0% found this document useful (0 votes)
33 views

Cyber Security Handbook by CERTIn 2024

Uploaded by

chaudharynkjaat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

Cyber Security Handbook by CERTIn 2024

Uploaded by

chaudharynkjaat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

CYBER SECURITY

HANDBOOK

NATIONAL CYBER SECURITY


AWARENESS MONTH (NCSAM)
"Secure Our World"
THEME: CYBER SURAKSHIT BHARAT
#SatarkNagrik

1st-31st October 2024


Table of Contents
01 INTRODUCTION

02 DESKTOP SECURITY BEST PRACTICES

03 BROWSER SECURITY BEST PRACTICES

04 E-MAIL SECURITY BEST PRACTICES

05 FIREWALL SECURITY BEST PRACTICES

06 BROADBAND SECURITY BEST PRACTICES

07 DATA SECURITY BEST PRACTICES

08 VPN SECURITY BEST PRACTICES


Table of Contents
09 BENEFITS OF USING ANTI-VIRUS SOFTWARE

10 PASSWORD MANAGEMENT BEST PRACTICES

11 BACKUP BEST PRACTICES

12 REPORT CYBER SECURITY INCIDENT TO CERT-IN


aBOUT cert-in
The Indian Computer Emergency Response Team (CERT-In)
is a Government Organization under Ministry of Electronics and Information
Technology (MeitY), Government of India established with the objective of
securing Indian cyber space. CERT-In provides Incident Prevention and
Response services as well as Security Quality Management Services. CERT-
In has been designated to serve as national agency for incident response
under Section 70B of the Information Technology Act, 2000 (Amendment
2008). As part of services of CERT-In, for creation of awareness in the area
of cyber security as well as training/ upgrading the technical knowhow of
various stakeholders.

CERT-In is observing the National Cyber


Security Awareness Month (NCSAM) during
October 2024 by organizing various events
and activities for citizens as well as the
technical cyber community in India with the
theme of "Secure Our World" and "Cyber
Surakshit Bharat" and hashtag #SatarkNagrik.

This Cyber Security Handbook for Digital


Nagriks and Digital Enterprises is released as a
part of CERT-In's awareness initiatives to
educate the users on the best practices that
needs to be followed to protect them from
different cyber security attacks and cyber
threats.

PAGE 1
Desktop Security

Best Practices
Use genuine Operating System and Software.
Keep your Operating System updated.
Install anti-virus and anti-malware solutions and keep them updated.
Use strong login password and change them periodically.
Regularly take backups of your important files and data.
In-case of incidents such as hardware failure, or cyberattacks, having
backups can help you restore important information.
Maintain multiple copies of critical data in different locations to
prevent loss in case of disasters.
Periodically test and verify your backups to ensure they can be used
for restoration when needed.

PAGE 2
Browser Security

Best Practices
Update your web browser with the latest patches.
Disable pop-up windows in your browser.
Delete browser cookies and cache regularly.
Have "Safe Search" ON in Search Engines.
Enable private browsing or incognito mode.
Be careful with the websites you visit.
Check the URL of a website to make sure that it has the "https://" or a
padlock icon.

PAGE 3
E-Mail Security

Best Practices
Verify the sender before clicking on any link/ attachment.
Check the domain name in the email address of the sender. Look for
misspelled or typo errors.
Don’t click any link/attachment from suspicious emails received from
strangers.
Do not use official email accounts for online shopping or ticket
booking.
Do not click on shortened URLs received in emails/ chats/ messages
without verifying them by expanding the URL.
Use strong passwords.
Enable Multi-Factor Authentication (MFA).
Do not store Username and passwords in public systems.

PAGE 4
Firewall Security
firewall

Legitimate network Non-Legitimate


network

Lan

Best Practices
Always make sure the firewall is hardened and configured properly.
Keep the software updated with the latest updates.
Regularly update firewall protocols.
Review and update access controls on a regular basis.
Implement a comprehensive logging and alert mechanism.
Set up procedures for backup and restoration.
Perform regular audits of firewalls.

PAGE 5
Broadband Security

Best Practices
Always download broadband drivers from the legitimate websites
recommended by the manufacturer.
Change the default administrator or admin password of broadband
router modem given by manufacturer .
Install broadband Internet bandwidth usage monitoring tool.
Enable SSH (secure channel) for remote administration.
Power-off the modem router after completing the Internet access.
Do not enable auto-connect to open Wi-Fi networks.
Don’t use USB broadband modem with insecure computers / Laptops.
Use effective end point security solution (with anti virus, anti spyware,
desktop firewall etc) to protect PC / Laptop from broadband Internet
threats.

PAGE 6
Data Security

Best Practices
Encrypt sensitive data to protect it from unauthorized access.
Enable Multi Factor Authentication (MFA) to add an extra layer of
security to your accounts.
Be cautious when working with sensitive information in public places
or on shared devices.
Avoid using easily guessed or common passwords.
Use different passwords for different accounts.
Avoid using public Wi-Fi to do secured transactions.
Use strong passwords to lock your devices.

PAGE 7
VPN Security

Best Practices
A Virtual Private Network (VPN) is a service used for establishing a
secure connection over the Internet.

Keep your VPN software upto date with the latest security patches.
Monitor and enable logs of VPN activity to identify and address
suspicious activity.
Select VPNs that follow standard security protocols.
Configure VPN with all web application security settings enabled.
Use strong passwords for VPN accounts.

PAGE 8
Benefits of using
anti-virus Software

1
An essential step in preventing and
identifying malware infection is installing
antivirus software from a trustworthy
vendor

2 Realtime protection by system scanning


and blocks malicious pop-ups and ads

3 Alerts malicious files present in internal


and external devices

4 Alerts when visiting infected or malicious


websites

5 Keeping them updated helps to improve


protection against latest threats

PAGE 9
Password Management
Best Practices
1 Use Strong and long passwords
Always prefer to create lengthy passwords.
pass123 Short length passwords are easy to crack.
Uw12345_chk?

2 Don't use dictionary words as passwords


Dictionary

Such passwords are too easy to crack.

security123
Dictionary words are
vulnerable to brute-force
Secur_ity?123# attack by hackers.

3
Create passwords using special characters
Passwords mixed with uppercase, lowercase,
security123
numerals and special characters are difficult to
crack
Sec_urity#<123>

4 Change passwords periodically


Change
password
Avoid using guessable patterns of password.

OTP
5
Username
Password
Enable Multi Factor Authentication
MFA adds another layer of security to your accounts.

Change
password

PAGE 10
Backup-Best practices

Recovery

Best Practices
Backups of the system, application and data should be performed on a
regular basis.
Ensure that a valid, virus-free backup exists and is available for use at any
time
Up-to-date backups of all critical items should be maintained to ensure
the continued provision of the minimum essential level of service.
Back-up procedures should be documented, scheduled and monitored.
The backups must be kept in an area physically separate from the server.
Offline backups with encryption for critical systems should be
maintained.
Online backup systems should be properly hardened and access to its
network should be strictly restricted.

PAGE 11
Report Cyber Security
INCIDENT TO CERT-IN
For reporting Cyber Security Incidents to CERT-In:
Visit website: https://www.cert-in.org.in
Email: [email protected] Information Desk
Toll Free Phone: +91-1800-11-4949 Phone: +91-11-24368551
Toll Free Fax: +91-1800-11-6969 Fax: +91-11-24368546

For Reporting Cyber Fraud & Crime to I4C:


Visit website: https://www.cybercrime.gov.in
Call : 1930

For reporting Vulnerabilities & Collaboration with


CERT-In in the area of Cyber Security:
Visit website: https://www.cert-in.org.in Scan Me

Email: [email protected]
[email protected]
Phone: +11-22902600 Ext: 1012, +91-11-24368572
For Trainings/ Awareness programmes: www.cert-in.org.in
Email: training@cert-in.org.in

Scan Me
Official social media handles of @IndianCERT
https://www.facebook.com/IndianCERT/

https://twitter.com/IndianCERT

https://www.instagram.com/cert_india/ www.csk.gov.in

https://www.pixstory.com/user/indiancert/9280

You might also like