Cyber Security Handbook by CERTIn 2024
Cyber Security Handbook by CERTIn 2024
HANDBOOK
PAGE 1
Desktop Security
Best Practices
Use genuine Operating System and Software.
Keep your Operating System updated.
Install anti-virus and anti-malware solutions and keep them updated.
Use strong login password and change them periodically.
Regularly take backups of your important files and data.
In-case of incidents such as hardware failure, or cyberattacks, having
backups can help you restore important information.
Maintain multiple copies of critical data in different locations to
prevent loss in case of disasters.
Periodically test and verify your backups to ensure they can be used
for restoration when needed.
PAGE 2
Browser Security
Best Practices
Update your web browser with the latest patches.
Disable pop-up windows in your browser.
Delete browser cookies and cache regularly.
Have "Safe Search" ON in Search Engines.
Enable private browsing or incognito mode.
Be careful with the websites you visit.
Check the URL of a website to make sure that it has the "https://" or a
padlock icon.
PAGE 3
E-Mail Security
Best Practices
Verify the sender before clicking on any link/ attachment.
Check the domain name in the email address of the sender. Look for
misspelled or typo errors.
Don’t click any link/attachment from suspicious emails received from
strangers.
Do not use official email accounts for online shopping or ticket
booking.
Do not click on shortened URLs received in emails/ chats/ messages
without verifying them by expanding the URL.
Use strong passwords.
Enable Multi-Factor Authentication (MFA).
Do not store Username and passwords in public systems.
PAGE 4
Firewall Security
firewall
Lan
Best Practices
Always make sure the firewall is hardened and configured properly.
Keep the software updated with the latest updates.
Regularly update firewall protocols.
Review and update access controls on a regular basis.
Implement a comprehensive logging and alert mechanism.
Set up procedures for backup and restoration.
Perform regular audits of firewalls.
PAGE 5
Broadband Security
Best Practices
Always download broadband drivers from the legitimate websites
recommended by the manufacturer.
Change the default administrator or admin password of broadband
router modem given by manufacturer .
Install broadband Internet bandwidth usage monitoring tool.
Enable SSH (secure channel) for remote administration.
Power-off the modem router after completing the Internet access.
Do not enable auto-connect to open Wi-Fi networks.
Don’t use USB broadband modem with insecure computers / Laptops.
Use effective end point security solution (with anti virus, anti spyware,
desktop firewall etc) to protect PC / Laptop from broadband Internet
threats.
PAGE 6
Data Security
Best Practices
Encrypt sensitive data to protect it from unauthorized access.
Enable Multi Factor Authentication (MFA) to add an extra layer of
security to your accounts.
Be cautious when working with sensitive information in public places
or on shared devices.
Avoid using easily guessed or common passwords.
Use different passwords for different accounts.
Avoid using public Wi-Fi to do secured transactions.
Use strong passwords to lock your devices.
PAGE 7
VPN Security
Best Practices
A Virtual Private Network (VPN) is a service used for establishing a
secure connection over the Internet.
Keep your VPN software upto date with the latest security patches.
Monitor and enable logs of VPN activity to identify and address
suspicious activity.
Select VPNs that follow standard security protocols.
Configure VPN with all web application security settings enabled.
Use strong passwords for VPN accounts.
PAGE 8
Benefits of using
anti-virus Software
1
An essential step in preventing and
identifying malware infection is installing
antivirus software from a trustworthy
vendor
PAGE 9
Password Management
Best Practices
1 Use Strong and long passwords
Always prefer to create lengthy passwords.
pass123 Short length passwords are easy to crack.
Uw12345_chk?
security123
Dictionary words are
vulnerable to brute-force
Secur_ity?123# attack by hackers.
3
Create passwords using special characters
Passwords mixed with uppercase, lowercase,
security123
numerals and special characters are difficult to
crack
Sec_urity#<123>
OTP
5
Username
Password
Enable Multi Factor Authentication
MFA adds another layer of security to your accounts.
Change
password
PAGE 10
Backup-Best practices
Recovery
Best Practices
Backups of the system, application and data should be performed on a
regular basis.
Ensure that a valid, virus-free backup exists and is available for use at any
time
Up-to-date backups of all critical items should be maintained to ensure
the continued provision of the minimum essential level of service.
Back-up procedures should be documented, scheduled and monitored.
The backups must be kept in an area physically separate from the server.
Offline backups with encryption for critical systems should be
maintained.
Online backup systems should be properly hardened and access to its
network should be strictly restricted.
PAGE 11
Report Cyber Security
INCIDENT TO CERT-IN
For reporting Cyber Security Incidents to CERT-In:
Visit website: https://www.cert-in.org.in
Email: [email protected] Information Desk
Toll Free Phone: +91-1800-11-4949 Phone: +91-11-24368551
Toll Free Fax: +91-1800-11-6969 Fax: +91-11-24368546
Email: [email protected]
[email protected]
Phone: +11-22902600 Ext: 1012, +91-11-24368572
For Trainings/ Awareness programmes: www.cert-in.org.in
Email: training@cert-in.org.in
Scan Me
Official social media handles of @IndianCERT
https://www.facebook.com/IndianCERT/
https://twitter.com/IndianCERT
https://www.instagram.com/cert_india/ www.csk.gov.in
https://www.pixstory.com/user/indiancert/9280