This program is a collaboration between Bahagian Teknologi Pendidikan (BTP), Kementerian Pendidikan Malaysia and CyberSecurity Malaysia (CSM) to raise security awareness among students. The program was officiated by Tan Sri Dato’ Muhyiddin Yassin, Minister of Kementerian Pendidikan Malaysia during the launching of CyberSAFE in School program in 2010 at Kota Marudu Sabah.
CyberSAFE ambassador program comprises of six lessons on security awareness and one presentation session in order to develop competencies to become CyberSAFE ambassador.
Lets begin our lessons!
The objectives of this program are
1) To become BTP CSM CyberSAFE Ambassador and roll out CyberSAFE programs and activities in schools
In order to increase security awareness among students , the role of CyberSAFE ambassador is critical to roll out CyberSAFE programs and activities in schools. This program will train the participants on various aspect of security awareness so that the participants will have sufficient knowledge to become CyberSAFE ambassador.
2) To educate school students to become responsible digital citizen and cyber safety savvy
Upon completion of this program, the trained participant will assume the role of CyberSAFE ambassador to impart the CyberSAFE messages to students so that they will become responsible digital citizen and cyber safety savvy.
This program comprises of three stages:
Stage 1 - CyberSAFE Ambassador Development The participants will be trained to be CyberSAFE Ambassador which responsible to conduct CyberSAFE Program in their respective schools. This program will disseminate sufficient knowledge, skillset and toolset in cyber safety to the future CyberSAFE Ambassador.
Stage 2 - CyberSAFE in Schools The trained participants will relay CyberSAFE message to their students at schools in various format such as speaking engagement (seminar, workshop, talks ) and interactive (treasure hunt, quiz, competition). The main objective is to educate our young generation to be cyber safety savvy.
Stage 3 - School Project & Community Engagement There are many potential activities can be organised in order to get active participation from students such as securing the computer lab - to ensure the safe environment in computer lab promoting my school to the world - to positively use of internet
Lesson 1 - Introduction to CyberSAFE Website This lesson will introduce the cyber safety resources website i.e. CyberSAFE website which contains guideline, tips and tricks, video, games and many more.
Lesson 2 - Power Search Using Google Participants will learn the internet searching skills to find information on the internet. This lesson teaches the interesting search techniques by using Google search engine. Information is power!
Lesson 3 - Secure the Computer It is important for us to secure our computer from malicious attacks. This lesson highlights 10 common mistakes made by computer users in securing their computers. Take notes on how to mitigate the potential threats so that we can protect our computers.
Lesson 4 - Secure the Human This lesson exposes the most vulnerable parameter in the security defenses i.e. the computer users. Learn how cyber criminals take advantage of users’ ignorance, interests and trust to compromise our online accounts and computers.
Lesson 5 - WiFi Network Security The lesson highlights the flaws in WiFi networks so that we understand the potential threats at WiFi hotspots.
Lesson 6 - Facebook Security Learn on how to secure our Facebook account so that our personal info can be protected. We will discuss clickjacking, survey scam and privacy setting.
This program timeline can be adjusted based on case-by-case situation. Our main objective is to has very conducive learning environment in this program.
The trainer will seek the common ground on the realistic schedule before commencing the lessons.
The program requirements are as follows
1) Venue classroom setup for maximum of 30 participants classroom is expected for learning environment i.e. cool temperature, sufficient numbers of desks and chairs, electrical power points, microphone, external audio speaker, high resolution projector and white screen) classroom person-in-charge for setting up the class based on requirement
2) Computer there are two options - organiser provides the computer or participants bring own laptop. Windows operating systems - Win XP, Win Vista or Win 7 admin user rights is expected - to install, remove application and to change the configuration Google Chrome as the standard web browser
3) Internet high speed internet connection is highly anticipated for this program bring own wireless broadband is most welcome in order to avoid disappointment if possible – no content filtering mechanism.
In order to have a conducive learning environment for this program, there are roles and responsibility to be assumed by the organiser, trainer(s) and participants. Without clear understanding of our roles and responsibilities, the program will end up with unpleasant circumstances.
1) The roles and responsibilities for the ORGANISER coordinate the program - schedule, trainers, participants, venues program requirements - for TRAINERS (microphones, high resolution projector, white screen, 3-points power extension) - for PARTICIPANT (computer, wireless broadband/wireless card, program materials) - for venue ( classroom setup, power points, high speed WiFi network) resourceful and dedicated person-in-charge to ensure the smooth coordination
2) The roles and responsibilities for the TRAINER(S) communicate with the organiser - coordination (travelling, venue, material, participants) verify all requirements are met with organiser facilitate the participants to digest the materials evaluate the participants achievement
3) The roles and responsibilities for the PARTICIPANTS be serious to learn this material in this program - try not to be a joker in the class no disruption during this program - turn off mobile phone or put in silent mode be on time for every lesson - class will commence as scheduled get ready with program materials, your laptop is ON and internet access is working refer to USEFUL RESOURCES slide for references - terminology , foundation knowledge be proactive and think before you ask - be independent learner
In this program, the participants are expected to conduct 5-minutes presentation before the class at the end of program. The presentation will be evaluated by the trainer(s) in terms of core message development and delivery creativity in slide design and slideware literacy oral communication and presentation competency effort to complete the activity
1) Select Presentation Topic Please consult with the trainer(s) for selection of presentation topic. The nature of this program, we welcome any topics within the following domains how to use antivirus, antispyware and antirootkit software how to use social media , clouds application , online tools how to use Windows-based utility tools , built-in Windows tools how to use web browsers, add-on for web browser
2) Select Slide Design Presentation slide must contains title slide, objectives slide, table of contents slide, intro to tool / application / software slide, features slide, benefit slide, how-to-use slide and conclusion slide. No limit on the number of slides.
3) Presentation Delivery This is a short presentation session. Therefore, the participant is expected to present the presentation content only. No welcome speech and question and answer session. We are not expected entertainment but the slide contents and presentation delivery.
In this program, we are expected to be independent learners. Therefore, spoon-feed type of learners are not welcome in this program. Be proactive!
The following are the useful resources :
1) General Resources Wikipedia - http://en.wikipedia.org/ eHow - http://www.ehow.com/
2) Information Technology Resources Computer Glossary - http://whatis.techtarget.com/ HowStuffWorks (Computer) - http://computer.howstuffworks.com/ Microsoft Windows - http://windows.microsoft.com/en-US/windows/home Microsoft Safety & Security Center - http://www.microsoft.com/security/default.aspx Security Glossary - http://www.sans.org/security-resources/glossary-of-terms/
3) Language Resources Local Language Translation Tool - http://www.citcat.com/ Dictionary.com - http://dictionary.reference.com/ Merriam-Webster - http://www.merriam-webster.com/dictionary.htm
Please refer to this slide for terms and terminology networking and security concept Microsoft products
The world has dramatically moving in tremendous speed. New innovation and technological advancement require us to unlearn everything we knew. There is no such things as timeless knowledge in information technology domain. Some of our knowledge may be considered as outdated due to it can not be applied in today's reality.
However, some of us may think otherwise. The following are three common dogma among us
“I have PHD in IT!” In information technology, those who spend their time, attention and energy in specific technology are those who are adept in that technology. Paper qualification is not the parameter to address the specialization in technology. There is a case when the individual who do not possess any paper qualification is the expert of certain specific knowledge domain .
“I’m to old for these stuffs” We are not product of circumstances but we are the product of our own choices. We have the choice to choose to learn new stuffs or the choice to be ignorance person. Therefore, we had to choose wisely.
“It’s not related to my job scope” If we are exercise creative muscles in our brain, we will find how to make it relevant to our daily life routine. Think – make it relevant or make it irrelevant!
Learning is a lifelong journey regardless who we are, what we have and how busy we are. Now lets start our journey to understand about cyber safety.