Cybersecurity tips:
1. Computers and the Internet have
become commonplace in current day society. Every day these systems store,
manipulate and exchange business and personal information. Cyber security is
the steps taken to protect this information by preventing, detecting and
responding to attempts to vandalize, steal or corrupt data. Organizations need
to address cyber security for several reasons. Individuals and employees who
have provided personal information to an organization have the expectation that
it will be respected and appropriately protected. Organizational data also
needs to be protected. Entities that partner or provide services to your
organization will want assurance that their information and systems will not be
put at risk when electronic transactions occur. Finally, many types of
information must be safeguarded due to regulatory requirements. If your
organization provides employee health benefits, operates a school or receives
credit card payments then security standards such as the Health Insurance
Portability & Accountability Act (HIPAA), Family Educational Rights and
Privacy (FERPA), and Payment Card Industry Data Security Standards (PCI DSS)
apply. It is not possible for an organization to develop a perfect cyber
security plan. Rather, organizations should implement and continuously evaluate
cyber security practices that protect sensitive data, while making their
computers and networks a difficult target for malicious intent. The following
section outlines basic best practices for cyber security in your organization.
2. Best practices for cyber
security.
a. Establish policies and educate
staff in cyber security principles. Educate staff on the proper use of
computers and other technology devices in your organization. Define what
sensitive data is and the types of sensitive data stored on your system.
Clearly identify what data needs to be secured and how that protectionism accomplished.
Create and implement policies describing how to handle and protect sensitive
information and data. Create a culture of cyber security by establishing basic
security practices for all staff, including volunteers. Promote security
awareness and education in your organization.
b. Protect information, computers
and networks from cyber-attacks. Install anti-virus and anti-malware software
to keep computers and other technology devices free from viruses, spyware and
other malicious programs. Having the latest security software, web browsers,
and operating systems also help to defend against these threats. Whenever
possible, anti-virus and anti-malware software should updated automatically and
run in “real-time” mode to continuously monitor for and mitigate threats should
they occur. In addition to real time protection, a complete anti-virus/anti-malware
scan of each computer should be performed on a weekly basis.
c. Keep computer operating
systems and application software up to date. Vendors that manufacture computer
operating systems and application software are continuously introducing new
versions of their product and/or provide patches and bug fixes when a
vulnerability is identified. It’s important to keep computers and other
technology devices up to date as new versions or updates are made available. Many
vendors –such as Microsoft and Apple- regularly schedule release updates, but may
publish a patch at any time to address a particularly serious threat. Most
computer operating systems can be configured to automatically update themselves
or provide notification when an update is available. Regardless of the type of
operating system or application software used, new versions, patches and fixes
should be updated regularly.
d. Provide firewall security for
your Internet connection. It is commonplace for most organizations to have an
Internet connection that is “always on” exposing computers to external threats
24 hours a day. Firewalls are critical as they help protect Internet-connected
computers from these threats. Firewalls may be integrated into a router or
wireless access point, provided as a service from your Internet Service
Provider, or purchased separately from a firewall manufacturer. Regardless of
the type, product updates should be regularly applied and administrative
passwords changed when first deployed and regularly over time. Many computer
operating systems have an integrated software firewall feature that should be enabled
wherever possible. If staff work from home, verify that their home computer
system(s) are protected by a firewall and are subject to your organization’s
cyber security policies and procedures.
e. Create a mobile device action
plan. Mobile devices including smartphones, pads, tablets, USB/memory sticks
and mobile hard disk drives create significant data security concerns
especially if they contain confidential information or can access computers or
data in your internal network. Limit their use wherever possible and require
users to encrypt stored data, enable password protection, and install security
applications to prevent the theft of information while the device is operating,
especially over a public network. Be sure to implement reporting procedures for
staff to follow when mobile devices are lost or stolen.
f. Make backup copies of
important business data and information. Regularly backup the data on all
computers. Critical data includes –but is not limited to- word processing documents,
spreadsheets, databases, human resources files, and financial information
including accounts receivable/payable files. Whenever possible, backup data
automatically throughout the day and execute a complete backup every night. At
the minimum, perform a weekly backup of systems. Store the backup copies either
offsite or in the Cloud. Data stored offsite containing personal, financial or
health information must be encrypted. Regardless of the frequency in which data
is backed up or where copies are kept, establish and test the process for
restoring data back to the system.
g. Control physical access to
your computers and create user accounts for each staff member. Prevent access
or use of business computers by unauthorized individuals. Insinuations where
computer monitors display sensitive data and may be inadvertently viewed, the
use of a privacy screen or re-positioning the monitor is suggested. Enable
screen savers wherever possible and require a password to unlock the computer.
Laptops can be particularly easy targets for theft or can be lost, so physically
secure them when unattended. Make sure a separate user account is created for
each staff member and require the use of strong passwords. Administrative-level
access should be restricted to key personnel only.
h. Secure wireless networks. If
you have a Wi-Fi network in your workplace, make sure transmissions are secure and
encrypted using the most up-to-date standards. Ensure that administrative
access to the router is protected with a strong password. If your organization
provides guest Wi-Fi services, ensure that the guest Wi-Fi network is completely
isolated from your workplace Wi-Fi network.
i. Limit access to data and
information; authority to install software. Limit –wherever possible- the
circumstances that provide any one employee access to all data systems. Rather,
determine the requirements for each staff persons ‘specific job function and
limit their access to specific systems based on those requirements. Staff
should not be able to install any software without permission. Consider the use
of content monitoring and filtering systems for those computers that access the
Internet.
j. Passwords and authentication. Require
staff to use unique passwords and change passwords minimally every three months.
Minimally a 6 to 8 digit mix of upper and lower case letters, numbers and special
characters is best. Consider implementing multi-factor authentication that requires
additional information beyond a password to gain entry. Check with your business
partners that handle sensitive data -especially financial institutions- to see if
they offer multi-factor authentication for your account.
k. Don’t forget embedded systems
and other often missed data sources. Many organizations have dedicated
computers that are used to monitor and control on premise systems such as
heating and cooling, lighting, security and telephones. These computers can
operate autonomously or by personnel at a remote location and are usually
connected via the Internet. Wherever possible, these systems should be
completely isolated from other computers in your organization, and, if available,
using a separate Internet connection. If it’s not possible to completely
isolate these devices, they should then be electronically quarantined from
other computers and devices to prevent access to secure data or the
introduction of viruses or malware. Devices such as copiers, printers, scanners
and fax machines are sometimes equipped with internal memory or hard disk
drives. Ensure that any internal storage is adequately erased when retiring
these devices from active service.
l. Payment Cards Organizations
that accept credit card payments must keep customer data safe. Wherever
possible use a third party institution to capture and process credit card data.
If credit cards are processed internally, keep only the information absolutely
needed, securely disposing of the rest. Carefully control employee access to
payment systems and electrically isolate computers that process payments from
other organizational computers. Computers that process credit card payment should
be restricted from surfing the Internet.
General Computer usage – Best
practices
a) Use account with limited
privileges on systems and avoid accessing with administrator privileges for
day-to-day usage.
b) Keep Operating System,
Application software and Anti-Virus software updated by applying the latest
service packs and patches.
c) Backup of important files at
regular intervals.
d) Do not leave system
unattended. Log out of or lock your computer when stepping away, even for a
moment
e) Supervise maintenance or
rectification of faults in the system by service engineers.
f) Do not download unfamiliar
software off the Internet.
g) Remove unnecessary programs or
services from computer: Uninstall any software and services you do not need
h) Restrict remote access. If
file sharing is not required in your day-to-day work, disable file and print
sharing.
i) Treat sensitive data very
carefully.
j) Remove data securely: Remove
files or data you no longer need to prevent unauthorized access to them. Merely
deleting sensitive material is not sufficient, as it does not actually remove
the data from your system
k) If your networking devices are
not using IPv6, disable IPv6from computer.
l) Always maintain a redundant
power supply
m) Use system’s screen locking
functionality to protect against physical access, such as a screen saver that
won’t deactivate without a password, or just log out of everything so any one that
wants access has to log in again.
n) The systems should be placed
in a room which is dust free and has a good ventilation to avoid overheating of
CPU.
o) Do not plug the computer
directly to the wall outlet as power surges may damage computer. Instead use a genuine
surge protector to plug a computer.
p) Don’t eat food or drink near
the PC.
q) There should be no magnets
near to your PC.
r) Scan all the files after you download
whether from web sites or links received from e-mails. General Internet Browsing – Best Practice.
a) Always use updated anti-virus,
Operating System and applications and browser.
b) Use a web browser with
sandboxing capability (like Google chrome, safari, etc.). Sandboxing usually
contains malwareduring execution.
c) Download software from trusted
source only.
d) Be wary of storing personal
information on Internet.
e) Do not store any information
you want to protect on any device that connects to the Internet.
f) Verify those you correspond
with. It is easy for people to fake identities over the Internet.
g) Make a habit of clearing
history from the browser after each logout sessions.
h) Delete Windows “Temp” and
“Temporary Internet “files” regularly.
i) Avoid all cloud services
(Dropbox, iCloud, Evernote, etc) that are based outside India.
j) Avoid using services that
require location information.
k) Remember search engines track
your search history and build profiles on you to serve you personalised results
based on your search history.
l) Be conscious of what you are
clicking on/downloading.
m) Some pop-ups have what appears
to be a close button, but will actually try to install spyware when you click
on it.
n) Remember that things on the
internet are rarely free. “Free” Screensavers, etc. generally contain Malware.
o) Be wary of free downloadable
software - There are many sites that offer customized toolbars or other
features that appeal to users, which are likely to have backdoors.
p) Avoid Internet access through
public Wi-Fi.
q) Never exchange home and office
work related contents.
r) Avoid posting of photos with
GPS coordinates.
s) Don't respond to email,
instant messages (IM), texts, phone calls, etc., asking you for your password.
t) Only click on links from
trusted sources. Never click on a mystery link unless you have a way to
independently verify that it is safe. This includes tiny URLs.
u) Be extremely careful with file
sharing software. File sharing opens your computer to the risk of malicious
files and attackers. Also, if you share copyrighted files, you risk serious
legal consequences. | 5Malware defense
a) Always set automatic updates
for Operating System, Ant-virus and Applications. (My Computer -> properties
->automatic updates -> select Automatic and time)
b) Enable hidden file &
system file view to find any unusual or hidden files. (My computer -> tools
-> folder options -> view-> select enabled with “Show hidden file and
folders” option and disable “Hide protected operating system files”)c) Turn off
auto play(Win XP: Start -> Run -> type gpedit.msc -> Computer Configuration
-> Administrative Templates -> System ->Double Click at Turn off Auto
play -> Select Enabled -> Select “Turn off Auto play on:” to “All drives”
and Click OK. Windows Vista/7 :- Start -> Run -> type gpedit. msc
->Computer Configurations -> Administrative Templates ->Windows
Components - > Select “AutoPlay Policies” ->Double Click at “Turn off
Auto play” -> Select Enabled -> Set“Turn off Auto play on:” to “All
drives” and Click OK.)d) Type: dir %temp% in “run” and delete all entries after
opening any suspicious attachments.
e) Type cmd in run and type
netstat –na. Checkout foreign Established connection and IP addresses. Check
the IPaddress for its ownership.
f) Type “msconfig” in “run” and
check for any unusual executable running automatically.
g) Check Network icon (for
packets received and sent) / ADSL lights for data in non-browsing mode. Check
data usage pattern in Mobile. If the outgoing is unusually high, then it is very
likely that the system is compromised.
h) Type “ipconfig/displaydns” in
command prompt and lookout for any URLs which you have not accessed recently.
i) Always be cautious while
opening attachments even from the known sources. Try to use non-native
applications for opening attachments. Example for word document use, WordPad to
open the attachment.
j) When in doubt, better to
format the Internet connected computer rather than doing some “patch
works”.What is a Malware?Malware (Malicious Software) is software designed to
infiltrate a computer system without the owner’s informed consent for a
malicious intent. Examples of Malware include Viruses, Trojans, Worms, Key
loggers, Backdoors, Root kits, Spyware, Crimeware, Adware, etc. |
7Removable Information Storage Media Removable Information Storage Media (RISM)
means any device which is capable of storing electronic information in any
form. Device or media that is readable and/or writeable by the end-user and is
able to be moved from computer to computer without modification to the
computer. For example CDR (multi sessions), CD-RW, DVD-RW, BluRay Disk, MOD,
USB Storage devices (Pen Drives, Media Cards, etc.), MP3Players, MP4 Players,
Smart Phones, Digital Camera, Watches with memory, Various types of Memory
cards, Internet Data Card, External Hard Disk, or any other gadget having memory
space and could be connected to a system through USB or COMor any other ports
or device connected through Network Share falls under Removable Information
Storage Media.
a) Damaged / faulty RISM should
never be handed over to outsiders / manufacturer for repair.
b) Sensitive information should
be stored on removable media only when required in the cases of assigned
duties.
c) All media must be stored in a
safe, secure environment. d) All media must be handled with care and it must be
ensured that it is not kept near magnetic material and not exposed to extreme
heat or pollution;
e) The computers should be
enabled with “Show hidden file and folders” option and “Hide protected
operating system files” should be disabled to view hidden malicious files in USB
storage devices.
f) Make sure there is no hidden
file and folders present in the Media. g) Autorun / Autoplay feature should be
disabled in all the computers.
h) Avoid Baiting. (Someone gives
you a USB drive or other electronic media that is preloaded with malware in the
hope you will use the device and enable them to hack your computer). Do not use
any electronic storage device unless you know its origin is legitimate and
safe.
i) Scan all electronic media for
Malware before use smart device Smart device is a device having any of the
features like computation power, Internet access, storage capability, camera,
recordings, GPS, etc. Smart phone, Tablets, etc. falls under this category. Most
of the Smart Phones and Tablets (Tabs) are having equal computing power of a
normal Desktop / Laptop systems. These gadgets are capable of delivering many
services on Video, Voice, GPS and other computational apps like any other
computer. Therefore, all cyber security issues related to computers are also
applicable to these devices. Following are some of the security concerns of
Smart devices:
I. These are equally vulnerable
to malware attacks and data leakages as ordinary Internet connected computers.
II. More application, features
and service are available on Smart device for exploits than ordinary feature
phones.
III. These gadgets are known to
be used for bugging (audio and video), monitoring call details, contents, SMS monitoring,
sending malicious SMS, Emails, spoofing, and other malicious activities without
the knowledge of the user. Android and IOS platform based Smart Phones and Tabs
are known to have multiple vulnerabilities, which are being widely exploited by
the attackers and adversaries
a) Smart device must not be used
for sensitive telephonic conversation. The Wi-Fi and blue-tooth should be kept
inturned-off mode.
b) A low-end basic mobile phone
without camera / internet /Wi-Fi may be carried for sensitive voice
conversation and contact details.
c) Internet connection in the
Smart device will normally be keptin off-mode and it will be made 'on' on need
basis to access internet.
d) No free Apps should be loaded
in the Smart device.
e) During repairs, do not leave
Smart device unattended to deny the possibility of installation of malware.
f) Relevant anti-virus software
should be installed in the smart device.
g) If the Smart device gets
de-activated for any reason for few hours / one day, the service provider
should be contacted immediately to ascertain the reason for de-activation.
h) If the battery gets unusually
discharged very fast or device gets heated up without any user activity, then
it is very likelysome malicious traffic is consuming battery.
i) Free Wi-Fi should not be used
at public places such as Airport. Turn off blue-tooth and Wi-Fi when use of the
same is not required for operational purposes. Even when the same is in use,
set default blue-tooth / Wi-Fi configuration to"non-discoverable".
j) Compromised smart device
should not be connected with computer even for the purpose of charging.
k) Turn off the applications
which are not needed
l) When device is idle, it should
get locked and require a password / pin or swipe pattern. Set the device to
lock in relatively short time.
m) Don't reply or click on link
on SMS or messages sent by strangers.
n) Don't jail-break your device
as jail-breaking removes the restrictions on which apps can be installed or not
installed. This removes the protection set by the company.
o) Watch for unauthorised
GPRS/data connection during idle mode of the Smart device.
p) Check the memory frequently if
any unusual data is stored there. Malware stores temporarily, the data
collected in the memory of the phone till the same is sent to the destination.
q) Suitable non-transparent
tape/sticker may be applied toblock the camera view.
r) Think before you click,
download, forward, or open. Before responding, registering, downloading or providing
information, get the facts. No matter how tempting the text, image, or
application is, if the download isn’t from legitimate app store or the site of
a trusted company, doesn’t engage with the message.
s) Understand the terms of use.
Some applications claim extensive rights to accessing and leveraging your personal
information. If the app requires more access to your account and/or device than
is needed to run the service, do not continue. In addition, be aware that terms
can change overtime. Review your terms of use often.
t) Be cautious with public Wi-Fi.
Many Smartphone users use free Wi-Fi hotspots to access data (and keep their
phone plan costs down). There are numerous threats associated with WiFi
hotspots. To be safe, avoid logging into accounts, especially financial
accounts, when using public wireless networks.
u) Disable Bluetooth and Near
Field Communication (NFC) capabilities when not in use. Capabilities such as
Bluetoothand NFC can provide ease and convenience in using yourSmartphone. They
can also provide an easy way for a nearby, unauthorized user to gain access to
your data. Turn thesefeatures off when they are not required.
v) Enable encryption. Enabling
encryption on your Smart phone is one of the best ways to safeguard information
stored onthe device, thwarting unauthorized access.
w) Securely dispose of your
device. With the constant changes and upgrades in the Smartphone market, many
are upgrading their devices on a regular basis. It is important that you wipe the
information from your Smartphone before disposal. Additionally, make sure any
SD cards are removed and erased. If you are not redeploying the SIM card to an other
device, then make sure your personal information stored on the SIM card is
erased or destroyed. Checklist for Secure Android Device There are many ways to
make Android device is safe and secure. A few of these are listed here:
1. Implementing basic security
(screen security): Users can choose from the standard device PIN, password,
pattern lock, | 13face unlock and swipe (swipe is not a
secure method). Screen lock can be set from settings > screen security >
screen lock.
2. SIM PIN: users should consider
setting up a SIM PIN. With this option enabled, the device will ask for the SIM
PIN every time it boots up.
3. Encryption: Android 2.3.4 and
later versions support device encryption. Though this is a must-have security,
most device manufacturers choose to ignore it in their customized Android
version. In case this feature is not available, users can use external apps
such as Secret Space Encrypt or (SSE), Encryption Manager, etc.
4. Passwords: Passwords should
not be made visible. Users should make sure that this feature remains disabled
at all times.
5. Multiple user accounts:
Tablets running on Android 4.2 +(Jellybean) provide an option to create
separate user profiles for different users. This is helpful if the device is
being shared by multiple family members. This feature can be found under Settings
> device > users.
6. Device Administration: this
section provides two features, ‘Device Administrators’ and ‘Unknown Sources’. Device
Administrators are apps that can control certain features of the device. For
example, when an anti-virus app is installed, it becomes a device
administrator. It can erase all data on the device, set password rules, etc. on
the user’s behalf. Often, these apps provide an option for users to perform
these tasks remotely and hence, they need to act as device administrators. The
‘Unknown Sources’ feature allows the user to side load apps or install apps
provided by a third party app Store. Apps installed via this mode might contain
some malicious code, which could pose a risk to the user’s data. This option
should remain disabled at all times except for development purposes.
7. Mobile Security Suite:
Installing a mobile security suite is a must. All the leading anti-virus
companies provide a mobile version of their product. A mobile security suite
provides wide variety of features along with an anti-virus.
8. Device backup: Users should
regularly back up the data on their device. By default Android provides an
option to back up the configuration and settings. This is available under
settings >Personal > Backup & Reset. However, it does not back up data
stored on the device. Device data can be backed up either by using the desktop
software suite for the device or via third party apps.
9. Mobile Device Management: Many
users bring their device and connect the same to their organization network.
Leading to data leakage and other security compromise. To counter such risks, MDM
solutions (Mobile Device Management) needs to be deployed by the organizations.
10. Application Permission: No
apps should be allowed to access the device resources without the consent of
the user. Use should refrain from installing apps that look suspicious and asks
for other resources for accessing.
11. Application Locks : If a
device is changing hands, users might want to protect their personal data (SMS,
Pictures, Emails, etc.)from prying eyes. An application lock is an answer to this
problem. By installing apps users can put a password on apps that store
personal data. Once implemented, a password protected app will ask the user for
a PIN before launching.
12. Transaction Passwords: Users
can set transaction passwords for selected App Stores.
13. Rooting Device: Android, ROMs
shipped with devices; do not provide root (super user privilege) access, by
default. While many users do not require root privileges on their device, advanced
users and developers often like to experiment with their device.
Social Networking
a) Do not store any information
you want to protect on any device that connects to the Internet.
b) Always use high security
settings on social networking sites, and be very limited in the personal
information you share. Monitor what others are posting about you on their online
discussions
,LKmjh lgkfdstare.
c) Use anti-virus and firewall
software. Keep them and your browser, and operating systems patched and
updated.
d) Change your passwords
periodically, and do not reuse old passwords. Do not use the same password for
more than one system or service. For example, if someone obtains the password
for your email, they can access your online banking information with the same
password.
e) Do not post anything that
might embarrass you later, or that you don’t want strangers to know.
f) Do not automatically download,
or respond to content on a website or in an email. Do not click on links in email
messages claiming to be from a social networking site. Instead go to the site
directly to retrieve messages.
g) Only install applications or
software that come from trusted, well-known sites. “Free” software may come
with malware. Verify what information applications will be able to access prior
to enabling them. Once installed, keep it updated
h) Avoid accessing your personal
accounts from public computers or through public Wi-Fi spots.
i) Disable Global Position System
(GPS) encoding. Many digital cameras encode the GPS location of a photo when it
is taken. If that photo is uploaded to a
site, so are the GPS coordinates, which will let people know that exact
location.
j) Whenever possible, encrypt
communications with websites. It may be a feature (like HTTPS site rather than
HTTP site)social network sites allow you to enable.
k) Beware of unsolicited contacts
from individuals in person, on the telephone, or on the Internet who are seeking
corporate or personal data.
l) Monitor your bank statements,
balances, and credit reports.
m) Do not share usernames,
passwords, credit cards, bank information, salaries, computer network details, security
clearances, home and office physical security and logistics, capabilities and
limitations of work systems, or schedules and travel itineraries.
n) No legitimate service or
network administrator will ask you for your password.
o) Do not provide information
about yourself that will allow others to answer your security questions—such as
when using “I forgot my password” feature.
p) Be thoughtful and limit
personal information you share such as job titles, locations, hobbies, likes
and dislikes, or names and details of family members, friends, and co-workers.
q) Verify those you correspond
with. It is easy for people to fake identities over the Internet.
r) Do not click advertisement
shown in the social web registering an
Account
a) Use a strong password
different from the passwords you use to access other sites.
b) If you are asked to provide
security questions, use information that others would not know about you.
c) Never provide a
work-associated email to a social network, especially when signing up. Consider
creating a new email address strictly to connect with your social networking
profile(s).
d) Do not use your real name
e) Provide only information that
is necessary or that you feel comfortable providing. When in doubt, err on the
side of providing less information.
f) During the registration
process, social networks often solicit anew user to provide an email account
password so the social network can access the user’s email address book. The social
network promises to connect the new user with others they may already know on
the network. To be safe, don’t provide this information at all. Email Communication
a) Auto save of password should
not be enabled.
b) Users must check their last
login details while accessing the email account.
c) Use of encryption and digital
signature certificate (DSC) maybe considered for mails deemed necessary.
d) Email IDs should have a strong
password (at least 13 characters with alpha numeric and special characters)e)
Once in every 30 days the email passwords should be changed.
f) Logout properly from mail
accounts.
g) Before opening any attachment,
the same should be scanned through an updated anti-virus for malicious
contents.
h) Do not keep mails in Inbox,
sent box, draft, etc. which are no longer required.
i) User should type the complete
URL in the browser instead of clinking links from other sources.
j) Before accepting the SSL
certificate, the user should verify the authenticity of the certificate.
k) Make a habit of clearing
history from the browser after each logout sessions.
l) Do not open / forward / reply
to suspicious E Mail.
m) Do not click any URLs
mentioned in the body of the E Mail text.
n) Be cautious of Tiny URLs in
Email contents.
o) Do not open attachment having
extension EXE, DLL, VBS, U64, SHS, PIF , SCR
| 20Typical example .txt.exe ,
.doc. exe.
p) Some malicious program starts
executing as soon as they appear on the Outlook Express preview pane. Disable that
option (view -> layout -> uncheck “show preview pane”)q) Don't open
unsolicited or unexpected attachments. If you can’t verify an attachment is
legitimate, delete it.
r) Don't log in to web sites or
online applications unless the login is secure (HTTPS).
s) Don't enter personal or
sensitive information online unless you are using a trusted, secure web. Instant
Messaging (IM) Instant Messaging networks provide the ability to not only transfer
text messages, but also the transfer of files. Consequently, IM can transfer
Malware and other programs. Many IM allows peer-to-peer file sharing, a malware
can configure the IM client to share all files on the system with full access
to everyone. Hackers can impersonate other users in many different ways. The
most frequently used attack is simply stealing the account information of an
unsuspecting user.
a) Careful when creating a screen
name. Each IM programs asks you to create a screen name. Screen name should not
provide or allude to personal information. Use a nick name instead of full
name.
b) Never provide sensitive
personal information. Do not share credit card numbers/ passwords. Etc. over
IM.
c) Create a barrier against
unwanted IM. Do not list your name or email address in public areas or to
strangers.
d) Only communicate with people
who are on your contact lists. If you decide to meet a stranger that you know only
from IM communication, take appropriate safety precautions. For example do not
meet that person alone, take a friend or colleague with you. Always meet and
stay in public place such as café or other places.
e) Never open pictures, download
files or click links in messages from people you do not know.
f) Do not send personal or
private IM at work.
g) If you uses a public computer,
do not select the feature allows you to log on automatically. People who use
that computer after you may be able to see and use your screenname to log on. |
23Home Devices – Wi-Fi, ADSL Routers
a) All ADSL Broadband routers
should be adequately secured.
b) Disable web and telnet
services from outside network.
c) Change the default passwords
of all the network devices.
d) Turn off the Network during
extended periods of non-Use.
e) Disable DHCP service
f) Try to use your ISP DNS rather
than open DNS IP addresses
g) Always configure ISP provided
DNS IP address in computer rather than automatically obtaining the same from
ADSL device.
h) If update option is available
in the ADSL device, update the firmware from the legitimate vendor’s web site.
Wi-Fi Device
i) Information/Data on the Wi-Fi
Network should always be in the encrypted form.
j) Do not connect the access
point directly to the wired network. As there is a chance of compromised
wireless client in turn effecting the systems in the wired network, firewall
and an antivirus gateway should be placed between the access point and the
wired network
k) In order to allow authorized
users to connect to the access point, wireless clients should be provided
access based on MAC address.
l) Do not auto-Connect to open
Wi-Fi Networks.
m) Do not use WEP encryption use
WPA2 or higher graded encryption
n) Change your SSID (Wireless
Network Name)o) Turn off SSID broadcasting.
p) Change the default passwords
while configuring the access point.
q) When the number of users
accessing the access point is less, it is recommended to disable the DHCP
service. As this may make the attackers easy, to connect to the network once
they get associated with the access point.
r) Update the firmware of access
point. It will reduce the number of security loop holes in the access
point.Multi Functional Peripherals (MFP, Fax-Printer-Scanner Photocopies with
hard disk / solid state disk
a) If possible, disable the
option of saving contents in the hard disk of the MFP.
b) Set up devices to perform regular
overwrites (Wiping) with a pattern more frequently. In some environments that may
mean overwriting the disk after any content is printed, scanned, faxed, and
copied.
c) Encrypt the data on the disk
if that function is available.
d) Regularly check FAX reports in
MFP.
e) Do not connect MFP to
telephone line, if the MFP with FAXis to be connected to a sensitive computer. mart
TV, Refrigerator, Washing Machine, Gaming Console etc.
a. Always protect your devices
with a password.
b. Change the default password of
the smart devices (IOT devices)
c. Update software.
d. Do your research: Investigate
the data sharing and privacy policies of the company selling the product.
e. Browse with caution. Smart TVs
are every bit as susceptible to hacking as your home computer. What is Internet
of Things (IOT)?It refers to uniquely identifiable objects and their virtual
representations in an Internet-like structure on standard communication
protocol. Each person and thing has a locatable, addressable, and readable
counterpart on the Internet. Internet connected household devices with the potential
to be turned in the spy tools.
Password – Best Practices
a) Passwords must be changed at
regular intervals.
b) Always use different passwords
for different accounts.
c) Do not share passwords with
anyone.
d) All passwords are to be
treated as sensitive.
e) Passwords should never be
written down or stored on-line without encryption.
f) Do not reveal a password in
email, chat, or other electronic communication.
g) Do not reveal a password on
questionnaires or security forms
h) Always decline the use of the
"Remember Password" feature of applications
i) All users should be aware of
how to select strong passwords.
j) Strong passwords contain
combination of lower case characters, upper case characters, numbers, “Special”
characters (e.g. @#$%^&*()_+|~-=\`{}[]:";'<>/ etc).
k) Contain at least thirteen
alphanumeric characters (except in the case of BIOS, if the same is not
possible).
l) Weak passwords have the
following characteristics:
I. The password contains less than
thirteen characters
II. The password is a word found
in a dictionary (English or foreign)
III. The password is a common
usage word such as: Names of family, pets, friends, colleagues, Movie /Novel /
Comics characters, etc.
IV. Computer terms and names,
commands, sites, companies, hardware, software.
V. Birthdays and other personal
information such as addresses and phone numbers.
VI. Word or number patterns like
aaaaa, qwerty, as dfg, zxcvb, etc.
m) Password history should be
enforced wherever possible to ensure that the users are forced to select different
passwords with a user account.
n) Maximum password age should be
configured to enforce the period of time (90 days) that a password can be used before
the system forces the user to change it.
o) Always use different passwords
for different accounts.
p) Do not reveal a password in
email, chat, or other electronic communication.
q) Do not speak about a password
in front of others.
r) Do not hint at the format of a
passwords) Do not reveal a password on questionnaires or security forms Online
transaction / ATM
a) Before you buy, check out the
store’s and the seller’s reputation through website reviews or physical address
verification to ascertain the legitimacy of the party you are going to deal
with. Keep in mind however that online reviews can be manipulated to credit or
discredit reputation.
b) Be aware of what details
legitimate sites ask for before entering into a transaction. Acquaint your-self
with the site’s procedure and compare this with similar sites. This will help
decide whether the site or the communication from it is genuine.
c) Be wary of unsolicited mail,
especially those with email attachments and embedded links.
d) Learn to distinguish bogus
communications that claims to be from banks, auction sites, and other financial
institutions, specifically those asking for personal or account information as
these are never requested electronically by institutions.
e) Review financial and credit
card statements for un-known expenses. Incorrect entries or suspicious
transactions serve as a warning bell that online financial accounts are compromised.
If so, contact the financial institution immediately, consider re-porting the
attack to the police, reset online pass-words, ATM PINs and check for malware on
your home computer
f) Cancel unused debit / credit
cards (cutting them up is not enough).
g) Don't carry your PAN card
Aadhar card, passport, or EC card, etc. with you, except when necessary.
h) Shred all credit card / debit
card receipts and solicitations, cancelled checks and financial documents
before throwing away.
i) Check your credit card
statements and immediately report unauthorized purchases.
j) Don't give out your mother's
maiden name, or any account information over the phone, unless you are sure the
caller is legitimate. Adopt a "need to know" approach to your
personal data.
k) Have your name removed from
lists sold to companies offering pre-approved credit cards
l) Never write down PINs and
passwords: memorize them. Do not use any part of your Social Security number,
your nameor any easy to guess words or sequences
m) Always use phishing filters at
your Internet browser.
n) Confirm whether email is
received from bank or not.
o) Be cautious while providing
bank details via online, before proceed further confirm with bank about the
email you received. Think that if something is important or urgent why don’t
bank calling me instead of sending email?
p) Delete all cookies and history
file before you perform online transactions.
q) Always use virtual keyboard
while accessing online banking.
r) Enable mobile number and email
with banking transactions for timely SMS and Email alerts.
s) Update your details such as
change of address for receipt of cheque books, statements /debit/credit cards
at the right address.
t) Vishing is a form of phishing,
where instead of people receiving an email to lure them into giving personal
information, the criminal uses a phone call, either live or automated, to
attack the bank or credit union customer and get critical information. ATM
a) Always protect your PIN, Do
Not give the number to anyone
b) Cover the keypad while you are
entering the PIN.
c) Do not operate ATM in lonely
places / unguarded ATMs.
d) Be wary of anything about the
ATM machine that looks out of ordinary, such as odd-looking equipment or wires
attached to the device.
e) Look for a ”no tampering”
sign. Crooks often place these to stop anyone curious about a new piece of
equipment.
f) Regularly check bank accounts
to make sure that no unusual or unauthorized transactions (even smaller amount) Social
Engineering Social Engineering is an approach to gain access to information
through misrepresentation. It is the conscious manipulation of people to obtain
information without realizing that a security breach is occurring. It may take
the form of impersonation via telephone or in person and through email.
a) Some emails entice the
recipient into opening an attachment that activates a virus or malicious
program in to your computer.
b) Be suspicious of unsolicited
phone calls, visits, or email messages from individuals asking about employees
or other internal information. If an unknown individual claims to be from a
legitimate organization, try to verify his or her identity directly with the
company.
c) Do not provide personal
information or information about your organization, including its structure or
networks, unless you are certain of a person's authority to have the
information.
d) Do not reveal personal or
financial information in email, and do not respond to email solicitations for
this information. This includes following links sent in email.
e) Don't send sensitive
information over the Internet before checking a website's security. Pay
attention to the URL of website. Malicious websites may look identical to a legitimate
site, but the URL may use a variation in spelling or a different domain (e.g.,
.com vs. .net).
f) If you are unsure whether an
email request is legitimate, try to verify it by contacting the company
directly. Do not use contact information provided on a website connected to the
request; instead, check previous statements for contact information.
g) Install and maintain
anti-virus software, firewalls, and email filters to reduce some of this
traffic.
h) Take advantage of any
anti-phishing features offered by your email client and web browser.
i) If you believe your financial
accounts may be compromised, contact your financial institution immediately and
close any accounts that may have been compromised. Watch for any unexplainable
charges to your account.
j) Immediately change any
passwords you might have revealed. If you used the same password for multiple
resources, make sure to change it for each account, and do not use that
password in the future.
k) Don't make you mobile phone as
a source for your personal data, which is dangerous if it falls in to the hands
of strangers. It is advisable not to store important information like credit
card and bank cards passwords, etc., in a mobile phone.
l) Note the IMEI code of your
cell phone and keep it in a safe place. This helps the owner to prevent access
to the stolen mobile. The operator can block a phone using the IMEI code. Public
computers (like Internet Cafes etc)
a) If you store or download any
personal information on Desktop in cyber cafe make sure you delete all the
documents after you’re done with your work.
b) When surfing the Internet, you
always should check about the browser security to avoid risks of exposing personal
information such as disabling the option “Remember my ID on this computer”.
c) A key logger is basically
spyware and logs or records your keystrokes so that your username and password
are made available to Cyber cafe owner or any Attacker. These records may types
into directly into Hacker’s machine or collected afterwards through a file
transfer. Some of Cyber Cafes may use Hardware key loggers so that you check
that there is an intermediate device between your keyboard and CPU.
d) Cybercafé computers are
public computers and shared computers. Your data or communication may be
exposed to all users at the same time. So be aware that sensitive information
like personal details like username, passwords etc. should be deleted.
e) Whenever you go to Cybercafé,
you ensure that it has most up to date Anti-Virus and Anti-spam software. These
may help to stop some of the key loggers, Trojans and other malware.
f) Don't leave the computer
unattended with sensitive information on the screen.
g) Don't enter sensitive
information into a public computer.
h) Always make sure to logout
properly when you leave Cybercafé.
some essential cybersecurity tips to help protect
your personal information and digital presence:
General Tips:
- Use
Strong Passwords:
Create complex passwords with a mix of letters, numbers, and symbols.
Avoid using easily guessable information like birthdays or common words.
- Enable
Two-Factor Authentication (2FA): Whenever possible, enable 2FA for an extra
layer of security.
- Keep
Software Updated:
Regularly update your operating system, browsers, and software to protect
against the latest threats.
- Install
Antivirus Software: Use reputable antivirus software and keep it
up to date.
- Backup
Data Regularly:
Regularly back up important data to an external drive or cloud storage to
prevent data loss.
- Use
a VPN:
When using public Wi-Fi, use a Virtual Private Network (VPN) to encrypt
your internet connection.
Online Safety:
- Beware
of Phishing Scams: Be cautious of unsolicited emails or
messages asking for personal information. Verify the source before
clicking on links or downloading attachments.
- Secure
Your Social Media Accounts: Adjust privacy settings and be mindful of
the information you share.
- Avoid
Public Wi-Fi for Sensitive Transactions: Avoid accessing sensitive information or
making transactions over public Wi-Fi.
- Use
Secure Websites:
Ensure websites are secure (look for "https://" in the URL)
before entering personal information.
Device Security:
- Lock
Your Devices:
Use passwords, PINs, or biometric locks (fingerprint or face recognition)
to secure your devices.
- Encrypt
Sensitive Data:
Use encryption tools to protect sensitive data on your devices.
- Disable
Unnecessary Features: Turn off Bluetooth, GPS, and other features
when not in use to reduce potential attack surfaces.
- Monitor
Device Access: Be
aware of which apps have access to your data and permissions on your
device.
Email Security:
- Use
Separate Emails:
Use different email accounts for different purposes (e.g., personal, work,
online shopping) to limit exposure.
- Be
Skeptical of Unknown Senders: Do not open attachments or click on links
from unknown or suspicious senders.
- Check
for Email Encryption: Use encrypted email services for sending
sensitive information.
Social Engineering Awareness:
- Educate
Yourself and Others: Learn about common social engineering
tactics and share this knowledge with family and colleagues.
- Verify
Identities:
Always verify the identity of individuals requesting sensitive
information, even if they appear legitimate.
Financial Protection:
- Monitor
Financial Statements: Regularly check bank and credit card
statements for unauthorized transactions.
- Use
Credit Monitoring Services: Consider using credit monitoring services to
detect unusual activity on your accounts.
By following these tips, you can significantly
enhance your cybersecurity posture and protect yourself against various cyber
threats.
Cybersecurity is crucial for business houses as it provides multiple benefits that help ensure the integrity, confidentiality, and availability of their data and systems. Here are some key ways cybersecurity helps businesses:
1. Protects Sensitive Information:
- Data Security: Safeguards sensitive information, including customer data, financial records, and intellectual property, from unauthorized access and breaches.
- Compliance: Helps businesses comply with regulations like GDPR, HIPAA, and CCPA, which mandate strict data protection measures.
2. Prevents Financial Loss:
- Avoids Breach Costs: Reduces the potential costs associated with data breaches, including legal fees, fines, and compensation to affected customers.
- Mitigates Downtime: Prevents or minimizes system downtime caused by cyber-attacks, ensuring business continuity and reducing potential revenue loss.
3. Builds Customer Trust:
- Reputation Management: Enhances a company’s reputation by demonstrating a commitment to protecting customer information, which can increase customer loyalty and trust.
- Customer Confidence: Ensures that customers feel secure when interacting with the business, leading to increased customer satisfaction and retention.
4. Protects Against Cyber Threats:
- Malware Protection: Defends against malware, ransomware, and other malicious software that can compromise systems and data.
- Phishing Defense: Implements measures to detect and prevent phishing attacks that target employees and customers.
5. Enhances Operational Efficiency:
- Risk Management: Identifies and mitigates potential cyber risks, allowing for more efficient allocation of resources and better planning.
- Automated Security Tools: Utilizes automated tools and processes to continuously monitor and protect against threats, reducing the burden on IT staff.
6. Supports Business Growth:
- Secure Digital Transformation: Ensures that new technologies and digital initiatives are implemented securely, enabling safe innovation and growth.
- Competitive Advantage: Positions the business as a secure and reliable partner in the marketplace, giving it a competitive edge.
7. Legal and Regulatory Protection:
- Avoids Legal Consequences: Reduces the risk of legal action resulting from data breaches or non-compliance with data protection laws.
- Regulatory Compliance: Helps meet industry-specific regulatory requirements, avoiding fines and penalties.
8. Employee Safety and Productivity:
- Secure Remote Work: Protects remote work environments, ensuring employees can work safely from any location.
- Training and Awareness: Educates employees on cybersecurity best practices, reducing the likelihood of human error leading to security incidents.
9. Incident Response and Recovery:
- Preparedness: Develops and implements incident response plans to quickly and effectively respond to and recover from cyber incidents.
- Minimized Impact: Limits the damage and recovery time from cyber-attacks, ensuring faster restoration of normal business operations.
10. Future-Proofing:
- Adapts to Evolving Threats: Continuously updates and adapts security measures to protect against emerging cyber threats.
- Invests in Security: Positions the business to proactively address future security challenges, ensuring long-term resilience.
Implementing robust cybersecurity measures helps businesses protect their assets, maintain customer trust, comply with legal requirements, and ultimately support sustainable growth and success.
1. Use two-step verification whenever
possible
2. Strong password
recommendations:
• Longer passwords are always better. Aim for at
least 14 characters
• Choose unusual phrases that are easy for you to
remember that include numbers and symbols
• Never use the same password for multiple accounts
• For best results, use a password manager to
create and store passwords.
3. Bad actors are constantly
looking for opportunitiesin unpatched software. Keep your software up todate-it’s
one of the most effective security toolsyou have. Better yet, enable automatic
updates, soyou never have to think about it.
4. When using a public computer
or any device that is not your own,another user may be able to access your data
and accounts. Before signing off, make sure you:
• Disable
any options to “save passwords”
• Log out
of your accounts when finished
• Delete
cookies, cache and browsing history
Types of Cyber Attacks:
A cyber-attack is an exploitation of computer
systems and networks. It uses malicious code to alter computer code, logic or
data and lead to cybercrimes, such as information and identity theft. Cyber-attacks
can be classified into the following categories:
1) Web-based attacks.
2) System-based attacks: Web-based attacks these
are the attacks which occur on a website or web applications. Some of the
important web-based attacks are as follows
1. Injection attacks: It is the attack in which
some data will be injected into a web application to manipulate the application
and fetch the required information. Example- SQL Injection, code Injection, log
Injection, XML Injection etc.
2. DNS Spoofing: DNS Spoofing is a type of computer
security hacking. Whereby a data is introduced into a DNS resolver's cache
causing the name server to return an incorrect IP address, diverting traffic to
the attacker’s computer or any other computer. The DNS spoofing attacks can go
on for a long period of time without being detected and can cause serious
security issues.
3. Session Hijacking: It is a security attack on a
user session over a protected network. Web applications create cookies to store
the state and user sessions. By stealing the cookies, an attacker can have access
to all of the user data.
4. Phishing: Phishing is a type of attack which
attempts to steal sensitive information like user login credentials and credit
card number. It occurs when an attacker is masquerading as a trustworthy entity
in electronic communication.
5. Brute force: It is a type of attack which uses a
trial and error method. This attack generates a large number of guesses and
validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted
data, or by security, analysts to test an organization's network security.
6. Denial of Service: It is an attack which meant
to make a server or network resource unavailable to the users. It accomplishes
this by flooding the target with traffic or sending it information that
triggers a crash. It uses the single system and single internet connection to
attack a server. It can be classified into the following Volume-based attacks-
Its goal is to saturate the bandwidth of the attacked site, and is measured in
bit per second. Protocol attacks- It consumes actual server resources, and is
measured in a packet. Application layer attacks- Its goal is to crash the web
server and is measured in request per second.
7. Dictionary attacks : This type of attack stored
the list of a commonly used password and validated them to get original
password.
8. URL Interpretation: It is a type of attack where
we can change the certain parts of a URL, and one can make aweb server to
deliver web pages for which he is not authorized to browse.
9. File Inclusion attacks: It is a type of attack
that allows an attacker to access unauthorized or essential files which is available
on the web server or to execute malicious files on the web server by making use
of the include functionality.
10. Man in the middle attacks It is a type of
attack that allows an attacker to intercepts the connection between client and server
and acts as a bridge between them. Due to this, an attacker will be able to
read, insert and modify the data in the intercepted connection. System-based
attacks These are the attacks which are intended to compromise a computer or a
computer network. Some of the important system-based attacks are as follows
1. Virus: It is a type of malicious software
program that spread throughout the computer files without the knowledge of a
user. It is a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when executed. It can
also execute instructions that cause harm to the system.
2. Worm: It is a type of malware whose primary
function is to replicate itself to spread to uninfected computers. It works
same as the computer virus. Worms often originate from email attachments that
appear to be from trusted senders.
3. Trojan horse: It is a malicious program that
occurs unexpected changes to computer setting and unusual activity, even when
the computer should be idle. It misleads the user of its true intent. It appears
to be a normal application but when opened/executed some malicious code will
run in the background.
4. Back doors: It is a method that bypasses the
normal authentication process. A developer may create a back door so that an
application or operating system can be accessed for troubleshooting or other
purposes.5. Bots A bot (short for "robot") is an automated process
that interacts with other network services. Some bots program run
automatically, while others only execute commands when they receive specific
input. Common examples of bots program are the crawler, chatroom bots, and
malicious bots.

