Skip to main content

DO's AND DONT's : Cyber Security PDF File Download 1.54MB

Do's

  • Ensure physical security of computer / laptop and other IT assets
  • Ensure effective physical access control procedures by using multilevel passwords.
  • Always use screen saver password, user login password and power on password.
  • The password must be a complex one and hard to guess, change them every 15 days.
  • The contents of CDs and flash drive are as good as written files. The external storage media containing classified data should be marked and treated like other classified documents.
  • All classified documents must be stored in an encrypted form in PCs as well as external storage devices.
  • In a multi user system, user log to be maintained.
  • Before deleting the sensitive files, overwrite the files with some junk data to prevent resotration of sensitive data by any means or delete the data by using secure delete option.
  • Avoid storing of files on deskstop and C drive of the PC.
  • CD drive to be disabled and external CD writers are to be kept under the custody of Gp "A" officer only.
  • Every new incoming storage media and software should be tested for malwares.
  • Always use original software purchased from the authorized vendors.
  • Use a standalone computer for internet work and no official work is to be permitted on that PC.
  • Ensure proper marking of removable media like CD/DVD. The defective CD/DVD to be physically broken and destruction certificate for the same to be kept for auditing purpose.
  • Always use UPS to ensure uninterrupted power supply and to prevent any corruption of data and software.
  • Maintenance and rectification of PC faults to be undertaken in the presence of individual user. Under no circumstance the PC to be handed over to outside maintenance engineer alone.
  • Ensure centralized printing of all documents. Network printer must be located in a secure place.
  • Always keep the PC updated with antivirus and OS update patches
  • Portable storage media used on internet machine to be scanned for spyware, Trojan viruses and other suspicious malware before being used on department LAN systems.
  • Ensure first boot device is the internal HDD.
  • Install latest software patches
  • Install a personal firewall
  • Never log in as Admin for day to day work.
  • Take regular backups.
  • Disable services that are not reqiured.
  • Always lock account while leaving the computer.
  • Encrypt sensitive data on HDD.
  • Wipe data from unused portion of the disk
  • Local Security Policy:
  • (a) Show a customized warning screen
  • (b) Only have one Admin account.
  • (c) Set a strong Password policy.
  • (d) Set a strong Account lockout policy
  • (d) Set a strong Account lockout policy
  • (e) Disable file sharing
  • (f) Enable auditing
  • (g) Disable Guest account if not required
  • Stay alert and report suspicious activity.
  • Always use password protect for sensitive files and devices.
  • Be cautious of suspicious e-mails and links.
  • Delete information when it is no longer needed.
  • Be aware of your surrounding when printing, copying, facing or discussing senstitive information.
  • Implementation of CAT, Principal Bench, New Delhi Order Dated 03.04.2013 in OA No 2520/2012 Filed by Draughtsman Association, DGQA 4.96MB
  • Always use screen saver password, user login password and power on password.
  • Always use screen saver password, user login password and power on password.
  • Always use screen saver password, user login password and power on password.
  • Always use screen saver password, user login password and power on password.
  • Always use screen saver password, user login password and power on password.
  • Website Policies
  • Citizen Charter

Dont's

  • Don't let any unauthorized person use your computer system.
  • Never select the "Remember my password" option.
  • Don't share your password with anyone, not even your colleagues.
  • Don't reveal the admin/root password to any unauthorized persons
  • Do not connect youe computer storing classified data to internet
  • Don't allow staff to bring their own devices or software to run on the offical computer.
  • Don't use pirated or gifted copies of software as these may contain viruses and even faciliate intrusion into the system.
  • Don't play computer games. These could be the main carriers of viruses for an intruder to break into your computer system.
  • Dont's store TOP SECRET or SECRET information permanently in the hard disk of PC. Whenever TOP SECRET or SECRET information is processed on the PC, erase the information immediately from the disk after the processing is over.
  • When CDs or DVDs are used for working on TOP SECERT or SECRET information it should be handled in accordance with instructrions for handling TOP SECRET or SECRET documents. It will be the responsibility of the authorized officer under whose supervision th
  • Don't carry CDs or removabvle devices outside the office bulding. In case a device has to be taken outside the office building, its movement will be with the prior approval of the officer-in-charge. A record of the movement indicating full details like da
  • Don't become a memeber of any unofficial chat club. Don't use official internet for joining and offical chat club.
  • Don't download free songs/videos or any objectionable material on PCs where official work is carried out as such downloads often contains malware.
  • Do not use pen drivers/ USB data storage devices on official PCs.
  • Do not use/ install freely available screen saver on internert as these may have encode spyware / Trojan.
  • Don't be tricked into giving away confidential information.
  • Don't use unprotected computer on public networks for carrying out official work.
  • Don't leave senstive information unattended on your desktop on official PCs
  • Don't post any private or sensitive information on any social media
  • Don't open mail or attachement from an untrused sourcee. Report the same immediately as cyber attacker often trick you into visiting malicious sites and downloading malware to steal data& damage network.
  • Never reply to emails requesting personal or financial information.
  • Overview
  • PLANNING OF WORKS FY : 2021-22