Difference between revisions of "AY Honors/Cybersecurity (SSD)/Requirements"
(+ Reqs. for Cybersecurity AY Honor, from the SSD) |
(Marked this version for translation) |
||
Line 3: | Line 3: | ||
<section begin=Body /> | <section begin=Body /> | ||
− | <b>1. <section begin=req1 /><noinclude><translate></noinclude>Have the Internet Honor. | + | <b>1. <section begin=req1 /><noinclude><translate><!--T:1--> |
+ | </noinclude>Have the Internet Honor. | ||
<noinclude></translate></noinclude><section end=req1 /></b> | <noinclude></translate></noinclude><section end=req1 /></b> | ||
− | <b>2. <section begin=req2 /><noinclude><translate></noinclude>Explain what is cybersecurity. | + | <b>2. <section begin=req2 /><noinclude><translate><!--T:2--> |
+ | </noinclude>Explain what is cybersecurity. | ||
<noinclude></translate></noinclude><section end=req2 /></b> | <noinclude></translate></noinclude><section end=req2 /></b> | ||
− | <b>3. <section begin=req3 /><noinclude><translate></noinclude>Define the following sub-categories of cybersecurity: | + | <b>3. <section begin=req3 /><noinclude><translate><!--T:3--> |
+ | </noinclude>Define the following sub-categories of cybersecurity: | ||
<noinclude></translate></noinclude><section end=req3 /></b> | <noinclude></translate></noinclude><section end=req3 /></b> | ||
− | :<b>a. <section begin=req3a /><noinclude><translate></noinclude>Network security | + | :<b>a. <section begin=req3a /><noinclude><translate><!--T:4--> |
+ | </noinclude>Network security | ||
<noinclude></translate></noinclude><section end=req3a /></b> | <noinclude></translate></noinclude><section end=req3a /></b> | ||
− | :<b>b. <section begin=req3b /><noinclude><translate></noinclude>Application security | + | :<b>b. <section begin=req3b /><noinclude><translate><!--T:5--> |
+ | </noinclude>Application security | ||
<noinclude></translate></noinclude><section end=req3b /></b> | <noinclude></translate></noinclude><section end=req3b /></b> | ||
− | :<b>c. <section begin=req3c /><noinclude><translate></noinclude>Information or data security | + | :<b>c. <section begin=req3c /><noinclude><translate><!--T:6--> |
+ | </noinclude>Information or data security | ||
<noinclude></translate></noinclude><section end=req3c /></b> | <noinclude></translate></noinclude><section end=req3c /></b> | ||
− | :<b>d. <section begin=req3d /><noinclude><translate></noinclude>Operational security | + | :<b>d. <section begin=req3d /><noinclude><translate><!--T:7--> |
+ | </noinclude>Operational security | ||
<noinclude></translate></noinclude><section end=req3d /></b> | <noinclude></translate></noinclude><section end=req3d /></b> | ||
− | :<b>e. <section begin=req3e /><noinclude><translate></noinclude>Cloud security | + | :<b>e. <section begin=req3e /><noinclude><translate><!--T:8--> |
+ | </noinclude>Cloud security | ||
<noinclude></translate></noinclude><section end=req3e /></b> | <noinclude></translate></noinclude><section end=req3e /></b> | ||
− | :<b>f. <section begin=req3f /><noinclude><translate></noinclude>Disaster recovery and business continuity | + | :<b>f. <section begin=req3f /><noinclude><translate><!--T:9--> |
+ | </noinclude>Disaster recovery and business continuity | ||
<noinclude></translate></noinclude><section end=req3f /></b> | <noinclude></translate></noinclude><section end=req3f /></b> | ||
− | :<b>g. <section begin=req3g /><noinclude><translate></noinclude>End-user education | + | :<b>g. <section begin=req3g /><noinclude><translate><!--T:10--> |
+ | </noinclude>End-user education | ||
<noinclude></translate></noinclude><section end=req3g /></b> | <noinclude></translate></noinclude><section end=req3g /></b> | ||
− | <b>4. <section begin=req4 /><noinclude><translate></noinclude>Explain the three classification of cyber threats. | + | <b>4. <section begin=req4 /><noinclude><translate><!--T:11--> |
+ | </noinclude>Explain the three classification of cyber threats. | ||
<noinclude></translate></noinclude><section end=req4 /></b> | <noinclude></translate></noinclude><section end=req4 /></b> | ||
− | :<b>a. <section begin=req4a /><noinclude><translate></noinclude>Cybercrime | + | :<b>a. <section begin=req4a /><noinclude><translate><!--T:12--> |
+ | </noinclude>Cybercrime | ||
<noinclude></translate></noinclude><section end=req4a /></b> | <noinclude></translate></noinclude><section end=req4a /></b> | ||
− | :<b>b. <section begin=req4b /><noinclude><translate></noinclude>Cyber-attack | + | :<b>b. <section begin=req4b /><noinclude><translate><!--T:13--> |
+ | </noinclude>Cyber-attack | ||
<noinclude></translate></noinclude><section end=req4b /></b> | <noinclude></translate></noinclude><section end=req4b /></b> | ||
− | :<b>c. <section begin=req4c /><noinclude><translate></noinclude>Cyberterrorism | + | :<b>c. <section begin=req4c /><noinclude><translate><!--T:14--> |
+ | </noinclude>Cyberterrorism | ||
<noinclude></translate></noinclude><section end=req4c /></b> | <noinclude></translate></noinclude><section end=req4c /></b> | ||
− | <b>5. <section begin=req5 /><noinclude><translate></noinclude>Define the following cyber threats: | + | <b>5. <section begin=req5 /><noinclude><translate><!--T:15--> |
+ | </noinclude>Define the following cyber threats: | ||
<noinclude></translate></noinclude><section end=req5 /></b> | <noinclude></translate></noinclude><section end=req5 /></b> | ||
− | :<b>a. <section begin=req5a /><noinclude><translate></noinclude>Malware | + | :<b>a. <section begin=req5a /><noinclude><translate><!--T:16--> |
+ | </noinclude>Malware | ||
<noinclude></translate></noinclude><section end=req5a /></b> | <noinclude></translate></noinclude><section end=req5a /></b> | ||
− | :<b>b. <section begin=req5b /><noinclude><translate></noinclude>SQL injection | + | :<b>b. <section begin=req5b /><noinclude><translate><!--T:17--> |
+ | </noinclude>SQL injection | ||
<noinclude></translate></noinclude><section end=req5b /></b> | <noinclude></translate></noinclude><section end=req5b /></b> | ||
− | :<b>c. <section begin=req5c /><noinclude><translate></noinclude>Social engineering | + | :<b>c. <section begin=req5c /><noinclude><translate><!--T:18--> |
+ | </noinclude>Social engineering | ||
<noinclude></translate></noinclude><section end=req5c /></b> | <noinclude></translate></noinclude><section end=req5c /></b> | ||
− | :<b>d. <section begin=req5d /><noinclude><translate></noinclude>Phishing | + | :<b>d. <section begin=req5d /><noinclude><translate><!--T:19--> |
+ | </noinclude>Phishing | ||
<noinclude></translate></noinclude><section end=req5d /></b> | <noinclude></translate></noinclude><section end=req5d /></b> | ||
− | :<b>e. <section begin=req5e /><noinclude><translate></noinclude>Spear phishing | + | :<b>e. <section begin=req5e /><noinclude><translate><!--T:20--> |
+ | </noinclude>Spear phishing | ||
<noinclude></translate></noinclude><section end=req5e /></b> | <noinclude></translate></noinclude><section end=req5e /></b> | ||
− | :<b>f. <section begin=req5f /><noinclude><translate></noinclude>Insider threats | + | :<b>f. <section begin=req5f /><noinclude><translate><!--T:21--> |
+ | </noinclude>Insider threats | ||
<noinclude></translate></noinclude><section end=req5f /></b> | <noinclude></translate></noinclude><section end=req5f /></b> | ||
− | :<b>g. <section begin=req5g /><noinclude><translate></noinclude>Man-in-the-middle (MitM) | + | :<b>g. <section begin=req5g /><noinclude><translate><!--T:22--> |
+ | </noinclude>Man-in-the-middle (MitM) | ||
<noinclude></translate></noinclude><section end=req5g /></b> | <noinclude></translate></noinclude><section end=req5g /></b> | ||
− | :<b>h. <section begin=req5h /><noinclude><translate></noinclude>Distributed denial-of-service (DDoS) | + | :<b>h. <section begin=req5h /><noinclude><translate><!--T:23--> |
+ | </noinclude>Distributed denial-of-service (DDoS) | ||
<noinclude></translate></noinclude><section end=req5h /></b> | <noinclude></translate></noinclude><section end=req5h /></b> | ||
− | :<b>i. <section begin=req5i /><noinclude><translate></noinclude>Advanced persistent threats (APTs) | + | :<b>i. <section begin=req5i /><noinclude><translate><!--T:24--> |
+ | </noinclude>Advanced persistent threats (APTs) | ||
<noinclude></translate></noinclude><section end=req5i /></b> | <noinclude></translate></noinclude><section end=req5i /></b> | ||
− | :<b>j. <section begin=req5j /><noinclude><translate></noinclude>Romance scams | + | :<b>j. <section begin=req5j /><noinclude><translate><!--T:25--> |
+ | </noinclude>Romance scams | ||
<noinclude></translate></noinclude><section end=req5j /></b> | <noinclude></translate></noinclude><section end=req5j /></b> | ||
− | :<b>k. <section begin=req5k /><noinclude><translate></noinclude>Cryptojacking | + | :<b>k. <section begin=req5k /><noinclude><translate><!--T:26--> |
+ | </noinclude>Cryptojacking | ||
<noinclude></translate></noinclude><section end=req5k /></b> | <noinclude></translate></noinclude><section end=req5k /></b> | ||
− | :<b>l. <section begin=req5l /><noinclude><translate></noinclude>Zero-day exploits | + | :<b>l. <section begin=req5l /><noinclude><translate><!--T:27--> |
+ | </noinclude>Zero-day exploits | ||
<noinclude></translate></noinclude><section end=req5l /></b> | <noinclude></translate></noinclude><section end=req5l /></b> | ||
− | :<b>m. <section begin=req5m /><noinclude><translate></noinclude>DNS Tunneling | + | :<b>m. <section begin=req5m /><noinclude><translate><!--T:28--> |
+ | </noinclude>DNS Tunneling | ||
<noinclude></translate></noinclude><section end=req5m /></b> | <noinclude></translate></noinclude><section end=req5m /></b> | ||
− | <b>6. <section begin=req6 /><noinclude><translate></noinclude>Define the following types of malware: | + | <b>6. <section begin=req6 /><noinclude><translate><!--T:29--> |
+ | </noinclude>Define the following types of malware: | ||
<noinclude></translate></noinclude><section end=req6 /></b> | <noinclude></translate></noinclude><section end=req6 /></b> | ||
− | :<b>a. <section begin=req6a /><noinclude><translate></noinclude>Virus | + | :<b>a. <section begin=req6a /><noinclude><translate><!--T:30--> |
+ | </noinclude>Virus | ||
<noinclude></translate></noinclude><section end=req6a /></b> | <noinclude></translate></noinclude><section end=req6a /></b> | ||
− | :<b>b. <section begin=req6b /><noinclude><translate></noinclude>Trojans | + | :<b>b. <section begin=req6b /><noinclude><translate><!--T:31--> |
+ | </noinclude>Trojans | ||
<noinclude></translate></noinclude><section end=req6b /></b> | <noinclude></translate></noinclude><section end=req6b /></b> | ||
− | :<b>c. <section begin=req6c /><noinclude><translate></noinclude>Spyware | + | :<b>c. <section begin=req6c /><noinclude><translate><!--T:32--> |
+ | </noinclude>Spyware | ||
<noinclude></translate></noinclude><section end=req6c /></b> | <noinclude></translate></noinclude><section end=req6c /></b> | ||
− | :<b>d. <section begin=req6d /><noinclude><translate></noinclude>Ransomware | + | :<b>d. <section begin=req6d /><noinclude><translate><!--T:33--> |
+ | </noinclude>Ransomware | ||
<noinclude></translate></noinclude><section end=req6d /></b> | <noinclude></translate></noinclude><section end=req6d /></b> | ||
− | :<b>e. <section begin=req6e /><noinclude><translate></noinclude>Adware | + | :<b>e. <section begin=req6e /><noinclude><translate><!--T:34--> |
+ | </noinclude>Adware | ||
<noinclude></translate></noinclude><section end=req6e /></b> | <noinclude></translate></noinclude><section end=req6e /></b> | ||
− | :<b>f. <section begin=req6f /><noinclude><translate></noinclude>Botnets | + | :<b>f. <section begin=req6f /><noinclude><translate><!--T:35--> |
+ | </noinclude>Botnets | ||
<noinclude></translate></noinclude><section end=req6f /></b> | <noinclude></translate></noinclude><section end=req6f /></b> | ||
− | :<b>g. <section begin=req6g /><noinclude><translate></noinclude>Worm | + | :<b>g. <section begin=req6g /><noinclude><translate><!--T:36--> |
+ | </noinclude>Worm | ||
<noinclude></translate></noinclude><section end=req6g /></b> | <noinclude></translate></noinclude><section end=req6g /></b> | ||
− | :<b>h. <section begin=req6h /><noinclude><translate></noinclude>Dridex | + | :<b>h. <section begin=req6h /><noinclude><translate><!--T:37--> |
+ | </noinclude>Dridex | ||
<noinclude></translate></noinclude><section end=req6h /></b> | <noinclude></translate></noinclude><section end=req6h /></b> | ||
− | :<b>i. <section begin=req6i /><noinclude><translate></noinclude>Emotet | + | :<b>i. <section begin=req6i /><noinclude><translate><!--T:38--> |
+ | </noinclude>Emotet | ||
<noinclude></translate></noinclude><section end=req6i /></b> | <noinclude></translate></noinclude><section end=req6i /></b> | ||
− | <b>7. <section begin=req7 /><noinclude><translate></noinclude>Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet: | + | <b>7. <section begin=req7 /><noinclude><translate><!--T:39--> |
+ | </noinclude>Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet: | ||
<noinclude></translate></noinclude><section end=req7 /></b> | <noinclude></translate></noinclude><section end=req7 /></b> | ||
− | :<b>a. <section begin=req7a /><noinclude><translate></noinclude>Keep your software up-to-date | + | :<b>a. <section begin=req7a /><noinclude><translate><!--T:40--> |
+ | </noinclude>Keep your software up-to-date | ||
<noinclude></translate></noinclude><section end=req7a /></b> | <noinclude></translate></noinclude><section end=req7a /></b> | ||
− | :<b>b. <section begin=req7b /><noinclude><translate></noinclude>Use anti-virus protection and firewall | + | :<b>b. <section begin=req7b /><noinclude><translate><!--T:41--> |
+ | </noinclude>Use anti-virus protection and firewall | ||
<noinclude></translate></noinclude><section end=req7b /></b> | <noinclude></translate></noinclude><section end=req7b /></b> | ||
− | :<b>c. <section begin=req7c /><noinclude><translate></noinclude>Use strong passwords and use a password management tool | + | :<b>c. <section begin=req7c /><noinclude><translate><!--T:42--> |
+ | </noinclude>Use strong passwords and use a password management tool | ||
<noinclude></translate></noinclude><section end=req7c /></b> | <noinclude></translate></noinclude><section end=req7c /></b> | ||
− | :<b>d. <section begin=req7d /><noinclude><translate></noinclude>Use two-factor or multi-factor authentication | + | :<b>d. <section begin=req7d /><noinclude><translate><!--T:43--> |
+ | </noinclude>Use two-factor or multi-factor authentication | ||
<noinclude></translate></noinclude><section end=req7d /></b> | <noinclude></translate></noinclude><section end=req7d /></b> | ||
− | :<b>e. <section begin=req7e /><noinclude><translate></noinclude>Learn about phishing scams – be very suspicious of emails, phone calls, and flyers | + | :<b>e. <section begin=req7e /><noinclude><translate><!--T:44--> |
+ | </noinclude>Learn about phishing scams – be very suspicious of emails, phone calls, and flyers | ||
<noinclude></translate></noinclude><section end=req7e /></b> | <noinclude></translate></noinclude><section end=req7e /></b> | ||
− | :<b>f. <section begin=req7f /><noinclude><translate></noinclude>Protect your sensitive personal identifiable information (PII) | + | :<b>f. <section begin=req7f /><noinclude><translate><!--T:45--> |
+ | </noinclude>Protect your sensitive personal identifiable information (PII) | ||
<noinclude></translate></noinclude><section end=req7f /></b> | <noinclude></translate></noinclude><section end=req7f /></b> | ||
− | :<b>g. <section begin=req7g /><noinclude><translate></noinclude>Use your mobile devices securely | + | :<b>g. <section begin=req7g /><noinclude><translate><!--T:46--> |
+ | </noinclude>Use your mobile devices securely | ||
<noinclude></translate></noinclude><section end=req7g /></b> | <noinclude></translate></noinclude><section end=req7g /></b> | ||
− | :<b>h. <section begin=req7h /><noinclude><translate></noinclude>Backup your data regularly | + | :<b>h. <section begin=req7h /><noinclude><translate><!--T:47--> |
+ | </noinclude>Backup your data regularly | ||
<noinclude></translate></noinclude><section end=req7h /></b> | <noinclude></translate></noinclude><section end=req7h /></b> | ||
− | :<b>i. <section begin=req7i /><noinclude><translate></noinclude>Don’t use public Wi-Fi | + | :<b>i. <section begin=req7i /><noinclude><translate><!--T:48--> |
+ | </noinclude>Don’t use public Wi-Fi | ||
<noinclude></translate></noinclude><section end=req7i /></b> | <noinclude></translate></noinclude><section end=req7i /></b> | ||
− | :<b>j. <section begin=req7j /><noinclude><translate></noinclude>Review your online accounts and credit reports regularly for changes | + | :<b>j. <section begin=req7j /><noinclude><translate><!--T:49--> |
+ | </noinclude>Review your online accounts and credit reports regularly for changes | ||
<noinclude></translate></noinclude><section end=req7j /></b> | <noinclude></translate></noinclude><section end=req7j /></b> | ||
− | <b>8. <section begin=req8 /><noinclude><translate></noinclude>Explain the following precautionary measures an individual can take to protect | + | <b>8. <section begin=req8 /><noinclude><translate><!--T:50--> |
+ | </noinclude>Explain the following precautionary measures an individual can take to protect | ||
themselves while using their smartphone: | themselves while using their smartphone: | ||
<noinclude></translate></noinclude><section end=req8 /></b> | <noinclude></translate></noinclude><section end=req8 /></b> | ||
− | :<b>a. <section begin=req8a /><noinclude><translate></noinclude>Use a strong pin or password on your smartphone | + | :<b>a. <section begin=req8a /><noinclude><translate><!--T:51--> |
+ | </noinclude>Use a strong pin or password on your smartphone | ||
<noinclude></translate></noinclude><section end=req8a /></b> | <noinclude></translate></noinclude><section end=req8a /></b> | ||
− | :<b>b. <section begin=req8b /><noinclude><translate></noinclude>Enable biometric logins to your smartphone | + | :<b>b. <section begin=req8b /><noinclude><translate><!--T:52--> |
+ | </noinclude>Enable biometric logins to your smartphone | ||
<noinclude></translate></noinclude><section end=req8b /></b> | <noinclude></translate></noinclude><section end=req8b /></b> | ||
− | :<b>c. <section begin=req8c /><noinclude><translate></noinclude>Disable Wi-Fi and/or Bluetooth when you don’t need them | + | :<b>c. <section begin=req8c /><noinclude><translate><!--T:53--> |
+ | </noinclude>Disable Wi-Fi and/or Bluetooth when you don’t need them | ||
<noinclude></translate></noinclude><section end=req8c /></b> | <noinclude></translate></noinclude><section end=req8c /></b> | ||
− | :<b>d. <section begin=req8d /><noinclude><translate></noinclude>Be careful of the apps you download and the services you allow them to access | + | :<b>d. <section begin=req8d /><noinclude><translate><!--T:54--> |
+ | </noinclude>Be careful of the apps you download and the services you allow them to access | ||
<noinclude></translate></noinclude><section end=req8d /></b> | <noinclude></translate></noinclude><section end=req8d /></b> | ||
− | :<b>e. <section begin=req8e /><noinclude><translate></noinclude>Disable location services when you don’t need them | + | :<b>e. <section begin=req8e /><noinclude><translate><!--T:55--> |
+ | </noinclude>Disable location services when you don’t need them | ||
<noinclude></translate></noinclude><section end=req8e /></b> | <noinclude></translate></noinclude><section end=req8e /></b> | ||
− | :<b>f. <section begin=req8f /><noinclude><translate></noinclude>Be careful about where you plug your smartphone | + | :<b>f. <section begin=req8f /><noinclude><translate><!--T:56--> |
+ | </noinclude>Be careful about where you plug your smartphone | ||
<noinclude></translate></noinclude><section end=req8f /></b> | <noinclude></translate></noinclude><section end=req8f /></b> | ||
− | :<b>g. <section begin=req8g /><noinclude><translate></noinclude>Employ remote wiping software | + | :<b>g. <section begin=req8g /><noinclude><translate><!--T:57--> |
+ | </noinclude>Employ remote wiping software | ||
<noinclude></translate></noinclude><section end=req8g /></b> | <noinclude></translate></noinclude><section end=req8g /></b> | ||
− | :<b>h. <section begin=req8h /><noinclude><translate></noinclude>Backup your smartphone often | + | :<b>h. <section begin=req8h /><noinclude><translate><!--T:58--> |
+ | </noinclude>Backup your smartphone often | ||
<noinclude></translate></noinclude><section end=req8h /></b> | <noinclude></translate></noinclude><section end=req8h /></b> | ||
− | <b>9. <section begin=req9 /><noinclude><translate></noinclude>Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses. | + | <b>9. <section begin=req9 /><noinclude><translate><!--T:59--> |
+ | </noinclude>Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses. | ||
<noinclude></translate></noinclude><section end=req9 /></b> | <noinclude></translate></noinclude><section end=req9 /></b> | ||
− | :<b>a. <section begin=req9a /><noinclude><translate></noinclude>Hebrews 13:5-6 | + | :<b>a. <section begin=req9a /><noinclude><translate><!--T:60--> |
+ | </noinclude>Hebrews 13:5-6 | ||
<noinclude></translate></noinclude><section end=req9a /></b> | <noinclude></translate></noinclude><section end=req9a /></b> | ||
− | :<b>b. <section begin=req9b /><noinclude><translate></noinclude>Psalm 121:3-5 | + | :<b>b. <section begin=req9b /><noinclude><translate><!--T:61--> |
+ | </noinclude>Psalm 121:3-5 | ||
<noinclude></translate></noinclude><section end=req9b /></b> | <noinclude></translate></noinclude><section end=req9b /></b> | ||
− | :<b>c. <section begin=req9c /><noinclude><translate></noinclude>Proverbs 11:15 | + | :<b>c. <section begin=req9c /><noinclude><translate><!--T:62--> |
+ | </noinclude>Proverbs 11:15 | ||
<noinclude></translate></noinclude><section end=req9c /></b> | <noinclude></translate></noinclude><section end=req9c /></b> | ||
− | :<b>d. <section begin=req9d /><noinclude><translate></noinclude>Acts 20:28 | + | :<b>d. <section begin=req9d /><noinclude><translate><!--T:63--> |
+ | </noinclude>Acts 20:28 | ||
<noinclude></translate></noinclude><section end=req9d /></b> | <noinclude></translate></noinclude><section end=req9d /></b> | ||
<section begin=challenge /> | <section begin=challenge /> | ||
− | <b>10. <section begin=req10 /><noinclude><translate></noinclude>Do two of the following: | + | <b>10. <section begin=req10 /><noinclude><translate><!--T:64--> |
+ | </noinclude>Do two of the following: | ||
<noinclude></translate></noinclude><section end=req10 /></b> | <noinclude></translate></noinclude><section end=req10 /></b> | ||
− | :<b>a. <section begin=req10a /><noinclude><translate></noinclude>Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet. | + | :<b>a. <section begin=req10a /><noinclude><translate><!--T:65--> |
+ | </noinclude>Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet. | ||
<noinclude></translate></noinclude><section end=req10a /></b> | <noinclude></translate></noinclude><section end=req10a /></b> | ||
− | :<b>b. <section begin=req10b /><noinclude><translate></noinclude>Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet. | + | :<b>b. <section begin=req10b /><noinclude><translate><!--T:66--> |
+ | </noinclude>Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet. | ||
<noinclude></translate></noinclude><section end=req10b /></b> | <noinclude></translate></noinclude><section end=req10b /></b> | ||
− | :<b>c. <section begin=req10c /><noinclude><translate></noinclude>Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet. | + | :<b>c. <section begin=req10c /><noinclude><translate><!--T:67--> |
+ | </noinclude>Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet. | ||
<noinclude></translate></noinclude><section end=req10c /></b> | <noinclude></translate></noinclude><section end=req10c /></b> | ||
− | :<b>d. <section begin=req10d /><noinclude><translate></noinclude>Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words. | + | :<b>d. <section begin=req10d /><noinclude><translate><!--T:68--> |
+ | </noinclude>Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words. | ||
<noinclude></translate></noinclude><section end=req10d /></b> | <noinclude></translate></noinclude><section end=req10d /></b> | ||
− | :<b>e. <section begin=req10e /><noinclude><translate></noinclude>Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats. | + | :<b>e. <section begin=req10e /><noinclude><translate><!--T:69--> |
+ | </noinclude>Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats. | ||
<noinclude></translate></noinclude><section end=req10e /></b> | <noinclude></translate></noinclude><section end=req10e /></b> | ||
<section end=challenge /> | <section end=challenge /> | ||
<section end=Body /> | <section end=Body /> |
Latest revision as of 19:29, 11 February 2025
Skill Level
3
Year
2024
Version
06.10.2025
Approval authority
Southern Asia-Pacific Division
1. Have the Internet Honor.
2. Explain what is cybersecurity.
3. Define the following sub-categories of cybersecurity:
- a. Network security
- b. Application security
- c. Information or data security
- d. Operational security
- e. Cloud security
- f. Disaster recovery and business continuity
- g. End-user education
4. Explain the three classification of cyber threats.
- a. Cybercrime
- b. Cyber-attack
- c. Cyberterrorism
5. Define the following cyber threats:
- a. Malware
- b. SQL injection
- c. Social engineering
- d. Phishing
- e. Spear phishing
- f. Insider threats
- g. Man-in-the-middle (MitM)
- h. Distributed denial-of-service (DDoS)
- i. Advanced persistent threats (APTs)
- j. Romance scams
- k. Cryptojacking
- l. Zero-day exploits
- m. DNS Tunneling
6. Define the following types of malware:
- a. Virus
- b. Trojans
- c. Spyware
- d. Ransomware
- e. Adware
- f. Botnets
- g. Worm
- h. Dridex
- i. Emotet
7. Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet:
- a. Keep your software up-to-date
- b. Use anti-virus protection and firewall
- c. Use strong passwords and use a password management tool
- d. Use two-factor or multi-factor authentication
- e. Learn about phishing scams – be very suspicious of emails, phone calls, and flyers
- f. Protect your sensitive personal identifiable information (PII)
- g. Use your mobile devices securely
- h. Backup your data regularly
- i. Don’t use public Wi-Fi
- j. Review your online accounts and credit reports regularly for changes
8. Explain the following precautionary measures an individual can take to protect themselves while using their smartphone:
- a. Use a strong pin or password on your smartphone
- b. Enable biometric logins to your smartphone
- c. Disable Wi-Fi and/or Bluetooth when you don’t need them
- d. Be careful of the apps you download and the services you allow them to access
- e. Disable location services when you don’t need them
- f. Be careful about where you plug your smartphone
- g. Employ remote wiping software
- h. Backup your smartphone often
9. Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses.
- a. Hebrews 13:5-6
- b. Psalm 121:3-5
- c. Proverbs 11:15
- d. Acts 20:28
10. Do two of the following:
- a. Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet.
- b. Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet.
- c. Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet.
- d. Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words.
- e. Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats.