SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Malaysia
Website Fundamentals
CyberSAFE Website FundamentalsCyberSAFE Website Fundamentals
INTERNET SAFETY AWARENESS
CyberSecurity Malaysia’s CyberSAFE Program
CyberSAFE, short for Cyber Security Awareness For Everyone, is CyberSecurity
Malaysia’s initiative to educate and enhance the awareness of the general
public on the technological and social issues facing internet users, particularly
on the dangers of getting online.
Copyright © 2014 CyberSecurity Malaysia
INTERNET SAFETY AWARENESS
CyberSAFE Portal & Materials
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Awareness Talk
CyberSAFE Awareness
Talk Invitation
CyberSAFE Ambassador Program
Copyright © 2014 CyberSecurity Malaysia
Target Groups
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Website
Copyright © 2011 CyberSecurity Malaysia
Exploring the Kids
Copyright © 2011 CyberSecurity Malaysia
Exploring the Kids
Copyright © 2011 CyberSecurity Malaysia
Exploring the Parents
Copyright © 2011 CyberSecurity Malaysia
Exploring the Parents
Copyright © 2011 CyberSecurity Malaysia
Exploring the Youth
Copyright © 2011 CyberSecurity Malaysia
Exploring the Youth
Copyright © 2011 CyberSecurity Malaysia
Exploring the Organisation
Copyright © 2011 CyberSecurity Malaysia
Exploring the Organisation
Copyright © 2011 CyberSecurity Malaysia
Deep Exploration
Copyright © 2011 CyberSecurity Malaysia
CyberSAFE Digest
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Digest
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Digest
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Digest
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Digest
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Digest
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Multimedia Content
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Multimedia Content
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Multimedia Content
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Multimedia Content
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Community
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Community
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Community
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Community
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Help
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Help
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Help
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Help
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Help
Copyright © 2014 CyberSecurity Malaysia
CyberSAFE Help
Copyright © 2014 CyberSecurity Malaysia
Test Your Password
Copyright © 2011 CyberSecurity Malaysia
Don’t Phish Me
Copyright © 2014 CyberSecurity Malaysia
Online Banking Quiz
Copyright © 2011 CyberSecurity Malaysia
End Message
Copyright © 2014 CyberSecurity Malaysia
Copyright © 2013 CyberSecurity Malaysia 42

Weitere ähnliche Inhalte

Was ist angesagt?

You can trust on soc 2 report!
You can trust on soc 2 report!You can trust on soc 2 report!
You can trust on soc 2 report!socassurance
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareDomen Savič
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi North Texas Chapter of the ISSA
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURCyren, Inc
 
4 Ways to Respond to Today's Advanced Threats
4 Ways to Respond to Today's Advanced Threats4 Ways to Respond to Today's Advanced Threats
4 Ways to Respond to Today's Advanced ThreatsSymantec
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFiMartin Keg
 

Was ist angesagt? (11)

Mezcal Security Vehicles brochure 2016
Mezcal Security Vehicles brochure 2016Mezcal Security Vehicles brochure 2016
Mezcal Security Vehicles brochure 2016
 
Up your Infosec game
Up your Infosec gameUp your Infosec game
Up your Infosec game
 
You can trust on soc 2 report!
You can trust on soc 2 report!You can trust on soc 2 report!
You can trust on soc 2 report!
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
 
Cyber Security White Paper
Cyber Security White PaperCyber Security White Paper
Cyber Security White Paper
 
4 Ways to Respond to Today's Advanced Threats
4 Ways to Respond to Today's Advanced Threats4 Ways to Respond to Today's Advanced Threats
4 Ways to Respond to Today's Advanced Threats
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFi
 

Andere mochten auch

Cybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician PracticesCybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician PracticesRavi D. Goel, MD
 
Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Kaufman & Canoles
 
easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure easyLive Systems Ltd
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicInApp
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (12)

Cybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician PracticesCybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician Practices
 
Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)
 
easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie 01 Cyber Safe Malaysia Website Fundamentals

Strategy to Develop Mobile Solution
Strategy to Develop Mobile SolutionStrategy to Develop Mobile Solution
Strategy to Develop Mobile SolutionThe World Bank
 
Disrupting Healthcare: quando l'innovazione passa per la salute.
Disrupting Healthcare: quando l'innovazione passa per la salute.Disrupting Healthcare: quando l'innovazione passa per la salute.
Disrupting Healthcare: quando l'innovazione passa per la salute.Ninja Marketing
 
Meruvian Seamless Education - SMK v1.0
Meruvian Seamless Education - SMK v1.0Meruvian Seamless Education - SMK v1.0
Meruvian Seamless Education - SMK v1.0The World Bank
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesArtur Alves
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 
Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...
Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...
Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...SITA
 
Razorfish university slide_share
Razorfish university slide_shareRazorfish university slide_share
Razorfish university slide_shareReva McPollom
 
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...Accumulo Summit
 
Skillsoft perspectives 2014 marketing learning and development workshop
Skillsoft perspectives 2014 marketing learning and development workshopSkillsoft perspectives 2014 marketing learning and development workshop
Skillsoft perspectives 2014 marketing learning and development workshopMarie Sanguinetti
 
New Islamabad Office Opening Speech
New Islamabad Office Opening SpeechNew Islamabad Office Opening Speech
New Islamabad Office Opening SpeechZeeshan Ali
 
Is the Cloud ready for Your Firm?
Is the Cloud ready for Your Firm?Is the Cloud ready for Your Firm?
Is the Cloud ready for Your Firm?SS&C Advent
 

Ähnlich wie 01 Cyber Safe Malaysia Website Fundamentals (20)

00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
Strategy to Develop Mobile Solution
Strategy to Develop Mobile SolutionStrategy to Develop Mobile Solution
Strategy to Develop Mobile Solution
 
JOE 1.0.1
JOE 1.0.1JOE 1.0.1
JOE 1.0.1
 
Disrupting Healthcare: quando l'innovazione passa per la salute.
Disrupting Healthcare: quando l'innovazione passa per la salute.Disrupting Healthcare: quando l'innovazione passa per la salute.
Disrupting Healthcare: quando l'innovazione passa per la salute.
 
Meruvian Seamless Education - SMK v1.0
Meruvian Seamless Education - SMK v1.0Meruvian Seamless Education - SMK v1.0
Meruvian Seamless Education - SMK v1.0
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...
Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...
Tomorrow's Problems: Patrick Naef, Divisional Senior Vice President IT, The E...
 
Empower your business with joomla
Empower your business with joomlaEmpower your business with joomla
Empower your business with joomla
 
Razorfish university slide_share
Razorfish university slide_shareRazorfish university slide_share
Razorfish university slide_share
 
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...
 
Skillsoft perspectives 2014 marketing learning and development workshop
Skillsoft perspectives 2014 marketing learning and development workshopSkillsoft perspectives 2014 marketing learning and development workshop
Skillsoft perspectives 2014 marketing learning and development workshop
 
Taking safety back to the future
Taking safety back to the futureTaking safety back to the future
Taking safety back to the future
 
What is a Health Savings Account (HSA)?
What is a Health Savings Account (HSA)?What is a Health Savings Account (HSA)?
What is a Health Savings Account (HSA)?
 
New Islamabad Office Opening Speech
New Islamabad Office Opening SpeechNew Islamabad Office Opening Speech
New Islamabad Office Opening Speech
 
Meruvian 4.0
Meruvian 4.0Meruvian 4.0
Meruvian 4.0
 
Is the Cloud ready for Your Firm?
Is the Cloud ready for Your Firm?Is the Cloud ready for Your Firm?
Is the Cloud ready for Your Firm?
 

Mehr von Ministry of Education Malaysia

Mehr von Ministry of Education Malaysia (20)

Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMKFail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMK
 
Panduan Fail Meja
Panduan Fail MejaPanduan Fail Meja
Panduan Fail Meja
 
Modul 1 Scratch
Modul 1 ScratchModul 1 Scratch
Modul 1 Scratch
 
Hack me now, hack me then @ btp
Hack me now, hack me then @ btpHack me now, hack me then @ btp
Hack me now, hack me then @ btp
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
02 power search using google
02 power search using google02 power search using google
02 power search using google
 
Manual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLEManual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLE
 
Mtg v5.0 full pdf bm
Mtg v5.0 full pdf bmMtg v5.0 full pdf bm
Mtg v5.0 full pdf bm
 
Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014 Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014
 
Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7
 
Pembentangan TMK
Pembentangan TMKPembentangan TMK
Pembentangan TMK
 
Makna "PLuG TMK"...
Makna "PLuG TMK"...Makna "PLuG TMK"...
Makna "PLuG TMK"...
 
Kumpulan 6
Kumpulan 6Kumpulan 6
Kumpulan 6
 
Kumpulan 3
Kumpulan 3Kumpulan 3
Kumpulan 3
 
Kumpulan 4: Geng Bahagi 4
Kumpulan 4: Geng Bahagi 4Kumpulan 4: Geng Bahagi 4
Kumpulan 4: Geng Bahagi 4
 
Kumpulan 5
Kumpulan 5Kumpulan 5
Kumpulan 5
 

Kürzlich hochgeladen

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

01 Cyber Safe Malaysia Website Fundamentals

Hinweis der Redaktion

  1. Welcome! In this lesson, we will familiar ourselves with security awareness website i.e. CyberSAFE Malaysia. The purpose of this website is to help the elderly beginners to surf the web efficiently and safely to get information on internet safety. Before you start to surf the web, you must learn a few things about CyberSAFE Malaysia: CyberSAFE Malaysia is an initiative under CyberSecurity Malaysia which aimed to provide educators, organization and school communities with appropriate tools and strategies to defend themselves from the danger on the cyberspace. CyberSAFE Malaysia portal is a website providing tips, articles, videos, and interactive activities that teach us how to protect ourselves from the risks associated with using the Internet. It provides with safety guidelines, security resources such as poster, video and games as well as security tools in order to safeguard us from potential internet threats. Lets begin the lesson with opening the CyberSAFE website - www.cybersafe.my.
  2. Here is the portal of CyberSAFE Malaysia. The purpose of this portal is to educating and enhancing the awareness of the general public on the technological and social issues facing Internet users, particularly regarding the dangers they need to be aware of online. CyberSecurity Malaysia launched CyberSAFE (‘CyberSecurity Awareness For Everyone’) initiative and information portal as part of its public outreach activities on behalf of the government of Malaysia. It aims to impart practical knowledge and provide the necessary information and resources to a wide spectrum of the community. This will then enable them to make informed choices and deal with cyber security issues on their own.
  3. Lets discuss what are the current issues that we are facing on the internet! CyberSAFE Program includes a lot of activities that help people recognise and deal with common cyber safety issues and looks at the range of issues that children of all ages can face online and provides age-specific tips to help manage these situations. In CyberSAFE Portal, we focus on Cyber safety issues includes: Cyberstalking and cyberbullyingWhat is cyberstalking and cyberbullying, what are the warning signs and how to help if the child is being cyberstalking and cyberbullying? Harassment / Unwanted sexual contact What is sexting and how can we help the child deal with it? How to help the child avoid unwanted online sexual contact, including grooming by adults Protecting personal informationHow to help the child keep their personal information safe. Safer social networking How to help the child interact more safely on social networking websites. Blog and chat safely How to help the children manage inappropriate content online while chatting online. Sharing and downloading How to be aware of when sharing or downloading using file sharing or peer to peer
  4. CyberSAFE Portal and Materials is a safety resources for us to download and share are all available in this section. These include a range of brochures , posters and newsletter about online safety and guidelines about important safety issues. Some of the issues and best practices addressed includes good online chat and social networking habits; safe internet banking and online shopping; online investment scams, identity thefts, online fraud and phishing scams; protecting your computer against viruses, worms and other malware infections; cyber stalking, cyber bullying and online harassment; good e-mail account management and dealing with spam; and protecting privacy and personal information online. We encourage everyone to share these materials in your community or workplace that would benefit whether it's our friends, colleagues, or children. Help us make the cyber world a safer place!
  5. How to request the speaker from CyberSAFE team? Let’s go to http://www.cybersafe.my/speaker.html CyberSAFE Awareness Talk is one of CyberSAFE initiative that provides the content of current threat and trends of internet safety by giving awareness talk for students, teachers, parents and organization. The event organiser could invite CyberSAFE team to deliver talk by fill up online speaker request form with the details such as contact information, event information, audience, topic, objectives and goal of presentation. CyberSAFE team will send the notification for the successful registration and will confirm the procedure within 2 ( two) days of working days. The topics include: I Know What You Did Last Raya What Happen in Phuket Stay on Facebook, Photopages, Youtube, Why Hackers Like Your Computer, The Invisible Hackers: WiFi Hackers - Knowing Your WiFi Threats, and Power Search with Google.
  6. How to be the ambassador for CyberSAFE? First of all, go to this link: http://www.cybersafe.my/ambassador.html CyberSAFE Ambassadors Program is an initiative by CyberSecurity Malaysia to engage the general public in volunteering themselves to help propagate the CyberSAFE message. The ambassadors provides : support CyberSAFE activities or events, assist in the conduct and management of related activities and events represent the campaign at designated locations as well as organise CyberSAFE activities and events on their own. Volunteers will be given Train-the-Trainer Program training in several stages to help them understand what CyberSAFE is. Train- the -Trainer Program FIRST LEVEL to provide supporting presence at CyberSAFE activities or events 2. SECOND LEVEL to assist in the conduct and management of CyberSAFE activities and events THIRD LEVEL to represent CyberSAFE at designated locations and organise CyberSAFE activities and events
  7. How do we reach our target groups?
Children and young people are the target group for the campaign, but parents, educators, social workers, media and internet industry as well as policy makers are also important target audiences for CyberSAFE Malaysia. This awareness campaign has strong support from public and will continue the widespread dissemination of tools and information on safer internet use. CyberSAFE Malaysia believed that every target group have their own culture and therefore awareness message will be imparted in different approach. CyberSAFE Malaysia are focusing on own target groups which includes: Kids Youth Parents Adults Organization Choosing which topic to discuss can also help with choosing our target audience. If our topic is about cyberbullying, the audience may be very broad. But if our topic is personal safety or precautions of sharing personal information online, the audience may only consist of high school juniors, seniors and parents. An important question to ask is who can benefit from the discussion?
  8. CyberSAFE believe privacy awareness is an important element of improving cyber safety for children and young people. The proliferation of online activities and associated privacy risks, coupled with the fact that young users are often less aware of the risks, suggests that there is a particular need for educational activities aimed at raising privacy awareness amongst children and young people. Each week, official events will be highlighted in CyberSAFE Website, and everyone can view more upcoming events especially CyberSAFE awareness talk and CyberSAFE exhibition. The main purpose to highlight this event is to attract more visitors to get involved in this awareness program. Visitors can get the latest information about CyberSAFE Program and they were invited to attend awareness programs such as awareness talk , exhibitions and interactive games designed to test the level of ICT awareness.
  9. Let’s be honest. Many children especially post-pubescent boys are interested in what we commonly call “porn.” We might not like the idea that some kids are looking at these images, but that doesn’t change the fact that it’s a pretty common occurrence. This column isn’t about young children or children who accidentally come across unwanted sexual material. Those are different issues. The question we want to explore is how young children should react if they discover their growing level, typically 12 or old is deliberately looking at sexually explicit material on the Internet. Lets go this link : http://www.cybersafe.my/cyberkids.html Try edutainment quizzes and games and test the knowledge about what children are doing in their digital world. Learn about what children do online and some strategies to help them be cybersmart as they grow up. This includes tips for young kids (up to age 7) kids (up to 12 years) and teens (up to 18 years). Sample (Gaming Tips For Kids) If another player is behaving badly or making you uncomfortable, block them from your players list. You may also be able to report them to the game site operator. Limit your game play time so you can still do other things like homework, jobs around the house and hanging out with your friends. Keep personal details private. Remember to make time offline for your friends, your favourite sports and other activities.
  10. This section provides downloadable resources for parents to use with children. There are some of cyber tips, posters, cyber-tools and games and quiz in order to help improve the computer’s security. Following these simple guidelines can prevent potential problems in future. Start a discussion with the child : What are your favorite things to do online? What is personal information? Why should you keep it private? What could you do to be safer online? What would you do if anyone online asked to meet you face-to-face? Besides me, who do you feel that you can talk to if you are in a scary or uncomfortable situation More information on cybersafe tips for kids: http://www.indianchild.com/safe_surfing http://www.netsmartz.org/safety/safetytips http://www.kids.gov/6_8/6_8_computers_internet.shtml
  11. Being a parent isn't easy especially if they didn’t grow up with the same technologies. And it can be especially difficult raising teenagers these days. But do you know where to turn if the parents are having problems with their child? We can help this by : Click this link: http://www.cybersafe.my/cyberparent.html This link provide the information and resources of cyber safety issues with their children and teens, and ways to manage those risks. This section includes practical tips in the video, posters and newsletters to help parents use the resources and guide their children. Explore topics such as safe online banking, safety on internet chat, and computer security checklist to help better protect ourselves while online. Just as adults need to help kids stay safe, they also need to learn not to overreact when they find out a child or teenager has been exposed to inappropriate material or strayed from a rule. Don't blame or punish the children if they tells about an uncomfortable online encounter. The best strategy is to work with them, so parents and children can learn from what happened and figure out how to keep it from happening again. These tools and technologies available to assist parents to monitor the Internet usage of their children. With these understanding, they would be able to guide their children on the proper use of the Internet more effectively. In turn, parents can inculcate values in their children which will enable them to face the challenges in their life in the local community and the larger world.
  12. The following are some tips for parent to monitor their children's time online and to ensure that they are safe as well : 1. Teach kids online safety Internet is highly accessible to anyone who has computer at home, including your kids. It is important to teach your kids internet safety in relation to posting personal information, chatting with friends, meeting people or playing games. 2. Preventing Your Kids From Spending Too Much Time Online   The Internet creates interest and excitement and therefore it can occupy most of your children's productive time. While in their growing years, it is important for them to manage their time and expose themselves to various activities during the day or the week in order to make their growing years more fruitful and meaningful, apart from just internet.   3. Protecting Your Kids From Online Predators   The Internet has become an important part of our life, we use it for work, play and study but we must be aware of the dark side similar to real life problems that can affect your children. Talk to your kids about sexual predators and potential online dangers. Others information and tips for parents can be read at this link: http://www.cyber-safety.com/parents.html http://csriu.org/documents/cstparentguide.pdf http://www.fbi.gov/stats-services/publications/parent-guide http://www.safetyweb.com/social-networking-safety-tips
  13. The challenges posed by the Internet can be positive. Learning to make good choices on the Internet can serve young people well by helping them to think critically about the choices they will face. Social networking sites have given us a great platform to share knowledge, ideas, and to unite on various topics and many more. The youth now can voice their opinion on this. Social networking is the latest craze this days having both positive and negative effect. On the plus side it is hugely helping todays youth in communicating with their friends, relatives or anyone. Also security is a big question as far as networking is concerned. Not only the youths but also underaged kids are making fake profiles.Social networking these days is spread to each and every corner of the world. Even the small kids are getting addicted to involving in them. This greatly finds its effect on the minds of youth. Learn more about how to explore the youth to keep their personal information to themselves online by visiting this link : http://www.cybersafe.my/cyberyouth.html This section provide the information and resources of cyber safety issues and ways to manage those risks. It is included practical tips in the video, posters and newsletters to help youth use the resources and guide themselves. These videos feature the stories about social networking, safe online shopping, id theft and want the youth to learn from their mistakes. They’ll learn to evaluate their own online choices and understand why talking to an adult they trust is so important. Find out how to enjoy blog and chat while safe from being victimized by cyberstalking and harassment. These resources can help you navigate the Internet while guarding your reputation.
  14. Today’s teens enjoying the internet constantly, and of course, there are safety risks that come with being on the internet. There are all types of online users that can have a negative influence upon teens and also content that is not appropriate which can be visible. Youth is a critical period for social and emotional development, a time when people face serious challenges like cyberbullying and discrimination. One in four young people experience mental health difficulties, disrupting relationships, education and work. The good news is that the online world offers the youth experiences that are educational and rewarding. In addition, being able to use the Internet effectively may increase their school performance and future job potential. To help keep the youths safe online, this link provides an overview of three areas of the Internet popular (email, the Web, and chat rooms). For each area, CyberSAFE list cyber tips, videos, posters and newsletter for youths to explore more on internet safety. For more information on cybersafe tips for youths: http://www.cyber-safety.com/teens.html http://kidshealth.org/teen/safety/safebasics/internetsafety.html http://kids.getnetwise.org/safetyguide/teens  
  15. The Internet is a powerful tool, but it’s important to practice some safety measures and common sense. We are taking the initiative to provide a framework for you for teaching responsible Internet use to the organisation. This site is designed to help home users and small businesses to stay smart online. It has simple advice on how to secure computers, transact and interact safely online and provides access to a range of information and resources including helpful top tips, fun quizzes, and guides. The link also provide the information and resources to keep organizations updated on the security best practices to get a secure business environment. Get more useful information in our newsletter. Click to read our latest issue! Through this guide, we want to empower the organisation to use the Internet and enjoy all the positive benefits it offers.
  16. Here are a few posters and cyber tips for organisation can do to practice cybersafety Security Best Practices Dealing with malware, securing mobile devices, backing up data, wireless access, email and spam, secure remote access, protecting passwords, desktop security and identity theft privacy. Information Security Management Security Policy, Information Security Management System ( ISMS ) and Business Continuity Management ( BCM) These items might contain only headlines with links that you can click to read the complete article: http://www.cybersafe.my/cyberorganization.html For more info on benefits and safety tips for organization, please refer this link: http://www.efytimes.com/e1/creativenews.asp?edid=46080 http://www.wiredsafety.org/
  17. The Internet offers great ways to learn new things and keep in touch with people you know, but children need to be careful. In this website, everyone can find out the reason they need to be careful online, how to be safe when using social networking sites, how to keep their passwords safe, how to avoid cyberbullying and much more. The other main components of the site are: CyberSAFE Digest (WebZines, e-security bulletins, CyberSAFE Newsletters and guidelines) CyberSAFE Multimedia Content (videos, posters, games, quizzes and cyber tools) CyberSAFE Community (CyberSAFE ambassador, learning zone, active zones and news highlights) CyberSAFE Help (Cyber999 helpline, CyberSAFE first aid and speaker request and request to exhibit) This components provides us with a quick guide to information and resources available to support safe online behaviour. Internet safety education materials and programs have materialized rapidly. Websites have been established to educate children and parents about the dangers of Internet use. For more info visit at: http://www.connectsafely.org http://www.growing-up-online.com http://www.safeteens.com http://www.ikeepsafe.org http://www.netsmartz.org
  18. Welcome on our issue of CyberSAFE Web Zine! Check out our links can be used for more information or help on this topic : http://www.cybersafe.my/webzine.html Knowing the cyber threats Practical tips for concerned parents Protecting your child in online world This webzine invites CyberSAFE readers to contemplate the news coverage in Malaysia pertaining to cyber threats. Have a pleasure reading. Click this link for more information: http://kids.yahoo.com/parents/online-safety http://www.education.com/reference/article/legislation-protect-children-internet/ http://ezinearticles.com/?Protecting-Children-in-Cyberspace http://www.protectkids.com/ Knowing the Cyber Threats! Be Smart Be Safe!
  19. CyberSAFE Digest : e-Security Bulletin This section provides detailed information about e-security detailed tips for us to protect our computers and finances when online. It also provides advice on educating us about basic protective measures. Poor e-security or internet security can result in the corruption of files and can enable criminals and others to access personal and financial information. E-security measures provide protection from unwanted intentional and unintentional intrusion into computers, file corruption and data loss. Lets go to this link for detail information: http://www.cybersafe.my/esecurity.html
  20. CyberSAFE Digest : CyberSAFE Newsletter As part of its Cybersafety Outreach program, CyberSAFE Program offers free general internet safety awareness newsletter for parents, students and teachers. Parents need to be concerned about the online activities of their children. There are many pre-teens engaging in increasingly risky behaviors and are often not supervised by adults while they are online. Many children and teens have already learned the hard way about the cruel consequences that can occur when they post personal information on the Web, assuming it will be kept confidential. It is our hope that this newsletter will clarify some issues and generate meaningful discussions among parents and their children. The content in this newsletter are easy to understand, thorough, non-technical and informative. They cover a range of issues including: the ways children use the internet and emerging technologies potential risks faced by us when online such as cyberbullying, identity theft, inappropriate contact and exposure to inappropriate content tips and strategies to help children stay safe online. This newsletter will feature additional information, tips, hints, strategies and updates on available resources from year 2007 until 2010. Lets go to this link : http://www.cybersafe.my/newsletter.html Enjoy reading!
  21. CyberSAFE Digest: Guidelines In today’s world, the students and everyone’s children are exposed to dangers that are rarely completely new but are definitely closer than they once were. This guidelines will help all of us stay on guard when we are using the Internet for e-mail, instant messaging, and the World Wide Web. These wonderful guidelines offer the promise of tremendous power to learn and to communicate, to bring people together and even to bring nations together. With open discussion of ideas and values among adults and children, we can safeguard our young people and even grownups against some of the abuses occurring through the Internet. Did you know that your safety depends on each individual users? The following are some guidelines for using the internet: Guidelines for Children Guidelines for Parents, Guardian and Educators Guidelines for Industry Guidelines for Policy Makers Family Safety – Learn about family safety setting for Microsoft product General Information Security Best Practices Just click the link on this site: http://www.cybersafe.my/guidelines.html
  22. CyberSAFE Digest : Report,E-Book,Bulletin 1. Own Your Space--Keep Yourself and Your Stuff Safe Online Help teens 'own their space' online. Whether you are a parent, caregiver, or educator, you can keep up with the latest computer and online safety issues and help kids learn to avoid them 2.Cyber Awareness Bulletin Cyber Awareness Bulletin is a compilation of open source news articles regarding information and cyber-related threats. The bulletin is intended to highlight new and emerging cyber threats, provide potential mitigation measures, and educate the reader 3.EURIM Online Child Protection Report The purpose of this report is to provide an overview of the principal actors and initiatives in the sphere of online child protection as well as highlighting areas of best practice and recommendations from the actors themselves – in order to enhance our understanding of how best we might achieve such a balance We have many more great info for you to select from, just click:- http://www.microsoft.com/security/resources/book-teens.aspx http://www.jkwebtalks.com/2010/09/free-ebook-from-microsoft-to-keep-teens.html http://doa.alaska.gov/ets/security/SA_Bulletins/AB04-trojans.html
  23. CyberSAFE Digest : Article This article will walk you through the dark journey of the World Wide Web that may contain your public information as well as sensitive information. By using publicly available open source tools or 'your best friend on the internet' - Google search engine, the information reconnaissance about you, your friends, your company etc can be performed without asking your permission. This reality affects everyone as we becoming more dependent on the internet. More people than ever before in history are using the Web to shop for a wide variety of items, from houses to shoes to airplane tickets. What are the advantages of online shopping? Are there benefits to using the Web to buy what you need? Let’s go to this link at http://www.cybersafe.my/article.html to read more information: How much Google know about us In our daily lives, easier access to the information and improved methods of communication has significantly helped us on our various tasks. The right combination of free, easy-to-use services along with targeted advertising has made numerous online companies emerged to offer such services. One of them is Google. 2. Tips and guidelines on safe online shopping To ensure your internet shopping is as secure as its convenient, we’ve compiles these online shopping guidelines and identity protection tips.
  24. CyberSAFE Multimedia Content : Videos The following videos have been produced in an effort to educate students, parents, teachers and others on a variety of Internet safety topics. The video link provides information about how to help us manage the risk associated with video sharing websites: http://www.cybersafe.my/video.html The Cybersafe Video section of this website includes more information, including: Social Networking Protecting your privacy and personal information. Safe chat Safe online shopping Safe Internet Banking Email and spam ID Theft Cyber Stalking’ What should you know about phishing scams?
  25. CyberSAFE Multimedia Content : Poster Our free colourful printable web safety posters for kids, youth and adult offer advice and guidance on how to use the internet safely; particularly for online chatting, messaging and sharing personal information. Our web safety posters can be freely printed off (they're in Adobe PDF format) and pinned-up at school in the IT suite or classroom, at home, or wherever you need to reinforce the importance of children surfing and chatting on-line safely. Please note that our internet safety printables provide basic guidance and tips only and must be used as part of a wider and more thorough lesson plan (or education at home) covering the dangers and risks associated with children and teenagers communicating in cyberspace across the world wide web. Let’s go to this link : http://www.cybersafe.my/poster.html The following topics are covered: Password Pornography Cyberbully Noticeboard Chat Topic Identity Theft
  26. CyberSAFE Multimedia Content : Games and Quizzes If kids are like most other kids enjoy playing computer and online games. These can be a great way to help teach the kids about the dangers of online life such as cyberbullying,sexting, and online predators and about the ways they can protect themselves. There are many games and activities available online, and we’ve listed several here for them to use. It’s probably a good idea to look at them before let the children do them, so they know what their kids can learn from each activity. Depending on their kids’ ages, it may also be nice to do them together, as a parent-child activity. Test the knowledge by visit this link : http://www.cybersafe.my/games.html Cyber Cadet Test our knowledge on Password Security as a Cyber Cadet. Earn our badge by answering the questions provided. 2. Email & SpamCan you tell if the email you receive is spam? Categorize the emails in your inbox and get as many correct in the time provided. 3. Cyber FriendsWelcome to the Cyberfriends Social Networking website. Secure your Cyberfriend account privacy by limiting access to strangers. 4. Kampung CyberAnswer the quiz accurately and help safeguard the people of Kampung Cyber from cyber threats.
  27. CyberSAFE Multimedia Content : Cyber Tools Cyber Tools are designed for use by us seeking information about antivirus software, online virus scanner, free antivirus software, web browser, toolbar, phishing filter, anti spyware, updates and patches checker, validating genuine microsoft software, and other utilities. The materials below are practical advice on how to be a savvy and successful digital citizen. Please visit this link : http://www.cybersafe.my/tools.html Go to this link to find out more information: http://en.wikipedia.org/wiki/Antivirus_software https://www.virustotal.com/ http://en.wikipedia.org/wiki/Anti-phishing_software http://en.wikipedia.org/wiki/Web_browser http://en.wikipedia.org/wiki/Spyware
  28. CyberSAFE Community : CyberSAFE Ambassador Under CyberSAFE Community, CyberSAFE introduce CyberSAFE Ambassador Program is an initiative by CyberSecurity Malaysia to spread the awareness of internet safety by introduce Train of Trainer Program and engage the general public in volunteering themselves to help propagate the CyberSAFE message. Volunteers are expected to solely promote and represent CyberSAFE and not any other products, services or organisations, including soliciting for business opportunities. Volunteers will be given training in several stages to help them understand what CyberSAFE is all about, and provided with all the logistical and content support during their CyberSAFE activities. To register click this link : http://www.cybersafe.my/ambassador.html
  29. CyberSAFE Community : Learning Zone How well do you know the internet ? Can you identify Cyber threats ? Do you know how to keep yourself safe online ? The Internet can be a wonderful resource and provides many learning opportunities.  We use it to research information, communicate with others, play interactive games, create sensational presentations, share ideas and much more. CyberSAFE Program are able to literally access the world. In order to learn and benefit from these opportunities it is important to learn web netiquette (good web manners), make good decisions and practise online safety. Check some of these websites out out! Try a Quiz. Play a game. Learn some rules. Go to this link : http://www.cybersafe.my/l2surf.html Take the License2Surf test by going through all the games, quiz & videos before taking the test to ensure you know your stuff!
  30. CyberSAFE Community : Active Zone Every Internet user has a role to play in securing cyberspace and ensuring the safety of themselves and their families online. Through a series of events and initiatives across the state , CyberSAFE Awareness Program engages public and private sector partners to raise awareness and educate Malaysians cybersecurity, and increase the resiliency of the Nation and its cyber infrastructure. CyberSAFE shared some statistics : http://www.cybersafe.my/event-stats.html No of schools involved in the CyberSAFE Program 2009-2011 No of organisation involved in the CyberSAFE Program 2009-2011 No of students involved in the CyberSAFE Program 2009-2011 No of teachers involved in the CyberSAFE Program 2009-2011 Some of the videos uploaded in conjunction with CSM-ACE 2010 which includes: CyberSAFE CSM-ACE Exhibitions CyberSAFE CSM-ACE Google Fu CyberSAFE CSM-ACE Ambassador Convention Ambassador Convention by Mr Sabri Sahak Ambassador Convention by Mr Rashidi This video can be found at http://www.cybersafe.my/active-video.html To show the location of recent CyberSAFE Activities, can find it from Google Map at http://www.cybersafe.my/google-map.html with the pictures in Photo Gallery at http://www.cybersafe.my/galleries.html
  31. Cybersafety awareness activities during the year focused on the development of new resources such as Digi CyberSAFE Program, Cyber parenting program, an interactive parent resource and various multimedia school resources. These resources build on the existing suite of resources, including the CyberSAFE Malaysia website, which continued to offer young people, parents, and teachers for cybersafety information and education resources. The development and deployment of internet safety presentations and teacher professional development resources for the CyberSAFE Outreach program continued throughout the year, along with the production of cybersafety education programs and information material for schools and parents. Therefore, CyberSAFE have some new highlights for upcoming activities from year 2010 onwards whereby each week we highlight some of the big upcoming events about CyberSAFE awareness program. Click this link to find the upcoming event: http://www.cybersafe.my/new-highlight.html
  32. If someone we know has been victimized by someone we met online, report them to Cyber999. We should report anyone who sends us obscene photos or videos, anyone who talks to us about sex, and anyone who asks us to meet offline. Stand up for ourselves and make sure no one else becomes a victim. If we noticed unusual or suspicious activities related to information security or privacy, please report CyberSAFE Malaysia immediately. Promptness in reporting an event will help to mitigate the impact of verified incidents. For any incident related please refer CyberSAFE helpline as follows: http://www.cybersafe.my/cyber999.html 1. Via online – http://www.mycert.org.my/report_incidents/online_form.html 2. Via handphone - MyCERT's Call Reporting number: +6019-2665850. 3. Via sms- CYBER999 REPORT <EMAIL> <COMPLAINT> to 15888 4. Via fax - +603 - 8945 3442 5. Via email - cyber999 [at] cybersecurity.my
  33. You are not alone! Cybersecurity and creating a safe computing environment for families, small businesses and others is a national priority. The government, industry, academic institutions and nonprofits groups across the country are concerned about and engaged in cyber security issues. Please refer to this link: http://www.cybersafe.my/first-aid.html There is an information about threats and trends, and tools to help us. How strong is your password? We can check our password strength, how to create strong password and secrets. Microsoft Security Centre Provides firewall and microsoft security tools Do you update your software application? Provides free antivirus software Other additional information , please refer below links: http://hitachi-id.com/password-manager/docs/choosing-good-password.html http://www.microsoft.com/security/default.aspx http://www.pctools.com/free-antivirus/
  34. CyberSAFE Help: Awareness Talk Invitation The Internet is an immense and valuable resource that unlocks a world of possibilities. Today both adults and children are using the Internet to research a wide array of issues - colleges, health plans, and employment opportunities, among many others. Unfortunately, strangers also have access to these conversations, pictures, and videos. This is why CyberSAFE team has created educational materials in CyberSAFE Portal and give awareness talk to the public. This presentation provides vital information that will help us how to safely enjoy the digital world. By working together, we can keep ourselves safer. Awareness Talk is one of CyberSAFE awareness program whereby the organizer need to complete this CyberSAFE Awareness Talk Invitation( CSAT ) form provided to make a request for Outreach staff to talk at their event. For links, visit : http://www.cybersafe.my/speaker.html Upon submission of the form, CyberSAFE team will get back to you to confirm our participation and/or other arrangements/enquiries within 2 ( two )days of working days.
  35. CyberSAFE Help: Request to Exhibit CyberSAFE Exhibition is one of CyberSAFE awareness program whereby the organizer need to complete request to exhibit form provided to make a request for Outreach staff to participate in their exhibition event. Upon submission of the form, CyberSAFE officers will get back to you to confirm our participation and/or other arrangements/enquiries within 2 ( two )days of working days.
  36. Cyber safety is an important issue for all of us therefore CyberSAFE Malaysia really appreciate user feedback towards CyberSAFE Program and if have any concern about internet safety please leave the message by leave your contact information here and cybersafe team will get back to you as soon as possible. Click on the following link: http://www.cybersafe.my/contact-onlineform.html CyberSAFE Help includes : General enquiry Feedback form Report Cybersafe ambassador program enquiry Cybersafe malaysia facebook enquiry
  37. CyberSAFE Help : Links CyberSAFE also provide links which contains OnGuard Online, Microsoft Security at Home and Useful Resources for public to view more information on security. OnGuard Online is provide practical tips from federal government and the technology industry to help you be on the guard against internet fraud, secure your computer and protect your personal information. Microsoft Security at Home together with other industry leaders, has demonstrated a strong commitment to helping consumers become more secure online via the Trustworthy Computing initiative. Please visit http://www.cybersafe.my/link.html for more details.
  38. Secure our computer with a password so that unauthorized users may not have access to our data and personal/confidential information. If we have a shared computer at home that is used by the children as well, each user should have a login ID and a password and as the head of the family, we should create an Administrator's password. Go to this link to test our password : http://www.cybersafe.my/pswd-cheker/index.html This application is designed to assess the strength of password strings. Just type in our password and get an instant strength rating: Weak, Medium, Strong, or Best. To really pick a good password, we should assume the best case scenario for the attacker, and the worst case scenario for us.   When an attacker brute-forces our password, they basically iterate through all possible character combinations.  Don't worry: Microsoft isn't secretly collecting passwords ,this page doesn't record what we type, it merely generates a response based on the nature of the input. How to create a good password? Please refer below link for more information: httphttp://netforbeginners.about.com/od/antivirusantispyware/tp/5-steps-to-a-strong-password. htm://www.microsoft.com/security/online-privacy/passwords-create.aspx http://www.passwordmeter.com/ http://howsecureismypassword.net/
  39. DontPhishMe v.1.6.0 has been fully reviewed by Mozilla [1] and Google [2] and it is now available to public.   DontPhishMe v.1.6.0 will be the last major changes/release in version 1 and the whole detection method/algorithm will be changed, re-code and release as version 2.   Here are the changelogs of DontPhishMe v.1.6.0:   1) Whitelist only the domain instead of subdomain and domain to prevent false positive 2) Major famous websites' domain added to whitelist to increase performance and reduce resource utilization 3) Added support for Bank Muamalat 4) Added support for BSN
  40. Online banking is becoming much more common. We can pay our bills online and access a record of our checking account transactions online. Online banking is a great feature, and most banks do offer it. Online banking makes everything we do with our finances a bit easier. We can access the information anywhere when have access to the Internet. It makes our financial life much easier to manage. However , there are advantages and disadvantages to be considered by anyone, for the details can refer this website for more information: http://www.buzzle.com/articles/history-of-internet-banking.html http://www.arraydev.com/commerce/jibc/0103_01.htm http://www.finweb.com http://www.gettingmoneywise.com Simply visit this site: http://www.cybersafe.my/online banking-quiz.php Just answer 10 questions to test our computer security skills and learn how we can help protect our online banking information. Please take time while going through the quizzes.
  41. It is critical to remember that the awareness program never ends. It is critical to relay CyberSAFE messages to youth , parents, educators and those who are part of the cyberspace citizen. CyberSAFE Malaysia has continued to develop and expand its existing education materials on the CyberSAFE website. In particular, CyberSAFE program was been expanded to provide additional general cybersafety awareness presentations to teachers, parents and students which highlight the key issues and strategies to minimise potential online risks. Teaching internet safety includes reminding us not to give out private information online, to behave responsibly and respectfully toward others, and to understand the difference between ads and content. Being responsible about online life also means limiting the amount of time we spend online and to balance online activities with other activities. Let’s make the internet a safer place!