ACT Digital Security Guidelines 2019
ACT Digital Security Guidelines 2019
January 2019, V1
02 PASSWORD MANAGEMENT 5
02.1 WHY A PASSWORD 5
02.2 PROTECT YOUR IDENTITY 5
02.3 HOW CAN IT BE STOLEN -THE DIFFERENT TYPES OF ATTACK 6
DIRECT ATTACKS 6
INDIRECT ATTACKS 6
02.4 HOW TO CHOOSE A GOOD PASSWORD 7
WHAT IS A GOOD PASSWORD? 7
HOW TO MEMORIZE A GOOD PASSWORD? 8
HOW TO PROTECT YOUR PASSWORD 8
02.5 HOW TO SECURELY SHARE A PASSWORD WITHIN A TEAM 9
03 COMPUTER SAFETY 10
03.1 DIGITAL HYGIENE 10
SOFTWARE AND UPDATE: 27
03.2 REMOVABLE DEVICES AND USB 10
03.3 DATA MANAGEMENT 11
HOW DO WE ENCRYPT FILES? 11
HOW TO SECURELY SHARE FILES 15
DATA CLASSIFICATION 16
HOW TO BACK UP DATA 17
HOW TO DESTROY SENSITIVE INFORMATION 18
04 INTERNET SECURITY 19
04.1 FILES FROM THE INTERNET 19
04.2 WEB BROWSING 20
MESSAGE POP-UP 21
PASSWORD 21
04.3 E-MAIL 21
SWITCHING TO A MORE SECURE EMAIL ACCOUNT 22
04.4 SOCIAL NETWORK 22
04.5 PUBLIC WI-FI 23
04.6 YOUR ORGANIZATION WI-FI 23
2
05 SMARTPHONE SECURITY 24
06 COMMON SCAM 25
06.1 PHISHING EMAIL SCAMS 24
06.2 FACEBOOK SECURITY 25
3
01
INTRODUCTION
With the digitalization of our lives, both private and work related, a vast range
of new threats have emerged as “soft” threats next to the hard threats in
Safety & Security like car accidents, shooting, kidnaps, etc.
1.1. To Whom
• For the security management to set up and brief/sensitize/train staff.
• To be read by the staff to know how to use their equipment, email
etc.…
Protection of the organization’s asset and information is everyone’s
responsibility and not solely of security professionals.
4
02
PASSWORD MANAGEMENT
GOOD PRACTICES
5
02.3 How can it be stolen -the different types of
attack
There is a very large number of possibilities to steal a password but the most
common techniques are:
Direct attacks
"Direct" attacks are those by which an attacker tries to recover your login and
password to log in your place. The list is long but here are some of the
techniques.
• Brute force attack is the simplest direct attack. It consists, using
software, to test all passwords (including
special characters) possible one by one
until you reach the right one.
• Distributed Attack consists of
distributing the workload of the
software between multiple computers.
Thus, several infected computers can
work at the same time to identify the
password, reducing the identification time.
• Proximity attack is a direct look at
your password when typing, or when it is written on a post-it or
chalkboard in your office.
• Key logger, are software installed on your computer that will record
all keystrokes on your keyboard and transmit them over the Internet to
the person who controls the program. These programs are easily available
on the Internet, for free or for a few dollars depending on their complexity.
Indirect attacks
Unlike direct attacks that steal your passwords on your desktops or when
typing you, indirect attacks use the trick to trap you and
recover your authentication information without your
knowledge.
• Phishing is to send an email prompting to click
on a web link to solve a problem. In reality the link
leads to a fraudulent site, sometimes very well done,
which will push you to register your identification
elements which will then be registered.
• Reuse password. Many users today still use the same password for a
number of sites. Hackers attack low-security sites such as amateur
forums or buy lists of passwords from pirated sites on parallel
markets and then reuse them on more profitable sites, such as
websites. banking or courier services.
6
02.4 How to choose a good password
What is a good password?
A good password, which is called strong, must be difficult to discover by an
attacker in a reasonable time and with the help of automated tools.
G&LmLeVa@2
ABC… 123…
Uppercase Numbers
1. At least 10 characters.
2. Use a varied character set (not just letters and
numbers but uppercase, lowercase, numeric,
special).
3. Avoid reporting to your identity (surname, first
name, date of birth, first name parents / children,
etc.)
4. Not related to the name of the service for which it
is used (pwdHotmail, NameOfmyNGO).
A password is personal, nobody or any site will ask you. If this is the
case then it is a fraudulent attempt.
7
How to memorize a good password?
How to retain a password such as "Pa_ (uYç! &" without needing to write it
somewhere or reset it each time?
1. Define a phrase consisting of four random words and then concatenate
them.
Exemple. Screen:Sun:window:currant
2. Use phonetics, that is, remember the sounds of each syllable to make
a sentence easy to remember.
Exemple. J’ai acheté huit CD pour 100 dollars cet après-midi
Ght8cd%$7aM
Here is a website that will allow you to determine how long it would
take a software to discover your password:
https://howsecureismypassword.net/
GOOD PRACTICES
For sensitive data (banks, private correspondence, medical,
etc.) it is recommended to configure your software and
browsers so that they do not remember your passwords.
You should use a Password Manager that will allow you to
manage different password for different website.
www.enpass.io
8
02.5 How to securely share a password within a
team
Managing passwords within a team is a recurring problem. It is not always
possible to have unique passwords for each person (for example, the
administrator password for a database). It may also be necessary to send a
temporary password (for example, Alice creates an account for Bob asking
him to change his password).
Many organizations use unspoken practices (unscrambled e-mail, shared
files) to exchange passwords that are common to multiple users, undermining
their privacy.
Many existing password management solutions focus on the personal needs
of their users. Passbolt was designed to meet the needs of a team in small
and medium organizations. Moreover, passbolt is completely free.
Passbolt can also help administrators set up rules for rotating, auditing, and
replacing passwords, for example, when an employee leaves an organization.
Passbolt helps end users to use strong and unique passwords.
https://www.passbolt.com/
9
03
COMPUTER SAFETY
GOOD PRACTICES
1. Enable automatic updates.
2. Download only software and updates from trusted
sources (publisher's site).
3. If the software asks you to access too much personal
information (your contacts or SMS on your phone for
example) then find another solution and do not install
it.
GOOD PRACTICES
1. Never connect to your computer a removable device
from a dubious source (found in the street, offered has
a gift etc.)
2. Separate uses (work and personal).
3. Do not put sensitive information (or encrypt it).
10
03.3 Data Management
Governments usually have the means to monitor organizations’ phone calls,
Internet activity, Facebook, Twitter, etc. as well as hack your computer hard
drives.
Criminal organizations will also perceive NGOs as wealthy, given the vehicles,
laptops, satellite phones they often use, as well as publicly announced donor
funding levels.
All of this makes aid agencies vulnerable to information security risks and this
is why we have to properly manage the security of our data by encrypting files
and email, managing their classification and securely backup data.
11
• Enter a password for the file. You'll be prompted to re-enter the
same password, then click OK. After you exit this file, you'll have to
enter the same password to reopen it
12
Step 3: In the Add to Archive window change the name of the archive you
wish to create.
13
Step 6: Enter a Password. See Chapter 2 on how to choose a strong one.
Step 7: Select “Ok” to create the encrypted archive file. The new archive file
will be located in the same folder as the original.
GOOD PRACTICE
• Anything can be decrypted if you're targeted by a
savvy enough, or well-financed foe. You might
want to find a paid solution if your files are
truly sensitive.
• Files encrypted using the above methods can still
be deleted, so you might want to have a backup
on a secondary location.
• If you lose your passwords, you've lost your files
forever. So, again, keep an unencrypted
backup on a physical drive somewhere safe
where it won't be found.
14
Method 3: Encrypt your computer hard drive or external storage device
Vera Crypt is free and open source software that will protect your files by
encrypting them with a passphrase. It allows you to encrypt your computer
hard drive, a USB key or your external storage device use for back up
https://securityinabox.org/en/guide/veracrypt/windows/
Decipherment
Encryption
Once you have encrypted your files you To ensure the confidentiality of the file it will be
can now share them securely. necessary to share it by a channel (ex: email) and your
password by another one (ex: WhatsApp).
To read them, the recipient must know the
password used as an encryption key. It will Thus, if one of the channels is compromised it will be
therefore be necessary to send him. impossible to know the contents of the file because it or
the password will be missing to decrypt it.
15
Data classification1
The sharing of some information may be considered an obligation for all
organization and a matter of policy.
It is important that an organization decides what information they are
willing to share, to whom and for what purpose. The below table provides
an example of how the sensitiveness of information may affect the access
level.
Confidential Confidential information has significant value for the organization, and
unauthorized disclosure or dissemination of it could result in severe
reputational damage or adverse impact on the organization’s operations.
ü Only those who need access explicitly should be granted it, and only
to the least degree necessary (the ‘need to know’ and ‘least privilege’
principles).
ü When held outside the organization’s offices such as on laptops,
tablets or phones, confidential information should be protected
behind explicit logons and possibly encryption devices and/or
encrypted email platforms.
Restricted Disclosure or dissemination of this information is not intended, and may incur
impact on people’s lives, some negative publicity or limited reputational
damage or potential financial loses to the organization.
Internal Use The dissemination of the information to the relevant stakeholders ensure
good functioning and responses, internally to the organization or working
group. Its release will not cause any damage to the organization or its staff
but is considered as undesirable.
Public The dissemination of the information through news media and other channels
is not posing any risk to the organization or its staff, and its release is
considered desirable or non- objectionable at least.
1
From the « Security Incident Information Handbook » (SIM), developed by RedR UK,
Insecurity Insight and EISF.
16
ü Public information can be disclosed or disseminated without any
restrictions on content.
ü Disclosure or dissemination of the information must not violate any
applicable laws or regulations, such as privacy rules.
BACK UP
Purpose Restoring data if needed
A copy of all immediate data
Data concerned
needed for everyday operations
When to do it On a regular basis
Where to do it On an external Hard Drive
Is their sensible information Encrypt your hard drive
How do to it
How to back-up your data will depend on the type of data and the device on
which the data is stored.
Your backups should preferably be stored outside of the offices to prevent the
destruction of the original data from being accompanied by the destruction of
the backup copy in case of fire or flood, or the backup copy to be stolen at the
same time as the computer containing the original data.
The choice of location should not be taken lightly to prevent the data from
being stolen by hackers.
GOOD PRACTICE
• Back-up device can get lost or stolen. Encrypt it
using the software VeraCrypt as describe on page
15.
17
How to destroy sensitive information
When deleting a file the system simply indicates that the file storage location
is reusable.
Other data will be rewritten over time ... maybe the next day or maybe in a
year. When you delete a file, even after you empty the recycle bin, the
contents of that file remain on your hard drive and can be recovered by
anyone who has the right tools.
Moreover, with professional software it is sometimes possible to find data
even after several writing cycles. It is therefore necessary for the extremely
sensitive data to perform erasure (this specific process is call wiping) by
rewriting the file via a dedicated tool to ensure the actual destruction of data.
https://securityinabox.org/en/guide/eraser/wi
ndows/
18
04
INTERNET SECURITY
One of the most common misconceptions is that computer attacks only affect
state administrations and large corporations.
SPAM, malware, spyware, keylogger,
ransomware all these threats (and
many others) can be received by
email, downloaded on the web or
shared via USB sticks. The risks are
many!
Fraudulent use of your credit card,
identity, blackmail broadcast of a
compromising video, but also use of your data to retaliate on your NGO,
government control etc.
It is therefore a question of protecting oneself by adopting a behavior and by
setting up and a set of actions when you use the internet tool.
GOOD PRACTICES
• Disable automatic execution of removable devices.
• Do not open files that come from unreliable sources.
• Be aware of executable files (.exe, dmg)
• Download software (free or paid) only from the
publisher's website (with a green tick next to it)
• Always show the file extension
Windows 10
19
04.2 Web browsing
Websites are the most common source of malware infection, so accessing
them securely is vital.
Do not give personal and confidential information (your personal details, your
bank details, etc.) on a merchant site or a banking site, without first checking
that the site is secured. It should use an electronic certificate that guarantees
that the site is authentic, and that will serve to protect the confidentiality of
information exchanged.
For this, there are two pieces of information displayed by the browser that
must be checked:
1. The URL of the site must begin with "https: //" and the site name must
match the user's expectation;
2. A small closed padlock must appear to the right of the site address, or
at the bottom right of the status bar (depending on the version and type
of your browser); it symbolizes a secure connection. By clicking on it,
you can display the electronic certificate of the site, and view the name
of the organization.
GOOD PRACTICE
The overwhelming majority of malware and spyware
infections originate from web pages.
It is important that you always consider whether it is
safe to visit unknown websites, particularly those that
are sent to you by email.
Before you decide to before opening a web page you
are not sure about, use, we recommend that you scan
the web address using the following URL scanners (add
it to your bookmark):
www.virustotal.com
20
Navigate with a browser up to date
What is true for an operating system, is also true for the software that is
installed there. Before using any browser, make sure that it is up to date as
soon as possible. The most recent browsers all offer an automatic update
feature. Check in the settings that this one is activated.
Message pop-up
Beware of pop-up windows: they are often the occasion to broadcast
commercials but can sometimes carry a perfectly wrong alarmist message
("your computer is infected!"). Click on the links of these windows until
after careful reflection.
Conversely, do not fall into the panel of enticing promises. The most primary
instincts are often solicited to get the user to visit a site whose content can be
dangerous.
Password
Do not save passwords in your browser to access your favorite
websites, especially if they are e-commerce or banking sites (PayPal
included). The security of these identifiers, in case of viral intrusion, is not
guaranteed.
See page 5 for more information.
https://securityinabox.org/en/guide/firefox/wi
ndows/
04.3 E-mail
Best practices to better understand e-mail:
GOOD PRACTICE
• Reinforce the password of your mailbox (use a
password safe).
• Do not consider the sender's e-mail address as a
reliable criterion as it can easily be misused.
• Never give confidential information by mail or
telephone
• Do not open attachments without scanning it with
your antivirus, even if it is a trusted person who sends
it to you.
• Do not click on the links in the emails (move your
mouse over it and look at the corresponding address
that appears in the status bar at the bottom left of your
browser).
21
Switching to a more secure email account
Few webmail providers offer very strong access to your email. Yahoo and
Hotmail, for instance, provide a secure connection only while you log in, to
protect your password, but your messages themselves are sent and received
insecurely. In addition, Yahoo, Hotmail and some other free webmail
providers insert the IP address of the computer you are using into all of the
messages you send.
But be careful, Gmail is known for potentially allowing government to get
access to your email if requested.
If you need an extra layer of confidentiality please read the section below.
https://securityinabox.org/en/guide/thunderb
ird/windows/
So for this:
• Pay attention to settings and information that you share.
• Only invite and accept people you know.
• Determine where you make your information visible and
check what other users see in your profile.
• Do not share information about your professional
activities.
• Only post picture on social media after you left the place
22
• Will my contacts mind if I share information about them with other
people?
• Do I trust everyone with whom I'm connected?
There is also a very large number of scams that can be easily avoided.
GOOD PRACTICE
There are two simple rules to follow:
1. Avoid connecting to unknown or untrusted
wireless networks.
2. Avoid using public Wi-Fi to transmit sensitive
data.
• Check that your terminal has the WPA2 decryption protocol and
enable it. Otherwise, use the WPA-AES version (never use breakable
WEP decryption in minutes).
• Change the default login key (which is often displayed on the label of
your Internet access point) with a strong password.
• Give your network an anonymous name so that it does not identify
you with your organization.
• Use wire connections as much as possible, faster and more secure.
23
05
SMARTPHONE SECURITY
The way the mobile networks operate, and their infrastructure, are
fundamentally different from how the Internet works. This creates additional
security challenges, and risks for users' privacy and the integrity of their
information and communications. Mobile phone providers (so government as
well) have access to all your voice and text communications.
It is important to start with the understanding that mobile phones are
inherently insecure:
• Information sent from a mobile phone is vulnerable.
• Information stored on mobile phones is vulnerable.
• Phones are designed to give out information about their location.
GOOD PRACTICE
• Set a strong PIN. Always use your phone's
security lock codes and change these from the
default factory settings.
• Do not accept and install unknown and
unverified programmes on your phone that
originate from an unwanted and unexpected
source. They may contain viruses, malicious
software or spying programmes. Android
user, only download apps from the Google Play
Store.
• Be wary when connecting to Wi-Fi access
points that don't provide passwords, just as you
would when using your computer and connecting
to Wi-Fi access points. The mobile phone is
essentially like a computer and thus shares the
vulnerabilities and insecurities that affect
computers and the Internet. Favour 3G / 4G
connections.
• Check which applications you are installing
and what they are requesting in terms of access.
Ex: If you install a flashlight application and it
asks you to have access to your GPS
coordinates and SMS data then do not install it
and look for another one!
• Pay attention to the data you share with your
phone. (> Settings> privacy and check what
apps have access to).
24
To go further on the encryption of your
smart phone communication
Install Signal App. Signal messages and
calls are always end-to-end encrypted
06
COMMON SCAM
The most common scam happens when you:
• Check your email addresses
• Access your social media networks
GOOD PRACTICE
1. First thing to check: the sender’s email address.
Look at the email header. Does the sender’s
email address match the name and the
domain?
2. Hover your mouse over the links in the email
message in order to check them BEFORE
clicking on them.
3. Look out for attachments; think twice before
to open it.
4. They ask you to send them or verify personal
information via email. If you have doubt look
for official phone number of the company and
ask them if they sent the email.
25
06.2 Facebook security
Few tips to help you stay away from Facebook online scams:
• Do not accept friend requests from people you don’t know
• Do not share your password with others
• When log in, use two-factor authentication
• Avoid connecting to public and free Wi-Fi networks
• Keep your browser and apps updated
GOOD PRACTICE
To keep your Facebook account safe: open Facebook
in your browser and go to Settings > Security and
Login > Setting Up Extra Security.
From there:
1. Turn on login alerts so that you receive
notifications when your account is logged into.
This helps you catch a hacker early, before any
major damage is done.
2. Enable two-factor authentication, then choose
an extra layer of security from the list.
3. Choose your trusted contacts and add a few
close friends or family members that can help
you unlock your account if it ever becomes
hacked.
26
ANNEX: CHECK-LIST FOR A SECURE DIGITAL ECO
SYSTEM
Topic Strong Medium Weak Related Chapter and page
My password is of What is a good password?
at least 10 Page 7
characters
My password are How to protect your password
saved in my Page 8
browser
I know how to How to securely share a password
share a password within a team
Page 9
with my team.
I know how to Software and update:
manage software Page 27
update.
I’m following strict Removable device and USB
removable device Page 10
policy
I encrypt sensitive How do we encrypt files?
files Page 11
27
I know that my Wi- Your organisation Wi-Fi
Fi network is on Page 23
WPA2
There is a strong Smartphone security
PIN to connect to Page 24
my mobile phone.
I know the Smartphone security
permissions Page 24
granted to the
applications
installed on my
phone.
If my Contact your IT dep.
computer/phone
get stolen I can
reach 27/7 my IT
dep.
I’m aware (and Contact your IT dep.
following) my NGO
IT policy
28
NOTE:
29