
getting closed are being replaced with government approved businesses. These pre-approved
businesses monitor patrons activities and help the government crackdown on offending users.
(Xiao, 2003; Qiu 2003)

Milestones:

Before 1995 An Internet caf called 3C+T appeared in Shanghai, probably the first in
China. The price was 20 yuan per hour ($2.50 per hour)

19951998 China's Internet cafs proliferate. Playing unconnected games is the main
purpose of caf users. The average price was 15~20 yuan per hour.

After 2002 Heavy censorships were imposed, including real-name registration. At the end
of 2004, more than 70,000 Internet cafs were closed in a nationwide campaign.

2008 Microsoft attempts to make Internet cafs profitable in Asia and other emerging
markets. After discussions with the governments of these countries, it helps to establish safe
Internet cafs.
Indonesia[edit]
According to APWKomitel[14] (Association of Community Internet Center), there are 5,000 Internet
cafs in urban Indonesian cities in 2006 providing computer/printer/scanner rentals, training, PC
gaming and Internet access/rental to people without computer or internet access. The website [15] also
contains a directory listing some of these warnet/telecenter/gamecenter in Indonesia. In urban areas,
the generic name is warnet (or warung internet) and in rural areas the generic name is telecenter.
Warnets/netcafes are usually privately owned as bottom-up initiatives, while telecenters in rural
villages are typically government or donor-funded as top-down financing. Information on
netcafe/warnet in Indonesia can also be found in a book titled: Connected for Development:
Indonesian Case study.[16]

Currently, no special license is required to operate an Internet caf or warnet in Indonesia, except for
the ordinary business license applicable to cafes or small shops. Because of hype and poor
business planning, many net cafes have closed down. Although the number of Internet cafes are
growing, associations such as APWKomitel[17] urge new Internet caf owners to do a feasibility study
before planning to open an Internet caf, and provide a business model called multipurpose
community Internet center or "MCI Center"[18] to make the business more sustainable and
competitive. Hourly usage rate varies between Rp 2500-15000 ($0,27 - 1,60)

Japan[edit]
Japan has a strong Internet cafe culture, with most serving a dual purpose as joint Internet-manga
cafes. Most chains (like Media Cafe Popeye and Jiy Kkan) allow offer customers a variety of
seating options, including normal chair, massage chair, couch, and flat mat. Customers are then
typically given unlimited access to soft drinks, manga, magazines, Internet, online video games, and
online pornography. Most offer food and shower services for an additional fee. In fact, many
purchase "night packs" and shower/sleep in the cafes, giving rise to a phenomenon known as "net
cafe refugee" or "net cafe homeless".[19]

Malaysia[edit]
In Malaysia, Internet cafs are popular among teenagers who enjoy gaming. An Internet caf is also
known as a cybercafe. Some Internet cafs in Malaysia combine the characteristics of a F&B caf
and an Internet caf.[citation needed]

Philippines[edit]

An Internet caf in Angeles City, Philippines.

In the Philippines, Internet cafs or better known as computer shops are found on every street in
major cities and there is at least one in most municipalities or towns. There are also Internet cafs in
coffee shops and malls. High-end restaurants and fast food chains also provide free broadband to
diners. Rates range from P10 ($0.20) on streets, up to P100 ($2) in malls.

In some major cities with existing ordinances regulating Internet cafs (e.g. Valenzuela, Marikina,
Davao, Lapu-lapu and Zamboanga), students who are below 18 years old are prohibited from
playing computer games during regular class hours. Depending on the city, regulations varies on
their exact details and implementation.[20] Such city ordinances usually also requires Internet caf
owners to:
1. Install filtering software to block adult oriented sites

2. Prohibit the sales of intoxicating drinks and cigarettes inside their establishment

3. Allow open view of rented computers (i.e. no closed cubicles)

4. Front wall panel is 50% transparent to allow a clear view of the interior of the establishment

5. Adequate lighting both inside and outside of the establishment to allow a clear view of the
interior at all times
South Korea[edit]
Main article: PC bang

In South Korea, Internet cafs are called PC bangs.[21] They are ubiquitous in South Korean cities,
numbering over 20,000.[22] PC bangs mostly cater to online game playing for the younger generation.
On average and mode, use of a PC bang computer is priced at around 1,000 won per hour (about
$0.88 USD).

Taiwan[edit]
Internet cafs are omnipresent in Taiwan, and especially concentrated in major cities,
namely Taipei and Kaohsiung. The Internet caf is called a "" (Wng k) in traditional Chinese.
The first character literally means "net" and the second character is the first syllable of "caf."The
rate is consistent at about NT$10~20 in the most part, but prominent districts, such as the Eastern
District of Taipei, can charge users up to NT$35 per hour. With the growth of smartphone ownership
and free Wi-Fi networks in all major public attractions, the Internet cafs now primarily cater to
gamers, and some even provide food and drinks.

An Internet caf in Mombasa, Kenya, combined with other services.


Vietnam[edit]
In Vietnam, many people go to Internet cafs for $0.25 an hour, as it is very cheap for them. Internet
caf in Vietnamese is "Qun Nt" or "Tim Nt". 'Qun', 'Tim' mean "store" and 'Nt' means 'Net'
(Internet).

United States[edit]
Reputedly, the first kosher cybercafe was the IDT Cafe in New York Citys diamond district, opened
in the spring of 1997.[23][24][25][26][27]

India[edit]
In India, Internet cafs are used by traveling people and business is declining since the arrival of
widespread mobile Internet usage. A set of other services are also offered, such as printing of
documents or webpages. Operators also help computer illiterates through some government
processes (as a part of e-governance in India ). Low speed of mobile Internet and these services
offered by Internet cafs help its survival. In India a positive government ID is compulsory for every
cafe users in most states.

Kenya[edit]
See also: Video gaming in Kenya

Cybercafes are prevalent in the city of Mombasa, as poverty and unreliable infrastructure do not
make personal Internet a viable option for many citizens. The cafes are often combined with a
variety of other businesses, such as chemists, manicurists, repair shops, and convenience stores.
Video gaming has become particularly profitable in cybercafes in Kenya in recent years.

Cybercaf

A cybercafe is a cafe, coffee or espresso shop, or similar food and/or


beverage-serving place that has a number of personal computers connected
to the Internet and available for use by customers. Some cybercafes allow
customers to use the computers at no charge; others charge by the hour or
fraction of an hour. In September, 1997, there were estimated to be more than
1,000 cybercafes internationally. By 2001, there were perhaps tens of
thousands, with at least one in almost every small community in many
countries. In cities such as Beijing, China; Kathmandu, Nepal; and Florence,
Italy, there are now chains of cybercafes.

If you travel and need access to the Internet, a cybercafe might be one
solution. Call ahead and find out location and hours. If possible, reserve a
computer at a certain time.

Comments:

around 4 to 5 yrs back it was a reall good business, but as the broadband services started to focus
personal use internet connections for the most economical cost with unlimited offers, this business slowed
down. and out of every hundred u find max people owning a PC from their very early age and also
internet on mobiles is one more feature for simple and short access.
If u want to start one internet cafe sure opt for a nearby place to colleges, and prefer to even have Xerox,
scanner etc, it will benifit u well during their projects.

If you are living in educated as well as populated city then it will be of economic one. More over cafe must
be students and public approachable distance, otherwise they will seek the nearest place only from bus
stand or junction, something like that. Before starting the cafe check speed of the net and available net
provider at cost benifit manner. Calculate the number of system and the labour going to be employed and
other monthly expense, initial investment and esteemate the probable income then go on proceed. One
thing I want to remaind you that once after establishment you cannot resale the system because half the
rate only you can sale it. Take care. I ran the same but after a while I changed it as a education center
because of the maintanence expense. Better calculate all the ways.

INTRODUCTION
An Internet caf or cybercaf is a place which provides
internet access to the public, usually for a fee. These
businesses usually provide snacks and drinks, hence the caf
in the name. The fee for using a computer is usually charged
as a time-based rate. Internet cafs are a natural evolution of
the traditional cafe. Cafs started as places for information
exchange, and have always been used as places to read the
paper, send postcards home, play traditional or electronic
games, chat to friends, find out local information. Cafs have
also been in the forefront of promoting new technologies.
Internet cafs are located worldwide, and many people use
them when traveling to access webmail and instant
messaging services to keep in touch with family and friends.
Apart from travelers, in many developing countries Internet
cafs are the primary form of Internet access for citizens as a
shared-access model is more affordable than personal
ownership of equipment and/or software. A variation on the
Internet caf business model is the LAN gaming center, used
for multiplayer gaming. These cafs have several computer
stations connected to a LAN. The connected computers are
custom-assembled for gameplay, supporting popular
multiplayer games. This is reducing the need for video
arcades and arcade games, many of which are being closed
down or merged into Internet cafs. The use of Internet cafs
for multiplayer gaming is particularly popular in certain areas
of Asia like China, Taiwan, Hong Kong, South Korea and The
Philippines. In some countries, since practically all LAN
gaming centers also offer Internet access, the terms net cafe
and LAN gaming center have become interchangeable. Again,
this shared-access model is more affordable than personal
ownership of equipment and/or software, specially since
games often require high end and expensive PC's. There are
also Internet kiosks, Internet access points in public places
like public libraries, airport halls, sometimes just for brief use
while standing. Many hotels, resorts, and cruise ships offer
Internet access for the convenience of their guests; this can
take various forms, such as in-room wireless access, or a web
browser that uses the in-room television set for its display
(usually in this case the hotel provides a wireless keyboard on
the assumption that the guest will use it from the bed), or
computer(s) that guests can use, either in the lobby or in a
business center. As with telephone service, in the US most
mid-price hotels offer Internet access from a computer in the
lobby to registered guests without charging an additional fee,
while fancier hotels are more likely to charge for the use of a
computer in their "business center." For those traveling by
road in North America, many truck stops have Internet kiosks,
for which a typical charge is around 20 cents per minute.
Internet cafs come in a wide range of styles, reflecting their
location, main clientele, and sometimes, the social agenda of
the proprietors. In the early days they were important in
projecting the image of the Internet as a 'cool' phenomena.
Building up an internet cafe seems so easy from outside. It
feels as if one just needs to pull some chairs and tables, few
computers and an internet networking system, and here goes
the flourishing business. One has to take many steps and
decisions to make his business successful. It needs a lot of
patience, administrative quality and leadership skills to
maintain an internet cafe. Running an internet caf is quite
challenging job as you have to deal with the employs,
customers, the safety on internet, environment of the cafe
and the quality of internet. One has to satisfy everyone, has
to keep an eye on because there is lot of competition in this
field too. It might difficult at the beginning, because there
were not many resources. But nowadays, with the invention
of high...

An internet caf or cybercaf is a place where one can use a


computer with Internet access, most for a fee, usually per
hour or minute; sometimes one can have unmetered access
with a pass for a day or month, etc. It may serve as a regular
caf as well, with food and drinks being served. | |

[pic]
Cyberia: one of the world's first Internet cafs, London, 1994
The internet cafe phenomenon was started in July 1991 by
Wayne Gregori in San Francisco when he began SFnet
Coffeehouse Network. Gregori designed, built and installed 25
coin operated computer terminals in coffeehouses throughout
the San Francisco Bay Area. The cafe terminals dialed into a
32 line Bulletin Board System that offered an array of
electronic services including FIDOnet mail and, in 1992,
Internet mail. See SFnet Press Archive The concept and
name, Cybercaf, was invented in early 1994 by Ivan Pope.
Commissioned to develop an Internet event for an arts
weekend at the Institute of Contemporary Arts (ICA) in
London, and inspired by the SFnet terminal based cafes, Pope
wrote a proposal outlining the concept of a caf with Internet
access from the tables. The event was run over the weekend
of 12-13 March 1994 during the 'Towards the Aesthetics of
the Future' event. In June 1994, The Binary Cafe, Canada's
first Internet caf, opened in Toronto, Ontario. After an initial
appearance at the conference site of the 5th International
Symposium on Electronic Art, ISEA, in August 1994, an
establishment called CompuCafe was established in Helsinki,
Finland, featuring both Internet access and a robotic beer
seller. Inspired partly by the ICA event, a commercial
establishment of this type, called Cyberia,[1] opened on
September 1, 1994 in London, England. The first public,
commercial American Internet cafe was conceived and
opened by Jeff Anderson in August 1994, at Infomart in
Dallas, Texas and was called The High Tech Cafe.[1] Next, in
the USA, three Internet cafs opened in the East Village
neighborhood of New York City: Internet Cafetm, opened by
Arthur Perley, the @ Cafe, and the Heroic Sandwich.[2] A
variation of Internet caf called PC bang (similar to LAN
gaming center) became extremely popular in South Korea
when StarCraft came out in 1997. Although computer and
broadband penetration per capita were very high, young
people went to PC bangs to play multiplayer games. [pic]

A solar powered Internet caf in San Juan del Sur, Nicaragua.


Internet cafs are located worldwide, and many people use
them when traveling to access webmail and instant
messaging services to keep in touch with family and friends.
Apart from travelers, in many developing countries Internet
cafs are the primary form of Internet access for citizens as a
shared-access model is more affordable than personal
ownership of equipment. A variation on the Internet caf
business model is the LAN gaming center, used for
multiplayer gaming. These cafs have several computer
stations connected to a LAN. The connected computers are
custom-assembled for gameplay, supporting popular
multiplayer games. This is reducing the need for video
arcades and arcade games, many of which are being closed
down or merged into Internet cafs. The use of Internet cafs
for multiplayer gaming is particularly popular in certain areas
of Asia like China, Taiwan, South Korea and The Philippines.
There are also Internet kiosks, Internet access points in public
places like public libraries, airport halls, sometimes just for
brief use while standing. Many hotels, resorts, and cruise
ships offer Internet access for the convenience of their
guests; this can take various forms, such as in-room wireless
access, or a web browser that uses the in-room television set
for its display (usually in this case the hotel provides a
wireless keyboard on the assumption that the guest will use it
from the bed), or computer(s) that guests can use, either in
the lobby or in a business center. As with telephone service,
in the US most mid-price hotels...

How To Start Internet Cafe Business In India?

Internet caf or simply cyber caf is the place where people hang out
to use high speed internet and other computer services including
games. You sell your services per minute or per hour. Internet caf is
becoming popular among teenagers and also tourists. Food and
drinks can also be served to the customers.

Requirements for the business


The cost of the business setup depends on the number of computers and
the extent of services that you are planning to provide. The basic
requirements for the business are

1. Client computers
2. Internet connection high speed
3. A server computer to control all the client computers
4. Other hardware components related to networking
5. A stall for selling drinks and snacks
The hardware components would not add much to your budget. The total
cost of setup depends on the type of network you are planning to use. If
you are planning to opt for wired networking, the hardware components
would increase and make the space congested.

Profitability of the market


70% of the youngsters own a device through which they can access internet.
Thus, people usually are endowed with devices like smartphones, laptops or
desktops that restrict their foot prints in a cyber cafe. The internet cafe usage
in India was 85% in 2008-2009 and today it is lower than 15%. To gain a
market place in this business, you should provide a little more than just
internet. Let it be games or graphic design services or anything related to
internet that would attract the people. The environment should be pleasing
and the computers should be free from virus and spam.

There is always an internet cafe near your business, to steal the


dissatisfied customers from you. The niche places for the internet
cafe are near educational institution, lodges and hotels where you
can find a lot of youngsters. Alternatively, you can find the place
where the power cuts are more common and use generator powered
internet cafe to attract the bored local people.

Return on investment

Let us consider a tier 3 location where the rent for the spacing would be
around 4000 rupees. The internet lease line would be approximately 3000
rupees per month. A second hand computer with all required elements
would come around 30,000 rupees. If you are taking up a loan for buying
7 computers (6 client computers plus one server), the EMI would be
approximately 7,000 rupees per month (for three years)! The total fixed
cost for your set up would come around 14,000 per month.

The electricity used can be assumed as one rupee per hour. You would
need 1500 hours to breakeven your fixed cost alone with a browsing rate of
10 rupees per hour. If you open the cafe for six days a week and for twelve
hours, it would account for 1800 hours (25 * 12* 6 computers). Thus, only
if your cafe is 83% full, you would be at least able to break even.

The only way to make profit in this industry is to provide other services
like scanning (5 rupees per page), printing (3 rupees per page), booking
railway tickets, paying electricity bills and so on.

Support staffing

Managing an internet cafe is one mans job. But, it is always better to have
a semi-skilled person for helping you to collect ID, note the time, take
print outs and other processes. You can also hire a network skilled person
who can take care of the performance of the computer and also help you in
the additional services.

Important tips:

1. Attract a lot of new customers by providing discounts for the


login tickets.
2. Add all additional services like scanning, printing, burning CD,
faxing and others.
3. Add gaming services to increase the foot print of youngsters.
4. Using multiplayer games would increase traffic to your cafe.
5. Sell small hardware products and accessories like printing
paper, mouse, compact discs, pen drive, stationery items,
mobile recharge and so on.
INTERNET CAFE
An Internet caf is a place which provides internet access to public for a fee. Internet
cafs have become more popular since the first Internet caf started in July 1991 by
Wayne Gregori in San Francisco named as SFnet Coffeehouse Network. Subsequently in
June 1994, The Binary Caf, Canadas first Internet caf started in Toronto, Ontario. To
cope with the increasing demand for Internet access new Internet cafes have come into
play.

In India many people go to Internet caf to carryout their day to day online activities.
Most of the people are aware of how to use Internet for meeting their needs. We usually
go to Internet caf for checking our mails, chat with friends online, play online games,
book travel tickets, etc. The same Internet caf used by a common man is also used by
Anti-social elements, Criminals and terrorists to perform their illegal activities over the
Internet. Hackers sometimes install malicious software on the public computers in
Internet Caf in order to get sensitive information from the users who are visiting that
particular Caf.

The Internet caf owners have to follow the guidelines to prove their innocence in case
of any incident. Let us see a case with cyber crime cell of pune. A mail was sent to pune
police commissionerate threatening disruptive activities during Ganesh Puja. Police were
trying to trace the person who sent the email, they arrested owners of the Internet caf
from where the email was sent on August 25,2012. Police arrested the owner of
Internet cafe for not verifying the credentials of the customer who sent the threat mail
and for not keeping any record of the customers. In this case if the owners have
followed the rules they might have proved their innocence. This incident have made it
clear that Internet caf owners should follow the guidelines strictly.

Not only should the owners of Internet caf, users visiting the Internet caf also take
certain precautions to surf the web safely in order to avoid hackers. Let us see some of
the guidelines issued by Government of India for Internet caf owners; and also some
useful tips/guidelines for users visiting Internet caf.

GUIDELINES FOR INTERNET CAF OWNERS


Maintain a register for Identity of the visitor.
The Identity of the visitor/User shall be established through Voter card, identity
card, ration card, driving license, passport or PAN card.
If any activity of the visitor is suspicious the owner of the cybercaf should inform
to the near by police station.
GUIDELINES FOR INTERNET CAF VISITORS
Never pass or tell the Cyber Cafe Owner or anyone else in Cyber Caf about your
email username and password to check your e-mail. This may sound little bit odd but
the surveys saying that small kids or many old aged persons have no idea about the
risks of information theft. Username and passwords always be entered by their owners
and at most you may request for guidance to reach login page.
If you store or download any personal information on Desktop in cyber cafe make
sure you delete all the documents after you are done with your work.
When surfing the Internet, you always should check about the browser security to
avoid risks of exposing personal information such as disabling the option Remember
my ID on this computer. User ID or Username also should be secured along with
password to avoid trail passwords by next user.
A keylogger is basically spyware and logs or records your keystrokes so that your
username and password are made available to Cyber cafe owner or any Attacker.
Some of Cyber Cafes may use Hardware key loggers so that you check that there is an
intermediate device between your keyboard and CPU.
Whenever you go to Cyber Cafe, make sure that it has up to date Anti Virus and
Anti spam software. These may help to stop some of the key loggers, Trojans and
other malware. .
Do not surf the web through already opened web browsers, open a new web
browser to surf the web.
Don't leave the computer unattended with sensitive information on the screen.
Disable the feature that stores passwords.
Don't enter sensitive information into a public computer.
Force Cyber Cafe Owner to allocate you a computer loaded with updated
antivirus software.
Finally, always make sure to logout properly when you leave Cyber cafe.
Information Security Awareness for
Children
Hey Kids!
Do you access Internet?
If yes, Internet has considered itself as a greatest platform and technology in this century and
become an integral part of our daily lives. It helps us as a learning and communication tool and
offers us a wide range of opportunities. It is an invaluable source of knowledge and encourages
creativity and imagination.

Do you follow ethics?


Internet ethics implies your behavior while using Internet .You should be aware that you should
always be honest, respect the rights and property of others on Internet

Step 1 : Do you share about Internet access with your family?

Sharing about Internet activity with family members is the first step to being safe in Internet. Our
parents always love us and look about our safety so that they would be with us in all difficult
periods. So let we share each and every thing what we do and face in Internet.
Step 2 : Do you use family Computer?

If yes, we need to follow guidelines and rules of family for accessing Internet as our family
members may use for different purposes like banking, shopping etc. and sharing such sensitive
information with online friends may cause for huge losses in financial terms. So before using
family computer, follow family rules.

Since most online games or videos may required credit card requirement to play or see to access
and some times family members may left this information in common computer. Without their
permission, we do not use the same.

Step 3 : Do you love to see videos?

Watching videos in Internet always fun and enjoyable. But the same time there are risks like
malicious links that could take you to inappropriate or illegal content. If you encounter any such
activity, intimate to your family member.

Remind Family Members that people met online may be strangers

Step 4 : Do you follow any celebrity in Internet?


Like any other children, we follow and chat online about our favorite celebrities in all kinds of
fields. There are lots of celebrity sites, and the ones operated by the celebrities themselves or
entertainment news publishers are fine.

We need to be extra care of fan sites that turn up in search results but aren?t actually run by the
celebrities and the people who cover them. It?s not always easy to tell, but at least they?re
usually lower down in the search results

Step 5 : Do you believe everything is right in Internet?

It's common for students to think, Everything is on the Internet is true. But it is collection of
lot of member?s views as they can write and post without any guidance and control. The Internet
contains a wealth of valuable information, but it often is difficult to accessibility, low cost and
wide distribution, the Internet is great medium for disseminating falsehoods and inaccuracies.

It is very valuable, of course, but you should realize there are still biased views and information
to market their products and agenda. We need to be careful and confirm the same by going in to
various sources of Internet.

Step 6 : Do you love to play games?

Yes, Children love to play games. We always love to play online games and extend our arms to
further with unknown members Internet is great opportunity for all of us to extend our friend
circles. Some web sites are needed credit card details to play even though they are free. But we
always play free games in Internet

At the same time, we also should know that there are risks that if we share credit cards of family
and the same time automated charges are also burden to family. The details and identification
passed to the web site may open to others so that the identification theft may occur.
Step 7 :Do you love to be Social?

Yes, Children are social. We always in touch with friends and extend our arms to new members.
Internet is great opportunity for all of us to extend our friend circles.

At the same time, we also should know that there are social reasons why kids are hacked. The
bullying is common as some of kids or hackers tries to post embarrassing messages by using
shared password or post links to malicious sites.

We should not to share passwords, even with their closest buddies, and always to close out of
accounts when they?re finished using computers shared with other people ? especially those used
in public, such as at school or public libraries.

Step 8 : Do you keep open your identification?

For Hackers or Attackers, Children Identification is much valuable. The criminal gets as
much as information about children such as name, address, class, school name to target them.
The collected information may be useful for guessing passwords of children and their parents as
in general passwords of family members and related with family names. Also further they may
use the same information for making friendship through online with you to get know about your
family and consequently they may apply credit cards on your family member names. It is
suggested to children for not to share any information related to sensitive and financial aspects in
social networks and maintain privacy with known and unknown members.
Information Security Awareness for
Student
Internet safety is every ones responsibility. Its all about being able to have fun online
to be able to chat with your friends, to post a video that youve made or a song that
youve written, to be free to find out more about information youre interested in and
check out the latest trends - without being bullied, annoyed or scammed, or having your
ideas stolen including identity theft.

Internet safety is a lot more than just about ensuring that your computer has the latest
anti-virus and firewall software installed. Its about being smart about how you handle
yourself online and savvy about how you deal with other people (especially strangers
who you meet online), and not falling prey to an online scam artist who takes advantage
of your ignorance

Why is it important to stay safe online?

Most of us are connected via our laptops, mobile phones, tablets or personal computer.
The potential for the internet to be a valuable and a fun resource for entertainment,
making friends, keeping in touch and learning is huge. But if you use the internet without
safety awareness, you could be at risk of illegal activity or abuse - be it bullying, fraud or
something more serious. Unlike seeing someone face to face, on the net, people aren't
always what they first seen.

In the same way you learn about safety when you leave the house, it is important to
learn how to stay safe online. These are skills that will stay with you for life time.

Some Golden Rules to follow when youre online

Don't give out personal information such as your address or phone number.

Dont send pictures of yourself to anyone, especially indecent pictures.

Don't open emails or attachments from people you don't know.

Don't become online friends with people you don't know.


Never arrange to meet someone in person whom you've met online.

If anything you see or read online worries you, tell someone/inform your parents
about it.

ISEA-Awareness Program will always gives you tips and suggestions for the
teenagers/students for online safety. Do follow these guidelines/ steps before using the
internet.

Step 1 : Using a Web Browser

The internet is a way to stay connected with friends and family. For many Students, its
also a way to stay current on news, research information or shop online and
downloading books, online applications etc.,. The Internet has also become a popular
method for banking, paying bills and completing and submitting applications and forms.

Using the Web browser is easy, to do things online, but there can be some hidden
dangers to you and your computer. These risks can include exposure of sensitive
personal information and infection by malware, which includes viruses, spyware, and
adware. Safe browsing means being aware of these online threats and taking the
necessary precautions to avoid them.
It only takes a little bit of effort, a few tools, and some basic information to be safe as
you browse the Internet. Follow these guidelines to protect your personal information
and your computer online.

Install and maintain up to date anti-virus software on your computer or device.

Keep your internet browser up-to-date

Be alert to unusual computer activity or problems.

Install and maintain a firewall on your computer.

Use a modern browser with features such as a pop-up blocker.

Avoid storing sensitive material indefinitely on your computer.

Change your passwords often.

Beware of links sent via instant messaging and e-mail attachments.

Step 2 : Making friends

We all know it's not healthy to spend hours and hours in front of a computer screen. But
another problem with social networking is the pressure you can feel to make sure you
have lots of friends. But here are some things to remember:

Friendships made online are made by clicking a button rather than talking to
people and sharing experiences.

Being online friends with someone is much less meaningful than face to face
friendship.
You can easily fall out with an online friend because of a misunderstood
comment.

It is far easier, and healthier, to sort out arguments and problems when you can
talk to someone face to face

So although you might know someone who likes to boast about how many friends
they've got on their social networking site, remember that real friendships aren't made
by computers.

Tips to stay safe on social networking sites

Make sure you're old enough to join

Maybe use a made up name or nickname on your profile.

Do not make friends you don't already know personally.

Maybe use an email address that does not include your name.

Use the strongest privacy setting when you set up your profile. This means that
only your friends will be able to view your information.

Pictures and Videos can be shared very careful when uploading-even if you only
share it with friends,it can easily be spread much further

Be very careful about sharing content online - especially if it isn't yours to share
.Illegal downloads definitely should be avoided.

Step 3 :Smartphone Security


We no longer rely on our phones for just calling friends or family. With modern
smartphones we can do a wide range of tasks; everything from browsing the Internet
and paying your bills to checking your bank statement and accessing work emails.
Because smartphones are so advanced many of the security issues were exposed to
through our computers now exist on our smartphones.

What risk does it pose?

Device loss or theft. Losing a device to mishap or theft can cause lost
productivity, data loss, and potential liability under data-protection laws.

Loss of sensitive data. Many mobile devices may contain sensitive or confidential
information, for example, personal photographs and videos, email messages, text
messages and files.

Unauthorised network penetration. Because many mobile devices provide a


variety of network connectivity options, they could potentially be used to attack
protected corporate systems.

Intercepted or corrupted data. With so many business transactions taking place


over mobile devices, there is always a concern that critical data could be
intercepted via tapped phone lines or intercepted microwave transmissions.

Malicious software. Viruses, Trojan Horses, and Worms are familiar threats to
mobile devices it has become a significant target.

How can I avoid it from happening?

When choosing a mobile device, consider its security features and ensure they
are enabled.

Install and maintain an Anti-Virus application on your smart device.

Do not follow links sent in suspicious email or text messages.

Carefully consider what information you want stored on the device

Be cautious when selecting and installing applications


Avoid joining unknown Wi-Fi networks and using unsecured Wi-Fi hotspots.

Disable interfaces that are not in use, such as Bluetooth, infrared, or Wi-Fi.

Delete all information stored in a device prior to discarding it.

Information Security Awareness for Family


Internet has become a necessary tool for the Family. Home computers or Mobiles are often
shared with every member of the family, including children and teenagers. The Internet can
connect you and your family to all types of resources. Using computer with internet, you and
your family can read the latest news, look up for information, do online shopping, do online
booking of household items, listen to music, play games, buy things, or e-mail friends. The
possibilities for learning and exploring on the Internet are endless. However, not all information
and resources are safe and reliable.

How to make sure you and your family's experience on the Internet is safe, educational, and fun
Both online shopping and the downloading of software or files need to be discussed with all
members or supervised by adults to make sure your personal and financial information remains
safe and secure.

The very nature of the Internet helps to connect to people and resources which have some risk of
people intruding into your system. There are also other types of threats, such as companies that
track what you do on the Internet. While there is no guarantee that you will be safe on internet,
but there are many things you can do to protect yourself and family members while using the
Internet. The Internet can be a helpful source of information and advice, but you and your family
members can't trust everything you read. Anyone can put any information on the Internet, and
not all of it is reliable. Some people and organizations may take the necessary steps and take care
about the accuracy of the information what they post. In parallel, some may give false
information intentionally.

When you and your family surf the Web it's important to keep the
following in mind:
Online information is usually not private.

People online are not always who they say they are.

Anyone can put information online.


You can't trust everything you read online.

You and your family may unexpectedly and unintentionally find material on the Web that
is offensive, pornographic (including child pornography), obscene, violent, or racist.

So ISEA-Awareness Program always provides tips and suggestions for the whole family
members. Please follow the steps before chatting, participating in social networks, shopping
online or downloading files, games or other software to be safe online.

Step 1 : Secure your home Wi-Fi network.

Your home may be connected with Wi-Fi now and it allows your family to access the Internet
from all over your house, which makes it harder for you to control the Internet activity and
sharing information. If it's not secured properly, intruders might use your bandwidth, or
compromise your Internet security by infecting your devices with malware. Further they may use
your devices or systems, as bots for sending the attacks from your systems to other's systems or
infrastructure.

Change the default admin password with a secured one.

Make sure your Wi-Fi device is highly secured

Make use a strong password for accessing your router.

Enable wireless encryption to prevent strangers from "seeing" your network and restrict
access to it.

Allow only specific devices to access your wireless network. Every device that is able to
communicate with a network is assigned a unique Media Access Control (MAC) address,
so use them.
Use filtering options to avoid unnecessary websites with inappropriate content.

Step 2 : Consider Common Place for Computer to Children and


Family

Placing the family computer at common room where family members gather is one of most
important thing in a home for children and aged. You can help, monitor them so that they always
safe on Internet. It also helps you to control the no. of hours of usage of computer by your
children and useful for aged to continued learning with latest technologies through Internet.

Step 3 : Set Family Rules for Accessing Internet

One way to help family members is to frame Dos and Donts rules for accessing Internet. It is to
set clear rules, standards for using computers and other electronic devices like smart phones and
tablet computers. You may consider:

Telling your family members like children to ask for your permission before they access
the Internet.

Setting time limits for computers and other devices, per day or per week, and what time
of day is OK.

Limiting your child to social networking sites that you approve, if you decide to allow
them to use these kinds of sites.

Joining social networking sites that your child uses, so you can monitor what they share.

Remind Family Members that people met online may be strangers


No matter how often you chat with online "friends," no matter how long you've been chatting,
and no matter how well you think you know them, people you meet online are strangers.

It is easy to lie and pretend you are someone else when you are online. Children especially need
to know that a new "friend" may really be a 40-year-old man rather than someone their own age.
So please remind your family members that people met online may be strangers

Step 4 : Understand the need and set boundaries for online safety

As different family members may require different things to access Computer and Internet,
together, agree Upon Family Rules in accessing Computer and Internet, Decide exactly what is
okay and what is not okay with regards to

Access of various web sites that appropriate to visit,

Using chat rooms and forums which can be monitored

Creating Usernames that never reveal true identity or that provocative

Create Strong, Unique and Easy to remember Passwords for online account

Pledge to not to share or post any sensitive information like phone numbers, names of
family members that reveals family members identity

Promise your family members not to post inappropriate photos or ones that may reveal
your identity (for example: city or school names on shirts)

Without informing family, never meet face to face meetings with strangers who met
online

Promise for not responding e-mails and attachments from strangers

Any irritated activity such as cyber stalking, bullying etc and strange behavior computer
and applications, promise to inform and discuss with family members

Follow Privacy Rules


Social networks or websites that require basic information from you when you create an account
with them - Facebook, Google+ etc. - have privacy policies. Every time you (or a family
member) want to join a new network, read the privacy policy carefully so that you know how/if
its creators intend to use your information in any way, and what measures they take to prevent
internet security dangers such as phishing and identity theft

Step 5 : Sign for Agreement and Online pledge among family


members for appropriate online behavior

Prepare an agreement for online behavior so that that there is a clear understanding among all
family members on appropriate usage of computer, Internet usage. This helps all family
members safety in Internet access.

It is also recommended that the members of family to pledge for computer and Internet safety as
said below

PLEDGE

As the Computer and Internet is a privilege for acquiring knowledge, surfing the things to know
how, work, play, chat, and connect which I do not want to lose and for my safety and my family
safety, we have agreed on online safety and behavior

I will follow all of the safety and security rules of my computer and Internet access

I will not reveal my identity including my phone number, my address, or my passwords


with anybody

I will never meet in person with people I met online. In case if required I only meet along
with my family members

If I find myself in an situation where I am uncomfortable, unsafe or abnormal behavior of


any device, I promise to let my family members (my parent/guardian/teacher) know so
that they can assist me

I commit to this pledge and help in my safety, my family safety and also to my country
safety to enable cyber safe India.
As your parent/guardian/teacher, I promise to make myself available to you when you
ask for assistance and will help you resolve any problems that may arise in any way that I
can

Step 6 : Secure Your Computer

Crackers, hackers, and identity thieves are looking to steal your personal information ? and your
money. But there are steps you can take to protect yourself, like keeping your computer software
up-to-date right from operating System to applications The attackers constantly develop new
ways to attack your computer, so your operating system, security software must be up-to-date to
protect against the latest threats.

Today's operating systems are more sophisticated and feature-rich than ever before, which makes
them substantially more useful to the enterprise but also adds to security vulnerabilities. The first
important step is to check if you have the latest security updates and patches available for your
Windows, Linux, MAC and any other operating system, which you are using.

After you have installed your security updates for your operating system, make sure you have
created a Restore Point for your installation. You can create the Restore Point as soon as your
Operating System installation is ready and name it clean installation and then you can continue
installing drivers and applications. In case one of the drivers causes issues on the system, you can
always go back to the clean installation restore point.

Step 7 : Keep your software up to date

It is important to have not only your operating system up to date, but also the software you are
using, therefore make sure you have the latest updates and security patches for your main
programs and applications. Since it is a well-known fact that hackers try to exploit popular
software , such as Java, Adobe Flash, Adobe Shock wave, Adobe Acrobat Reader, Quick time or
popular web browsers like Chrome, Mozilla Firefox or Internet Explorer, always make sure you
have the latest available patches. Since these pieces of software are always under threat from
criminal minds, don't just rely on your memory to manually update every program or application
you have installed.

Make sure you have security software that protects your computer against viruses,
hackers, and spyware.

The software should be updated frequently, as new threats are emerging daily. Ideally,
security that updates automatically

Step 8 : Install Antivirus, Desktop Firewall solutions against


malware and unauthorized access

Install Antivirus, Desktop Firewall solutions against malware and unauthorized access popular
vendor as it is very important to have a reliable security solution on your computer system,
which should include real-time scanning, automatic update and also firewall functionality, which
can control unauthorized activity

You may use some security software to protect your computer and your data and assure that the
security software having minimum three components anti-virus, anti-spyware, and a firewall.

Use Parental Controls

Most of vendor based tools provides Parental Control based tools and use and enable Parental
Controls to filter and block inappropriate material and protect children from online attacks,
exposing to risks, strangers, inappropriate content and other threats. These tools may not
sufficient to secure all threats so that you have to monitor and observe the members behavior
while they accessing Internet
Step 9 : Back up your system

You updated the operating system and your system applications and you have installed additional
security products for your system safety. The steps above are meant to keep you safe from
malicious software and online threats, but you may still encounter hardware issues that could
endanger your private information. To make sure your data stays safe, you should be using a
twofold strategy, which should include combining an external hard drive usage with an online
backup service.

We need to emphasize the importance of having a back-up solution, which provides stability so
that you won't have any problems and allows you to synchronize your files with the online
backup servers and provides some sort of security, such as encryption capabilities.

Step 10 : Use separate standard user accounts for family


members

Modern Operating Systems grants a certain level of rights and privileges depending on what kind
of user account you have. You may have a standard user account or an administrator user
account.

It is recommended to use standard accounts for your family members to access computer to
prevent users from making changes that affect everyone who uses the computer, such as deleting
important files necessary for the system.

In case you want to install an application or make security changes, Operating System will ask
you to provide the credentials for an administrator or root account
Using a standard account you make sure that a piece of malware which infects a limited-user
account won't do much damage as one infecting a root or an administrator account. It also helps
you to monitor the activity of users and control the software access to family members.

Step 11 : Create strong and easy remember passwords for your


accounts.

Any hacker who wants to breach your online accounts and steal precious information or your
identity can easily crack with a weak password of you. A basic internet security rule is to create a
strong, unique and easy to remember password for each online account and change it regularly:
make it long (at least eight characters), mix letters, numbers and symbols, and opt for security
questions (whenever the possibility is provided) to which only you know the answer. Teach your
family members to do the same

To create passwords that are strong unique and easy to remember


Start by using at least 8 characters minimum

Use a combination of letters, numbers, and symbols (all variety of keys in a key board
including Capital and Small letters).

Passwords should be changed periodically to reduce the likelihood of a particular


password being compromised over time.

Techniques for easy and strong passwords :


For easy to remember, Use a Passphrase: "I love my child who always invites me with
her great smile" - Ilmcwaimwhgs" (key : all first letters of words in passphrase)

Change small letters to Capital letters of even position letters - ILmCwAiMwHgS (key
becoming stronger password)

Now change wherever i=!, g=9, s=$, (personal keys you have to remembers for all your
password) so that your password becomes more stronger than before. ?IlmCwA!MwH9$
For making unique passwords, create as many as pass phrases and words for different
passwords to different accounts. For example

o shopping - $h0pp!n9 (S =$, i=!, g=9, o=0)

o banking - bank!n99 (one more 9 is added as "banking" is with 7 letters)

o Social Network - $0c!alNetw0rK

o Windows -w!nD0W$9

o GNULinux - 9NuL!NuX

Do not share your personal keys and type of passphrases to any body

Also remember that do not share usernames too with strangers as even they knowing
passwords without user IDs are useless.

Create your IDs which cannot reveal your identity

o for example your name is Mr Ch A S Murty, The user ID chasmurty is always


gives identity of him. Instead of chasmurty, murch9 user ID may not reveal the
same.

Step 12 : Secure your web browser before accessing Internet

The main interface in computer between you and your access to Internet is Internet Browser and
it is very important to secure it before accessing Internet.
Even though, you secured your operating system, applications except your browser, it may like
open invitation to the attackers as the browsers helps them to take your private information from
your computer. To stay safe while accessing Internet through browsers, make sure you follow
and respect the following

Always choose a latest or up to date version of browsers

Always consider the right settings for security in browser settings


Always Block pop-ups and allow only for trusted web sites depending on requirement or
temporarily

Choose a private browsing session about a web site, which you are not sure about.

Step 13 : Be careful online and don't click suspicious links

To make sure that clicking on dangerous links won't affect you and your family, as you hover the
mouse over the link to see if you are directed to a legitimate location or not. If you were
supposed to reach your favorite news website, such as "www.india.com", but the link
indicates "2wffer21.net", then you should resist the urge of clicking the link.

Most of us use shortening services for their links, such as goo.gl or tinyurl. But in some cases an
unknown link may send you to a malicious site that can install malware on the system.

Step 14 : Ensure safe browsing for everyone, even for grand


parents!

Web browsing is probably the one thing everybody's good at in the online world. But remember
that cyber crooks know and use this fact to their advantage. They can push up fake web
addresses in your search results to make you visit their malicious websites and trick you into
giving up personal details or downloading spyware and malware. This is why you need to install
an effective Safe Browsing tool
Step 15 : Download and install software from trusted sources
only.

Free games, music, movies etc. are available for download all over the Internet. They
are also very tempting and may attracting for children and other family members. But
some of them contain spyware and other types of malware that can compromise your
whole family's Internet security

Make a list of trusted downloading sources and have your whole family stick to it. Also,
read carefully the license agreement before installing a new piece of software and make
sure your kids ask for your permission before they download or install something.

Information Security Awareness for


Women
Since ages, women were taught how to be safe and how to maintain privacy. They were
made aware about identifying positive and negative of the opposite person to protect
themselves. With these practices, women grew stronger and became independent.
Women are considered equal to men in todays generation. Now many women are
leading as entrepreneurs creating jobs for others, as home makers-keeping the family
safe,as Bank Managers-managing people and resources and also in other leading roles.

Though this is current situation in this modern world, women are still found to be victim
in many cases and are bearing pain and loss in both personal and official lives.
An age old practice is still continuing today in the form of harassment, blackmailing etc.,
Todays cyber world or virtual world have open up new ways to reach out women attack
them. The use of cyber space and its attendant anonymity continue to influence
negatively the social and cultural aspects of society.

While there are many security tools and spaces available where women can enjoy the
benefits of the cyber world, lack of awareness on how to use things safely and securely
is making women more vulnerable to cyber-attacks than men.

In cyber world women are subjected to harassment via email, morphing, cyber
defamation, Social Networking, hacking, cyber-stalking, cyber pornography, cyber flirting
and cyber bullying.

Some awareness best practices and Tips can help women to be safe from these cyber-
attacks and protect them and their families.

As part of this project, Information Security Education and Awareness, we are trying to
spread this awareness to women and help them to follow the best practices in using
Internet, Smart phones and various other new cyber technologies through which attacks
are most likely to happen.

1. Do you have email account?

2. Do you have social networking account?

3. Do you use smart phone?

4. Do you have smart washing machine or smart refrigerator?

5. Do you buy groceries online?

6. Do you buy items online?

7. Do you use WhatsApp, Instagram, viber ?

If answer to any of the above questions is yes from you, then please proceed reading
the following articles. They are just for you.
The following are few simple and quick tips for Women in the cyber world

Beware of fake profiles

Maintain your privacy online

Check your account settings regularly

Dont let others peep into your accounts

Avoid participating in chat rooms, they are not for us.

Dont be happy if someone praises you online

Do not get motivated for likes on your pics and upload more

Information Security Awareness for


System/Network Admin
As information infrastructure and Internet became more complex and larger, it also
became critical to maintain systems up and running all the time with respect to security.
Though the system administration tasks became easier in recent years, system
administrators need to be more updated on the systems and network Security they are
managing. In recent years, all systems are exposed to Internet; there is increased
challenge on System Administration/Network Administration for maintaining and
protecting from the attackers.

System Administrators are primarily responsible for keeping systems/computers/network


devices to work smoothly and securely in any organization. Further they are also
responsible for the continuous operations of the networks and computers to the end
users for their business needs. It is very important to the System Administrators to keep
the information as much securing the system and network devices in the organization.
By following simple practices/standards during their administrative functions, they can
maintain the security of IT devices. The practices for security also help in reporting
security incidents at an early stage and take corrective measures so that they can safe
guard the business. As part of Awareness, ISEA Phase-II introduces best practices and
guidelines for systems and network devices.

If the System Administrators are more cautious and follow good practices during routine
administrative tasks. It would be easy to maintain and secure IT systems and networks
in the organization. The system admin should have their own policy as per the
organization policy:

Because to maintain system intact as per the organization policy

To give seamless support to the end users

Every organization must have an overall policy that establishes the direction of
the organization and its security mission as well as roles and responsibilities.

There can also be system specific rules to address the policies for individual
systems, network and application security.

These policies should be included in the employee handbook and uploaded on a


company intranet site.

Before keeping the system and network devices in the work place or in the existing
network, it is very important to follow some of the best system/network practices

Harden the Operating System before keeping into the network

Harden the Integrated OS and its applications installed

Have all the network architecture in one place

Harden the network by using the vulnerability Assessment process for any open
ports and any vulnerable applications

Harden the Servers by running least services which is actually required


Always have an knowledge update on the security loopholes of the systems and
networks

Always provide the physical security to the internetworking devices attached to


the network

Always Document the systems/Networks configurations and whenever any


changes happen

Monitor Your Systems Periodically by downloading the system/network logs

System Administrator and Network Admin need to educate users and help-desk
personnel about basic security issues and practices to follow

Information Security Awareness for


Police
In this age of Technology advancement, computer and information technology have not
only brought convenience to citizens in modern life, but also encouraged lawbreakers to
take advantage of advanced technology to commit crimes through various modus
operandi. The Cyber Security awareness for police personnel has been dedicated to
fighting technology crime, striving to maintain law and order in cyberspace so as to
ensure that citizens of India remains digitally safe .

Police Personnel should have a Good Understanding of the Technology, the working of
the devises, how internet works, how the citizens are targeted for online fraud and tools
and techniques to investigate and bring the culprits to Justice by understanding the
different IT laws.

Awareness for the police is very much important to understand the various issues
related to cyber world and safety guidelines which help them to save themselves and
promote/share them with general public to participate securely while using internet.
Information Security Awareness for
Teacher
Teachers are very important in any society. Creating good citizens is the great role of
teachers in the society.The teacher is a good source of inspiration to students. Teachers
are encouraged to foster a love for learning in their students. Teachers act as the
advisers to parents as well. The teachers serve as guardians of the child's interests. A
teacher should consider it his duty to educate and train his students and should feel
responsible for it. He should feel that his students have been entrusted to him and he
should avoid any breach of the trust the society has reposed in him. He should be a
sociable person with his roots in the society. A teacher should be aware of the internet
and its advantages and disadvantages. Creating cyber security Awareness is very much
required for a teacher to impart the knowledge about pros and cons of internet usage
and safety tips for online presence. In turn the Teacher should be aware of the cyber
threats and how to safe guard himself and disseminate the knowledge to all students
and parents. Cyber Awareness on this page are aimed at assisting teachers to
understand and teach some of the issues about information security, cyber safety, cyber
bullying and the Guidelines to be safe online.

Information Security Awareness for


Govt. Employee
All Government employees should take responsibility when using the department's
Information Communication and Technology (ICT) facilities and devices which include
access to systems, networks and services such as internet, phone, email, printer, Wi-Fi
etc. The Organization monitors and records use of its ICT facilities including the internet,
intranet and email. The department's email system is not an authorized recordkeeping
system. Employees when using the department's ICT facilities and devices should
follow adequate access procedures of organization. The Government employees should
handle official data with atmost care.

Government Staff must ensure that Confidentiality, Privacy and Commercial Sensitivity
Standards, Practices and Requirements are followed to the use the organization
equipment and the storage, retrieval, access and while giving out of system and
networks information.

Please answer the following questions:

1. Do you have an official e-mail ID?

2. Do you follow internet ethics?

3. Do you have an access policy in your organization?

4. Do you have any policy guidelines for accessing /using the organization
resources?

5. Do you maintain any confidential data in your organization?

6. Do you make any download on your official computer?

7. Do you have security policies in your organization?

Now go through the Guidelines provided to safeguard yourself and organized resources.

Always follow the Internet Ethics while using internet and the moral principles that
govern the usage of computers. One of the common issues of computer ethics is
violation of copyright issues like illegal downloads from torrents etc. Downloading the
document/paper from the internet and distributing to others without proper permission
from the author etc. for more..

You should be always honest, respect the rights and property of others on the internet.
One has to accept that Internet is not a value free-zone .It means World Wide Web is a
place where values are considered in the broadest sense so we must take care while
shaping content and services and we should recognize that internet is not apart from
universal society but it is a primary component of it. For more..
Always use strong login password for the systems/Laptops and need to change once in
a 30 days. Do not share the work related information to the peoples outside of your
organization. There are social engineering approach like phishing, vishing, baiting,
dumpster diving etc to gain access to personal information through misrepresentation. It
is the conscious manipulation of people to obtain information without realizing that a
security breach is occurring. It may take the form of impersonation via telephone or in
person and through email. Some emails lure the receiver into opening an attachment
that activates a virus or malicious program in to your computer. You should follow some
paper/e-mail methods to give the information to the outside peoples and also the
reception/front desk should be aware with such kinds of social engineering attacks. For
more..

When surfing the Internet, you always should check about the browser security to avoid
risks of exposing personal information such as disabling the option Remember my ID
on this computer. User ID or Username also should be secured along with password to
avoid track passwords by next user. It is good to use Private Browsing in Mozilla
Firefox Web Browser and Incognito Window option in Google Chrome Web Browsers
to avoid such type of attacks.

Keep your computer operating system up-to date which is very important to run your
computer fast and safe. The security of the operating system running on various PCs
plays an important role in the security of the network as a whole. Not updating one
system in the network may affect the security of the other systems in the network. Today
we have a highly sophisticated operating system with lots of features, but it may be
vulnerable if they are not administered, configured and monitored properly. Sometimes
updating the operating system with latest patches may lead to interoperability issues
with other operating systems. Hence proper care should be taken while updating the
operating system in a separate System/PC.

If government employees are using the mobile phones, you have to ensure that serial
number/Model number and IMIE Number are maintained in an assets register offline or
online. If they are using the personal mobiles/portable devices accessing the
organization network must take written approval from their IT Managers/Director to
connect the same. Always see the devices which you are using must be meeting the IT
Security policies. Use secure passwords to the devices and lock when not in use.
The organization does not accept liability for any loss or damage suffered to personally
owned devices as a result of using the department's ICT facilities, systems, network or
services and is not responsible for any repairs or maintenance. The department further
does not provide any technical or software support to an employee's personally owned
device. Information and system backup procedures and archiving must be in place to
ensure that in the event of a loss restoration can take place within acceptable
parameters to ensure business continuity.

Objectives:

Educating the community on what the Internet has to offer.

The formation of an environment that will bring people with diverse interests and
backgrounds together in a common forum.

Good coffee and bakery items at a reasonable price.

Affordable access to the resources of the Internet and other online services

Mission

As the popularity of the Internet continues to grow at an exponential rate, easy and affordable
access is quickly becoming a necessity of life. Atis Internet Cafe provides communities with
the ability to access the Internet, enjoy a cup of coffee, and share Internet experiences in a
comfortable environment. People of all ages and backgrounds will come to enjoy the unique,
upscale, educational, and innovative environment that Atis Internet Cafe provides.

Anda mungkin juga menyukai