don't take any chances while you are on internet this is a cyber safety checklist for educating people on cyber safety.
Cyber-Security refers to the act of protecting and ensuring the safety of computer systems and electronic devices from targeted cyber-attacks, opportunist malware (- viruses, trojans and bugs) or accidental introduction of malware by users. The global scale of cyber-threats continues to rise rapidly. In the modern day and age, access to volumes of data has gained currency, and hence every year, numerous attempts are made to breach data, and/or sensitive, confidential or classified records to expose information for political or economic gains. Effective cyber-security practices as a countermeasure, thus have become important.
End-user Protection is an important aspect of cyber security. It is imperative to ensure that users are educated to protect their systems and themselves from cyber-threats. It is found that introduction to malware is (accidentally) often caused by users themselves. It is thus crucial that users are able to detect such malware, update their systems timely, and refrain from using unsecure networks
Scan this QR code to use this paper checklist on your smartphone or tablet or
visit
https://safetyculture.com/
Title Page
Conducted on
Prepared by
Location
Cyber-Safety Inspection
What is cyber crime ?
Hacking of sensitive information from internet
Stealing things from you physically
Not talking to you
Giving free food
It is ok to cyberbully, even if you are kidding around ?
Can you trust anyone and everyone online?
Which of the following are examples of threats you may encounter online? Select all that apply.
Viruses
Phishing
HTTPS
Spyware
________ are messages that try to trick you into providing sensitive information?
Which of the following passwords is the strongest?
True or False: Clicking ads and pop-ups could expose your computer to malware?
When shopping online, which payment method is generally safest?
What is a browser cookie?
A type of food you can buy online
A type of phishing scam
A plug-in that allows you to view special types of web content
A small piece of data that tracks your preferences on different websites
To see if a website is using a secure connection, what should you look for? Select all that apply
"https" at the very beginning of the URL
A star icon to the right of the URL
A lock icon to the left of the URL
A plus sign (+) to the right of the tab
What is the purpose of an IP Address?
A unique identifier for a computer
A unique location identifier
A network location identifier
None of the above
The full form of IP in IP Address is ______.
You should use VPN to protect your IP Addess
Never use anti-virus and firwall
What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?
That the site has special high definition
That information entered into the site is encrypted
That the site is the newest version available
That the site is not accessible to certain computers
A group of computers that is networked together and used by hackers to steal information is called a
Is free or public wifi safe for banking
What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
Use of insecure Wi-Fi networks
Key-logging
De-anonymization by network operators
Phishing attacks
chanchal jha
Play it safe - Cyber safety
don't take any chances while you are on internet this is a cyber safety checklist for educating people on cyber safety.
Cyber-Security refers to the act of protecting and ensuring the safety of computer systems and electronic devices from targeted cyber-attacks, opportunist malware (- viruses, trojans and bugs) or accidental introduction of malware by users. The global scale of cyber-threats continues to rise rapidly. In the modern day and age, access to volumes of data has gained currency, and hence every year, numerous attempts are made to breach data, and/or sensitive, confidential or classified records to expose information for political or economic gains. Effective cyber-security practices as a countermeasure, thus have become important.
End-user Protection is an important aspect of cyber security. It is imperative to ensure that users are educated to protect their systems and themselves from cyber-threats. It is found that introduction to malware is (accidentally) often caused by users themselves. It is thus crucial that users are able to detect such malware, update their systems timely, and refrain from using unsecure networks
The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions.
The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice.
You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction.
You should independently determine whether the template is suitable for your circumstances.