0% found this document useful (0 votes)
42 views17 pages

Mahila Suraksha Handbook

The Cyber Security Handbook aims to educate women and online users about best practices for protecting themselves from various cyber threats and scams. It covers topics such as online account security, mobile security, social media best practices, and how to report cyber incidents to CERT-In. The handbook is part of CERT-In's initiatives to raise awareness and enhance cybersecurity knowledge among users, especially in light of International Women's Day on March 8, 2025.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views17 pages

Mahila Suraksha Handbook

The Cyber Security Handbook aims to educate women and online users about best practices for protecting themselves from various cyber threats and scams. It covers topics such as online account security, mobile security, social media best practices, and how to report cyber incidents to CERT-In. The handbook is part of CERT-In's initiatives to raise awareness and enhance cybersecurity knowledge among users, especially in light of International Women's Day on March 8, 2025.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

CYBER SECURITY

HANDBOOK

you
ha tever
W re
e awa
do, b

INTERNATIONAL WOMEN'S DAY

8th March 2025


Table of Contents
PAGE NO.

01 INTRODUCTION 1

02 ONLINE ACCOUNTS SECURITY 2

03 DESKTOP SECURITY 3

04 MOBILE SECURITY 4

05 SOCIAL MEDIA BEST PRACTICES 5

06 STAYING SAFE AGAINST SCAMS 6

07 BEWARE OF MORPHING 7

08 BEWARE OF CYBER STALKING 8


Table of Contents
09 BEWARE OF MALICIOUS APK SCAM 9

10 BE SMART- STAY SAFE WHILE USING FREE PUBLIC WI-FI 10

11 BEWARE OF DIGITAL ARREST SCAM 11

12 BEWARE OF INSTANT LOAN APPS SCAM 12

13 PASSWORD MANAGEMENT BEST PRACTICES 13

14 REPORT CYBER SECURITY INCIDENT TO CERT-IN 14


aBOUT cert-in
The Indian Computer Emergency Response Team (CERT-In)
is a Government Organization under Ministry of Electronics and Information
Technology (MeitY), Government of India established with the objective of
securing Indian cyber space. CERT-In provides Incident Prevention and
Response services as well as Security Quality Management Services. CERT-
In has been designated to serve as national agency for incident response
under Section 70B of the Information Technology Act, 2000 (Amendment
2008). As part of services of CERT-In, for creation of awareness in the area
of cyber security as well as training/ upgrading the technical knowhow of
various stakeholders.

CERT-In is observing International women’s


Day on 8th March 2025.

This Cyber Security Handbook for women is


released as a part of CERT-In's awareness
initiatives to educate women and other online
users on the best practices that needs to be
followed to protect them from different cyber
security attacks and cyber frauds.

PAGE 1
Online account
Security
[Password] [Multi factor Authentication] [Logged In]

One Time Code


Trust

Security Key

Allow access ?

Finger Print

Best Practices
Enable Multi-Factor Authentication, it adds an extra layer of security
by requiring a second form of verification in addition to your
password.
Regularly update your passwords.
Do not reuse passwords.
Do not share your passwords with anyone.
Use unique, complex, and long passwords.
Regularly check your account activity and look for any suspicious login
attempts.

PAGE 2
Desktop Security

Best Practices
Use genuine Operating System and Software.
Keep your Operating System updated.
Install anti-virus and anti-malware solutions and keep them updated.
Use strong login password and change them periodically.
Regularly take backups of your important files and data.
Incase of incidents such as hardware failure, or cyberattacks, having
backups can help you restore important information.
Maintain multiple copies of critical data in different locations to
prevent loss in case of disasters.
Periodically test and verify your backups to ensure that they can be
used for restoration when needed.

PAGE 3
Mobile security
#Secure your mobile by restricting permissions to apps

Best Practices
Download apps from official app stores to avoid downloading
potentially harmful apps.
Do not download any apps from ads or third party websites.
Ensure your OS and applications are up to date.
Always read the reviews about the app and developer before
downloading and installing an app.
Carefully review the permission requests and ensure that it is related
to the purpose of the app.
Remove/ Uninstall apps with excessive permissions.
Always read the app’s privacy policy on how your data will be shared.
To avoid unnecessary data collection, uninstall apps you no longer use.
Restrict permissions to social media and banking accounts.
Report immediately to concerned authorities if any unauthorized
activity is detected.

PAGE 4
Social Media Best
Practices for Women

To protect yourself from harassment on social media, it's not


enough to simply remove your accounts or cut off network contact.

Best Practices
If an individual is causing trouble to you or others, it is recommended to
block and report them to the social media platform and other concerned
agencies.
Set the privacy settings on your social media accounts to prevent
unauthorized individuals from viewing, chatting, or tagging your content.
Exercise caution while accepting friend requests or responding to strangers
in social media.
Restrict visibility to your posts and profile information.
Avoid sharing personal and sensitive details online through posts or chats.
Disable automatic addition to unknown groups without your permission.
Keep a record of all online or virtual workplace discomforts and document
every aspect of your work environment.
Exercise caution while sharing photos online.
If you are becoming a victim of any cyber frauds or cyber harassments
report to the nearest police station or report at
https://www.cybercrime.gov.in or call 1930.

PAGE 5
Staying safe against
SCAMS
1 Never merge/ respond to calls or video calls
from unknown people.

2 Always verify callers identity.

3 Never share sensitive information or PIN,


OTP etc. over phone call or Online.

4
Never share intimate pictures over online
video calls/ social media platforms with
anybody.

5
Malicious mobile apps with access permission
to gallery/ storage can access your photos and
can be used to blackmail you.

6 Enable multi-factor authentication with


strong passwords for all online accounts.

PAGE 6
Beware of Morphing

Adult Website Fake ID Card

Social Media Post

Best Practices
Morphing is altering or changing the pictures of the persons in
photos or videos.

Enable your security and privacy features on social media accounts


Never share your personal pictures online publicly on social media
accounts
Enable multi-factor authentication with strong passwords for your
social media accounts.
Save the evidence and the screen shots for referring to the incident
later.
Don’t suffer in silence, know that you are not alone, reach out and
seek help from trusted family and friends.
If you observe your fake profile or any such objectionable posts in
social media, report to the respective social media help centre .

PAGE 7
Beware of
cyber stalking
Do not accept “Friend Requests” from strangers on
Accept
Social media
Delete

Review your social media privacy settings and


restrict to family and known friends

Do not post your home address, phone number, or any


Profile
personal information, which can be used to stalk you

Turn off location services on Social media platforms

Enable Multi-Factor Authentication (MFA) for your


social media accounts

Take screenshot of online messages, comments, conversation etc. as a


proof.
Note down the mobile number and available details of the criminals.
Report cyber crime incident to https://www.cybercrime.gov.in or call
1930.

PAGE 8
Beware of Malicious
APK Scam
Fraudsters may use messaging
Malicious
File through social media to send
file.apk
3.8 MB.APK
malicious APK files. Clicking on
such links or installing such files
received in chats may result in
financial losses and theft of
sensitive information.

Best Practices
Avoid clicking on suspicious links.
Do not respond to messages that request personal information or
requests to click on links to download APK files from third party
websites.
Malicious APKs target banking apps and steal financial data.
Do not share login credentials, passwords, credit card numbers, or
any other sensitive information to strangers.
Only install apps from trusted sources instead of links sent via
messages.
Immediately report cyber frauds through the National Cyber Crime
Reporting Helpline at 1930 or file a complaint at the official portal
(https://cybercrime.gov.in).

PAGE 9
Be smart- stay safe
while using free
Public Wi-Fi
# Beware it could be a trap

Best Practices
Be cautious when connecting to any public network at airport,
hotel, train/bus station, cafe, and other public places.

Always confirm the name of the network and exact login procedures
with appropriate staff to ensure that the network is legitimate.
Do not conduct sensitive activities, such as online shopping, banking,
or sensitive work, using a public wireless network.
Use a VPN service.
Use public Wi-Fi only when required.
Switch off Wi-Fi service when not in use.

PAGE 10
Beware of Digital
arrest scam
o
pt vide
ce
er ac
Nev
l ls from
ca !!
ng ers!
stra

Unknown

Best Practices
Cybercriminals threaten individuals as Investigation officers and
create a sense of fear through fake calls.

Never accept to join any online video calls for any investigation or arrest
through calls received from strangers.
Avoid answering video calls from unknown contacts, even if they claim
to know you.
Avoid sharing sensitive personal information online with strangers.
Never make any payments to strangers claiming to be investigation
officer in online calls.
Keep the privacy settings of your social media profile at the most
restricted levels.
If you receive any calls about arrest or investigation, visit the nearest
police station.

PAGE 11
Beware of instant loan
apps scam

Best Practices
Always download apps from official websites and app playstores.
Always avail loans from RBI regulated entities.
Always check whether the lender is approved by RBI and/or is
associated with a financial institution.
Do not enter your PIN or password anywhere to receive money.
Visit only the official website of your bank or service provider.
Do not download any applications from any unknown sources.
Always check the terms and conditions of lending, genuineness of their
website, physical office locations, Company Identification Number (CIN),
and details of the Certificate of Registration (CoR).
Always check URLs and domain names received in emails for spelling
errors.
Apply for loans only through applications related to Non Banking
Financial Corporation (NBFC) or authorized bank.

PAGE 12
Password Management
Best Practices
1 Use Strong and long passwords
Always prefer to create lengthy passwords.
pass123 Short length passwords are easy to crack.
Uw12345_chk?

2 Don't use dictionary words as passwords


Dictionary

Such passwords are too easy to crack.

security123
Dictionary words are
vulnerable to brute-force
Secur_ity?123# attack by hackers.

3
Create passwords using special characters
Passwords mixed with uppercase, lowercase,
security123
numerals and special characters are difficult to
crack
Sec_urity#<123>

4 Change passwords periodically


Change
password
Avoid using guessable patterns of password.

OTP
5
Username
Password
Enable Multi Factor Authentication
MFA adds another layer of security to your accounts.

Change
password

PAGE 13
Report Cyber Security
Incident to CERT-In
For reporting Cyber Security Incidents to CERT-In:
Visit website: https://www.cert-in.org.in
Email: incident@cert-in.org.in Information Desk
Toll Free Phone: +91-1800-11-4949 Phone: +91-11-24368551
Toll Free Fax: +91-1800-11-6969 Fax: +91-11-24368546

For reporting Vulnerabilities & Collaboration with


CERT-In in the area of Cyber Security:
Visit website: https://www.cert-in.org.in Scan Me
Email: collaboration@cert-in.org.in

Phone: +11-22902600 Ext: 1012, +91-11-24368572


For Trainings/ Awareness programmes:
www.cert-in.org.in
Email: training@cert-in.org.in

Official social media handles of @IndianCERT


Scan Me
https://www.facebook.com/IndianCERT/

https://twitter.com/IndianCERT

https://www.instagram.com/cert_india/
https://www.linkedin.com/company/
www.csk.gov.in
indiancert-cert-in/ Download Botnet
removal tools
https://youtube.com/@indiancert

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy