NCC'24 - Content (1) 2024 CYBERCLUB
NCC'24 - Content (1) 2024 CYBERCLUB
NCC'24 - Content (1) 2024 CYBERCLUB
CYBERSECURITY
CHALLENGE
CONTENT FOR SCHOOLS – 2024
Contents
MODULE 1 - GENERAL IT & CYBERSECURITY KNOWLEDGE ................................................ 5
Popular Cybersecurity Vulnerabilities (OWASP Top Ten) ............................................................ 5
Common Ports and Services ................................................................................................... 5
General Knowledge ................................................................................................................ 6
Terminologies ........................................................................................................................ 7
MODULE 2 - CAREER OPPORTUNITIES IN CYBERSECURITY .............................................. 10
Governance Risk and Compliance (GRC) ................................................................................. 10
Cybersecurity Threat Intelligence ........................................................................................... 11
Security Architecture ........................................................................................................ 11
User Education .................................................................................................................. 12
Security Operation ............................................................................................................ 13
Application Security .......................................................................................................... 14
Enterprise Risk Management (ERM) ................................................................................ 15
Descriptions of some common cybersecurity job roles ................................................... 16
MODULE 3- Online Activities and Associated risk ............................................................... 21
Background .......................................................................................................................... 21
The Online Risk Landscape .................................................................................................... 21
Types of threat actor......................................................................................................... 23
Online Privacy issues ........................................................................................................ 24
TOP REPORTED INCIDENTS ............................................................................................. 25
Online Shopping Scams ................................................................................................ 26
Mobile Payment Services Fraud ................................................................................... 27
Courier Service Scams .................................................................................................. 27
Romance Scams ........................................................................................................... 27
Shopping Fraud............................................................................................................ 27
Phishing Scams ............................................................................................................ 27
Lottery and Prize Scams ............................................................................................. 27
Charity Scam................................................................................................................ 27
Recommendations ............................................................................................................. 27
WhatsApp Account Takeover ................................................................................................. 28
Sextortion (Sexual Extortion) ................................................................................................. 28
Preventive & Mitigation Measures ................................................................................... 29
Countering Account Takeovers: Enable 'Two-Step Verification' .............................................. 29
Avoiding Sexual Extortion Schemes ........................................................................................ 29
Recommendations ......................................................................................................... 29
MODULE 4-INTERNET AND ONLINE SAFETY ................................................................. 30
Introduction ...................................................................................................................... 30
2. Staying Safe from Online Predators........................................................................... 32
3. Cybersecurity Cybercrime Incident Reporting Points of Contact ............................. 33
4.0 Cyberbullying and Cyber harassment ........................................................................ 33
5. Using social media Safely. ............................................................................................ 34
Privacy Settings for some Social Media Accounts ............................................................ 35
MODULE 5- MOBILE DEVICE SAFETY................................................................................... 40
Introduction and Overview............................................................................................... 41
Kinds of Sensitive Data Stored on Mobile Devices ........................................................... 42
Threats to Mobile Devices ................................................................................................ 42
Securing Mobile Devices ................................................................................................... 43
Measures that parents can take to protect their children's mobile devices.................... 44
Mobile Security Hacking and Terminologies .................................................................... 45
MODULES 6- SOCIAL ENGINEERING ................................................................................... 47
1. What is Social Engineering? ....................................................................................... 47
The Objective of Social Engineering Attackers ................................................................ 47
Traits of Social Engineering Attacks................................................................................. 47
Types of Social Engineering Attack .................................................................................. 47
Stages of Social Engineering ............................................................................................ 51
How to Spot Social Engineering Attacks .......................................................................... 51
How to Prevent Social Engineering Attacks ..................................................................... 52
MODULE 8- COP LEGAL ........................................................................................................ 54
1. Indecent image or photograph of a child .................................................................. 54
2. Penalty for indecent image or photograph of a child ................................................ 54
3. Meaning of publication of indecent image or photograph of a child ........................ 54
4. Includes a material image, visual recording, video, drawing or text that depicts: .54
5. Dealing with a child for purposes of sexual abuse .................................................... 55
6. Penalty for dealing with a child for purposes of sexual abuse ................................. 55
7. Aiding and abetting of child dealing for purposes of sexual abuse .......................... 55
8. Cyberstalking of a child .............................................................................................. 56
9. Sexual extortion ......................................................................................................... 56
10. Meaning of Intimate Image .................................................................................... 56
11. Penalty .................................................................................................................... 56
12. Objective of CRC General Comment 25 .................................................................. 57
13. General principles ................................................................................................... 57
14. Right to Non-Discrimination ................................................................................... 57
15. Ways in which children can be discriminated. ....................................................... 57
16. Best interest of the child......................................................................................... 58
17. Right to life, survival, and development ................................................................ 58
18. Respect for the views of the child .......................................................................... 58
19. Civil rights and freedoms ........................................................................................ 58
20. Access to information ............................................................................................. 58
23. Right to privacy ....................................................................................................... 59
24. Violence against children ........................................................................................ 59
25. Right to education................................................................................................... 60
Module 1
MODULE 1- GENERAL IT & CYBERSECURITY KNOWLEDGE
MODULE 1 – BASIC CONCEPTS IN CYBERSECURITY
INTRODUCTION TO CYBERSECURITY
What is Cybersecurity?
Figure 1: Describes what cybersecurity is – securing all devices and systems connected to
the internet or networks (Laptops, the cloud, workstations, mobile devices, tablets,
servers etc.)
Terminology
• Cyber: Refers to the technology encompassing systems, networks, and programmes or data.
• Security Pertains to the protection of these systems, networks, and programmes from cyber
threats.
•
Cyberspace: The environment where communication over computer networks occurs. It
includes all online digital spaces where information is stored and exchanged.
Key Components of Cybersecurity
Importance of Cybersecurity
• Protection of Sensitive Data: With the increasing amount of data being generated and
stored online, protecting sensitive information such as personal details, financial records,
and intellectual property is crucial. Cybersecurity measures help prevent unauthorised
access, data breaches, and theft, thereby safeguarding individuals’ privacy and
organisations' valuable information.
• Maintaining Business Continuity: Cyberattacks can disrupt business operations, leading
to significant downtime and financial losses. By implementing robust cybersecurity practices,
organisations can ensure business continuity, minimise disruptions, and maintain customer
trust. Effective cybersecurity also includes disaster recovery and business continuity
planning to quickly restore normal operations after an attack.
• Preventing Financial Loss: Cyberattacks can result in substantial financial losses due to
ransom payments, theft of financial data, and the costs associated with responding to and
recovering from breaches. Strong cybersecurity measures help protect against these
financial risks by preventing attacks and reducing the impact of any breaches that do occur.
• Protecting National Security: Critical infrastructure such as power grids, water supply
systems, and transportation networks are increasingly dependent on digital systems.
Cyberattacks on these systems can have severe consequences for national security and
public safety. Governments and organisations must prioritise cybersecurity to protect these
vital services from potential threats.
• Compliance with Regulations: Many industries are subject to regulations that require
the protection of sensitive data. Compliance with laws such as the General Data Protection
Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), the
Data Protection Act, 2012 (Act 843), the Cybersecurity Act, 2020 (Act 1038) and the
Directive for the Protection of Critical Information Infrastructure are essential to avoid legal
penalties and ensure the protection of data. Implementing robust cybersecurity practices
helps organisations meet these regulatory requirements and avoid costly fines.
• Mitigating Evolving Threats: Cyber threats are constantly evolving, with cybercriminals
developing more sophisticated methods to exploit vulnerabilities. Cybersecurity helps
organisations stay ahead of these threats by implementing up-to-date security measures,
conducting regular security assessments, and fostering a culture of continuous improvement
in security practices.
• Enhancing Customer Trust: Consumers are increasingly concerned about the security of
their personal information. Organisations that demonstrate a strong commitment to
cybersecurity can build trust with their customers, enhancing their reputation and
competitive advantage. This trust is crucial for customer retention and the long-term success
of the business.
• Supporting Economic Stability: Cybersecurity is essential for the stability of the global
economy. Cyberattacks can disrupt financial markets, erode consumer confidence, and
impact the overall economic health. By protecting digital assets and infrastructures,
cybersecurity contributes to the stability and resilience of the economy.
CYBERSECURITY PRINCIPLES
1. Confidentiality, Integrity, and Availability (CIA Triad)
The CIA Triad is the foundational model for understanding and implementing
cybersecurity measures. It provides a simple and complete checklist for evaluating an
organisation's security. An effective IT security system consists of three parts:
confidentiality, integrity, and availability, hence the name "CIA triad."
• The CIA triad provides a high-level framework for cybersecurity professionals to consider
when auditing, implementing, and improving systems, tools, and programmemes for
organisations. It is a powerful way to identify weak points and form solutions to strengthen
policies and programmemes.
4. Defense in Depth
Defense in Depth is a cybersecurity strategy that employs multiple layers of security
controls and measures to protect information and systems from a wide range of threats.
The core idea is that if one layer of defense is compromised, additional layers will continue
to protect the system. This approach mitigates the risk of a single point of failure and
enhances the overall security posture of an organisation.
An example of defense in depth used in securing your school. Defense in Depth is
exemplified through a multi-layered approach to security to protect against intruders, a
fence, strong locks, steel doors and windows, a safe room, security cameras, and motion
sensors. The school’s perimeter fence serves as the first line of defense, deterring
potential intruders from accessing the property. A security guard on the school’s
compound. A comprehensive security system with motion sensors and cameras adds
another layer of protection by detecting and alerting the security guard of any suspicious
activity. Strong locks and steel doors and windows further fortify the interior of the school,
making it difficult for intruders to gain entry. Finally, a safe room provides a secure retreat
in the event of a security breach, ensuring their safety until help arrives.
For instance, your online accounts might require a password, a security question, and a
fingerprint scan, making it much harder for someone to access them without permission.
This way, even if one layer of security is breached, there are still others keeping your
information safe.
Key Components of Defense in Depth
• Physical Security: Measures to prevent physical access to critical infrastructure, such as security
guards, locked doors, biometric access controls, and surveillance cameras.
• Network Security: Controls to protect the integrity, confidentiality, and availability of network
data. Examples include firewalls, intrusion detection and prevention systems (IDS/IPS), and virtual
private networks (VPNs).
• Endpoint Security: Protections for devices that connect to the network, such as computers,
smartphones, and IoT devices. This includes antivirus software, endpoint detection and response
(EDR) tools, and regular software updates and patches.
• Application Security: Ensuring that applications are secure against attacks. This involves secure
coding practices, regular vulnerability assessments, and application firewalls.
• Data Security: Safeguards to protect data at rest and in transit through encryption, access
controls, and data masking.
• User Education and Awareness: Training programmes to educate users about security best
practices, phishing, social engineering, and other common threats.
• Administrative Controls: Policies and procedures that govern security practices, including
incident response plans, access management policies, and compliance with regulations and
standards.
Examples of Defense in Depth
Consider an online retail company implementing defense in depth to secure its e-
commerce platform:
• Physical Security: The company secures its data centres with biometric access controls,
surveillance cameras, and security personnel. Only authorised personnel can access the server
rooms.
• Network Security: The company deploys firewalls to filter incoming and outgoing traffic,
ensuring only legitimate traffic passes through. Intrusion detection and prevention systems
(IDS/IPS) monitor network activities for signs of malicious behaviour.
• Endpoint Security: All employee computers and servers have antivirus software installed and
are regularly updated with security patches. Endpoint detection and response (EDR) tools monitor
for suspicious activity and respond to threats in real time.
• Application Security: The company's development team follows secure coding practices to
minimise vulnerabilities in their software. Regular code reviews, penetration testing, and the use
of web application firewalls (WAFs) help protect against application-level attacks.
• Data Security: Customer data is encrypted both at rest and in transit. Access to sensitive data is
restricted based on Role-Based Access Control (RBAC), ensuring only authorised employees can
view or modify the data.
• User Education and Awareness: Employees undergo regular training to recognise phishing
attempts and understand the importance of strong passwords and other security practices.
Simulated phishing attacks help reinforce this training.
• Administrative Controls: The company has a comprehensive incident response plan in place,
detailing the steps to take in the event of a security breach. Regular audits ensure compliance
with industry regulations such as the Directive for the Protection of Critical Information
Infrastructure, Data Protection Act, 2012, or Payment Card Industry Data Security Standard (PCI
DSS).
CYBERCRIME
Definition of Cybercrime
Computer crime, or cybercrime, is any crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may have been the
target. Cybercrime could be internal or external to an organisation. Cybercrime is
categorised into two types:
• Insider Attack: is an attack to the network or computer system by some person (employee, third
party personnel, etc.) with authorised system access. It is generally performed by dissatisfied or
unhappy inside employees or contractors for revenge or greed.
For example, a student shared their password with a friend, who then logged into their
account and changed their grades without permission. This would be an insider attack,
where someone who should have access to the system misuses it for their own gain.
Similarly, an insider attack occurs when someone with authorised access, like a student
or staff member, intentionally or unintentionally abuses their privileges to harm the
school's digital systems or steal information.
• External Attack: This attack originates from outside the organisation by scanning or gathering
information about the organisation. The attacker is either hired by an insider or an external entity.
For example, someone from another school trying to break into your school's computer
system to change grades or steal personal information. This would be an external attack,
where someone outside the school tries to harm its digital systems. Just like how you lock
your front door to keep strangers out of your house, cybersecurity measures are put in
place to prevent external attacks and keep your school's digital information safe from
outside threats.
Cyberattacks can also be classified as structured attacks or unstructured attacks based on
the level of maturity of the attacker.
• Structured Attacks: These types of attacks are performed by highly skilled and experienced people,
and the motives for these attacks are clear. They have access to sophisticated tools and technologies
that allow them to gain access to other networks without being detected.
For instance, a group of students working together to sneak into the school library after
hours by planning out every detail, like distracting the librarian and sneaking past security
cameras. This would be a structured attack, where the students carefully plan and execute
their actions to achieve their goal. Similarly, a structured attack occurs when hackers
meticulously plan and coordinate their efforts to breach a computer system, exploiting
vulnerabilities and using sophisticated techniques to gain unauthorised access or steal
sensitive information.
• Unstructured Attacks: These attacks are generally performed by amateurs who do not have any
predefined motives to perform the cyberattack. Usually, these amateurs try to test a tool readily
available over the internet on the network of a random company.
For instance, someone randomly trying different passwords to break into your online
accounts without any specific plan or strategy. This would be an unstructured attack,
where the attacker acts impulsively without careful planning. Similarly, an unstructured
attack occurs when hackers use simple and opportunistic methods, like phishing emails or
malware, to exploit vulnerabilities in computer systems without a detailed plan, posing a
threat to the security of digital information.
.
Cyberwarfare
Cyberspace has become another important dimension of warfare, where nations can carry
out conflicts without the clashes of traditional troops and machines. This allows countries
with minimal military presence to be as strong as other nations in cyberspace.
Cyberwarfare is an Internet-based conflict that involves the penetration of computer
systems and networks of other nations. These attackers have the resources and expertise
to launch massive Internet-based attacks against other nations to cause damage or
disrupt services, such as shutting down a power grid.
For instance, two rival schools (nations) competing in a big sports event. Now, imagine if
instead of playing fair, one school secretly sent spies to sabotage the other team's
practices and steal their playbook. This would be like cyber warfare, where countries or
groups use digital weapons like malware or hacking to disrupt or spy on each other's
computer systems, aiming to gain an advantage or cause harm without direct physical
conflict. Just like in sports, cyber warfare involves strategic planning, tactics, and
sometimes even espionage to outsmart the opponent.
Key aspects of cyber warfare include:
• Espionage: Stealing confidential information and intelligence from government agencies, military
organisations, or private enterprises. For example, the infamous Stuxnet worm, believed to be
developed by the United States and Israel, was used to sabotage Iran's nuclear programme by
targeting its industrial control systems.
• Sabotage: Disrupting critical infrastructure such as power grids, water supply systems, and
communication networks. For instance, the 2015 cyberattack on Ukraine's power grid caused
widespread power outages and highlighted the potential for cyber warfare to impact national
infrastructure.
• Propaganda and Psychological Operations: Spreading misinformation/disinformation or
propaganda to influence public opinion or destabilize societies. The use of social media platforms to
spread fake news and manipulate election outcomes is a prominent example of this tactic.
a. HTTP (80): Hypertext Transfer Protocol, used for accessing web pages.
b. HTTPS (443): Secure version of HTTP, used for secure web browsing and online
transactions.
c. FTP (20, 21): File Transfer Protocol, used for uploading and downloading files.
d. SSH (22): Secure Shell, used for secure remote access and file transfers.
e. Telnet (23): Remote login service, used for accessing servers and network
devices.
f. SMTP (25): Simple Mail Transfer Protocol, used for sending email messages.
g. DNS (53): Domain Name System, used for translating domain names into IP
addresses.
h. DHCP (67, 68): Dynamic Host Configuration Protocol, used for assigning IP
addresses to devices.
i. POP3 (110): Post Office Protocol, used for retrieving email messages.
j. IMAP (143): Internet Message Access Protocol, used for retrieving email
messages.
k. SNMP (161, 162): Simple Network Management Protocol, used for monitoring
and managing network devices.
l. MySQL (3306): Open-source relational database management system.
m. SMTP (587): Used for email message submission. It is an alternative to port 25,
which is used for SMTP (Simple Mail Transfer Protocol) email delivery.
General Knowledge
Ghana Emergency Numbers
a. Police – 191/18555
b. Fire – 192
c. Ambulance – 193
d. Universal Emergency Hotline - 112
e. Cyber Security Authority – 292
f. National Security – 999
o. PIN: The secret password strictly limited to numeric character is known as Personal
Identification Number.
p. Phishing: The most common cyberattack on the internet that comes in the form of
an email pretending to be from your bank or a trusted organisation and asking for
your password and other login information.
t. Sniffing or Traffic monitoring: This refers to the act of watching or capturing and
inspecting network traffic to gather information about the data being transmitted over
a network.
u. Data at Rest: This describes the state of data. It typically refers to stored digital
data. It is said to be “at” as opposed to being “in motion” when moving across a
network.
v. Kernel: is term used for the most basic level or core of an operating system,
responsible for resource allocation, file management and security. In a different
context, this word can also mean the seed and hard husk of a cereal.
Common Roles
• Compliance Officer
• Risk Manager
• Governance Analyst
• Internal Auditor
• Information Security Officer
• Documentation Review
Skills & Attributes
• Excellent analytical and critical thinking skills to identify and assess risks, and to
develop effective risk management strategies.
• Strong project management skills to manage multiple initiatives and prioritize tasks
effectively.
Common Roles
• Strong analytical skills to collect, analyse, and interpret data from various sources
to identify potential cybersecurity threats.
• Knowledge of cyber threat landscape, including threat actors, attack methods,
and malware.
• Familiarity with security tools and techniques, such as SIEM, threat intelligence
platforms, and data visualization tools.
• Strong communication skills to effectively communicate threat intelligence
information to stakeholders in a clear and concise manner.
• Attention to detail to ensure accuracy and completeness of threat intelligence
reports and other documentation.
Security Architecture
The security architecture domain of cybersecurity refers to the design and implementation
of a secure computing environment that ensures the confidentiality, integrity, and
availability of an organization's information assets. This domain focuses on developing a
security infrastructure that incorporates a range of technologies, processes, and policies
to prevent and mitigate cybersecurity threats.
Security architecture jobs combine hardware and software knowledge with programming,
research, and policy development. Security architects anticipate potential threats and
design systems to pre-empt them.
Common Roles
• Cloud Security Engineer
• Security Engineer
• Network Security
• Access Control Manager
• Cryptographer
• Risk management: Security architects must be able to assess and analyse risks to
an organization's information assets and develop strategies to mitigate those risks.
User Education
User education is a critical aspect of cybersecurity. It refers to the process of educating
users within an organization about safe computing practices and how to protect sensitive
information from cyber threats. The goal of user education is to reduce the likelihood of
security incidents caused by human error, such as falling for phishing scams or using weak
passwords.
Common Roles
• Security Awareness Training Specialist
• Technical Trainer
• Learning and Development Manager
• Cybersecurity Education Program Manager
• Creativity and innovation: User education often involves developing creative and
innovative strategies for engaging users and making cybersecurity training more
effective.
Security Operation
The Security Operation (SecOps) is a domain in cybersecurity that focuses on managing
and responding to security incidents and threats. It involves the implementation and
management of security technologies, processes, and procedures that are designed to
prevent, detect, and respond to cybersecurity incidents. The SecOps team is responsible
for monitoring the organization's systems, networks, and applications to identify potential
security threats and incidents. They use a range of security tools, such as firewalls,
intrusion detection and prevention systems (IDS/IPS), and security information and event
management (SIEM) solutions, to monitor and analyse security logs and events.
COMMON ROLES
• Security Operations Center (SOC) Manager
• Penetration Tester
• Security Analyst
Skills & Attributes
• Analytical and problem-solving skills: The ability to analyse complex security
events and incidents, identify potential threats, and develop effective solutions
is critical for SecOps professionals. They should be able to think critically,
creatively, and systematically to solve security problems.
• Ability to work under pressure: Security incidents can occur at any time and
require quick action to contain and remediate the threat. SecOps professionals
should be able to work effectively under pressure and prioritize tasks to manage
incidents in a timely manner. They should be able to handle high-stress situations
with calmness and focus on the task at hand.
Application Security
The application security domain of cybersecurity involves the protection of software
applications from potential cyber threats. It focuses on identifying and addressing
vulnerabilities in software applications that can be exploited by attackers to gain
unauthorized access or steal sensitive data. Application security involves a range of
activities, including secure software design, coding, testing, and deployment. It also
includes ongoing monitoring and maintenance of applications to ensure that they are
secure and free from vulnerabilities.
Common Roles.
• DevSecOps Engineer
• Application Security Analyst
• Application Security Engineer
• Security code auditor
Common roles
• Chief Information Security Officer (CISO)
• Risk Manager
• Compliance Manager
Skills & Attributes
Introduction to OSINT
OSINT (Open-Source Intelligence) refers to the collection and analysis of information from
publicly available sources. This includes social media, online forums, public databases,
search engines, and online publications. OSINT is a crucial aspect of cybersecurity, as it
helps identify potential threats and vulnerabilities. By leveraging OSINT, security
professionals can stay ahead of threats and make informed decisions to protect their
organizations.
What is OSINT Used For?
Threat Vulnerability
Intelligence Incident
Assessment
Response
Penetration Criminal
Testing Cybersecurity
Investigation
Research
By effectively using OSINT techniques, Sunshine High School was able to identify and
mitigate various security threats, ensuring a safer environment for its students and staff.
This proactive approach not only addressed immediate concerns but also established a
robust framework for future security measures.
Key Takeaways for Students
• Awareness: Understand the importance of cybersecurity and safe online practices.
• Reporting: Know how and where to report cyberbullying or any suspicious online activity.
• Collaboration: Work together with peers, teachers, and parents to maintain a secure and supportive
school environment.
• Continuous Learning: Stay informed about the latest trends in cybersecurity and adapt to new
challenges.
Module 4
MODULE 4- ONLINE ACTIVITIES AND ASSOCIATED RISK
MODULE 4- Online Activities and Associated risk
Background
Online activities and online risk are interconnected at every level of our lives. Instead of
visiting a friend, we can engage in video calling or instead of visiting the shop we can buy
online and have the items delivered to us; we can renew our passport and pay for it
online. This is all very convenient in our modern world because it allows us to connect
with different types of people including business, schools and even governments without
leaving the comfort of our homes. Globally, the youth are among the largest users of the
internet and in Ghana the most active group of internet users are the youth aged 15-24
years, and they form over 20% of the current Ghanaian population. Some online activities
the youth typically engage in include:
1. Online gaming
2. Social networking
3. Video and audio streaming
4. Betting
5. E-learning
6. Online shopping
7. Software downloads
8. Sexting
Online fraud This occurs when we meet people online or Online shopping,
opportunities that are not what they claim to be. social networking
This includes fake online shops, social media
profiles, scholarships, investments, and fake
online companies.
Recruitment This is a form of online fraud where a fake profile Online job searches
fraud or businesses offers non-existent jobs to
individuals who visit their page. They may be
pretending to be recruiters who want to employ
people into hospitals, ministries, the army or even
into schools.
Scholarship Fraudsters are actively deceiving students with Social networking
fraud the lure of foreign scholarships on social media.
In addition, fake websites related to scholarships
are being created, and their links spread on social
media platforms. When students input their
personal information on these websites,
scammers use it for various purposes. These
cybercriminals adopt new methods every day to
defraud people, offering fake scholarships for
free studies at universities abroad, collecting
documents, and demanding upfront payments for
application processing. Often, students are duped
into paying multiple times for different processing
steps, only to be blocked later, losing their
money.
Cyberbullying This is the use of technology to harass persons Social networking
online by exposing embarrassing information
about them or making them receive a flood of
unkind messages from online users.
Fake news Fake news is any news item that is not true or Searching for news
intentionally misrepresents the facts of an issue. online, social
Often this is done to confuse readers as part of a networking
misinformation campaign.
Inappropriate Inappropriate content includes any audio, picture Social networking
content or video which is not good for people, especially and online
children, to see or use. Usually, this used to refer streaming, sexting
to pornography or material with excessive
violence.
Cyber Cyber grooming occurs when an adult builds an Social networking,
grooming emotional relationship with a young person online gaming
online, with the intention of sexual abuse or
exploitation. This can extend offline where the
adult sends gifts and money to make the young
person feel special/indebted.
Sextortion This is a form of blackmail which occurs when one Social networking,
person demands sexual favours from another sextortion
individual in order to prevent the blackmailer
from disclosing sensitive information about
him/her. For example, a student may be
blackmailed because they sent their naked
pictures to another person. This is one of the
biggest risks of forming intimate online
relationships.
Romance Malicious actors create fake online profiles to Social networking
Scams deceive victims into believing they are engaging
in a trusting romantic relationship. They use the
relationship to persuade the victims to send
money, provide sensitive personal and financial
information, or purchase items for them.
Cyberstalking Cyberstalking is the use of technology and online Social networking,
platforms to closely follow the activities of online gaming
another person, for the purpose of harassment,
or abuse. This can be used by a malicious person
to gain enough information to intimidate you
since he/she has gained access to sensitive
information about you.
Romance Scams:
Malicious actors create fake online profiles to deceive victims into
believing they are engaging in a trusting relationship. They use the
relationship to persuade the victims to send money, provide personal
and financial information, or purchase items for them.
Shopping Fraud:
Malicious actors create fake websites or online shops or impersonate existing businesses
on social media pages, offering heavily discounted packages and items. Victims are
enticed to send money for these deals but never receive the promised packages/items.
Phishing Scams:
Malicious actors send unsolicited emails or messages claiming to be from a romantic
partner, or from a company offering deals. These messages contain links or attachments
that when clicked, install malicious software (malware), or steal personal information.
Charity Scam:
Malicious actors may contact victims and claim to be a charity organization. They may ask
for donations for gifts for needy children and other related causes.
Recommendations
Note: Providing the email address is recommended. Otherwise, if you forget your PIN,
you will have to wait 7 days before you can reset it. Tap Next
Confirm the email address and tap Save or Done
Sextortion (Sexual Extortion)
A potential victim would typically make a new friend
on a social media platform e.g., Facebook. Eventually
the two parties exchange WhatsApp numbers and the
chats continue over there, establishing a level of trust
and familiarity. After some time, a video call is initiated
over which the victim ends up being persuaded to go
nude. Unknown to them, the session is recorded by
the other party.
Some days afterwards, the other party (or an
associate) will contact the victim indicating that they have these videos and will threaten
to release them in public unless they receive a specified payment. In some cases, the
criminals will go ahead to share it online, provide a link (URL) to where it is and indicate
it would only be taken down when they are paid. The demands typically do not end once
the first payment is made.
• Never share your social media application account verification codes with
anyone. Protect all your social media application accounts by enabling the
'Two-Step Verification' or 'Two-Factor authentication (2FA)' feature.
• Be aware of who has physical access to your phone. If someone has physical
access to your phone, they can use your account without your permission. Do
NOT be impulsive - Beware of unusual requests from strangers or even your
social media contacts.
• Do NOT believe - Be wary of claims that you have won a prize, especially if
you have not participated in any campaign or lucky draw. Check official
websites to determine whether the lucky draw offers are legitimate. Always
verify the authenticity of the request by contacting your friend, but do not
do so through the social media platform as the account might have been
taken over by scammers.
• Do NOT give - Do not transfer money or give out your personal information,
bank account or credit/debit card details, and One-Time Password (OTP) to
anyone, including family and friends.
• If you are contacted by anyone claiming to have images and/or videos of you
of an intimate nature requesting a payment in exchange for not releasing them
to the public, report it immediately to the CSA's Cybersecurity/Cybercrime
Incident Reporting Point of Contact for guidance. Do NOT make any payments.
Module 5
MODULE 5- MISINFORMATION, DISINFORMATION AND FAKE NEWS
Misinformation, Disinformation
and Fake News
Exploring the Definitions, Impacts and Solutions
Presentation Overview
Misinformation, Disinformation, and Fake News
The presentation will begin by defining and providing examples of misinformation, disinformation,
and fake news.
Impact on Society
We will discuss the impact of misinformation, disinformation, and fake news on society,
including their effects on politics, public opinion, and media.
Combatting Misinformation
Finally, we will cover ways to combat misinformation, disinformation, and fake news,
including fact-checking tools and media literacy education.
Definitions and Examples
Misinformation
Misinformation is false or inaccurate information that is spread unintentionally through
various mediums such as social media, news outlets, or word of mouth.
Disinformation
Fake News
Fake news is a type of disinformation that is designed to look like legitimate news but
contains false or misleading information that is spread through various mediums.
Definitions of Misinformation,
Disinformation, and Fake News
Misinformation
Misinformation is inaccurate information that is spread unintentionally, often due to lack
of knowledge or awareness.
Disinformation
Fake News
Fake news is a type of disinformation that is spread through traditional or social media,
often with the purpose of generating clicks or views for profit.
Examples of Misinformation,
Disinformation, and Fake News
Misinformation
Misinformation is inaccurate or incomplete information that is spread widely through social
media or other channels, leading to confusion or misunderstanding among the public.
Disinformation
Fake News
Fake news is fabricated stories or hoaxes that are spread through social media or other
outlets to generate clicks or attention, often with the intent of influencing public opinion.
Impact on Society
Political Polarization
Misinformation, disinformation, and fake news can cause political
polarization and divisions in society. It can lead to mistrust and
hostility among people with differing views, making it difficult to
find common ground for important issues.
Health Consequences
Misinformation, disinformation, and fake news can have serious
health consequences. It can lead to the spread of false medical
advice, treatment, or cures, causing harm to individuals and
society as a whole.
Political Polarization
Misinformation and Disinformation
Misinformation and disinformation are major contributors to political polarization, as
they promote extreme views and reduce trust in institutions.
Social Unrest
Political polarization can lead to increased social unrest, as people become more
divided and less willing to compromise.
Author's Intentions
Media literacy education can help individuals identify the author's
intentions, enabling them to better understand the message and
the potential biases involved.
Conclusion
Misinformation, disinformation, and fake news are complex issues that can be solved by
taking a multifaceted approach, including understanding the definitions, impact, and ways
to combat these issues.
Click here for the training. Enroll on 16-18year olds (Guide below)
STEP 1
Click on “Enroll here”
STEP 2
Click on “Next”
STEP 3
Fill the form
STEP 4
Training material provided
NB: Focus on module 3 however,
you can learn module1&2
Module 6
MODULE 6- INTERNET AND ONLINE SAFETY
MODULE 4-INTERNET AND ONLINE SAFETY
Introduction
The Internet can be a wonderful place to learn, shop, play games, and talk to your friends.
Unfortunately, there are also predators, identity thieves, and others online who may try
to harm you. In order to be safe online, it's important for you and your kids to be aware
of the dangers. Many children are confident that they know how to be safe online.
However, there are a few reasons children are often more at risk. They may not always
think about the consequences of their actions, which can cause them to share too much
information about themselves. Children also are sometimes specifically targeted by
cyberbullies or predators. If you're a parent or guardian, you can help to keep your
children safe by talking to them about their Internet use, teaching them about
online dangers, and learning everything you can about the Internet so you can
make informed decisions. In order to keep your children safe, you'll need to know about
the different types of online dangers that exist. For example, children and teens may
find inappropriate content on the Internet, such as pornography or obscene language.
There is also a possibility of cyberbullying or cyber harassment from others online. This
does not mean your child will encounter all of these threats. However, knowing about the
dangers can help you and your children make smart decisions online.
a. Whenever someone uses a computer, there is a risk of eye strain, wrist strain, and
other injuries. You can help prevent this by limiting the amount of time your children
spend on computers and mobile devices.
b. There's also another reason to limit your children's Internet use: Because people are
spending more and more time online, Internet addiction is becoming a more
significant problem. Internet use can be a good thing, but if it becomes an addiction,
it can affect a person's offline life.
c. It's important for children to be careful whenever they're connected to the Internet
because online dangers are not just limited to bad websites. Chat rooms, computer
games, and even social networking sites can be risky. If your children have mobile
phones, they'll also need to be careful when texting or when accessing the Internet on
their phones.
The Internet is much more anonymous than the real world. People can hide their identities
or even pretend to be someone they're not. This can sometimes present a real danger to
children and teens who are online. Online predators may try to lure children and teens
into sexual conversations or even face-to-face meetings. Predators will sometimes send
obscene material or request that kids send pictures of themselves. Therefore, it's
important to teach your children to be on their guard whenever they're online.
Teens are generally more at risk from predators. Because they are curious and want to be
accepted, they may talk to a predator willingly, even if they know it's dangerous.
Sometimes teens may believe they are in love with someone online, making them more
likely to agree to a face-to-face meeting.
• Don't talk to anyone who wants to get too personal. If they want to talk
about things that are sexual or personal, you should end the conversation. Once
you get pulled into a conversation (or a relationship), it may be more difficult to
stop.
• Keep in mind that people are not always who they say they are. Predators
may pretend to be children or teenagers to talk to kids online. They may use a fake
profile picture and add other profile details to appear more convincing.
• Never arrange to meet with someone you met online. Predators may try to
arrange a face-to-face meeting with a child or teen. Even if the person seems nice,
this can be dangerous.
Cyberbullying is bullying that occurs online, often through instant messaging, text
messages, emails, and social networks. Cyberbullies may be the same age as the victims,
or they may be older. If the perpetrator is an adult, it is generally called cyber-
stalking or cyber harassment.
Cyberbullying can be just as hurtful as other types of bullying, and in some ways it can
be worse. Cyberbullying is not limited to the playground; it can occur anytime children are
online, even if they're at home. Also, the bully can sometimes remain anonymous, which
can make the bullying more difficult to stop.
Kids can be mean sometimes. Unfortunately, the Internet often makes it easier for people
to say hurtful things because it's more impersonal and anonymous than real life. As
a result, many kids participate in cyberbullying even though they don't consider
themselves bullies.
It's important for your children to understand that the comments they make online can
hurt just as much as those made face to face. Make sure they know not to say anything
online that they wouldn't say in person.
It's also possible for kids to face serious consequences for cyberbullying. Many schools
now have zero-tolerance policies for bullying, which may include cyberbullying that
occurs outside of school. In some cases, students have even been suspended from school
for cyberbullying.
c. Below Account Privacy, click to check the box next to Private Account.
e. Keep in mind that business profiles aren't able to make their accounts private. If
you want to make your business account private, first switch back to a personal
account.
2. LinkedIn
The Privacy tab covers all privacy and security settings related to what can be seen
about you, how information can be used, and downloading your data.
To access your LinkedIn privacy settings:
3. Facebook
• From the top of your Feed, click What's on your mind, [name]?
• Click Post.
You can use the audience selector to change who can see things (example: posts and
photos) you share on your timeline after you share it. Keep in mind, when you share
something on someone else's timeline, they control the audience for the post.
• Be careful what you share. Even if you're keeping posts private, it doesn't
guarantee that other people won't be able to see it. For example, if you share a
photo with your friends, they can easily save it to their computers and post it to
another website. You shouldn't post something online unless you're comfortable
with everyone in the world seeing it.
• Keep in mind that things you post online may stay there for years. Even
if something doesn't seem embarrassing, it may damage your reputation years
later when you're looking for a job or applying to college. Employers and colleges
often check social networking sites for information on candidates, so a photo or
other post could lower their impression of you.
• Profile picture
Many sites allow you to choose a profile picture. This can either be a photo or
an avatar, which is a graphical image that represents you. On Facebook, most
people use photos of themselves. However, on a more public site (such as a
discussion board), you may want to use an avatar, as it allows you to remain
more anonymous.
Keep in mind that many different people will be able to see your profile picture.
Therefore, it's important to choose a picture that won't reflect negatively on
you. It's possible for a photo to get you into trouble at school or damage your
reputation.
• Profile information
You should be careful about what personal information you share. If you have
the option of making your info private to just you and your friends, you should
choose this option. You should never make your birthday or home address
publicly viewable.
• Contact information.
Generally speaking, you do not want to include any contact information other
than your email address. Do not use home phone numbers or addresses. If you
must include a phone number, use a mobile phone number.
It may also be a good idea to create a separate email address for social
networking connections in order to protect your normal account from getting
cluttered with spam and phishing emails.
Many sites allow you to customize your profile with wallpaper, personal
interests, likes and other types of information like relationship status. Always
keep in mind what type of public image you want to project as you choose how
to customize your profile and what types of information to include.
Your online image will become more important when you begin applying for
jobs or to college. Anything that is inappropriate may lower someone's
impression of you. Even if you're not worried about it now, don't post anything
that's going to come back to haunt you in a few years.
File-sharing networks became popular in the late 1990s when Napster was first created.
Napster used a kind of technology called peer to peer (or P2P), which allowed people to
share music with others around the world.
Napster was shut down due to legal reasons, but since then many more P2P programs
have appeared. Unlike Napster, these programs not only let people share music but also
TV shows, movies, and software. Unfortunately, there are many risks associated with
these programs, which range from viruses to legal trouble, so to be safe it's best to keep
your kids away from them.
Basic Legal Issues of File Sharing
In theory, you can use a file-sharing network to download and share files that aren't
copyrighted. The problem is that most software, music, TV shows, and movies are
copyrighted, and there can be stiff penalties if you're caught downloading or sharing
them. For example, in 2006 Jammie Thomas was sued by several record labels for sharing
music on the Kazaa file-sharing network. She was ordered to pay $1.5 million in damages,
which was later reduced to $54,000.
Keep in mind that some songs and TV episodes can be downloaded for free from
the iTunes Store and other places, and a lot of software is also free. So, if your kids
have downloaded something without paying for it, it doesn't necessarily mean they've
done anything wrong.
• BitTorrent
• uTorrent
• FrostWire
• BitComet
• Ares Galaxy
Recommended Guidelines for Keeping Children Safe Online
It can be difficult to keep your kids completely safe online. Even if you set up parental
controls on your home computer, your kids will use many other computers that don't have
parental controls. To keep your kids safe, you'll need to teach them to make good
decisions online—even when you're not around.
Below are some general tips you can use when teaching your kids about online safety:
• Learn everything you can about the Internet. Being familiar with the
Internet will not only help you understand the risks, but it will also help you talk
to your kids.
• Set standards for what your kids can and cannot do online. It's important
to make rules for your kids so they know what's expected of them. Don't wait
until something bad happens to start creating guidelines.
• Teach your kids to keep personal information private. It's usually a bad
idea to post personal information online such as phone numbers, addresses,
and credit cards. If criminals gain access to this information, they can use it to
harm you or your family.
• Teach your kids to use social networking sites safely. Sites like Facebook
allow kids—and adults—to share photos and videos of themselves, as well as
have conversations with friends and strangers. If your kids share something with
friends, it's still possible for it to get into the wrong hands. Generally, they should
only post something online if they're comfortable with everyone in the world
seeing it.
• Talk to your kids about Internet use. Talk to your kids regularly about how
they use the Internet. If they're in the habit of talking to you about the Internet,
they'll be more willing to come to you if there's a problem.
Module 7
MODULE 7- MOBILE DEVICE SAFETY
1. Mobile security guidelines and tools.
Mobile Device Security refers to the measures designed to protect sensitive information
stored on and transmitted by laptops, smartphones, tablets, wearables, and other portable
devices. At the root of mobile device security is the goal of keeping unauthorized users
from accessing the enterprise network.
Mobile devices have become an integral part of our daily lives, with more people relying
on them for tasks such as communication, online banking, and e-commerce. However,
this increased reliance on mobile devices has also made them a prime target for
cybercriminals who seek to exploit vulnerabilities in the mobile device ecosystem. In this
context, mobile security refers to the measures that are taken to protect mobile devices
and the data they contain from cyber threats.
Examples of Mobile Devices include, tablets, laptops, wearable devices such as smart
watches and fitness trackers, handheld game consoles, smart phones.
Kinds of Sensitive Data Stored on Mobile Devices
Mobile devices can store various kinds of sensitive data that could be of interest to cyber
criminals:
Threats to mobile devices can be categorized into four (4) main sections.
a. Web-based Threats
• Malicious Websites: Malicious websites can infect mobile devices with malware,
spyware, or viruses, often through drive-by downloads or social engineering tactics.
• Phishing: Phishing attacks can target mobile device users through fake emails, text
messages, or social media accounts, tricking users into revealing sensitive information
or installing malware.
• Drive-By Downloads: Drive-by downloads occur when malware is automatically
downloaded and installed on a mobile device when visiting a malicious website or
clicking on a malicious link.
• Man-in-the-Middle (MitM) Attacks: MitM attacks can intercept mobile device traffic
and steal sensitive information, such as login credentials or financial data when surfing
the web on an unsecured network.
b. App-based Threats
• Rogue Apps: Rogue apps are malicious apps that masquerade as legitimate apps on
app stores, but actually perform malicious activities, such as stealing data or displaying
unwanted ads. They can also be downloaded from third-party app stores or other
sources.
• Unpatched Vulnerabilities: Unpatched vulnerabilities in mobile apps can be
exploited by attackers to gain access to sensitive information or perform other
malicious activities.
c. Network-based threats
• Man-in-the-Middle (MitM) Attacks: Public Wi-Fi networks and other unsecured
networks can be used by cybercriminals to intercept and steal sensitive information
through MitM attacks.
• Unattended Network Connection: Wireless networks and communications
protocols (Bluetooth, Wi-Fi and location services) when turned on and not attended to
can open up a mobile device to various forms of attacks by cybercriminals.
d. Physical Threats
• Theft: Mobile devices are often targeted by thieves due to their high value and
portability, and the theft of a mobile device can result in the loss of sensitive
information or data.
• Loss: Losing a mobile device can also result in the loss of sensitive information or data,
especially if the device is not password-protected or encrypted.
• Shoulder Surfing: Shoulder surfing is a type of physical threat to mobile device
security that involves an attacker looking over the shoulder of a mobile device user to
obtain sensitive information, such as login credentials or personal data. Shoulder surfing
can occur in public places, such as coffee shops, airports, or trains, where mobile device
users may be using their devices near others.
By implementing these countermeasures, users can enhance the security of their mobile
devices and protect their sensitive data from cyber threats.
Measures that parents can take to protect their children's mobile devices:
1. Use parental controls: Most mobile devices have built-in parental control features
that can help parents restrict access to certain apps or content, set time limits, and
monitor their child's online activity.
2. Limit access to sensitive information: Parents/guardians should ensure that their
child's mobile device does not contain sensitive information, such as credit card
numbers, social security numbers, or other personal information.
3. Install security software: Parents/guardians should install antivirus software on their
child's mobile device to protect against malware and other security threats.
4. Check age rating for online accounts and app: Parents/guardians need to check
the age rating of apps and ensure to sign up with the right ages of the child. This helps
the app administrators to filter contents and protect children.
5. Teach safe online behaviour: Parents/guardians should educate their children
about safe online behaviour, such as not sharing personal information, not accepting
friend requests from strangers, and avoiding inappropriate content.
6. Monitor online activity: Parents/guardians should monitor their child's online activity
and review their browsing history and social media activity to ensure that they are not
accessing inappropriate content or communicating with strangers.
7. Use privacy settings: Parents/guardians should adjust privacy settings on their
child's mobile device and social media accounts to limit who can see their child's posts
and information.
8. Use strong passwords: Parents/guardians should ensure that their child's mobile
device is protected by a strong password or PIN code to prevent unauthorized access.
9. Keep software updated: Parents/guardians should ensure that their child's mobile
device is always running the latest software updates to ensure that any security
vulnerabilities are addressed.
10. Use secure networks: Parents/guardians should ensure that their child's mobile
device is only connected to secure and trusted networks, such as their home Wi-Fi
network.
Overall, by implementing these measures, parents can help protect their child's mobile
device and ensure that they are using it safely and responsibly.
Mobile platform hacking refers to the process of exploiting vulnerabilities in the software
or hardware of a mobile device's operating system to gain unauthorized access or control
over the device.
h. Phishing: Phishing is a social engineering attack in which attackers trick users into
giving away sensitive information such as usernames and passwords.
j. VPN: A Virtual Private Network (VPN) is a secure connection between a mobile device
and a remote server. A VPN can be used to encrypt traffic and protect a user's privacy
while using public Wi-Fi networks.
Types of Phishing
• Email phishing is the email means of phishing to urge the victim to reply or follow-up on an
email request via web links, phone numbers, or malware attachments.
• Angler Phishing takes place on social media, where an attacker imitates a trusted company
customer service team. The attacker intercept communication between a customer and an
institution to hijack and divert conservation in private messages to advance attacks.
• Search engine phishing attempts to place links to fake websites at the top of search results.
• User Resource Locator (URL) phishing links tempt victims to click on phishing websites. URL
links are usually delivered in emails, text messages, social media messages and online
advertisements.
• Vishing (short for Voice phishing) occurs when a fraudster attempts to trick a victim into
discussing sensitive information or giving them access to the victim’s computer over the
telephone. One popular vishing scheme involves the attacker calling victims and pretending
to be from a telecommunication company.
• Smishing (short for Voice phishing or SMS phishing) occurs when a fraudster attempts to
trick a victim into discussing sensitive information or giving them access to the victim’s
computer through SMS or text messaging.
2 Pretexting Pretexting is a type of social engineering where the attacker creates a scenario where the victim
feels compelled to comply under false pretenses. Typically, the attacker will impersonate someone
in a powerful position to persuade the victim to follow their orders.
Pretexting uses a deceptive identity as the “pretext” for establishing trust, such as directly
impersonating a vendor or a facility employee. This approach requires the attacker to interact with
you more proactively. The exploit follows once the attacker have convinced the victim that they are
legitimate.
3 Baiting
Baiting puts something enticing or curious in front of the victim to lure them into the
social engineering trap.
Baiting abuses the victim’s natural curiosity to coax them into exposing valuable
information to the attacker.
Methods of Baiting can include:
Use of USB drives left in public spaces like libraries and parking lots.
Email attachments including details on a free offer or fraudulent free software.
4 Quid Pro Quo Quid pro quo is a term which means “a favor for a favor”, an exchange of personal information for
Attacks some reward or other compensation. The exploit comes from getting the victim excited for
something valuable that comes with a low investment from the victim. However, the attacker simply
takes the victim’s data with no reward or compensation for the victim.
6 Tailgating Tailgating is a social engineering attack used to gain physical access to an unauthorized location.
Tailgating is achieved by closely following an authorized user into the area without being noticed
by the authorized user.
7 Piggybacking Piggybacking is a social engineering attack used to gain physical access to an unauthorized location
by following an authorized person who has legitimate access.
8 Shoulder surfing Shoulder surfing is a social engineering technique used by attackers to obtain sensitive information,
such as passwords or credit card numbers, by looking over someone’s shoulder as they enter or access
the information.
Stages of Social Engineering
1. Prepare by gathering background information on you or a larger group you are
a part of.
2. Infiltrate by establishing a relationship or initiating an interaction, starting by
building trust.
3. Exploit the victim once trust and weakness are established to advance the
attack.
4. Disengage once the user has taken the desired action.
.
How to Spot Social Engineering Attacks
Defending against social engineering requires you to practice self-
awareness. Always slow down and think before doing anything or
responding.
Attackers expect you to take action before considering the risks, which
means you should do the opposite. To prevent being a victim of social
engineering attacks, look out for these questions:
• Did this message come from a legitimate sender? Inspect email addresses
and social media profiles carefully when getting a suspect message. There may
be characters that mimic others, such as “[email protected]” instead of
“[email protected].” Fake social media profiles that duplicate your friend’s
picture and other details are also common.
• Did my friend actually send this message to me? It’s always good to ask
the sender if they were the true sender of the message in question. Whether it
was a co-worker or another person in your life, ask them in-person or via a
phone call if possible. They may be hacked and not know, or someone may be
impersonating their accounts.
• Does the website I’m on have odd details? Irregularities in the URL, poor
image quality, old or incorrect company logos, and webpage typos can all be red
flags of a fraudulent website. If you enter a spoofed website, be sure to leave
immediately.
• Does this offer sound too good to be true? In the case of giveaways or other
targeting methods, offers are a strong motivation to drive a social engineering
attack forward. You should consider why someone is offering you something of
value for little gain on their end. Be wary at all times because even basic data like
your email address can be harvested and sold to unsavoury advertisers.
• Are attachments or links suspicious? If a link or file name appears vague or
odd in a message, reconsider the authenticity of the whole communication. Also,
consider if the message itself was sent in an odd context, or time, or raises any
other red flags.
• Can this person prove their identity? If you cannot get this person to verify
their identity with the organization, they claim to be a part of, do not allow them
the access they are asking for. This applies both in-person and online, as physical
breaches require that you overlook the attacker’s identity.
• Protection against social engineering starts with education. If all users are aware
of the threats, our safety as a collective society will improve. Be sure to increase
awareness of these risks by sharing what you’ve learned with your coworkers, family, and
friends.
Module 9
MODULE 9- COP LEGAL
MODULE 9- COP LEGAL
The Cybersecurity Act, 2020, (1038) established the Cyber Security
Authority (CSA) to regulate Cybersecurity activities and promote the
development of Cybersecurity in the country. Pursuant to section 4(j) of
the Cybersecurity Act, 2020 (Act 1038), the CSA is mandated to promote
the protection of children online.
There are provisions in the act that protect children, that is section 62-
68.