Cyber HYGIENEf o r c y b e r s p a c e
Dos & Don’ts
BASIC
2
Disclaimer: This document is for guidance and awareness only. The contents of this document are not to be used in any legal
validation in investigation, etc. The purpose is to share basic information on these matters.
Published by:
Indian Cyber Crime Coordinaon Centre (I4C)
Cyber and Informaon Security (CIS) Division
Ministry of Home Affairs
Government of India
North Block
New Delhi – 110001
Introducon
Indian Cyber Crime Coordinaon Centre (I4C) under Cyber &
Informaon Security (CIS) Division of the Ministry of Home
Affairs, has prepared this manual to disseminate Cyber Hygiene
Best Pracces for the benefit of Industrial Bodies/General
Public/Government Officials. This should not be considered as
an exhausve list of precauons for Cyber Hygiene but baseline
precauons that are to be taken.
Cyber space is a complex and dynamic environment of
interacons among people, soware and services supported by
worldwide distribuon of Informaon and Communicaons
Technology (ICT) devices and networks. The exponenal
increase in the number of internet users in India clubbed with
rapidly evolving technologies has brought in its own unique
challenges.
Contents
1. Computer Safety Tips----------------------------------------5
2. Password Security Management------------------------12
3. General Internet Safety Precauons-------------------17
4. Financial Transacons-Safe Pracces------------------20
5. Social Media Plaorms-Safety Tips---------------------24
6. Mobile Phone Safety---------------------------------------27
7. Malware Protecon----------------------------------------33
1.1 USB Device Security ----------------------------------10
8. E-mail Security Pracces----------------------------------35
3
Adopon of digital technology and internet have also led to increase
in cyber crime incidents. It can be controlled or minimized with care,
precauon, awareness and with the use of appropriate tools to
secure the informaon. The ps and recommendaons provided in
this document may help the user to keep the informaon/data &
device secure.
4
INTRODUCTION
Informaon Technology has made a significant contribuon and impact
on socio-economic scenarios. Rapid adopon of digital technology has led
to employment generaon, ease of living, ease of doing business and
access to informaon.
Computer safety tips
What is computer security?
Computer security threats
Computer Viruses Phishing Mail/URL
Botnet Keylogger
Computer security is the protecon of computer systems and informaon
from the and unauthorized access. It is the process of prevenon and
detecon of unauthorized use of the computer systems.
Computer Trojans
5
Computer security threats are possible dangers that can
cause impediment to the normal funconing of the computer. Some of
the common and harmful computer threats are depicted below:-
ERROR404RELOAD HOME
Always download applicaons/ soware from
trusted sources
Regularly update Operang System, Applicaons
and An-Virus soware of the system
Lock the computer screen when not in use
Computer safety
tips
Ensure backup of important data/files/
documents at regular intervals
Always keep the computer firewall “ON”
6
Dos
Use account with limited privileges on systems
Always insist on using genuine/ licensed
soware applicaons
Scan all the files/contents downloaded from
websites, e-mails or USBs
Uninstall unnecessary programs or soware
Computer safety
tips
7
Dos
Computer safety
tips
Use “Task Manager” to idenfy any unwanted
programs running on the computer system
Access to servers should be allowed via Mul-
Factor Authencaon (MFA)
Set Operang System update sengs to
“Auto-Download” opon for regular updates
Disable Remote Desktop Connecon and network
file sharing , when not in use
8
Dos
Donts
Do not install or use pirated copies of soware/
applicaons under any circumstances. These
may contain malware
Do not use guessable/weak passwords like
“password@123", etc.
Do not dispose computer or hard drive without
deleon and wiping of data
Do not click on untrusted/unexpected Pop-Up
adversements/ programs
Computer safety
tips
9
1.1 USB device Security
Unsecured use of USB drive can lead to data thes, data leakages and malware
infecon. USB security can be ensured with care, awareness and by using
appropriate scanning tools to secure the informaon.
Threats
Types of devices which support USB
Flash Drive/ Pendrive
Portable Hard Drive/ SSD
Mobile Phone
USB devices are very convenient to transfer data between different
computers. One can plug it into a USB port, transfer important data, remove
and use it appropriately as desired. However, this portability, convenience
and popularity also bring different threats to the informaon system.
Digital Camera
Card Reader
USB Keyboard/ Mouse
10
USB device Security
Scan USB device with
Anvirus/
Endpoint Protecon
before its use
Autorun/ Autoplay feature
shall be disabled in all the
computers, while
using USB
11
Dos
Password Security Management
Password helps in protecon of informaon accessible via computers.
It allows access to informaon only to authorised users. Strong mul
character passwords must be enforced in all the systems.
Cyber criminals use many methods to access accounts, including
diconary brute-force aack (aacks made to guess passwords), as well
as comparing various word combinaons against a diconary file.
Cyber criminals may also use password capturing tools like “Keyloggers”
Password attack
on vicm’s computer.
12
Always use different passwords for different
accounts. Ensure password is strong
Passwords must be changed at regular intervals
Immediately, change any password which might
have been shared or revealed by mistake
Strong passwords should contain combinaon of
upper case, lower case, numbers,"Special"
characters (e.g., @#$%^&*()_+|~--=\’{}[]: ";<>/,etc.)
Password security
management
13
Dos
A password containshould not
Birth dates, names, ID proofs and other
personal informaon such as addresses and
phone numbers
Commonly used words such as names of
family members, pets, friends, colleagues,
movie/novel/comics characters, etc.
The password containing less than
thirteen characters
Password should not be less than eight
characters
The password containing less than
thirteen characters
Password recovery answers should not
be guessable
14
Donts
Do not use public systems to access
banking/ sensive sites
Do not share password, OTP
through e-mail, chat or any other
electronic communicaon
Do not reveal password on
quesonnaires or security forms
Password security
management
15
Donts
Do not choose/ select “remember
my password” opon for banking/
sensive sites
Never write down your password
anywhere, especially as a ‘note sck’
to the computer
Don’t use your biometrics (finger
print, etc.) at untrusted terminals/
places
Password security
management
16
General Internet safety Precautions
Invenon of internet has revoluonized the way of communicaon and
informaon sharing. However, unsecured usage of internet may pose risks to an
organizaon. Internet security includes browser security, website security,
network security, soware applicaons, etc. Its objecve is to enforce
rules and measures against aacks over the internet.
Unsafe internet pracces may lead to risks from phishing, online viruses,
trojans, worms, ransomware, business email compromise, financial loss, etc.
17
Be vigilant while
clicking/
downloading
from suspicious
links/ URLs
Make it a habit of
clearing browser
history
aer confidenal
acvies/
transacons
Cloud storage
to be used with
appropriate
security/ privacy
sengs
Verify the
Authencity and
Identy of social
media profiles
before geng
involved in any
correspondence
Judiciously use
services that
require locaon
informaon. Also,
avoid posng
photos with
GPS-coordinates
Be vigilant and
verify the
adversements/
sponsored contents
on search results
or websites
General Internet safety
Precautions
18
Dos
Do not use any public computer or Wi-Fi for
carrying out financial transacons like
online shopping, internet banking,
UPI transacon, etc.
Don't respond to
email, instant
messages (IM),
texts, phone calls
etc., asking you for
your password.
Do not use email
address, phone
number and
details of payment
cards on untrusted
and unsecured
websites
Always verify the
source and
authencity of content
before sharing
Do not trust and share
unverified content on
social media and
messaging apps.
19
Donts
General Internet Safety precautions
Financial Transaction - Safe Practices
Digital modes of payments like internet banking, UPI, cards, mobile banking
have made day-to-day payments very convenient. Any security lag in online
transacons may result in financial loss to an individual or an organizaon.
20
Financial Transactions - Safe Practices
UPI Safety
Keep your UPI PIN safe
and do not share with
anyone
UPI PIN is not
needed while receiving
payments
Protect device and
payment app with strong
passcode
Verify the
name of “Payee” or QR code
before proceeding
with the payment
21
Dos
Card safety
Card Number, Expiry &
CVV number are confidenal.
Never share with
anyone
Sharing OTP may
result in unauthorized
debits
Manage your card limit
using mobile banking
apps for addional
safety
Use cards only
aer verifying authencity
of PoS/terminals/ATMs
and websites
OTP
Financial Transactions - Safe Practices
22
Dos
Internet /
Mobile Banking
Use genuine/licensed
Operang System for
internet banking
transacons
Verify Internet Banking
URLs received in SMS/Email
before entering your credenals
Public computers and
insecure internet
connecons must be
avoided
Use a strong
internet banking password
which is different from
other accounts like
e-mail, e-commerce,
etc.
Example-hps://retail.onlinesbi.com
hp://xyz.com/SBIBank
Financial Transactions - Safe Practices
23
Dos
Social Media Platforms - safety tips
24
Privacy sengs must be
carefully chosen
before sharing any
content over
internet Be vigilant before
revealing your locaon
informaon over
the internet
Friend requests
must be accepted
aer verificaon with
proper cauon Content posted on
social media must be
verified for authencity
before forwarding /
sharing
Social Media Platforms - safety tips
25
Dos
Do not use social
media account without
Mul-Factor
Authencaon
(MFA) Never log into
social media accounts
from untrusted
systems
Donts
Social Media Platforms - safety tips
26
mobile phone safety
Mobile phones are integral part of any organizaon. Secure usage of
phone is essenal for personal and organizaonal data protecon.
Data the, financial loss, unauthorized access, malware infecon, etc.,
27
may be a result of mobile phone compromise.
Be cauous with
public Wi-Fi
Informaon shared
over public
network may be
misused
Review the default
privacy sengs of
the smartphone,
mobile applicaons
and social
media accounts
Personal photos
posted on social
media with public
visibility may be
misused
Before
downloading
any App, same
should be checked
for its reputaon/
authencity
Read vendor
privacy policies
and verify app
permission
before
downloading
apps
mobile phone safety
28
Dos
Turn off / remove
unnecessary
apps
mobile phone safety
Prefer
downloading
mobile apps from
genuine sources
Register
for Do Not
Disturb (DND)
service with
Telecom Operators
29
Dos
Use Parental control
mode, while handing
over mobile phones
to kids or minors
Use device / SD card
encrypon to
safeguard
confidenal data
mobile phone safety
30
Dos
mobile phone safety
Protect your
device
with a strong
PIN/Password
or Biometrics and
enable auto lock
seng in
mobile phone
Always take
back-up of data
(contacts, personal
photos, etc.)
31
Dos
Do not reply or
click on link sent
through
SMS, e-mails
or chat messenger
by strangers
Do not store any
classified/ sensive
data (text /video /
photograph) in
the device
Do not log into
accounts,
especially the
financial
accounts, when
using public
wireless networks
Donts
mobile phone safety
32
Malware protection
How to protect against malware?
c://
< head >
< end >
x,y,z integer
begin
read x, y, z
The various types of malwares are spyware, viruses, worms and trojans,
ransomware, Botnet, etc.
Malware performs various tasks that include locking of important files,
stealing sensive informaon from the system, gaining unauthorized
remote access, spy on the user acvity, consuming computer memory,
internet bandwidth, corrupng important files, etc.
The Term Malware is a combinaon of words, ‘Malicious’ and ‘Soware’.
Malware is intenonally developed to perform various unauthorized and
destrucve tasks on the vicm's system without one’s knowledge.
Keep all soware up to date, including the Operang System and
applicaons.
Do not click on untrusted URL links
Patch Management to be ensured
to overcome vulnerabilies
Use an-malware soluons
33
Use Licensed Version of
Operang Systems and
Applicaon Soware
Scan USBs,
Files on your computer
regularly or before use.
Disable USB devices if not
needed
Keep your system and
Anvirus up-to-date with
regular patches
Malware
Protection
34
Dos
E-MAIL SECURITY PRACTICES
35
Don't open/reply to e-mail links
(hyperlinks/ web-links/ URLs
menoned in the body of such
mails) giving any luring offer.
It may result in compromising
your personal and financial
details.
Do not access to any spam
e-mails, unl the sender is
properly verified
E-MAIL SECURITY PRACTICES
36
NOTES
NOTES
December, 2021