Cyber Security Notes
Cyber Security Notes
1. Defining Cyberspace
Cyberspace refers to the virtual environment where communication over computer networks occurs. It
encompasses the internet, the data and information exchanged over it, and the underlying infrastructure
supporting this exchange. Cyberspace is essentially the digital universe created by interconnected systems,
including computers, networks, and data storage devices.
Computer Technology: The development and use of computers and software to manage, process, and store
data.
Web Technology: Refers to technologies used in building and accessing websites and web-based
applications. This includes web browsers, web servers, HTTP/HTTPS protocols, HTML, CSS, JavaScript, etc.
These technologies collectively facilitate online communication, information sharing, and global connectivity.
3. Architecture of Cyberspace
o Physical Layer: Hardware infrastructure like servers, routers, data centers, and cables.
o Network Layer: Communication protocols and networks that facilitate the transfer of data, such as
the internet, LAN, or WAN.
o Application Layer: Software and platforms where user interaction takes place, including websites,
social media, cloud services, etc.
This multi-layered structure requires different approaches to ensure security at each level.
Communication Technologies: Encompass methods and systems for sending and receiving information, such
as wired and wireless communication, satellite, fiber optics, and radio waves.
Web Technology: Involves tools that enable the creation and maintenance of websites and web applications,
such as web servers, content management systems, and e-commerce platforms.
The Internet: A global system of interconnected computer networks that use the Internet Protocol (IP) suite
to link devices worldwide. It facilitates data transfer, communication, and access to resources across the
globe.
World Wide Web (WWW): A service built on top of the internet, providing access to websites and
applications via browsers. The Web uses protocols like HTTP/HTTPS for communication.
The development of the internet and the Web has revolutionized how information is shared and accessed.
6. Advent of Internet
Origins: The internet began as ARPANET in the late 1960s as a research project funded by the U.S.
Department of Defense. It expanded through universities and research institutions in the 1980s and became
publicly accessible in the 1990s.
The Web Era: The World Wide Web, invented by Tim Berners-Lee in 1989, greatly accelerated the growth of
the internet, turning it into a global information hub.
Infrastructure: The internet’s backbone consists of data centers, fiber optic cables, routers, and other
physical components that ensure data flows smoothly between users across the globe.
Data Transfer: The internet uses protocols such as TCP/IP (Transmission Control Protocol/Internet Protocol)
to manage data transmission between devices, ensuring it reaches the right destination.
Governance: The internet is managed by organizations like the Internet Corporation for Assigned Names and
Numbers (ICANN) and the Internet Engineering Task Force (IETF). National governments and private sectors
also have a role in regulating internet activities.
8. Internet Society
Digital Community: The internet has created a global society, connecting people, cultures, and economies. It
facilitates social networking, commerce, education, and collaboration on an unprecedented scale.
Challenges: Issues like digital divide, cybercrime, privacy concerns, and the rise of misinformation are critical
challenges within this digital society.
9. Regulation of Cyberspace
Laws and Policies: Governments and international bodies have developed legal frameworks to regulate
activities in cyberspace. Examples include:
o General Data Protection Regulation (GDPR): European Union's data protection law.
o Cybersecurity Act: Various nations have enacted laws to protect national cyber infrastructure and
ensure data privacy.
Challenges: Regulating the global and decentralized nature of cyberspace is complex, and international
cooperation is needed to address issues like cross-border data flow and cybercrime.
Cybersecurity refers to the practice of protecting computer systems, networks, and data from cyber threats
such as hacking, malware, and data breaches.
The goal is to ensure confidentiality, integrity, and availability (CIA) of information systems and to protect
against unauthorized access or attacks.
Cybercrime: Illegal activities conducted over the internet, such as identity theft, phishing, ransomware
attacks, and financial fraud.
Data Privacy: Protecting users' personal information from unauthorized access or misuse by governments,
corporations, and hackers.
Cyberattacks: Attacks like Distributed Denial of Service (DDoS), malware, ransomware, and advanced
persistent threats (APT) pose significant risks to organizations and governments.
Lack of Cybersecurity Awareness: Many individuals and organizations remain unaware of basic security
practices, making them vulnerable to attacks.
Evolving Threats: Cyber threats constantly evolve, requiring cybersecurity experts to continuously adapt to
new types of attacks and vulnerabilities.
Legal and Ethical Issues: Ensuring compliance with laws, ethical considerations, and international
agreements about data security and privacy rights is a significant challenge.
1. Classification of Cybercrimes
Crimes Against Individuals: Involve actions like identity theft, cyberstalking, harassment, and online
defamation.
Crimes Against Property: Include hacking, online fraud, and unauthorized access to computer systems and
networks.
Crimes Against Government: Involve attacks on government websites, cyberterrorism, espionage, and
critical infrastructure sabotage.
Crimes Related to Cybersecurity: Includes attacks that compromise the security and integrity of digital
systems, such as DDoS attacks, malware, and ransomware.
Crimes Facilitated by Computers: Crimes like online piracy, child pornography, and illegal trading facilitated
through digital means.
2. Common Cybercrimes
o Hacking: Unauthorized access to systems or networks to steal data, cause damage, or disrupt
services.
o Data Theft: Stealing sensitive information from computers or mobile devices for illegal purposes.
o Phishing: Fraudulent attempts to obtain sensitive information like usernames and passwords by
impersonating trustworthy entities.
o Revenge Porn: Sharing explicit images without consent, often to shame or harm the victim.
o Child Exploitation: Using the internet to exploit, groom, or abuse children, including the distribution
of child pornography.
Financial Frauds:
o Online Banking Fraud: Fraudulent activities like phishing and account takeovers to steal money from
bank accounts.
o Credit Card Fraud: Unauthorized use of credit card information for fraudulent transactions.
o Phishing and Spear Phishing: Deceptive tactics to trick individuals into revealing confidential
information.
o Malware: Malicious software that damages or disrupts systems, such as viruses, spyware, and
Trojans.
o Ransomware: Malware that locks or encrypts a victim's data and demands a ransom for its release.
o Zero-Day Attack: Exploiting vulnerabilities in software or hardware that are unknown to the software
vendor, giving attackers a window of opportunity before the vulnerability is fixed.
o Zero-Click Attack: A type of attack where the victim doesn't need to interact with the malware for it
to be activated (e.g., exploits targeting messaging systems).
o Malicious Software: Using viruses, worms, and other malicious programs to compromise systems.
o Botnets: Networks of compromised computers controlled remotely for launching attacks like DDoS.
o National Cyber Crime Reporting Portal: A government initiative to allow citizens to report
cybercrimes.
o Online Reporting: Many organizations and law enforcement agencies now provide platforms for
victims to report online incidents.
Reporting involves submitting details of the crime, including evidence such as screenshots, logs, and any
other relevant information to help law enforcement in investigations.
Prevention:
o Cyber Hygiene: Practicing good digital habits like using strong passwords, keeping software updated,
and avoiding suspicious links or attachments.
o Firewalls and Anti-virus Software: Installing security tools to protect systems from unauthorized
access and malware.
Detection: Using intrusion detection systems (IDS) to monitor network traffic and identify potential attacks.
Response:
o Incident Response Plans: Having a plan in place to handle cyber incidents when they occur, including
isolation, investigation, and recovery.
Recovery: Restoring systems and data from backups, patching vulnerabilities, and ensuring that security
measures are strengthened.
Cybercrime and the Law: Cybercrimes can involve violations of national and international laws, including
privacy violations, fraud, theft, and attacks on national security.
Legal frameworks are in place to define offenses, provide punishment, and ensure the protection of digital
spaces.
The Information Technology Act 2000 (IT Act) is the primary legislation in India that deals with cybercrime
and electronic commerce.
o IT Act 2000: Provides a legal framework for e-commerce, electronic signatures, and cybercrimes.
o Amendments:
IT (Amendment) Act 2008: Enhanced provisions related to cybercrime, cyber security, and
privacy.
Key Sections:
Indian Computer Emergency Response Team (CERT-In): The national agency that deals with cybersecurity
incidents and issues alerts.
Cyber Crime Cells: Police units across India that investigate and handle cybercrimes.
National Critical Information Infrastructure Protection Centre (NCIIPC): Responsible for protecting critical
infrastructure from cyber threats.
Data Security Council of India (DSCI): A not-for-profit organization focused on promoting data protection and
cybersecurity awareness.
Yahoo Data Breach (2013): A major cyber attack where over 3 billion Yahoo user accounts were
compromised. This case highlights the importance of securing user data and the potential consequences of a
large-scale cybercrime.
WannaCry Ransomware Attack (2017): A global ransomware attack that affected hundreds of thousands of
computers across 150 countries, affecting industries like healthcare, telecommunications, and government
services.
Aadhaar Data Leak (2018): A case where sensitive personal data from India's Aadhaar database was exposed
due to vulnerabilities, leading to concerns about privacy and data security.
Social Networks are online platforms that allow users to create profiles, interact with others, share content,
and build relationships. These networks facilitate communication, collaboration, and content creation.
Examples of social networks include Facebook, Instagram, Twitter, LinkedIn, and others, where individuals
and organizations can connect and share information.
Social Media Platforms can be categorized into various types based on their purpose and functionality:
o Social Networking Sites: Platforms like Facebook and LinkedIn, designed to help users connect and
interact with friends, colleagues, and communities.
o Media Sharing Platforms: Websites like YouTube, Instagram, and Pinterest, primarily focused on
sharing photos, videos, and other media content.
o Microblogging Sites: Platforms like Twitter, where users post short messages, updates, and follow
others' content.
o Discussion Forums: Websites like Reddit and Quora, where users can post questions and answers,
participate in discussions, and share knowledge.
o Blogs and Wikis: Platforms like WordPress or Wikipedia, where users can publish articles or
contribute to collaborative content creation.
Facebook: A social networking site that allows users to connect with friends, family, and businesses, share
content, and join groups.
Twitter: A microblogging site that allows users to post short updates, also known as tweets, and interact
through hashtags.
Instagram: A platform focused on sharing photos and videos, with features like stories, reels, and direct
messaging.
LinkedIn: A professional networking platform designed for business connections, job searching, and sharing
industry-related content.
TikTok: A video-sharing platform that allows users to create and share short videos, often with music or
special effects.
YouTube: A video-sharing platform where users can upload, watch, and interact with videos, including
educational, entertainment, and promotional content.
Social Media Monitoring refers to tracking and analyzing social media platforms for specific content,
conversations, and user activity. It helps businesses, governments, and individuals track brand reputation,
customer feedback, and trends.
Tools like Hootsuite, Sprout Social, and Brandwatch are often used for social media monitoring, allowing
users to analyze metrics like engagement, mentions, and sentiment.
Hashtags: A way to categorize content and make it discoverable across social platforms. They are often used
on platforms like Twitter, Instagram, and LinkedIn to follow trends or participate in conversations.
Viral Content: Content that rapidly gains popularity and spreads across social media platforms. Viral content
often includes humorous, emotional, or timely topics that resonate with a large audience.
Social Media Marketing involves the use of social media platforms to promote products, services, or brands.
It includes creating engaging content, running ads, and interacting with followers to build brand loyalty and
drive sales.
Platforms like Facebook Ads, Instagram Influencers, and Twitter Promotions are popular methods of social
media marketing.
Influencer Marketing: Leveraging the reach of social media influencers (individuals with large follower bases)
to promote products or services.
Privacy Concerns: Social media platforms collect vast amounts of personal data, including location, contact
information, and user behavior. Privacy concerns arise when this data is shared or misused.
Settings: Most social media platforms offer privacy settings that allow users to control who can see their
posts, comment on them, and access their personal information. It's crucial for users to regularly update
these settings.
Data Breaches: Privacy risks increase when social media platforms suffer data breaches, leading to
unauthorized access to user data.
Challenges:
o Cyberbullying and Harassment: Negative behaviors like trolling, hate speech, and online harassment
can occur on social networks.
o Misinformation and Fake News: The rapid spread of false or misleading information can have serious
consequences, especially in political and health contexts.
o Privacy Violations: Users may inadvertently share sensitive personal information that can be
misused.
o Addiction and Mental Health: Prolonged use of social media can lead to issues like social media
addiction, anxiety, and depression, especially among younger users.
Opportunities:
o Networking and Personal Branding: Social media offers opportunities for individuals and businesses
to connect, promote their work, and create a personal brand.
o Social Good: Platforms can be used for activism, raising awareness about social issues, and driving
positive change.
Pitfalls:
o Phishing Attacks: Fraudsters often use social media platforms to execute phishing scams, tricking
users into revealing personal information.
o Reputation Damage: Negative content or interactions on social media can harm an individual’s or
company’s reputation.
Phishing and Identity Theft: Criminals can impersonate users or companies to steal login credentials and
personal information.
Malware and Ransomware: Links in posts or messages can lead to malware or ransomware attacks that
compromise devices and data.
Account Hacking: Social media accounts can be hacked to spread spam, false information, or to blackmail
users.
Social Engineering: Cybercriminals manipulate users into revealing confidential information by exploiting
psychological tactics.
Social media platforms provide tools for users to flag or report inappropriate content such as hate speech,
graphic violence, cyberbullying, and misinformation.
Reporting Mechanisms: These usually involve clicking a “Report” button next to offensive posts or accounts.
Each platform has its guidelines on what constitutes inappropriate content.
Content Moderation: Platforms employ a mix of automated systems (AI-driven) and human moderators to
enforce community guidelines and remove harmful content.
Cyber Laws: Many countries have laws in place to regulate online content and social media use:
o India’s IT Act 2000: Provides legal provisions for addressing cybercrimes like cyberstalking,
defamation, and identity theft.
o Section 66A of the IT Act: Addresses offensive and inappropriate content posted online, including
social media.
Defamation Laws: In many jurisdictions, posting defamatory content on social media can result in legal
consequences.
Freedom of Speech vs. Harmful Content: Striking a balance between freedom of speech and preventing
harmful content like hate speech and incitement to violence is an ongoing challenge.
Privacy Settings: Regularly review and update privacy settings to control who can access your personal
information and posts.
Think Before You Post: Be mindful of the content you share; once posted, it can be hard to remove
completely.
Avoid Clicking on Suspicious Links: Be cautious of unsolicited messages or links that may lead to phishing
sites or malware downloads.
Use Strong Passwords and Two-Factor Authentication (2FA): Strengthen account security by using complex
passwords and enabling two-factor authentication.
Monitor Account Activity: Regularly check your account activity to detect unauthorized access.
Educate Yourself on Security Risks: Stay informed about the latest social media security threats and trends.
Case Study 1 - Cambridge Analytica Scandal (2018): The misuse of personal data from millions of Facebook
users for political profiling and targeted ads raised serious privacy concerns and led to global discussions
about data protection and user consent.
Case Study 2 - Twitter Data Breach (2020): Hackers gained control of high-profile Twitter accounts, including
those of Elon Musk, Barack Obama, and others, to promote a cryptocurrency scam. This incident highlighted
the vulnerability of social media platforms and the need for stronger security protocols.
Case Study 3 - Social Media Addiction: Numerous studies have shown the negative psychological effects of
social media addiction, particularly among teenagers and young adults, including anxiety, depression, and
low self-esteem.
1. Definition of E-Commerce
E-Commerce (Electronic Commerce) refers to the buying and selling of goods and services over the internet.
It encompasses all online transactions, including product purchases, services, and digital goods exchanges.
E-commerce can also involve the exchange of information or services between businesses (B2B), businesses
and consumers (B2C), or consumers to consumers (C2C).
Online Storefront: A website or platform where businesses showcase their products and services.
Shopping Cart: A feature that enables users to select, review, and purchase items from an online store.
Electronic Data Interchange (EDI): Systems that enable businesses to exchange documents and transactions
electronically.
Inventory Management System: A system that tracks stock levels and manages product availability for online
stores.
Customer Support: Tools such as chatbots, help desks, and customer service support to handle queries and
complaints.
Confidentiality: Ensures that sensitive customer data (like payment details) is kept secure and private.
Integrity: Guarantees that data cannot be altered or tampered with during the transaction process.
Authentication: Verifies the identity of users or systems involved in the transaction, ensuring that both
parties are legitimate.
Availability: Ensures that systems and services are available for transaction processing at all times.
4. E-Commerce Threats
Hacking: Unauthorized access to websites or payment systems, aiming to steal customer data or modify
transaction processes.
Phishing: Fraudulent attempts to steal sensitive customer information such as passwords, credit card
numbers, or bank details.
SQL Injection: A technique where malicious SQL queries are injected into a database, exploiting
vulnerabilities to extract data.
Distributed Denial-of-Service (DDoS) Attacks: Overloading e-commerce sites with traffic, causing service
disruption.
Malware and Ransomware: Software designed to damage or disable systems, sometimes demanding
payment to unlock the data.
Fake Websites: Fraudulent websites that mimic legitimate online stores to trick users into providing personal
information.
To safeguard e-commerce platforms and transactions, businesses must implement the following best practices:
SSL Encryption: Secure Sockets Layer (SSL) encrypts data transmitted between the user’s browser and the
server to protect customer details.
Two-Factor Authentication (2FA): An added layer of security that requires users to provide two forms of
identification before gaining access to accounts.
Secure Payment Gateways: Using trusted and encrypted payment gateways like PayPal, Stripe, and secure
credit card processors.
Regular Security Audits: Conducting periodic audits of systems to detect and fix potential vulnerabilities.
User Education: Informing users about safe online practices, like avoiding suspicious emails or websites.
Firewall Protection: Using firewalls to monitor and control incoming and outgoing traffic to prevent
unauthorized access.
6. Advantages of E-Commerce
Cost-Effective: E-commerce reduces overhead costs by eliminating the need for physical stores.
Personalized Shopping: Online stores can track customer behavior and preferences to offer personalized
recommendations.
Quick Transactions: Fast payment and order processing increase customer satisfaction and operational
efficiency.
Variety and Selection: E-commerce platforms offer a wide range of products, often more than a physical
store.
Amazon: A global e-commerce giant offering a wide range of products from electronics to books.
Flipkart: A major e-commerce platform in India that offers products in various categories like fashion,
electronics, and groceries.
eBay: An online auction and shopping platform that allows individuals and businesses to buy and sell a
variety of goods.
Digital Payments are transactions where payments are made through electronic means rather than physical money.
Digital payments are crucial for e-commerce as they enable fast, secure, and convenient transactions.
Payment Gateway: A service that processes payment transactions between the payer and the payee.
Banks and Financial Institutions: Entities that authorize and facilitate the transfer of funds between the
payer and the payee.
Payment Service Providers (PSPs): Third-party companies that help facilitate digital payments, such as Paytm
or Razorpay.
Banking Cards: Debit or credit cards issued by banks to facilitate online and in-store purchases.
Unified Payment Interface (UPI): A real-time payment system in India that enables instant money transfer
between banks through mobile devices.
e-Wallets: Digital wallets like Paytm, Google Pay, and Apple Pay that store digital currency and allow easy
payments online.
Unstructured Supplementary Service Data (USSD): A technology used for mobile payments that doesn’t
require an internet connection. It’s often used in rural areas or by individuals with feature phones.
Aadhar Enabled Payments: A payment system based on biometric authentication linked to India’s Aadhaar
identity system, allowing seamless transactions through fingerprints or iris scans.
Phishing Scams: Fraudsters attempt to steal sensitive information such as bank account details by posing as
legitimate entities.
Sim Swap Fraud: Criminals swap a person’s SIM card to gain access to their mobile banking apps or OTPs.
Card Cloning: Copying information from a credit or debit card and using it to make unauthorized
transactions.
Fake Payment Gateways: Fraudsters set up fake websites that mimic legitimate payment systems to steal
financial data.
Preventive Measures:
Be cautious about sharing personal information online, especially through unsolicited emails or calls.
Use trusted payment gateways and verify websites are secure (look for “https” and padlock symbols).
12. RBI Guidelines on Digital Payments and Customer Protection in Unauthorized Banking Transactions
The Reserve Bank of India (RBI) has issued guidelines to protect customers in digital payment transactions:
o Zero Liability: Customers are not held responsible for unauthorized transactions if they report fraud
within three working days.
o Enhanced Security: Banks must implement security features like OTP, two-factor authentication, and
encryption for all digital payments.
o Transaction Limits: Banks and payment providers must set transaction limits for enhanced security.
o Dispute Resolution: There are clear mechanisms in place for resolving disputes related to
unauthorized transactions.
13. Relevant Provisions of the Payment and Settlement Systems Act, 2007
The Payment and Settlement Systems Act, 2007 provides the legal framework for payment systems in India,
ensuring they are secure, efficient, and accessible.
Key provisions:
o Regulation of Payment Systems: RBI regulates all payment systems, including card-based
transactions, mobile payments, and others.
o Settlement of Disputes: Provides a framework for resolving disputes related to payment system
failures.
o Consumer Protection: Ensures consumer rights are upheld in cases of fraudulent transactions or
payment issues.
This module focuses on securing endpoint devices such as computers, mobile phones, and other personal devices,
which are common targets for cyber-attacks. It emphasizes password policies, security patch management, and data
backup, along with best practices for maintaining device security through firewalls, antivirus software, Wi-Fi security,
and more.
Endpoint Devices refer to any device that connects to a network, including desktops, laptops, smartphones,
tablets, and IoT devices. Securing these endpoints is crucial to prevent unauthorized access, data breaches,
and malware infections.
Mobile Phone Security: Mobile phones are highly vulnerable to attacks due to their widespread use and
reliance on internet connectivity. Common risks include:
o Malware: Apps or files that can steal data or harm the device.
o Unsecure Wi-Fi: Risk of data interception when using public Wi-Fi networks.
o Install trusted apps only from official stores (Google Play or App Store).
2. Password Policy
A Password Policy is a set of rules that govern the creation, management, and use of passwords in an
organization or on personal devices to ensure strong, secure access control.
o Password Complexity: Passwords should include a mix of upper and lower case letters, numbers, and
special characters.
o Expiration and Rotation: Passwords should be changed periodically (e.g., every 90 days).
o Multi-Factor Authentication (MFA): Encourage or require the use of MFA to add an extra layer of
security.
o Avoid Reusing Passwords: Use unique passwords for different systems or accounts.
3. Security Patch Management
Patch Management involves keeping software up-to-date with the latest security patches and updates. It is
critical to fix known vulnerabilities in operating systems and applications to prevent exploitation by attackers.
o Assessment: Determine which patches are critical for security and stability.
4. Data Backup
Data Backup is the process of copying and storing data in a secure location to protect against data loss,
corruption, or cyber-attacks.
Types of Backups:
o Incremental Backup: Backs up only the data that has changed since the last backup.
o Differential Backup: Backs up data that has changed since the last full backup.
o Offsite Storage: Store backups in a secure, offsite location or cloud service to protect against physical
damage.
o Test Backups: Regularly test backups to ensure they are functioning and data can be restored if
necessary.
Third-Party Software refers to programs and applications downloaded from external sources, not from the
primary developer of the operating system.
o Download from Trusted Sources: Only download software from official websites or trusted app
stores.
o Verify Software: Use tools to scan downloaded software for malware before installation.
o Update Regularly: Keep third-party software up-to-date to protect against known vulnerabilities.
o Limit Use: Only install necessary third-party software and uninstall any unused applications.
A Device Security Policy is a set of rules that define how devices (computers, mobile phones, tablets) should
be secured within an organization. These policies are crucial to manage risks related to device theft,
malware, and unauthorized access.
o Remote Wipe: Enabling the ability to remotely erase data from lost or stolen devices.
Maintain Regular Backups: Backup important data regularly to avoid loss due to attacks or system failures.
Keep Software Updated: Regularly update operating systems, applications, and antivirus software.
Educate Users: Provide training on identifying phishing attacks, securing devices, and safe internet practices.
Secure Network Connections: Always use secure connections like VPNs and encrypted networks, especially
when using public Wi-Fi.
Host Firewall: A host-based firewall is a software-based system that protects a device from unauthorized
access by controlling inbound and outbound traffic based on predefined rules.
o Importance: It helps prevent attackers from exploiting vulnerabilities in the operating system and
applications by blocking malicious traffic.
o Configuration: Ensure firewalls are enabled and properly configured on all endpoints to monitor
traffic and block suspicious activity.
Anti-Virus Software: Software designed to detect, prevent, and remove malicious software, such as viruses,
worms, and malware.
o Importance: Anti-virus programs scan files, email attachments, and websites for known threats and
malicious activities.
o Best Practices:
Anti-Virus Management:
o Ensure that anti-virus software is always running and configured to automatically update virus
definitions.
o Perform regular scans and schedule automated scans for the system.
Wi-Fi Security is crucial to ensure that unauthorized users cannot gain access to your network.
o Use WPA3 Encryption: Ensure your Wi-Fi network is encrypted with WPA3 or at least WPA2, as WEP
is outdated and insecure.
o Change Default Credentials: Change the default administrator username and password for your
router.
o Disable WPS: Wi-Fi Protected Setup (WPS) can be a security vulnerability, so it’s advisable to disable
it.
o Use Strong Passwords: Set a strong, unique password for your Wi-Fi network.
o Guest Networks: Set up a separate guest network for visitors to protect your primary network from
unauthorized access.
Basic Security Policies define rules that users must follow to maintain a secure environment.
o Password Management: Policies should enforce the use of strong, regularly updated passwords.
o Access Control: Define permissions to ensure users only access the data and systems necessary for
their roles.
o Device Management: Outline how devices should be secured (e.g., encryption, strong
authentication).
Permissions:
o Set file and folder access permissions to ensure that only authorized users can view, edit, or delete
sensitive data.
o Implement least privilege access, giving users the minimum level of access needed to perform their
job.