Best Practices For Cyber Security
Best Practices For Cyber Security
Best Practices
Page | 1
n) The systems should be placed in a room which is dust free
and has a good ventilation to avoid overheating of CPU.
o) Do not plug the computer directly to the wall outlet as
power surges may damage computer. Instead use a genuine
surge protector to plug a computer.
p) Don’t eat food or drink near the PC.
q) There should be no magnets near to your PC.
r) Scan all the files after you download whether from websites
or links received from e-mails.
Page | 2
General Internet Browsing – Best Practices
Page | 3
o) Be wary of free downloadable software - There are many
sites that offer customized toolbars or other features that
appeal to users, which are likely to have backdoors.
p) Avoid Internet access through public Wi-Fi.
q) Never exchange home and office work related contents.
r) Avoid posting of photos with GPS coordinates.
s) Don't respond to email, instant messages (IM), texts, phone
calls, etc., asking you for your password.
t) Only click on links from trusted sources. Never click on a
mystery link unless you have a way to independently verify
that it is safe. This includes tiny URLs.
u) Be extremely careful with file sharing software. File sharing
opens your computer to the risk of malicious files and
attackers. Also, if you share copyrighted files, you risk serious
legal consequences.
Page | 4
Malware defense
(Win XP: Start -> Run -> type gpedit.msc -> Computer
Configuration -> Administrative Templates -> System ->
Double Click at Turn off Auto play -> Select Enabled -> Select
“Turn off Auto play on:” to “All drives” and Click OK.
Page | 5
g) Check Network icon (for packets received and sent) / ADSL
lights for data in non browsing mode. Check data usage
pattern in Mobile. If the outgoing is unusually high, then it is
very likely that the system is compromised.
h) Type “ ipconfig/displaydns” in command prompt and look
out for any URLs which you have not accessed recently.
i) Always be cautious while opening attachments even from
the known sources. Try to use non native applications for
opening attachments. Example for word document use,
WordPad to open the attachment.
j) When in doubt, better to format the Internet connected
computer rather than doing some “patch works”.
What is a Malware?
Page | 6
Removable Information Storage Media
Page | 7
f) Make sure there is no hidden file and folders present in the
Media.
g) Autorun/Autoplay feature should be disabled in all the
computers.
h) Avoid Baiting. (Someone gives you a USB drive or other
electronic media that is preloaded with malware in the hope
you will use the device and enable them to hack your
computer). Do not use any electronic storage device unless
you know its origin is legitimate and safe.
i) Scan all electronic media for Malware before use.
Page | 8
Smart device
Most of the Smart Phones and Tablets (Tabs) are having equal
computing power of a normal Desktop / Laptop systems. These
gadgets are capable of delivering many services on Video, Voice,
GPS and other computational apps like any other computer.
Therefore, all cyber security issues related to computers are also
applicable to these devices. Following are some of the security
concerns of Smart devices:
Android and IOS platform based Smart Phones and Tabs are
known to have multiple vulnerabilities, which are being widely
exploited by the attackers and adversaries.
Page | 9
a) Smart device must not be used for sensitive telephonic
conversation. The Wi-Fi and blue-tooth should be kept in
turned-off mode.
b) A low-end basic mobile phone without camera / internet /
Wi-Fi may be carried for sensitive voice conversation and
contact details.
c) Internet connection in the Smart device will normally be kept
in off-mode and it will be made 'on' on need basis to access
internet.
d) No free Apps should be loaded in the Smart device.
e) During repairs, do not leave Smart device unattended to deny
the possibility of installation of malware.
f) Relevant anti-virus software should be installed in the smart
device.
g) If the Smart device gets de-activated for any reason for few
hours / one day, the service provider should be contacted
immediately to ascertain the reason for deactivation.
h) If the battery gets unusually discharged very fast or device
gets heated up without any user activity, then it is very likely
some malicious traffic is consuming battery.
i) Free Wi-Fi should not be used at public places such as
Airport. Turn off blue-tooth and Wi-Fi when use of the same
is not required for operational purposes. Even when the
same is in use, set default blue-tooth / Wi-Fi configuration to
"non-discoverable".
j) Compromised smart device should not be connected with
computer even for the purpose of charging.
k) Turn off the applications which are not needed.
Page | 10
l) When device is idle, it should get locked and require a
password / pin or swipe pattern. Set the device to lock in
relatively short time.
m) Don't reply or click on link on SMS or messages sent by
strangers.
n) Don't jail-break your device as jail-breaking removes the
restrictions on which apps can be installed or not installed.
This removes the protection set by the company.
o) Watch for unauthorised GPRS/data connection during idle
mode of the Smart device.
p) Check the memory frequently if any unusual data is stored
there. Malware stores temporarily, the data collected in the
memory of the phone till the same is sent to the destination.
q) Suitable non-transparent tape/sticker may be applied to
block the camera view.
r) Think before you click, download, forward, or open. Before
responding, registering, downloading or providing
information, get the facts. No matter how tempting the text,
image, or application is, if the download isn’t from a
legitimate app store or the site of a trusted company, doesn’t
engage with the message.
s) Understand the terms of use. Some applications claim
extensive rights to accessing and leveraging your personal
information. If the app requires more access to your account
and/or device than is needed to run the service, do not
continue. In addition, be aware that terms can change over
time. Review your terms of use often.
Page | 11
t) Be cautious with public Wi-Fi. Many Smartphone users use
free Wi-Fi hotspots to access data (and keep their phone plan
costs down). There are numerous threats associated with Wi-
Fi hotspots. To be safe, avoid logging into accounts, especially
financial accounts, when using public wireless networks.
u) Disable Bluetooth and Near Field Communication (NFC)
capabilities when not in use. Capabilities such as Bluetooth
and NFC can provide ease and convenience in using your
Smartphone. They can also provide an easy way for a nearby,
unauthorized user to gain access to your data. Turn these
features off when they are not required.
v) Enable encryption. Enabling encryption on your Smartphone
is one of the best ways to safeguard information stored on
the device, thwarting unauthorized access.
w) Securely dispose of your device. With the constant changes
and upgrades in the Smartphone market, many are upgrading
their devices on a regular basis. It is important that you wipe
the information from your Smartphone before disposal.
Additionally, make sure any SD cards are removed and
erased. If you are not redeploying the SIM card to another
device, then make sure your personal information stored on
the SIM card is erased or destroyed.
There are many ways to make Android device is safe and secure.
A few of these are listed here:
Page | 12
face unlock and swipe (swipe is not a secure method). Screen lock
can be set from settings > screen security > screen lock.
2. SIM PIN: users should consider setting up a SIM PIN. With this
option enabled, the device will ask for the SIM PIN every time it
boots up.
Page | 14
11. Application Locks : If a device is changing hands, users might
want to protect their personal data (SMS, Pictures, Emails, etc.)
from prying eyes. An application lock is an answer to this
problem. By installing apps users can put a password on apps that
store personal data. Once implemented, a password protected
app will ask the user for a PIN before launching.
Page | 15
Social Networking
Page | 16
If that photo is uploaded to a site, so are the GPS coordinates,
which will let people know that exact location.
j) Whenever possible, encrypt communications with websites.
It may be a feature (like HTTPS site rather than HTTP site)
social network sites allow you to enable.
k) Beware of unsolicited contacts from individuals in person, on
the telephone, or on the Internet who are seeking corporate
or personal data.
l) Monitor your bank statements, balances, and credit reports.
m) Do not share usernames, passwords, credit cards, bank
information, salaries, computer network details, security
clearances, home and office physical security and logistics,
capabilities and limitations of work systems, or schedules and
travel itineraries.
n) No legitimate service or network administrator will ask you for
your password.
o) Do not provide information about yourself that will allow
others to answer your security questions—such as when using
“I forgot my password” feature.
p) Be thoughtful and limit personal information you share such
as job titles, locations, hobbies, likes and dislikes, or names
and details of family members, friends, and co-workers.
q) Verify those you correspond with. It is easy for people to fake
identities over the Internet.
r) Do not click advertisement shown in the social web pages
Page | 17
Registering an Account
Page | 18
Email Communication
Page | 19
Typical example .txt.exe , .doc.exe
p) Some malicious program starts executing as soon as they
appear on the Outlook Express preview pane. Disable that
option ( view -> layout -> uncheck “show preview pane”)
q) Don't open unsolicited or unexpected attachments. If you
can't verify an attachment is legitimate, delete it.
r) Don't log in to web sites or online applications unless the
login page is secure (HTTPS).
s) Don't enter personal or sensitive information online unless
you are using a trusted, secure web page.
Page | 20
Instant Messaging (IM)
Page | 21
f) Do not send personal or private IM at work.
g) If you uses a public computer, do not select the feature
allows you to log on automatically. People who use that
computer after you may be able to see and use your screen
name to log on.
Page | 22
Home Devices – Wi-Fi, ADSL Routers
Wi-Fi Device
Page | 23
n) Change your SSID (Wireless Network Name)
o) Turn off SSID broadcasting.
p) Change the default passwords while configuring the access
point.
q) When the number of users accessing the access point is
less, it is recommended to disable the DHCP service. As
this may make the attackers easy, to connect to the
network once they get associated with the access point.
r) Update the firmware of access point. It will reduce the
number of security loop holes in the access point.
Page | 24
Smart TV, Refrigerator, Washing Machine, Gaming Console etc.
Page | 25
Password – Best Practices
Page | 26
IV. Computer terms and names, commands, sites,
companies, hardware, software.
V. Birthdays and other personal information such as
addresses and phone numbers.
VI. Word or number patterns like aaaaa, qwerty, asdfg,
zxcvb, etc.
m) Password history should be enforced wherever possible to
ensure that the users are forced to select different
passwords with a user account.
n) Maximum password age should be configured to enforce the
period of time (90 days) that a password can be used before
the system forces the user to change it.
o) Always use different passwords for different accounts.
p) Do not reveal a password in email, chat, or other electronic
communication.
q) Do not speak about a password in front of others.
r) Do not hint at the format of a password
s) Do not reveal a password on questionnaires or security forms
Page | 27
Online transaction / ATM
a) Before you buy, check out the store’s and the seller’s
reputation through website reviews or physical address
verification to ascertain the legitimacy of the party you are
going to deal with. Keep in mind however that online reviews
can be manipulated to credit or discredit reputation.
b) Be aware of what details legitimate sites ask for before
entering into a transaction. Acquaint your-self with the site’s
procedure and compare this with similar sites. This will help
decide whether the site or the communication from it is
genuine.
c) Be wary of unsolicited mail, especially those with email
attachments and embedded links.
d) Learn to distinguish bogus communications that claims to be
from banks, auction sites, and other financial institutions,
specifically those asking for personal or account information
as these are never requested electronically by institutions.
e) Review financial and credit card statements for un-known
expenses. Incorrect entries or suspicious transactions serve
as a warning bell that online financial accounts are
compromised. If so, contact the financial institution
immediately, consider re-porting the attack to the police,
reset online pass-words, ATM PINs and check for malware on
your home computer
f) Cancel unused debit / credit cards (cutting them up is not
enough).
Page | 28
g) Don't carry your PAN card Aadhar card, passport, or EC card,
etc. with you, except when necessary.
h) Shred all credit card / debit card receipts and solicitations,
canceled checks and financial documents before throwing
away.
i) Check your credit card statements and immediately report
unauthorized purchases.
j) Don't give out your mother's maiden name, or any account
information over the phone, unless you are sure the caller is
legitimate. Adopt a "need to know" approach to your
personal data.
k) Have your name removed from lists sold to companies
offering pre-approved credit cards
l) Never write down PINs and passwords: memorize them. Do
not use any part of your Social Security number, your name
or any easy to guess words or sequences.
m) Always use phishing filters at your Internet browser.
n) Confirm whether email is received from bank or not.
o) Be cautious while providing bank details via online, before
proceed further confirm with bank about the email you
received. Think that if something is important or urgent why
don’t bank calling me instead of sending email?
p) Delete all cookies and history file before you perform online
transactions.
q) Always use virtual keyboard while accessing online banking.
r) Enable mobile number and email with banking transactions
for timely SMS and Email alerts.
Page | 29
s) Update your details such as change of address for receipt of
cheque books, statements /debit/credit cards at the right
address.
t) Vishing is a form of phishing, where instead of people
receiving an email to lure them into giving personal
information, the criminal uses a phone call, either live or
automated, to attack the bank or credit union customer and
get critical information.
ATM
Page | 30
Social Engineering
Page | 31
f) If you are unsure whether an email request is legitimate, try
to verify it by contacting the company directly. Do not use
contact information provided on a website connected to the
request; instead, check previous statements for contact
information.
g) Install and maintain anti-virus software, firewalls, and email
filters to reduce some of this traffic.
h) Take advantage of any anti-phishing features offered by your
email client and web browser.
i) If you believe your financial accounts may be compromised,
contact your financial institution immediately and close any
accounts that may have been compromised. Watch for any
unexplainable charges to your account.
j) Immediately change any passwords you might have revealed.
If you used the same password for multiple resources, make
sure to change it for each account, and do not use that
password in the future.
k) Don't make you mobile phone as a source for your personal
data, which is dangerous if it falls in to the hands of strangers.
It is advisable not to store important information like credit
card and bank cards passwords, etc in a mobile phone.
l) Note the IMEI code of your cell phone and keep it in a safe
place. This helps the owner to prevent access to the stolen
mobile. The operator can block a phone using the IMEI code.
Page | 32
Public computers (like Internet Cafes etc)
Page | 33
Page | 1