Difference between revisions of "AY Honors/Cybersecurity (SSD)/Requirements"

From Pathfinder Wiki
< AY Honors‎ | Cybersecurity (SSD)AY Honors/Cybersecurity (SSD)/Requirements
(+ Reqs. for Cybersecurity AY Honor, from the SSD)
 
(Marked this version for translation)
 
Line 3: Line 3:
 
<section begin=Body />  
 
<section begin=Body />  
  
<b>1. <section begin=req1 /><noinclude><translate></noinclude>Have the Internet Honor.
+
<b>1. <section begin=req1 /><noinclude><translate><!--T:1-->
 +
</noinclude>Have the Internet Honor.
 
<noinclude></translate></noinclude><section end=req1 /></b>
 
<noinclude></translate></noinclude><section end=req1 /></b>
  
<b>2. <section begin=req2 /><noinclude><translate></noinclude>Explain what is cybersecurity.
+
<b>2. <section begin=req2 /><noinclude><translate><!--T:2-->
 +
</noinclude>Explain what is cybersecurity.
 
<noinclude></translate></noinclude><section end=req2 /></b>
 
<noinclude></translate></noinclude><section end=req2 /></b>
  
<b>3. <section begin=req3 /><noinclude><translate></noinclude>Define the following sub-categories of cybersecurity:
+
<b>3. <section begin=req3 /><noinclude><translate><!--T:3-->
 +
</noinclude>Define the following sub-categories of cybersecurity:
 
<noinclude></translate></noinclude><section end=req3 /></b>
 
<noinclude></translate></noinclude><section end=req3 /></b>
  
:<b>a. <section begin=req3a /><noinclude><translate></noinclude>Network security
+
:<b>a. <section begin=req3a /><noinclude><translate><!--T:4-->
 +
</noinclude>Network security
 
<noinclude></translate></noinclude><section end=req3a /></b>
 
<noinclude></translate></noinclude><section end=req3a /></b>
  
:<b>b. <section begin=req3b /><noinclude><translate></noinclude>Application security
+
:<b>b. <section begin=req3b /><noinclude><translate><!--T:5-->
 +
</noinclude>Application security
 
<noinclude></translate></noinclude><section end=req3b /></b>
 
<noinclude></translate></noinclude><section end=req3b /></b>
  
:<b>c. <section begin=req3c /><noinclude><translate></noinclude>Information or data security
+
:<b>c. <section begin=req3c /><noinclude><translate><!--T:6-->
 +
</noinclude>Information or data security
 
<noinclude></translate></noinclude><section end=req3c /></b>
 
<noinclude></translate></noinclude><section end=req3c /></b>
  
:<b>d. <section begin=req3d /><noinclude><translate></noinclude>Operational security
+
:<b>d. <section begin=req3d /><noinclude><translate><!--T:7-->
 +
</noinclude>Operational security
 
<noinclude></translate></noinclude><section end=req3d /></b>
 
<noinclude></translate></noinclude><section end=req3d /></b>
  
:<b>e. <section begin=req3e /><noinclude><translate></noinclude>Cloud security
+
:<b>e. <section begin=req3e /><noinclude><translate><!--T:8-->
 +
</noinclude>Cloud security
 
<noinclude></translate></noinclude><section end=req3e /></b>
 
<noinclude></translate></noinclude><section end=req3e /></b>
  
:<b>f. <section begin=req3f /><noinclude><translate></noinclude>Disaster recovery and business continuity
+
:<b>f. <section begin=req3f /><noinclude><translate><!--T:9-->
 +
</noinclude>Disaster recovery and business continuity
 
<noinclude></translate></noinclude><section end=req3f /></b>
 
<noinclude></translate></noinclude><section end=req3f /></b>
  
:<b>g. <section begin=req3g /><noinclude><translate></noinclude>End-user education
+
:<b>g. <section begin=req3g /><noinclude><translate><!--T:10-->
 +
</noinclude>End-user education
 
<noinclude></translate></noinclude><section end=req3g /></b>
 
<noinclude></translate></noinclude><section end=req3g /></b>
  
<b>4. <section begin=req4 /><noinclude><translate></noinclude>Explain the three classification of cyber threats.
+
<b>4. <section begin=req4 /><noinclude><translate><!--T:11-->
 +
</noinclude>Explain the three classification of cyber threats.
 
<noinclude></translate></noinclude><section end=req4 /></b>
 
<noinclude></translate></noinclude><section end=req4 /></b>
  
:<b>a. <section begin=req4a /><noinclude><translate></noinclude>Cybercrime
+
:<b>a. <section begin=req4a /><noinclude><translate><!--T:12-->
 +
</noinclude>Cybercrime
 
<noinclude></translate></noinclude><section end=req4a /></b>
 
<noinclude></translate></noinclude><section end=req4a /></b>
  
:<b>b. <section begin=req4b /><noinclude><translate></noinclude>Cyber-attack
+
:<b>b. <section begin=req4b /><noinclude><translate><!--T:13-->
 +
</noinclude>Cyber-attack
 
<noinclude></translate></noinclude><section end=req4b /></b>
 
<noinclude></translate></noinclude><section end=req4b /></b>
  
:<b>c. <section begin=req4c /><noinclude><translate></noinclude>Cyberterrorism
+
:<b>c. <section begin=req4c /><noinclude><translate><!--T:14-->
 +
</noinclude>Cyberterrorism
 
<noinclude></translate></noinclude><section end=req4c /></b>
 
<noinclude></translate></noinclude><section end=req4c /></b>
  
<b>5. <section begin=req5 /><noinclude><translate></noinclude>Define the following cyber threats:
+
<b>5. <section begin=req5 /><noinclude><translate><!--T:15-->
 +
</noinclude>Define the following cyber threats:
 
<noinclude></translate></noinclude><section end=req5 /></b>
 
<noinclude></translate></noinclude><section end=req5 /></b>
  
:<b>a. <section begin=req5a /><noinclude><translate></noinclude>Malware
+
:<b>a. <section begin=req5a /><noinclude><translate><!--T:16-->
 +
</noinclude>Malware
 
<noinclude></translate></noinclude><section end=req5a /></b>
 
<noinclude></translate></noinclude><section end=req5a /></b>
  
:<b>b. <section begin=req5b /><noinclude><translate></noinclude>SQL injection
+
:<b>b. <section begin=req5b /><noinclude><translate><!--T:17-->
 +
</noinclude>SQL injection
 
<noinclude></translate></noinclude><section end=req5b /></b>
 
<noinclude></translate></noinclude><section end=req5b /></b>
  
:<b>c. <section begin=req5c /><noinclude><translate></noinclude>Social engineering
+
:<b>c. <section begin=req5c /><noinclude><translate><!--T:18-->
 +
</noinclude>Social engineering
 
<noinclude></translate></noinclude><section end=req5c /></b>
 
<noinclude></translate></noinclude><section end=req5c /></b>
  
:<b>d. <section begin=req5d /><noinclude><translate></noinclude>Phishing
+
:<b>d. <section begin=req5d /><noinclude><translate><!--T:19-->
 +
</noinclude>Phishing
 
<noinclude></translate></noinclude><section end=req5d /></b>
 
<noinclude></translate></noinclude><section end=req5d /></b>
  
:<b>e. <section begin=req5e /><noinclude><translate></noinclude>Spear phishing
+
:<b>e. <section begin=req5e /><noinclude><translate><!--T:20-->
 +
</noinclude>Spear phishing
 
<noinclude></translate></noinclude><section end=req5e /></b>
 
<noinclude></translate></noinclude><section end=req5e /></b>
  
:<b>f. <section begin=req5f /><noinclude><translate></noinclude>Insider threats
+
:<b>f. <section begin=req5f /><noinclude><translate><!--T:21-->
 +
</noinclude>Insider threats
 
<noinclude></translate></noinclude><section end=req5f /></b>
 
<noinclude></translate></noinclude><section end=req5f /></b>
  
:<b>g. <section begin=req5g /><noinclude><translate></noinclude>Man-in-the-middle (MitM)
+
:<b>g. <section begin=req5g /><noinclude><translate><!--T:22-->
 +
</noinclude>Man-in-the-middle (MitM)
 
<noinclude></translate></noinclude><section end=req5g /></b>
 
<noinclude></translate></noinclude><section end=req5g /></b>
  
:<b>h. <section begin=req5h /><noinclude><translate></noinclude>Distributed denial-of-service (DDoS)
+
:<b>h. <section begin=req5h /><noinclude><translate><!--T:23-->
 +
</noinclude>Distributed denial-of-service (DDoS)
 
<noinclude></translate></noinclude><section end=req5h /></b>
 
<noinclude></translate></noinclude><section end=req5h /></b>
  
:<b>i. <section begin=req5i /><noinclude><translate></noinclude>Advanced persistent threats (APTs)
+
:<b>i. <section begin=req5i /><noinclude><translate><!--T:24-->
 +
</noinclude>Advanced persistent threats (APTs)
 
<noinclude></translate></noinclude><section end=req5i /></b>
 
<noinclude></translate></noinclude><section end=req5i /></b>
  
:<b>j. <section begin=req5j /><noinclude><translate></noinclude>Romance scams
+
:<b>j. <section begin=req5j /><noinclude><translate><!--T:25-->
 +
</noinclude>Romance scams
 
<noinclude></translate></noinclude><section end=req5j /></b>
 
<noinclude></translate></noinclude><section end=req5j /></b>
  
:<b>k. <section begin=req5k /><noinclude><translate></noinclude>Cryptojacking
+
:<b>k. <section begin=req5k /><noinclude><translate><!--T:26-->
 +
</noinclude>Cryptojacking
 
<noinclude></translate></noinclude><section end=req5k /></b>
 
<noinclude></translate></noinclude><section end=req5k /></b>
  
:<b>l. <section begin=req5l /><noinclude><translate></noinclude>Zero-day exploits
+
:<b>l. <section begin=req5l /><noinclude><translate><!--T:27-->
 +
</noinclude>Zero-day exploits
 
<noinclude></translate></noinclude><section end=req5l /></b>
 
<noinclude></translate></noinclude><section end=req5l /></b>
  
:<b>m. <section begin=req5m /><noinclude><translate></noinclude>DNS Tunneling
+
:<b>m. <section begin=req5m /><noinclude><translate><!--T:28-->
 +
</noinclude>DNS Tunneling
 
<noinclude></translate></noinclude><section end=req5m /></b>
 
<noinclude></translate></noinclude><section end=req5m /></b>
  
<b>6. <section begin=req6 /><noinclude><translate></noinclude>Define the following types of malware:
+
<b>6. <section begin=req6 /><noinclude><translate><!--T:29-->
 +
</noinclude>Define the following types of malware:
 
<noinclude></translate></noinclude><section end=req6 /></b>
 
<noinclude></translate></noinclude><section end=req6 /></b>
  
:<b>a. <section begin=req6a /><noinclude><translate></noinclude>Virus
+
:<b>a. <section begin=req6a /><noinclude><translate><!--T:30-->
 +
</noinclude>Virus
 
<noinclude></translate></noinclude><section end=req6a /></b>
 
<noinclude></translate></noinclude><section end=req6a /></b>
  
:<b>b. <section begin=req6b /><noinclude><translate></noinclude>Trojans
+
:<b>b. <section begin=req6b /><noinclude><translate><!--T:31-->
 +
</noinclude>Trojans
 
<noinclude></translate></noinclude><section end=req6b /></b>
 
<noinclude></translate></noinclude><section end=req6b /></b>
  
:<b>c. <section begin=req6c /><noinclude><translate></noinclude>Spyware
+
:<b>c. <section begin=req6c /><noinclude><translate><!--T:32-->
 +
</noinclude>Spyware
 
<noinclude></translate></noinclude><section end=req6c /></b>
 
<noinclude></translate></noinclude><section end=req6c /></b>
  
:<b>d. <section begin=req6d /><noinclude><translate></noinclude>Ransomware
+
:<b>d. <section begin=req6d /><noinclude><translate><!--T:33-->
 +
</noinclude>Ransomware
 
<noinclude></translate></noinclude><section end=req6d /></b>
 
<noinclude></translate></noinclude><section end=req6d /></b>
  
:<b>e. <section begin=req6e /><noinclude><translate></noinclude>Adware
+
:<b>e. <section begin=req6e /><noinclude><translate><!--T:34-->
 +
</noinclude>Adware
 
<noinclude></translate></noinclude><section end=req6e /></b>
 
<noinclude></translate></noinclude><section end=req6e /></b>
  
:<b>f. <section begin=req6f /><noinclude><translate></noinclude>Botnets
+
:<b>f. <section begin=req6f /><noinclude><translate><!--T:35-->
 +
</noinclude>Botnets
 
<noinclude></translate></noinclude><section end=req6f /></b>
 
<noinclude></translate></noinclude><section end=req6f /></b>
  
:<b>g. <section begin=req6g /><noinclude><translate></noinclude>Worm
+
:<b>g. <section begin=req6g /><noinclude><translate><!--T:36-->
 +
</noinclude>Worm
 
<noinclude></translate></noinclude><section end=req6g /></b>
 
<noinclude></translate></noinclude><section end=req6g /></b>
  
:<b>h. <section begin=req6h /><noinclude><translate></noinclude>Dridex
+
:<b>h. <section begin=req6h /><noinclude><translate><!--T:37-->
 +
</noinclude>Dridex
 
<noinclude></translate></noinclude><section end=req6h /></b>
 
<noinclude></translate></noinclude><section end=req6h /></b>
  
:<b>i. <section begin=req6i /><noinclude><translate></noinclude>Emotet
+
:<b>i. <section begin=req6i /><noinclude><translate><!--T:38-->
 +
</noinclude>Emotet
 
<noinclude></translate></noinclude><section end=req6i /></b>
 
<noinclude></translate></noinclude><section end=req6i /></b>
  
<b>7. <section begin=req7 /><noinclude><translate></noinclude>Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet:
+
<b>7. <section begin=req7 /><noinclude><translate><!--T:39-->
 +
</noinclude>Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet:
 
<noinclude></translate></noinclude><section end=req7 /></b>
 
<noinclude></translate></noinclude><section end=req7 /></b>
  
:<b>a. <section begin=req7a /><noinclude><translate></noinclude>Keep your software up-to-date
+
:<b>a. <section begin=req7a /><noinclude><translate><!--T:40-->
 +
</noinclude>Keep your software up-to-date
 
<noinclude></translate></noinclude><section end=req7a /></b>
 
<noinclude></translate></noinclude><section end=req7a /></b>
  
:<b>b. <section begin=req7b /><noinclude><translate></noinclude>Use anti-virus protection and firewall
+
:<b>b. <section begin=req7b /><noinclude><translate><!--T:41-->
 +
</noinclude>Use anti-virus protection and firewall
 
<noinclude></translate></noinclude><section end=req7b /></b>
 
<noinclude></translate></noinclude><section end=req7b /></b>
  
:<b>c. <section begin=req7c /><noinclude><translate></noinclude>Use strong passwords and use a password management tool
+
:<b>c. <section begin=req7c /><noinclude><translate><!--T:42-->
 +
</noinclude>Use strong passwords and use a password management tool
 
<noinclude></translate></noinclude><section end=req7c /></b>
 
<noinclude></translate></noinclude><section end=req7c /></b>
  
:<b>d. <section begin=req7d /><noinclude><translate></noinclude>Use two-factor or multi-factor authentication
+
:<b>d. <section begin=req7d /><noinclude><translate><!--T:43-->
 +
</noinclude>Use two-factor or multi-factor authentication
 
<noinclude></translate></noinclude><section end=req7d /></b>
 
<noinclude></translate></noinclude><section end=req7d /></b>
  
:<b>e. <section begin=req7e /><noinclude><translate></noinclude>Learn about phishing scams – be very suspicious of emails, phone calls, and flyers
+
:<b>e. <section begin=req7e /><noinclude><translate><!--T:44-->
 +
</noinclude>Learn about phishing scams – be very suspicious of emails, phone calls, and flyers
 
<noinclude></translate></noinclude><section end=req7e /></b>
 
<noinclude></translate></noinclude><section end=req7e /></b>
  
:<b>f. <section begin=req7f /><noinclude><translate></noinclude>Protect your sensitive personal identifiable information (PII)
+
:<b>f. <section begin=req7f /><noinclude><translate><!--T:45-->
 +
</noinclude>Protect your sensitive personal identifiable information (PII)
 
<noinclude></translate></noinclude><section end=req7f /></b>
 
<noinclude></translate></noinclude><section end=req7f /></b>
  
:<b>g. <section begin=req7g /><noinclude><translate></noinclude>Use your mobile devices securely
+
:<b>g. <section begin=req7g /><noinclude><translate><!--T:46-->
 +
</noinclude>Use your mobile devices securely
 
<noinclude></translate></noinclude><section end=req7g /></b>
 
<noinclude></translate></noinclude><section end=req7g /></b>
  
:<b>h. <section begin=req7h /><noinclude><translate></noinclude>Backup your data regularly
+
:<b>h. <section begin=req7h /><noinclude><translate><!--T:47-->
 +
</noinclude>Backup your data regularly
 
<noinclude></translate></noinclude><section end=req7h /></b>
 
<noinclude></translate></noinclude><section end=req7h /></b>
  
:<b>i. <section begin=req7i /><noinclude><translate></noinclude>Don’t use public Wi-Fi
+
:<b>i. <section begin=req7i /><noinclude><translate><!--T:48-->
 +
</noinclude>Don’t use public Wi-Fi
 
<noinclude></translate></noinclude><section end=req7i /></b>
 
<noinclude></translate></noinclude><section end=req7i /></b>
  
:<b>j. <section begin=req7j /><noinclude><translate></noinclude>Review your online accounts and credit reports regularly for changes
+
:<b>j. <section begin=req7j /><noinclude><translate><!--T:49-->
 +
</noinclude>Review your online accounts and credit reports regularly for changes
 
<noinclude></translate></noinclude><section end=req7j /></b>
 
<noinclude></translate></noinclude><section end=req7j /></b>
  
<b>8. <section begin=req8 /><noinclude><translate></noinclude>Explain the following precautionary measures an individual can take to protect
+
<b>8. <section begin=req8 /><noinclude><translate><!--T:50-->
 +
</noinclude>Explain the following precautionary measures an individual can take to protect
 
themselves while using their smartphone:
 
themselves while using their smartphone:
 
<noinclude></translate></noinclude><section end=req8 /></b>
 
<noinclude></translate></noinclude><section end=req8 /></b>
  
:<b>a. <section begin=req8a /><noinclude><translate></noinclude>Use a strong pin or password on your smartphone
+
:<b>a. <section begin=req8a /><noinclude><translate><!--T:51-->
 +
</noinclude>Use a strong pin or password on your smartphone
 
<noinclude></translate></noinclude><section end=req8a /></b>
 
<noinclude></translate></noinclude><section end=req8a /></b>
  
:<b>b. <section begin=req8b /><noinclude><translate></noinclude>Enable biometric logins to your smartphone
+
:<b>b. <section begin=req8b /><noinclude><translate><!--T:52-->
 +
</noinclude>Enable biometric logins to your smartphone
 
<noinclude></translate></noinclude><section end=req8b /></b>
 
<noinclude></translate></noinclude><section end=req8b /></b>
  
:<b>c. <section begin=req8c /><noinclude><translate></noinclude>Disable Wi-Fi and/or Bluetooth when you don’t need them
+
:<b>c. <section begin=req8c /><noinclude><translate><!--T:53-->
 +
</noinclude>Disable Wi-Fi and/or Bluetooth when you don’t need them
 
<noinclude></translate></noinclude><section end=req8c /></b>
 
<noinclude></translate></noinclude><section end=req8c /></b>
  
:<b>d. <section begin=req8d /><noinclude><translate></noinclude>Be careful of the apps you download and the services you allow them to access
+
:<b>d. <section begin=req8d /><noinclude><translate><!--T:54-->
 +
</noinclude>Be careful of the apps you download and the services you allow them to access
 
<noinclude></translate></noinclude><section end=req8d /></b>
 
<noinclude></translate></noinclude><section end=req8d /></b>
  
:<b>e. <section begin=req8e /><noinclude><translate></noinclude>Disable location services when you don’t need them
+
:<b>e. <section begin=req8e /><noinclude><translate><!--T:55-->
 +
</noinclude>Disable location services when you don’t need them
 
<noinclude></translate></noinclude><section end=req8e /></b>
 
<noinclude></translate></noinclude><section end=req8e /></b>
  
:<b>f. <section begin=req8f /><noinclude><translate></noinclude>Be careful about where you plug your smartphone
+
:<b>f. <section begin=req8f /><noinclude><translate><!--T:56-->
 +
</noinclude>Be careful about where you plug your smartphone
 
<noinclude></translate></noinclude><section end=req8f /></b>
 
<noinclude></translate></noinclude><section end=req8f /></b>
  
:<b>g. <section begin=req8g /><noinclude><translate></noinclude>Employ remote wiping software
+
:<b>g. <section begin=req8g /><noinclude><translate><!--T:57-->
 +
</noinclude>Employ remote wiping software
 
<noinclude></translate></noinclude><section end=req8g /></b>
 
<noinclude></translate></noinclude><section end=req8g /></b>
  
:<b>h. <section begin=req8h /><noinclude><translate></noinclude>Backup your smartphone often
+
:<b>h. <section begin=req8h /><noinclude><translate><!--T:58-->
 +
</noinclude>Backup your smartphone often
 
<noinclude></translate></noinclude><section end=req8h /></b>
 
<noinclude></translate></noinclude><section end=req8h /></b>
  
<b>9. <section begin=req9 /><noinclude><translate></noinclude>Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses.
+
<b>9. <section begin=req9 /><noinclude><translate><!--T:59-->
 +
</noinclude>Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses.
 
<noinclude></translate></noinclude><section end=req9 /></b>
 
<noinclude></translate></noinclude><section end=req9 /></b>
  
:<b>a. <section begin=req9a /><noinclude><translate></noinclude>Hebrews 13:5-6
+
:<b>a. <section begin=req9a /><noinclude><translate><!--T:60-->
 +
</noinclude>Hebrews 13:5-6
 
<noinclude></translate></noinclude><section end=req9a /></b>
 
<noinclude></translate></noinclude><section end=req9a /></b>
  
:<b>b. <section begin=req9b /><noinclude><translate></noinclude>Psalm 121:3-5
+
:<b>b. <section begin=req9b /><noinclude><translate><!--T:61-->
 +
</noinclude>Psalm 121:3-5
 
<noinclude></translate></noinclude><section end=req9b /></b>
 
<noinclude></translate></noinclude><section end=req9b /></b>
  
:<b>c. <section begin=req9c /><noinclude><translate></noinclude>Proverbs 11:15
+
:<b>c. <section begin=req9c /><noinclude><translate><!--T:62-->
 +
</noinclude>Proverbs 11:15
 
<noinclude></translate></noinclude><section end=req9c /></b>
 
<noinclude></translate></noinclude><section end=req9c /></b>
  
:<b>d. <section begin=req9d /><noinclude><translate></noinclude>Acts 20:28
+
:<b>d. <section begin=req9d /><noinclude><translate><!--T:63-->
 +
</noinclude>Acts 20:28
 
<noinclude></translate></noinclude><section end=req9d /></b>
 
<noinclude></translate></noinclude><section end=req9d /></b>
  
 
<section begin=challenge />
 
<section begin=challenge />
<b>10. <section begin=req10 /><noinclude><translate></noinclude>Do two of the following:
+
<b>10. <section begin=req10 /><noinclude><translate><!--T:64-->
 +
</noinclude>Do two of the following:
 
<noinclude></translate></noinclude><section end=req10 /></b>
 
<noinclude></translate></noinclude><section end=req10 /></b>
  
:<b>a. <section begin=req10a /><noinclude><translate></noinclude>Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet.
+
:<b>a. <section begin=req10a /><noinclude><translate><!--T:65-->
 +
</noinclude>Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet.
 
<noinclude></translate></noinclude><section end=req10a /></b>
 
<noinclude></translate></noinclude><section end=req10a /></b>
  
:<b>b. <section begin=req10b /><noinclude><translate></noinclude>Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet.
+
:<b>b. <section begin=req10b /><noinclude><translate><!--T:66-->
 +
</noinclude>Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet.
 
<noinclude></translate></noinclude><section end=req10b /></b>
 
<noinclude></translate></noinclude><section end=req10b /></b>
  
:<b>c. <section begin=req10c /><noinclude><translate></noinclude>Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet.
+
:<b>c. <section begin=req10c /><noinclude><translate><!--T:67-->
 +
</noinclude>Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet.
 
<noinclude></translate></noinclude><section end=req10c /></b>
 
<noinclude></translate></noinclude><section end=req10c /></b>
  
:<b>d. <section begin=req10d /><noinclude><translate></noinclude>Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words.
+
:<b>d. <section begin=req10d /><noinclude><translate><!--T:68-->
 +
</noinclude>Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words.
 
<noinclude></translate></noinclude><section end=req10d /></b>
 
<noinclude></translate></noinclude><section end=req10d /></b>
  
:<b>e. <section begin=req10e /><noinclude><translate></noinclude>Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats.
+
:<b>e. <section begin=req10e /><noinclude><translate><!--T:69-->
 +
</noinclude>Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats.
 
<noinclude></translate></noinclude><section end=req10e /></b>
 
<noinclude></translate></noinclude><section end=req10e /></b>
 
<section end=challenge />
 
<section end=challenge />
  
 
<section end=Body />
 
<section end=Body />

Latest revision as of 19:29, 11 February 2025

Other languages:
English
Cybersecurity

Skill Level

3

Year

2024

Version

06.10.2025

Approval authority

Southern Asia-Pacific Division

Cybersecurity AY Honor (SSD).png
Cybersecurity
Vocational
Skill Level
123
Approval authority
Southern Asia-Pacific Division
Year of Introduction
2024
See also



1. Have the Internet Honor.

2. Explain what is cybersecurity.

3. Define the following sub-categories of cybersecurity:

a. Network security

b. Application security

c. Information or data security

d. Operational security

e. Cloud security

f. Disaster recovery and business continuity

g. End-user education

4. Explain the three classification of cyber threats.

a. Cybercrime

b. Cyber-attack

c. Cyberterrorism

5. Define the following cyber threats:

a. Malware

b. SQL injection

c. Social engineering

d. Phishing

e. Spear phishing

f. Insider threats

g. Man-in-the-middle (MitM)

h. Distributed denial-of-service (DDoS)

i. Advanced persistent threats (APTs)

j. Romance scams

k. Cryptojacking

l. Zero-day exploits

m. DNS Tunneling

6. Define the following types of malware:

a. Virus

b. Trojans

c. Spyware

d. Ransomware

e. Adware

f. Botnets

g. Worm

h. Dridex

i. Emotet

7. Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet:

a. Keep your software up-to-date

b. Use anti-virus protection and firewall

c. Use strong passwords and use a password management tool

d. Use two-factor or multi-factor authentication

e. Learn about phishing scams – be very suspicious of emails, phone calls, and flyers

f. Protect your sensitive personal identifiable information (PII)

g. Use your mobile devices securely

h. Backup your data regularly

i. Don’t use public Wi-Fi

j. Review your online accounts and credit reports regularly for changes

8. Explain the following precautionary measures an individual can take to protect themselves while using their smartphone:

a. Use a strong pin or password on your smartphone

b. Enable biometric logins to your smartphone

c. Disable Wi-Fi and/or Bluetooth when you don’t need them

d. Be careful of the apps you download and the services you allow them to access

e. Disable location services when you don’t need them

f. Be careful about where you plug your smartphone

g. Employ remote wiping software

h. Backup your smartphone often

9. Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses.

a. Hebrews 13:5-6

b. Psalm 121:3-5

c. Proverbs 11:15

d. Acts 20:28


10. Do two of the following:

a. Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet.

b. Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet.

c. Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet.

d. Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words.

e. Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats.