Program Summary Booklet
Program Summary Booklet
Thank you for completing the Cyber Crime Awareness Program. We are confident that you have obtained a valuable
amount of information related to Cyber Security and its related best practices in the topics of :
This booklet is a summary of all the key learning points and applicable actions that can be beneficial to you, your family
and community .
Importance of Cyber Security
Learning Summary
Overview
This module gives you an
Cyber attacks are a human problem – not introduction to the
necessarily something related to national importance of Cyber
security or an IT issue. Security, who is
responsible and what
Everyone has the power to help prevent a factors could potentially
exacerbate the risk of a
cyber attack.
Cyber Attack – and how
you can personally affect it.
This training will give you the means to help
keep loved ones, friends, and your
organisation safe from cyber attacks.
Data Privacy
Learning Summary
Overview
This module will give you
Awareness of classification of data is pertinent information on
paramount (e.g highly confidential data what attributes should be
should not be shared via email externally). defined in data, and also
where classified
Classified documents should not be stored documents should be
on non-approved storage systems, cloud stored, how you should
drives or USB drives. handle data, and when you
should destroy sensitive
Some data requires specific data material.
destruction, which must be followed prior
to disposal.
Common Threats
Learning Summary
Overview
This module will furnish you
Every cyber attack has a human with a background on
common cyber threats and
component somewhere.
their classification,
providing a foundational
Common threats include: Malware, understanding ready for
further depth later in the
Ransomware and Phishing.
training.
If a personal device is used for work, your This module also presents
organisation may install software that the knowledge and
separates work and personal data. guidance needed to
protect and strengthen
Keeping your device up-to-date, alongside your device, should you
encrypting data and having a strong use it for work.
password can all help protect your device.
Passwords
Learning Summary
Overview
This module allows you to
Choose a long password over one that is understand the
overtly complex. Over ten characters is the complexities of choosing a
norm. secure password, why you
need to do so, and what
Password managers are a viable way of other factors you can utilise
to stop a Black Hat
generating secure passwords for websites.
accessing your accounts.
Overview
This module will allow you
Make sure to implement two-factor to recognise the various
forms and parts of two-
authentication for all personal accounts.
factor authentication,
where it is valid, and the
If you receive login alerts and suspect importance of its use.
someone is trying to access your account,
immediately change your password.
If two-factor authentication is not available,
you can still receive email alerts when there
is a login attempted from another location.
Phishing
Learning Summary
Overview
This module the definition
Consider using separate email addresses of phishing, why phishing
for sensitive and non-sensitive accounts attacks occur and theira
and don’t share your address freely. impact. It also teaches you
how to spot phishing
Check the address of the sender carefully emails and what you should
and stop and think before clicking on any do when you encounter
links or attachments embedded in emails. one.