AY Honor Cybersecurity Requirements

From Pathfinder Wiki
< AY Honors‎ | Cybersecurity (SSD)AY Honors/Cybersecurity (SSD)/Requirements/en
Other languages:
Cybersecurity

Skill Level

3

Year

2024

Version

25.03.2025

Approval authority

Southern Asia-Pacific Division

Cybersecurity AY Honor (SSD).png
Cybersecurity
Vocational
Skill Level
123
Approval authority
Southern Asia-Pacific Division
Year of Introduction
2024



1. Have the Internet Honor.

2. Explain what is cybersecurity.

3. Define the following sub-categories of cybersecurity:

a. Network security

b. Application security

c. Information or data security

d. Operational security

e. Cloud security

f. Disaster recovery and business continuity

g. End-user education

4. Explain the three classification of cyber threats.

a. Cybercrime

b. Cyber-attack

c. Cyberterrorism

5. Define the following cyber threats:

a. Malware

b. SQL injection

c. Social engineering

d. Phishing

e. Spear phishing

f. Insider threats

g. Man-in-the-middle (MitM)

h. Distributed denial-of-service (DDoS)

i. Advanced persistent threats (APTs)

j. Romance scams

k. Cryptojacking

l. Zero-day exploits

m. DNS Tunneling

6. Define the following types of malware:

a. Virus

b. Trojans

c. Spyware

d. Ransomware

e. Adware

f. Botnets

g. Worm

h. Dridex

i. Emotet

7. Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet:

a. Keep your software up-to-date

b. Use anti-virus protection and firewall

c. Use strong passwords and use a password management tool

d. Use two-factor or multi-factor authentication

e. Learn about phishing scams – be very suspicious of emails, phone calls, and flyers

f. Protect your sensitive personal identifiable information (PII)

g. Use your mobile devices securely

h. Backup your data regularly

i. Don’t use public Wi-Fi

j. Review your online accounts and credit reports regularly for changes

8. Explain the following precautionary measures an individual can take to protect themselves while using their smartphone:

a. Use a strong pin or password on your smartphone

b. Enable biometric logins to your smartphone

c. Disable Wi-Fi and/or Bluetooth when you don’t need them

d. Be careful of the apps you download and the services you allow them to access

e. Disable location services when you don’t need them

f. Be careful about where you plug your smartphone

g. Employ remote wiping software

h. Backup your smartphone often

9. Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses.

a. Hebrews 13:5-6

b. Psalm 121:3-5

c. Proverbs 11:15

d. Acts 20:28


10. Do two of the following:

a. Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet.

b. Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet.

c. Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet.

d. Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words.

e. Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats.