Cyber Safety

Cyber Safety
+ Show
CYBER SAFETY CYBER SAFETY-1
Broadband Security
+ Show
Types of Broadband Modem
  • Wireless Fidelity (Wi-Fi)
    • Digital Subscriber Line (DSL)
  • Asynchronous Digital Subscriber Line (ADSL)
  • Very high speed Digital Subscriber Line (VDSL)
    • Cable Modem
    • Satellite
    • Broadband over Powerlines (BPL)
    • Terminal Adapter Modem
    • Universal Serial Bus (USB)
Securing Broadband In­ternet Access Do’s
  • Always download broadband drivers from th le­gitimate websites recommended by the manu­facturer.
  • Regularly download the firmware (driver code)
  • Always use the power adapter supplied by the manufacturer along with the modem.
Dont’s
  • Don’t enable the option for remote administration (via Internet), as it is not required for a home user.
  • Don’t enable the option “Restore Factory Default Set­ting” in broadband modem.
  • Don’t use connection without a filter for each broadband Internet line.
  • Don’t tap the line before the splitter (a small dvice that separates phone line from data / PC port).
  • Don’t use USB broadband modem with insecure
computer/laptop.            
Desktop Security
+ Show
Why do you need to secure your Desktop? A personal computer used without proper security measure could lead to ex­ploiting the system for illegal activities using the resources of such insecured computers. These exploiters could be Virus, Trojans, Keyloggers and sometimes real hackers. This may result in data theft, data loss, personal information dis­closure, stealing of credentials like passwords etc. So, protect and secure your Personal Computer before it is compromised.   Always install Licensed Software so that you have regular updates of your Operating system and Applications. In case of open source software, make sure to update frequently.
  • Read the “Terms and Conditions” / “License Agreement” provided by vendor/software before installation.
  • Properly shutdown and switch off your personal computer after the use along with your external devices like Monitor, Modem, Speakers etc.
Do’s Read the vendor document carefully and follow the guidelines to know how to setup the personal computer
  • Connect
i. Keyboard ii. Mouse iii. Monitor iv. Speakers and v. Network Cable …... to CPU (Central Processing Unit) as directed in vendor document.
  • Connect CPU and Monitor to Electrical Outlets.
Dont’s
  • Do not install pirated software such as
  • Operating System Software (Windows, Unix, etc..).
  • Application Software (Office, Database..etc).
  • Security Software (Antivirus, Antispyware..etc).
Note: Remember, some Pirated Software themselve can be rogue programs.
  • Do not plug the computer directly to the wall outlet as power surges may destroy computer. Instead use a genuine surge protector to plug a computer.
  • Don’t eat food or drink around the PC.
  • Don’t place any magnets near the PC.
  • Never spray or squirt any liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
  • Don’t open the e-Mail attachments which have double extensions.
 
Mobile Phone Security
+ Show
 
  • Mobile Device and Data Security Attacks
  • Do’s and don’ts for Mobile Device
    • Record IMEI number:
    • Record the unique 15 digit IMEI number. In case Mobile phone is stolen/lost, this IMEI number is required for registering complaint at Police station and may help in tracking your mobile phone through service provider.
    • Enable Device locking:
    • Use autolock to automatically lock the phone or keypad lock protected by passcode/ security patterns to restrict acess to your mobile phone.
    • Use a PIN to lock SIM card:
    • Use a PIN (Personal Identification Number) for SIM (Subscriber Identity Module) card to prevent people from making use of it when stolen. After turning on SIM security, each time phone starts it will prompt to enter SIM PIN.
    • Use password to protect information on the memory card.
    • Report lost or stolen devices
    • Report lost or stolen devices immediately to the nearest Police Station and concerned service provider. Use mobile tracking feature.
    • Use the feature of Mobile Tracking which could help if the mobile phone is lost/stolen. Every time a new SIM card is inserted in the mobile phone, it would automatically send messages to two preselected phone numbers of your choice, so that you can track your Mobile device.
  • Bluetooth:
    • Do’s:
    • Use Bluetooth in hidden mode so that even if the device is using Bluetooth it is not visible to oth- ers.
    • Change the name of the device to a different name to avoid recognition ofyour Mobile phone model.
    • Note: The default name will be the mobile model number for Bluetooth devices.
    • Put a password while pairing with other devices. The devices with the same password can connect to your computer
    • Disable Bluetooth when it is not actively transmitting information.
    • Use Bluetooth with temporary time limit after which it automatically disables so that the device is not available continuously for others.
    • Don’ts:
    • Never allow unknown devices to connect through Bluetooth.
    • Never switch on Bluetooth continuously.
    • Never put Bluetooth in always discoverable mode.
    • Note: Attackers can take advantage of its default always-on, always discoverable settings to launch attacks.