Module 2 CDS
Securing Devices and Networks :-
1. Keeping Phone & Laptop Safe – Always use strong
passwords, PINs, or biometrics along with antivirus software
and regular updates to prevent malware and hacking.
2. Software Updates – Keep operating systems and applications
updated to patch security vulnerabilities quickly.
3. Device Encryption – Enable full-disk encryption (like
BitLocker or FileVault) to protect files if your device is stolen.
4. Safe Use of Public Wi-Fi – Avoid logging into bank or social
accounts on open Wi-Fi since hackers can intercept data.
5. VPN Usage – Use a VPN (Virtual Private Network) on public
Wi-Fi to encrypt internet traffic and keep browsing private.
6. Protecting Smart Devices (IoT) – Change default passwords
on IoT devices, update firmware, and place them on a separate
home network.
7. Disable Unnecessary Features – Turn off remote access or
auto-connect features on IoT devices to reduce risks.
8. Backing Up Data – Follow the 3-2-1 rule: 3 copies, 2 different
storage types, 1 offsite (like cloud).
9. Secure Backups – Prefer encrypted external drives or trusted
cloud services (Google Drive, OneDrive, iCloud with security
features).
10. Overall Protection – Combining safe device habits,
VPNs, IoT security, and backups ensures strong protection
against cyber threats and data loss.
Module 2 CDS
Building Good Digital Habits (Cyber Hygiene)
1. Strong Passwords – Use at least 12+ characters
combining uppercase, lowercase, numbers, and symbols;
avoid personal details like birthdays.
2. Password Managers – Instead of remembering many
passwords, use trusted password managers (e.g.,
LastPass, Bitwarden) to store them securely.
3. Multi-Factor Authentication (MFA) – Add an extra
security step like OTPs, authenticator apps, or biometrics
to protect accounts even if passwords are stolen.
4. Regular Software Updates – Keep operating systems,
browsers, and apps updated to fix bugs and close security
loopholes.
5. Avoid Unsafe Downloads – Download software only
from official app stores or verified websites; avoid
pirated or cracked applications that may carry malware.
6. Email & Link Safety – Do not click suspicious email
attachments or unknown links as they may lead to
phishing or ransomware attacks.
7. Spotting Fake News – Check the credibility of the
source, verify headlines with multiple reliable news
outlets, and avoid blindly forwarding messages.
8. Recognizing Online Hoaxes – Look for signs like
exaggerated claims, fake URLs, poor grammar, or
requests for personal details before believing or sharing.
9. Use Fact-Checking Tools – Platforms like AltNews,
[Link], or Google Fact Check can help confirm if
information is genuine.
10. Safe Browsing Habits – Always log out of
accounts after use, clear browser cache periodically, and
avoid oversharing personal details on social media.
Module 2 CDS
11. Backup Habits – Combine cyber hygiene with
regular secure data backups to minimize damage if a
cyber-attack occurs.
12. Consistency is Key – Cyber hygiene works only
when followed daily, just like personal hygiene, keeping
you safe in the long run.
Module 2 CDS
Understanding Data Privacy
1. What is Personal Data? – It refers to any information that
identifies an individual, such as name, phone number, Aadhaar,
email, IP address, or biometrics.
2. Why Personal Data Matters – If leaked, it can lead to identity
theft, financial fraud, stalking, or misuse by companies for
targeted ads without consent.
3. Data Sensitivity – Some data is highly sensitive (medical
records, financial details, location history) and requires extra
protection.
4. Data Protection Laws – GDPR (Europe) – Grants people
rights like accessing their data, correcting errors, requesting
deletion (right to be forgotten), and knowing how their data is
used.
5. Data Protection in India – The Digital Personal Data
Protection Act, 2023 gives users rights over how companies
collect, process, and store their data.
6. Privacy-Friendly Browsers – Using browsers like Brave or
Firefox helps minimize tracking compared to Chrome.
7. Search Engines for Privacy – Tools like DuckDuckGo or
Startpage avoid storing search history or creating digital
profiles.
8. Private Messaging Apps – Apps like Signal and WhatsApp
(E2E encryption) ensure chats are secure and can’t be
intercepted.
9. What to Do in Case of Data Breach – Immediately change
passwords, enable multi-factor authentication, and monitor
bank/social accounts for unusual activity.
10. Checking Breach Exposure – Use websites like
[Link] to check if your email or account has
been compromised.
11. Notify Authorities/Organizations – Report breaches to
concerned companies, banks, or cyber cells for quick action.
Module 2 CDS
12. Personal Responsibility – Laws help, but users must stay
alert by choosing privacy-respecting tools and limiting
unnecessary sharing of personal details online.
Module 2 CDS
Cyber Safety at Work and Emerging Technologies
1. Safe Remote Working – Always use company-approved
devices, connect through secure VPNs, and avoid using personal
email for official work.
2. Workplace Device Protection – Lock screens when away,
disable auto-login, and keep security patches updated to prevent
unauthorized access.
3. Secure Email Practices – Beware of phishing emails that use
fake addresses or attachments; verify sender identity before
clicking links.
4. Workplace Communication Safety – Use official tools like
Microsoft Teams or Slack instead of personal apps to prevent
data leaks.
5. AI in Cyber Security (Good Side) – AI is used for intrusion
detection, malware scanning, analyzing suspicious behavior, and
automating security responses.
6. AI in Cyber Security (Bad Side) – Hackers also use AI for
advanced phishing attacks, password cracking, and generating
fake content at scale.
7. Deepfakes – AI-generated fake videos, images, or voices can
impersonate people, mislead employees, or be used in fraud
(e.g., fake CEO voice scams).
8. AI-Based Scams – Fraudsters create realistic messages, calls, or
chatbots to trick people into sharing sensitive data or
transferring money.
9. How to Stay Alert Against AI Threats – Double-check
unusual requests, verify information from secondary sources,
and maintain skepticism towards unexpected media.
10. Blockchain for Security – Blockchain provides a
decentralized and tamper-proof ledger, making it harder for
hackers to alter records.
11. Blockchain in Practice – Used in cryptocurrency
transactions, digital contracts, supply chain tracking, and secure
identity management.
12. Cyber Hygiene at Work – Combine personal safety
(passwords, MFA) with workplace protocols to maintain strong
security.
Module 2 CDS
13. Continuous Awareness – Employees should undergo
regular cyber security training to recognize scams and avoid
mistakes.
14. Future of Cyber Security – AI and blockchain will
continue to shape digital security, but awareness and human
judgment remain the strongest defense.