10.07.2015 Views

Page 1 of 1 - Central Bureau of Investigation

Page 1 of 1 - Central Bureau of Investigation

Page 1 of 1 - Central Bureau of Investigation

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

strengthened, particularly when the suspects are militants or belongto major criminal gangs. The possibility <strong>of</strong> rescue attempt by hisassociates cannot be ruled out. This brings into focus the weaponry inthe branch. The available weapons should be cleaned and keptserviceable at all times. Regular fire practice has to be given to allstaff members.35.8 Information SecurityAll the CBI branches are provided with computers and most <strong>of</strong>these computers are interconnected with each other through anetwork. Since information <strong>of</strong> confidential nature is stored andexchanged in most <strong>of</strong> these computers, it is essential that head <strong>of</strong> the<strong>of</strong>fice takes all precautions to ensure absolute security to theinformation and to make their systems impenetrable to the hackerattacks.35.8.1 Security precautions for network Administrators/usersSystem Administrator/HeadOf Department to ensureThat employee code may beused as login ID for eachauthorised userAll users periodically briefed,regarding SOPs and latestthreats and precautionsthat all users change theirpass words periodicallythat the Data is backed-up ona weekly basisfacility for Internet Access isnever attached or installed inthe CBI network.that temporary files from Tempfolder is regularly deleted.that no user with other thanhis own login name/passwords is allowed to access.that files are named properlyfor enabling search/retrieval atAll Users to ensure thatPasswords generated are <strong>of</strong>atleast 10 characters.Passwords contain alphanumeric and symboliccharacters.Passwords are neither noteddown nor disclosed to anyone.Character combinations thatare not available indictionary are used forgenerating passwords.That Internet is notaccessed on CBI network.They log <strong>of</strong>f their machine incase any one wants to leaveeven for a short while.Their login name/passwordsare not used by anyone evenfor a short while.That files are namedproperly for enabling<strong>Page</strong> 236 <strong>of</strong> 236

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!