0% found this document useful (0 votes)
32 views7 pages

Cds Notes Module 2

The document outlines essential practices for securing devices and networks, emphasizing strong passwords, software updates, and safe use of public Wi-Fi. It also discusses the importance of data privacy, including personal data protection laws and tools for maintaining privacy online. Additionally, it highlights cyber safety at work, the role of AI in cybersecurity, and the need for continuous awareness and training to combat emerging threats.

Uploaded by

harshwardhand83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views7 pages

Cds Notes Module 2

The document outlines essential practices for securing devices and networks, emphasizing strong passwords, software updates, and safe use of public Wi-Fi. It also discusses the importance of data privacy, including personal data protection laws and tools for maintaining privacy online. Additionally, it highlights cyber safety at work, the role of AI in cybersecurity, and the need for continuous awareness and training to combat emerging threats.

Uploaded by

harshwardhand83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Module 2 CDS

 Securing Devices and Networks :-


1. Keeping Phone & Laptop Safe – Always use strong
passwords, PINs, or biometrics along with antivirus software
and regular updates to prevent malware and hacking.
2. Software Updates – Keep operating systems and applications
updated to patch security vulnerabilities quickly.
3. Device Encryption – Enable full-disk encryption (like
BitLocker or FileVault) to protect files if your device is stolen.
4. Safe Use of Public Wi-Fi – Avoid logging into bank or social
accounts on open Wi-Fi since hackers can intercept data.
5. VPN Usage – Use a VPN (Virtual Private Network) on public
Wi-Fi to encrypt internet traffic and keep browsing private.
6. Protecting Smart Devices (IoT) – Change default passwords
on IoT devices, update firmware, and place them on a separate
home network.
7. Disable Unnecessary Features – Turn off remote access or
auto-connect features on IoT devices to reduce risks.
8. Backing Up Data – Follow the 3-2-1 rule: 3 copies, 2 different
storage types, 1 offsite (like cloud).
9. Secure Backups – Prefer encrypted external drives or trusted
cloud services (Google Drive, OneDrive, iCloud with security
features).
10. Overall Protection – Combining safe device habits,
VPNs, IoT security, and backups ensures strong protection
against cyber threats and data loss.
Module 2 CDS
 Building Good Digital Habits (Cyber Hygiene)
1. Strong Passwords – Use at least 12+ characters
combining uppercase, lowercase, numbers, and symbols;
avoid personal details like birthdays.
2. Password Managers – Instead of remembering many
passwords, use trusted password managers (e.g.,
LastPass, Bitwarden) to store them securely.
3. Multi-Factor Authentication (MFA) – Add an extra
security step like OTPs, authenticator apps, or biometrics
to protect accounts even if passwords are stolen.
4. Regular Software Updates – Keep operating systems,
browsers, and apps updated to fix bugs and close security
loopholes.
5. Avoid Unsafe Downloads – Download software only
from official app stores or verified websites; avoid
pirated or cracked applications that may carry malware.
6. Email & Link Safety – Do not click suspicious email
attachments or unknown links as they may lead to
phishing or ransomware attacks.
7. Spotting Fake News – Check the credibility of the
source, verify headlines with multiple reliable news
outlets, and avoid blindly forwarding messages.
8. Recognizing Online Hoaxes – Look for signs like
exaggerated claims, fake URLs, poor grammar, or
requests for personal details before believing or sharing.
9. Use Fact-Checking Tools – Platforms like AltNews,
[Link], or Google Fact Check can help confirm if
information is genuine.
10. Safe Browsing Habits – Always log out of
accounts after use, clear browser cache periodically, and
avoid oversharing personal details on social media.
Module 2 CDS
11. Backup Habits – Combine cyber hygiene with
regular secure data backups to minimize damage if a
cyber-attack occurs.
12. Consistency is Key – Cyber hygiene works only
when followed daily, just like personal hygiene, keeping
you safe in the long run.
Module 2 CDS

 Understanding Data Privacy


1. What is Personal Data? – It refers to any information that
identifies an individual, such as name, phone number, Aadhaar,
email, IP address, or biometrics.
2. Why Personal Data Matters – If leaked, it can lead to identity
theft, financial fraud, stalking, or misuse by companies for
targeted ads without consent.
3. Data Sensitivity – Some data is highly sensitive (medical
records, financial details, location history) and requires extra
protection.
4. Data Protection Laws – GDPR (Europe) – Grants people
rights like accessing their data, correcting errors, requesting
deletion (right to be forgotten), and knowing how their data is
used.
5. Data Protection in India – The Digital Personal Data
Protection Act, 2023 gives users rights over how companies
collect, process, and store their data.
6. Privacy-Friendly Browsers – Using browsers like Brave or
Firefox helps minimize tracking compared to Chrome.
7. Search Engines for Privacy – Tools like DuckDuckGo or
Startpage avoid storing search history or creating digital
profiles.
8. Private Messaging Apps – Apps like Signal and WhatsApp
(E2E encryption) ensure chats are secure and can’t be
intercepted.
9. What to Do in Case of Data Breach – Immediately change
passwords, enable multi-factor authentication, and monitor
bank/social accounts for unusual activity.
10. Checking Breach Exposure – Use websites like
[Link] to check if your email or account has
been compromised.
11. Notify Authorities/Organizations – Report breaches to
concerned companies, banks, or cyber cells for quick action.
Module 2 CDS
12. Personal Responsibility – Laws help, but users must stay
alert by choosing privacy-respecting tools and limiting
unnecessary sharing of personal details online.
Module 2 CDS
 Cyber Safety at Work and Emerging Technologies
1. Safe Remote Working – Always use company-approved
devices, connect through secure VPNs, and avoid using personal
email for official work.
2. Workplace Device Protection – Lock screens when away,
disable auto-login, and keep security patches updated to prevent
unauthorized access.
3. Secure Email Practices – Beware of phishing emails that use
fake addresses or attachments; verify sender identity before
clicking links.
4. Workplace Communication Safety – Use official tools like
Microsoft Teams or Slack instead of personal apps to prevent
data leaks.
5. AI in Cyber Security (Good Side) – AI is used for intrusion
detection, malware scanning, analyzing suspicious behavior, and
automating security responses.
6. AI in Cyber Security (Bad Side) – Hackers also use AI for
advanced phishing attacks, password cracking, and generating
fake content at scale.
7. Deepfakes – AI-generated fake videos, images, or voices can
impersonate people, mislead employees, or be used in fraud
(e.g., fake CEO voice scams).
8. AI-Based Scams – Fraudsters create realistic messages, calls, or
chatbots to trick people into sharing sensitive data or
transferring money.
9. How to Stay Alert Against AI Threats – Double-check
unusual requests, verify information from secondary sources,
and maintain skepticism towards unexpected media.
10. Blockchain for Security – Blockchain provides a
decentralized and tamper-proof ledger, making it harder for
hackers to alter records.
11. Blockchain in Practice – Used in cryptocurrency
transactions, digital contracts, supply chain tracking, and secure
identity management.
12. Cyber Hygiene at Work – Combine personal safety
(passwords, MFA) with workplace protocols to maintain strong
security.
Module 2 CDS
13. Continuous Awareness – Employees should undergo
regular cyber security training to recognize scams and avoid
mistakes.
14. Future of Cyber Security – AI and blockchain will
continue to shape digital security, but awareness and human
judgment remain the strongest defense.

You might also like