Mahila Suraksha Handbook
Mahila Suraksha Handbook
HANDBOOK
you
ha tever
W re
e awa
do, b
01 INTRODUCTION 1
03 DESKTOP SECURITY 3
04 MOBILE SECURITY 4
07 BEWARE OF MORPHING 7
PAGE 1
Online account
Security
[Password] [Multi factor Authentication] [Logged In]
Security Key
Allow access ?
Finger Print
Best Practices
Enable Multi-Factor Authentication, it adds an extra layer of security
by requiring a second form of verification in addition to your
password.
Regularly update your passwords.
Do not reuse passwords.
Do not share your passwords with anyone.
Use unique, complex, and long passwords.
Regularly check your account activity and look for any suspicious login
attempts.
PAGE 2
Desktop Security
Best Practices
Use genuine Operating System and Software.
Keep your Operating System updated.
Install anti-virus and anti-malware solutions and keep them updated.
Use strong login password and change them periodically.
Regularly take backups of your important files and data.
Incase of incidents such as hardware failure, or cyberattacks, having
backups can help you restore important information.
Maintain multiple copies of critical data in different locations to
prevent loss in case of disasters.
Periodically test and verify your backups to ensure that they can be
used for restoration when needed.
PAGE 3
Mobile security
#Secure your mobile by restricting permissions to apps
Best Practices
Download apps from official app stores to avoid downloading
potentially harmful apps.
Do not download any apps from ads or third party websites.
Ensure your OS and applications are up to date.
Always read the reviews about the app and developer before
downloading and installing an app.
Carefully review the permission requests and ensure that it is related
to the purpose of the app.
Remove/ Uninstall apps with excessive permissions.
Always read the app’s privacy policy on how your data will be shared.
To avoid unnecessary data collection, uninstall apps you no longer use.
Restrict permissions to social media and banking accounts.
Report immediately to concerned authorities if any unauthorized
activity is detected.
PAGE 4
Social Media Best
Practices for Women
Best Practices
If an individual is causing trouble to you or others, it is recommended to
block and report them to the social media platform and other concerned
agencies.
Set the privacy settings on your social media accounts to prevent
unauthorized individuals from viewing, chatting, or tagging your content.
Exercise caution while accepting friend requests or responding to strangers
in social media.
Restrict visibility to your posts and profile information.
Avoid sharing personal and sensitive details online through posts or chats.
Disable automatic addition to unknown groups without your permission.
Keep a record of all online or virtual workplace discomforts and document
every aspect of your work environment.
Exercise caution while sharing photos online.
If you are becoming a victim of any cyber frauds or cyber harassments
report to the nearest police station or report at
https://www.cybercrime.gov.in or call 1930.
PAGE 5
Staying safe against
SCAMS
1 Never merge/ respond to calls or video calls
from unknown people.
4
Never share intimate pictures over online
video calls/ social media platforms with
anybody.
5
Malicious mobile apps with access permission
to gallery/ storage can access your photos and
can be used to blackmail you.
PAGE 6
Beware of Morphing
Best Practices
Morphing is altering or changing the pictures of the persons in
photos or videos.
PAGE 7
Beware of
cyber stalking
Do not accept “Friend Requests” from strangers on
Accept
Social media
Delete
PAGE 8
Beware of Malicious
APK Scam
Fraudsters may use messaging
Malicious
File through social media to send
file.apk
3.8 MB.APK
malicious APK files. Clicking on
such links or installing such files
received in chats may result in
financial losses and theft of
sensitive information.
Best Practices
Avoid clicking on suspicious links.
Do not respond to messages that request personal information or
requests to click on links to download APK files from third party
websites.
Malicious APKs target banking apps and steal financial data.
Do not share login credentials, passwords, credit card numbers, or
any other sensitive information to strangers.
Only install apps from trusted sources instead of links sent via
messages.
Immediately report cyber frauds through the National Cyber Crime
Reporting Helpline at 1930 or file a complaint at the official portal
(https://cybercrime.gov.in).
PAGE 9
Be smart- stay safe
while using free
Public Wi-Fi
# Beware it could be a trap
Best Practices
Be cautious when connecting to any public network at airport,
hotel, train/bus station, cafe, and other public places.
Always confirm the name of the network and exact login procedures
with appropriate staff to ensure that the network is legitimate.
Do not conduct sensitive activities, such as online shopping, banking,
or sensitive work, using a public wireless network.
Use a VPN service.
Use public Wi-Fi only when required.
Switch off Wi-Fi service when not in use.
PAGE 10
Beware of Digital
arrest scam
o
pt vide
ce
er ac
Nev
l ls from
ca !!
ng ers!
stra
Unknown
Best Practices
Cybercriminals threaten individuals as Investigation officers and
create a sense of fear through fake calls.
Never accept to join any online video calls for any investigation or arrest
through calls received from strangers.
Avoid answering video calls from unknown contacts, even if they claim
to know you.
Avoid sharing sensitive personal information online with strangers.
Never make any payments to strangers claiming to be investigation
officer in online calls.
Keep the privacy settings of your social media profile at the most
restricted levels.
If you receive any calls about arrest or investigation, visit the nearest
police station.
PAGE 11
Beware of instant loan
apps scam
Best Practices
Always download apps from official websites and app playstores.
Always avail loans from RBI regulated entities.
Always check whether the lender is approved by RBI and/or is
associated with a financial institution.
Do not enter your PIN or password anywhere to receive money.
Visit only the official website of your bank or service provider.
Do not download any applications from any unknown sources.
Always check the terms and conditions of lending, genuineness of their
website, physical office locations, Company Identification Number (CIN),
and details of the Certificate of Registration (CoR).
Always check URLs and domain names received in emails for spelling
errors.
Apply for loans only through applications related to Non Banking
Financial Corporation (NBFC) or authorized bank.
PAGE 12
Password Management
Best Practices
1 Use Strong and long passwords
Always prefer to create lengthy passwords.
pass123 Short length passwords are easy to crack.
Uw12345_chk?
security123
Dictionary words are
vulnerable to brute-force
Secur_ity?123# attack by hackers.
3
Create passwords using special characters
Passwords mixed with uppercase, lowercase,
security123
numerals and special characters are difficult to
crack
Sec_urity#<123>
OTP
5
Username
Password
Enable Multi Factor Authentication
MFA adds another layer of security to your accounts.
Change
password
PAGE 13
Report Cyber Security
Incident to CERT-In
For reporting Cyber Security Incidents to CERT-In:
Visit website: https://www.cert-in.org.in
Email: incident@cert-in.org.in Information Desk
Toll Free Phone: +91-1800-11-4949 Phone: +91-11-24368551
Toll Free Fax: +91-1800-11-6969 Fax: +91-11-24368546
https://twitter.com/IndianCERT
https://www.instagram.com/cert_india/
https://www.linkedin.com/company/
www.csk.gov.in
indiancert-cert-in/ Download Botnet
removal tools
https://youtube.com/@indiancert