-->
Protect Your Cyberspace - Security risk in using Computer, Mobile Phone & Tablets,

Protect Your Cyberspace - Security risk in using Computer, Mobile Phone & Tablets,

Brilliant minds across the world are working tirelessly to make our lives easier through continuous inventions to harness the unlimited potential of cyber space. 

Vigilant India, GOI, New Delhi: Computer hardware and software-based technologies have a significant impact on the way we live and do our daily chores. It has been so revolutionizing that we do not even care to recall how things were done two decades back. 
These are surely positive changes that have embraced mankind because of the creative contributions of our cyber professionals. However, equally tech-savvy minds are operating underground to hack, break and disrupt these inventions that are now so much a part of our everyday lives. 
They are highly qualified criminals, trained in advanced technology and computer programming. These cyber crooks are a menace and pose a threat to civil societies, democracies and governments. 
As the established world order seeks a secure future for its citizens, criminals try their luck to disrupt the cyberspace and dupe people. To tackle this threat, there is an urgent need to take measures that beef up cybersecurity. The challenges are manifold because technology is not stagnant. 
The National Cyber Coordination Centre (NCCC) has been established by Indian Computer Emergency Response Team (CERT-In) to generate situational awareness of existing and potential cybersecurity threats. Specifically designed materials, including books, videos, and online resources, are developed for children, parents, and general users. These materials are disseminated through portals like "www.infosecawareness. in" and "www.csk.gov.in." By implementing these measures and fostering collaboration between central and state governments, India strives to create a safer cyber environment for its citizens and to protect them from cyber threats.

Mobile Phone & Tablets
Mobile phones and tablets are an integral part of our lives today. They are used for a variety of purposes, including communication, collaboration, and data access.
That is why mobile phones can also be a security risk if they are not used properly. Secure use of mobile phones is essential to protect personal and organizational data.
Misuse of mobile phones can lead to a variety of problems including data theft, financial loss, unauthorized access, malware infection etc.

What to do
  • Be careful with public Wi-Fi,information shared on public networks can be misused.
  • Consider the default privacy settings of smartphones, mobile applications and social media accounts.
  • Personal photos posted on social media with public visibility option can be misused.
  • Check the reputation/ authenticity of an app before downloading it.
  • Read the privacy policies of the seller and verify the app permission before downloading the app.
  • Prefer downloading mobile apps only from trusted sources.
  • Close/remove unnecessary apps 
  • Register with Telecom Operators for ‘Do Not Disturb’. 
  • Use parental control mode while giving mobile phones to children or minors.
  • Use device/SD card encryption to protect confidential data.
  • Protect your device with a strong PIN/password or biometrics and enable the setting of Auto Lock in the mobile phone.
  • Always keep backup of data like contacts, personal, photos etc.

What not to do
  • Do not reply to or click on links sent by strangers through SMS, e-mail or chat messages.
  • Do not store any type of classified sensitive data like taxes, videos, photographs etc. in the device.
  • Do not login to accounts, especially financial accounts, using public wireless networks

Computer
Computer security is the protection of computer systems from theft and unauthorized access of information.
It is the process of preventing and detecting unauthorized use of computer systems.
Computer security threats are potential threats that may interfere with the normal functioning of a computer.
Some of the common and harmful computer threats areComputer Virus, Computer Trojan, Phishing Mail/URL, Botnet, Key logger.

What to do
  • Always download applications/ software from trusted sources.
  • Regularly update the operating system, applications and antivirus software.
  • Make sure to back up important data/ files/documents at regular intervals.
  • Keep the c o m p u t e r screen locked when not in  use.
  • Always keep the computer firewall on.
  • Use accounts with less privileges on the system.
  • Always prefer to use genuine/ licensed software applications.
  • Scan all files/content downloaded from websites, e-mail or USB.
  • Uninstall unnecessary programs or software.
  • Use the Task Manager to identify any unwanted programs running on the computer system.
  • Access to the server must be permitted through multifactor authentication.
  • Turn off Remote Desktop Connection and network file sharing when not in use.
  • Set the operating system update settings to the Auto download option for regular updates.

What not to do
  • Never install or use pirated copies of software/ applications. These may contain malware.
  • Don't use weak passwords like password@123,etc.
  • Do not click on untrustworthy/unexpected pop-up advertisements/programs.
  • Do not dispose of computer or hard drive without extracting and erasing data.

Internet Safety Protocol
Using the Internet without adequate security can pose a risk to any organization. Internet security encompasses browser security, website security, and software applications. These measures are designed to protect against cyber attacks on the Internet such as phishing, online viruses, Trojans, worms, ransomware, commercial email breaches, and financial losses.

What to do
  • Be careful while clicking/downloading suspicious links/ URLs.
  • Get into the habit of clearing browser history after confidential activities/transactions.
  • Use cloud storage with appropriate security/privacy settings.
  • Verify the authenticity and identity of social media profiles before sharing any information.
  • Use judiciously those services that require location information. Avoid posting photos with GPS coordinates.

 What not to do
  • Do not use any public computer or Wi-Fi for financial transactions like online shopping, internet banking, UPI etc.
  • Do not provide e-mail address, phone number, payment card details etc. to untrustworthy and unsecured websites.
  • Do not trust and share unverified content on social media and messaging apps. Always check the authenticity of the source and content before sharing.

Indian Cyber Crime Coordination Centre
1. National Cyber crime Reporting Portal (NCRP) connecting more than 250 financial institutions. The cyber crime incidents can be reported on portal or on National cyber crime helpline number 1930.
2. National Cyber crime Threat Analytics Unit (NCTAU) is a platform for government and private research agencies for analysis on the collected cyber crime feeds from open sources and other agencies.
3. National Cyber crime Forensic Laboratory (NCFL) provides online forensic services to Central and State Law Enforcement Agencies in addressing issues of digital forensics.
4. National Cyber crime in Ecosystem Management Unit (NCEMU) formed to develop ecosystems to neutralize threats from cybercriminals by bringing together government and non-government organizations through multi-pronged efforts for creating awareness.
5. Joint Cyber crime Coordination Teams (JCCT) constituted for interstate coordination among law enforcement agencies on cyber crime investigations.
6. National Cyber crime Training Centre (NCTC) focuses on standardization of cyber crime courses and practical training.
7.National Cyber crime Research and Innovation Centre (NCR&IC) to track emerging technologies and to predict potential vulnerabilities.

Compiled from Vigilant India Issue: 01-15 July, 2023, Year : 1 Volume: 7 As received and sent to  newskalimpong[at]gmail[dot]com from Bureau of Police Research and Development, Ministry of Home Affairs, Government of India, New Delhi through no-reply[at]sampark[dot]gov [dot] in.

0 Response to "Protect Your Cyberspace - Security risk in using Computer, Mobile Phone & Tablets, "

Post a Comment

Kalimpong News is a non-profit online News of Kalimpong Press Club managed by KalimNews.
Please be decent while commenting and register yourself with your email id.

Note: only a member of this blog may post a comment.