AY Honor Cybersecurity Requirements
Skill Level
3
Year
2024
Version
25.03.2025
Approval authority
Southern Asia-Pacific Division
1. Have the Internet Honor.
2. Explain what is cybersecurity.
3. Define the following sub-categories of cybersecurity:
- a. Network security
- b. Application security
- c. Information or data security
- d. Operational security
- e. Cloud security
- f. Disaster recovery and business continuity
- g. End-user education
4. Explain the three classification of cyber threats.
- a. Cybercrime
- b. Cyber-attack
- c. Cyberterrorism
5. Define the following cyber threats:
- a. Malware
- b. SQL injection
- c. Social engineering
- d. Phishing
- e. Spear phishing
- f. Insider threats
- g. Man-in-the-middle (MitM)
- h. Distributed denial-of-service (DDoS)
- i. Advanced persistent threats (APTs)
- j. Romance scams
- k. Cryptojacking
- l. Zero-day exploits
- m. DNS Tunneling
6. Define the following types of malware:
- a. Virus
- b. Trojans
- c. Spyware
- d. Ransomware
- e. Adware
- f. Botnets
- g. Worm
- h. Dridex
- i. Emotet
7. Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet:
- a. Keep your software up-to-date
- b. Use anti-virus protection and firewall
- c. Use strong passwords and use a password management tool
- d. Use two-factor or multi-factor authentication
- e. Learn about phishing scams – be very suspicious of emails, phone calls, and flyers
- f. Protect your sensitive personal identifiable information (PII)
- g. Use your mobile devices securely
- h. Backup your data regularly
- i. Don’t use public Wi-Fi
- j. Review your online accounts and credit reports regularly for changes
8. Explain the following precautionary measures an individual can take to protect themselves while using their smartphone:
- a. Use a strong pin or password on your smartphone
- b. Enable biometric logins to your smartphone
- c. Disable Wi-Fi and/or Bluetooth when you don’t need them
- d. Be careful of the apps you download and the services you allow them to access
- e. Disable location services when you don’t need them
- f. Be careful about where you plug your smartphone
- g. Employ remote wiping software
- h. Backup your smartphone often
9. Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses.
- a. Hebrews 13:5-6
- b. Psalm 121:3-5
- c. Proverbs 11:15
- d. Acts 20:28
10. Do two of the following:
- a. Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet.
- b. Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet.
- c. Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet.
- d. Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words.
- e. Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats.