You are on page 1of 3

CYBER SECURITY

Safeguards
1.
Awareness.
China has org gps for hacking. IP add of all loc in the world
are known, therefore, they can tgt IP add of cantts easily. The perception that a
hacker will not know users from mil is a fallacy.
2.
Cont Over Data.
Passwords should be in form of sentences and
incorporate spl chr as well. !like2spendtime@myhome. Passwords should be
changed every week. Use strong passwords for fwg:-

3.

4.

(a)

Power on.

(b)

Boot sect.

(c)

Users.

(d)

Opening files.

(e)

Editing files.

(f)

Printing permission.

(g)

Copying files.

Softwares.
(a)

Original softwares incl Microsoft Office & antivirus.

(b)

Softwares should be upt frequently.

(c)

Only those softwares be installed that are to be used.

(d)

Flash videos are most vulnerable and hence be avoided.

Cyber Hygiene.
(a)

Anti virus and Firewalls be installed and kept updated.

(b)
Think befor clicking. Many worms, Trojans etc are activated by
clicking on harmless looking options on the net.
(c)
When accessing a site especially through hyperlinks, monitor the
status in status bar below. It is a good way of preventing phishing &
hacktivism.
5.

OS.
(a)
Cmptrs should not use Windows XP. It is the OS that is most
vulnerable to cyber attks.

(b)

OS should be upt reg.

(c)
Where possible, Linux should be used. Word, excel & ppt can be
accessed on Linux. It requires drivers to be installed for hardwares like
pendrives, CD drives etc, thus providing inbuilt security. Moreover, almost
all the viruses, worms, Trojans are designed for Windows.

Protection of Info on Social Media


5.
Dont send critical info on net. If data is to be tfr online, it should be
encrypted beforehand & recipient info of the password through a different media.
6.

Use two factor authentication on email.

7.
Enable SMS alerts when acct is logged into. This will alert the user if a
hacker tries to access the acct.
8.
The settings of email & other social media should be such that acct can be
logged on to from a particular place & cmptr only.
8.

Enable second email acct for recovery of passwords.

9.

Use strong passwords for all social media.

10. Never share details if a mail is received from the email provider asking to
conform pers details/ acct details. No mail provider has such policy. Such mails
are generated by the hackers.

Security on Internet
11. Wireless Modem.
(a)

Change default admin username & pw for wireless gateways.

(b)

Turn on encryption on wireless network.

(c)

Use min power.

(d)

Dont place modem near the window.

12. Cmptr.
(a)

Disable remote access & cont.

(b)

Enable MAC filtering.

(c)

Do not use Google chrome. Its security features are the weakest.

13. Enable remote wiping of data.

Smart Phone
14. Use anti virus.
15. Use pin/ pattern locks.
16. Turn off geo tagging.
17. Avoid loc chk in.

Some Good Softwares


18. EScan.
19. Kaspersky.
20. Strongly recom by the guest speaker
(a)

Comodo firewall.

(b)

A Squared.

(c)

Eraser ver 5.8 & above.

(b)

Add on feature:

Disable running of scripts.

(e)
User names & cmptr name should be random & never reveal
identity or appt of user.

You might also like