Cybersecurity Basics

Have you ever wondered what exactly Cybersecurity is?  Well it means the different types of technology, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. This course will guide you about the importance of strong passwords, the cyber safe usage of certain technologies, how to deal with cyber-bullying etc in the online platform.

What is the importance of strong passwords and passphrase?

How to build strong password ?

If the password to your online account is Password, your account easily be hacked.  When making a password or passphrase, you should make it as original and long as possible.  Using numbers, capital and lower-case letters, and special characters are important when making one.  It is also best for the password to be at least 8-9 characters long and should be changed around every 3 months.  You should be sure to keep your passwords safely hidden and always backup your pictures and data just in case it is stolen. Examples of strong passwords: We@31Are4g00d, 12EleP32&nT#6 etc.

In this video Bobo and Jackster take you on a tour in their classroom to show you what they learned to be internet safe behavior.



What is malicious software?

Cyber criminals use malicious software, called malware, like viruses, trojans, botnets, and worms etc to steal information and get access to your accounts without your permission.

How to prevent unauthorized access to your email account?

Match the steps with the keys

When someone has access to your social media/ email account without your consent, they can harass you. You must follow good practices to prevent unauthorized access to your email account.

  • Friends
    Do not share passwords with your friends or anyone.
  • Post-it
    Do not write password on publicly available platform.
  • Antivirus software
    Scan your computer to clean malicious software regularly.

What to do when your email account is hacked?

There can be multiple right answer.

  • Do not let anyone know about the hacking incident.
  • Let family and friends know to aware them about the incident.
  • Run antivirus software to determine if your computer is infected with malicious software.
  • Contact the email service provider to get back to your account.
  • Get a new email account, as hacked email account can never be recovered

What is the best practice to use pen-drives?

Fill in the blanks to learn about the best practices of using pen-drives

If you use flash drives, or pendrives you should be sure to put a on it in case it is stolen. Always  what you stored in the pendrive, so that even if you lose the pendrive you don’t lose all the data permanently.

What is cyber-bullying?

How to deal with cyber-bullying in the school campus?

Many times, cyber criminals use the information they steal to cyberbully. If you ever find yourself being cyber bullied, you should be sure to tell a trusted adult.  You should know the use of technology to help you fight any kind of cyber bullying or harassment. Usually only professionals like the police or a school’s office staff have access to such technology, for example CCTV or surveillance cameras.

CCTV cameras or surveillance camera can be used to seek help for any misconduct.

  • Yes, it can be used to record the visitors. You should also always be aware of your surroundings and may seek help of the footage recorded in the nearest CCTV if you have access to one.
  • No, surveillance cameras or CCTV cameras only serve entertainment purpose.