Module 3 of 4
In Progress

Module 3: Threats in the cyber world

OVERVIEW

This module includes an overview of the threats and risks that can occuring the online world. It provides a good insight into the history of online attacks and frauds, along with a detailed explanation of contemporary threats in an evolved, and rapidly changing digital environment.

Moreover, this module provides useful tips and important knowledge regarding personal digital hygiene, which creates the safety and security culture one must have, in order to avoid any cyber-attacks that can be harmful in many ways. This module provides important knowledge, useful tips, and examples, to cultivate the awareness of all kinds of cyber threats.

Specifically, this module is comprised of three (3) units. Firstly, Unit 1, which is the face-to-face guided learning unit, provides a brief history of cyber threats and an overview of the status of cybersecurity threats. Then, the discussion focuses on the different types of cyber threats that can be found online. Subsequently, Unit 2 which is the self-directed unit, is built around the provision of tips users can use to ensure their personal security online.  Specifically, this module introduces and discusses the personal digital hygiene routine which is based on digital practices users can adopt for minimising their encounter of cyber risks.  Lastly, this module concludes with Unit 3 which encourages learners to reflect on their learning through their engagement with the Reflective Questions included in the unit.

KEY WORDS

LEARNING OBJECTIVES

By the end of this module, participants should be able to achieve the following learning outcomes:

Knowledge:
Skills:
Competences:
Time schedule

Time necessary for: F2F/guided learning: 1,5 hours.

Learning content (self-directed learning): 0,5 hours.

Reflection questions: 15 minutes.

Useful References And Resources

Bamrungchok, D. (n.d.). Digital Hygiene 101: How to practice digital safety and security.  Retrieved 2 June, 2022, from https://coconet.social/digital-hygiene-safety-security/index.html

Brooks, R. (2020).How to Prevent Malware Attacks: 10 Security Tips.  Retrieved 1 June 2022, from https://blog.netwrix.com/2020/06/12/malware-prevention/

Cipher. (n.d.). 10 Personal Cyber Security Tips — #CyberAware.  Retrieved 1 June 2022, from https://cipher.com/blog/10-personal-cyber-security-tips-cyberware/

CIS. (Centre for Internet Security). (n.d.). Election Security Spotlight – Password Attacks.  Retrieved 5 June 2022, from

https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-password-attacks#:~:text=A%20password%20attack%20refers%20to,expedites%20cracking%20or%20guessing%20passwords.

Cisco. (2022). What is Malware? - Definition and Examples. Retrieved 28 September 2022, from https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html#~related-topics

Commonwealth of Massachusetts. (n.d.). Know the types of cyber threats.  Retrieved 5 May 2022, from https://www.mass.gov/service-details/know-the-types-of-cyber-threats

European Parliament. (2022). Cybersecurity: main and emerging threats in 2021 (infographic). Retrieved 15 May 2022, from

 https://www.europarl.europa.eu/news/en/headlines/society/20220120STO21428/cybersecurity-main-and-emerging-threats-in-2021-infographic

FIREEYE. (n.d.). What is a Zero-Day Exploit? Zero-day exploit: an advanced cyber attack defined. Retrieved 15 May 2022, from

 https://www.fireeye.com/current-threats/what-is-a-zero-day-exploit.html

Forcepoint. (n.d.). What is Threat Intelligence? Threat Intelligence Defined and Explored. Retrieved 29 May 2022, from https://www.forcepoint.com/cyber-edu/threat-intelligence

Forrester, N. (2021). A brief history of cyber-threats — from 2000 to 2020. Retrieved 17 May 2022, from https://securitybrief.co.nz/story/a-brief-history-of-cyber-threats-from-2000-to-2020

FRAUDWATCH. (n.d.). Cyber Security 101: The-basics of social media threats. Retrieved 28 May 2022, from https://fraudwatch.com/cyber-security-101-the-basics-of-social-media-threats/

Imperva. (n.d.). Cyber Security Solutions. Retrieved 17 May 2022, from https://www.imperva.com/learn/application-security/cyber-security-solutions/

Imperva. (n.d.). Man in the middle (MITM) attack. Retrieved 18 May 2022, from https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/

Imperva. (n.d.). Ransomware. Retrieved 11 May 2022, from https://www.imperva.com/learn/application-security/ransomware/#:~:text=Ransomware%20is%20a%20type%20of,unlock%20and%20decrypt%20the%20data

Imperva. (n.d.). Social Engineering. Retrieved 2 June 2022, from https://www.imperva.com/learn/application-security/social-engineering-attack/#:~:text=Social%20engineering%20is%20the%20term,or%20giving%20away%20sensitive%20information

Jithukrishnan. (2022). Top 10 password policies. Retrieved 3 June 2022, from https://www.securden.com/blog/top-10-password-policies.html

Karperksy. (n.d.). Emotet: How to best protect yourself from the Trojan. Retrieved 1 June 2022, from https://www.kaspersky.com/resource-center/threats/emotet

Kirsten, S. (n.d.). Cross Site Scripting (XSS), OWASP. Retrieved 25 May 2022, from https://owasp.org/www-community/attacks/xss/

Kost, E. (2022). What is Digital Risk? Definition and Protection Tactics for 2022. Retrieved 2 June 2022, from https://www.upguard.com/blog/digital-risk

Morgan, C. (2019). Cybersecurity CEO: The History Of Cybercrime, From 1834 To Present: Early hacking incidents were a glimpse of the future. Retrieved 24 May 2022, from https://cybersecurityventures.com/cybersecurity-ceo-the-history-of-cybercrime-from-1834-to-present/

Norton. (n.d.). 11 social media threats and scams to watch out for. Retrieved 16 May 2022, from https://uk.norton.com/internetsecurity-online-scams-11-social-media-threats-and-scams-to-watch-out-for.html

Paloalto Networks. (n.d.). What is a denial of service attack (DoS)?. Retrieved 17 May 2022, from https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos#:~:text=A%20Denial%2Dof%2DService%20(,information%20that%20triggers%20a%20crash

Recorded Future. (n.d.). What Is Threat Intelligence?. Retrieved 5 May 2022, from https://www.recordedfuture.com/threat-intelligence

Techopedia. (2022). What is Likejacking? - Definition from Techopedia. Retrieved 28 September 2022, from https://www.techopedia.com/definition/27758/likejacking

TestMatick. (2018). THIRD-PARTY AUTHENTICATION. Retrieved 12 May 2022, from https://testmatick.com/third-party-authentication/#:~:text=Third%2Dparty%20authentication%20is%20based,by%20using%20their%20media%20accounts

UND (University of North Dakota). (n.d.). 7 Types of Cyber Security Threats.  Retrieved 28 April 2022, from https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/

VMware. (n.d.). Remote Work Security. Retrieved 11 May 2022, from https://www.vmware.com/topics/glossary/content/remote-work-security.html

W3Schools. (n.d.). SQL Injection. Retrieved 18 May 2022, from https://www.w3schools.com/sql/sql_injection.asp