SlideShare a Scribd company logo
1 of 20
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
A Presentation on
Cyber Security Awareness Survey
Submitted to:
Dr. C.P. Gupta
(Professor)
Presented By:
Akshat Malav
Pooja Sharma
Mahenoor Khan
[M.Tech.(CS) 1st Semester]
Session: 2023-24
CONTENT
• What is cyber security.
• Three pillars of cyber security.
• Key Concepts of cyber security.
• Why awareness is important?
• Common cyber security concerns.
• How to stay safe?
• Survey charts and demographics.
• Conclusion
WHAT IS CYBER SECURITY?
• Cyber security, also known as information technology
security (IT security), is the practice of protecting systems,
networks, and programs from digital attacks.
• It uses technologies, processes, and practices to protect
against damage, attack, or unauthorized access to devices,
programs, networks, and data.
THREE PILLARS OF CYBER SECURITY
• People are the key components to consider when
you administer and protect a company or
individual’s assets by driving the cyber security
process, from multiple angles.
• Process and policy help provide the framework for
governance and also define procedures that can be
measured over time.
• Technology is the hardware and software that
departments use to achieve reliable cyber security.
They are the mechanisms IT people build processes
around to prevent compromises to an IT
infrastructure.
KEY CONCEPTS OF CYBER SECURITY
• Confidentiality refers to processes organizations
take to protect data from unauthorized use. This
helps keep sensitive information secure.
• Integrity has to do with maintaining accurate
and complete information by protecting it from
unauthorized alterations.
• Availability, covers data's accessibility to
authorized viewers. This means that those who
have the authority to view or change information
can do so.
WHY AWARENESS IS IMPORTANT?
COMMON CYBER SECURITY CONCERNS
HOW TO STAY SAFE?
SURVEY CHARTS AND DEMOGRAPHICS
CONCLUSION
Demographic Information:
• Age: The majority of respondents fall within the 18-24 age group, followed by
25-34 and 35-44.
• Education Level: Most respondents have at least a Bachelor's degree.
• Employment Status: The respondents include students, employed individuals,
and a few unemployed and retired individuals.
Cybersecurity Awareness:
• Most respondents use the internet multiple times a day and are confident in
recognizing phishing emails.
• However, a significant portion has not received formal cybersecurity training,
indicating potential gaps in knowledge and awareness.
• While many respondents use strong, unique passwords, a notable number are
not familiar with or do not use two-factor authentication (2FA).
Security Practices:
• A considerable percentage of respondents have not experienced a cyber
attack or data breach, and were nor very much aware about it.
• Regular data backup practices vary among respondents, with some backing
up data weekly or more frequently, while others do so rarely or never.
• Precautions taken when using public Wi-Fi vary, with some always using a
VPN and others not taking specific precautions and some don’t even know
what kind of tool a VPN is.
General Perception:
• Respondents generally express varying levels of concern about online
privacy and security, with some being very concerned and others less so.
• Sources relied upon for cybersecurity information include social media,
news websites, and online security blogs. Some are dependant on friends
and family.
Online Behavior:
• Many respondents admit to using the same password across multiple online
accounts, indicating a potential security risk.
Knowledge Assessment:
• Knowledge of identifying secure websites and actions to take when suspecting
malware infection is very poor among most respondents.
Emergency Preparedness:
• Knowledge about steps to take in the event of a cybersecurity incident varies
among respondents, with some having a plan and others being unsure.
Education and Awareness:
• Respondents have different sources of learning about cybersecurity best practices,
including school, workplace training, self-research, and friends and family.
• Perceptions about the effectiveness of current educational efforts vary.
Future Concerns:
• Respondents express varying levels of concern about the increasing use of
artificial intelligence and its potential impact on cybersecurity.
• Views on the future of online security also vary, with some expecting
improvement and others expressing uncertainty and some are not sure that how it
will impact them.
The data shows that only handful amount of people are doing well with
cybersecurity, but others and most of them need to improve a lot. We
should teach different groups how to stay safe online through targeted
campaigns. Since cyber threats keep changing, we need to keep learning
and updating our security measures. By doing this, we can better protect
ourselves and make the internet safer for everyone. This can be done with
the efforts of each and every individual.
By combining proactive education efforts with vigilant monitoring and
adaptation, organizations and individuals can better protect themselves
against cybersecurity threats and contribute to a safer online environment
for everyone.
THANK YOU

More Related Content

Similar to Cyber awareness ppt on the recorded data

google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-usersThomas Hughes
 
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented MigrantsPrivacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented MigrantsSara Vannini
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...Investorideas.com
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04kevin_donovan
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxShreeveni
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptxWeyai1
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 

Similar to Cyber awareness ppt on the recorded data (20)

Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented MigrantsPrivacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Jisc e-safety
Jisc e-safety Jisc e-safety
Jisc e-safety
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
information security management
information security managementinformation security management
information security management
 
Jason r mc kinney halfday
Jason r mc kinney halfdayJason r mc kinney halfday
Jason r mc kinney halfday
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

Recently uploaded

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 

Recently uploaded (20)

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 

Cyber awareness ppt on the recorded data

  • 1. RAJASTHAN TECHNICAL UNIVERSITY, KOTA DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING A Presentation on Cyber Security Awareness Survey Submitted to: Dr. C.P. Gupta (Professor) Presented By: Akshat Malav Pooja Sharma Mahenoor Khan [M.Tech.(CS) 1st Semester] Session: 2023-24
  • 2. CONTENT • What is cyber security. • Three pillars of cyber security. • Key Concepts of cyber security. • Why awareness is important? • Common cyber security concerns. • How to stay safe? • Survey charts and demographics. • Conclusion
  • 3. WHAT IS CYBER SECURITY? • Cyber security, also known as information technology security (IT security), is the practice of protecting systems, networks, and programs from digital attacks. • It uses technologies, processes, and practices to protect against damage, attack, or unauthorized access to devices, programs, networks, and data.
  • 4. THREE PILLARS OF CYBER SECURITY • People are the key components to consider when you administer and protect a company or individual’s assets by driving the cyber security process, from multiple angles. • Process and policy help provide the framework for governance and also define procedures that can be measured over time. • Technology is the hardware and software that departments use to achieve reliable cyber security. They are the mechanisms IT people build processes around to prevent compromises to an IT infrastructure.
  • 5. KEY CONCEPTS OF CYBER SECURITY • Confidentiality refers to processes organizations take to protect data from unauthorized use. This helps keep sensitive information secure. • Integrity has to do with maintaining accurate and complete information by protecting it from unauthorized alterations. • Availability, covers data's accessibility to authorized viewers. This means that those who have the authority to view or change information can do so.
  • 6. WHY AWARENESS IS IMPORTANT?
  • 8. HOW TO STAY SAFE?
  • 9. SURVEY CHARTS AND DEMOGRAPHICS
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. CONCLUSION Demographic Information: • Age: The majority of respondents fall within the 18-24 age group, followed by 25-34 and 35-44. • Education Level: Most respondents have at least a Bachelor's degree. • Employment Status: The respondents include students, employed individuals, and a few unemployed and retired individuals. Cybersecurity Awareness: • Most respondents use the internet multiple times a day and are confident in recognizing phishing emails. • However, a significant portion has not received formal cybersecurity training, indicating potential gaps in knowledge and awareness. • While many respondents use strong, unique passwords, a notable number are not familiar with or do not use two-factor authentication (2FA).
  • 17. Security Practices: • A considerable percentage of respondents have not experienced a cyber attack or data breach, and were nor very much aware about it. • Regular data backup practices vary among respondents, with some backing up data weekly or more frequently, while others do so rarely or never. • Precautions taken when using public Wi-Fi vary, with some always using a VPN and others not taking specific precautions and some don’t even know what kind of tool a VPN is. General Perception: • Respondents generally express varying levels of concern about online privacy and security, with some being very concerned and others less so. • Sources relied upon for cybersecurity information include social media, news websites, and online security blogs. Some are dependant on friends and family.
  • 18. Online Behavior: • Many respondents admit to using the same password across multiple online accounts, indicating a potential security risk. Knowledge Assessment: • Knowledge of identifying secure websites and actions to take when suspecting malware infection is very poor among most respondents. Emergency Preparedness: • Knowledge about steps to take in the event of a cybersecurity incident varies among respondents, with some having a plan and others being unsure. Education and Awareness: • Respondents have different sources of learning about cybersecurity best practices, including school, workplace training, self-research, and friends and family. • Perceptions about the effectiveness of current educational efforts vary. Future Concerns: • Respondents express varying levels of concern about the increasing use of artificial intelligence and its potential impact on cybersecurity. • Views on the future of online security also vary, with some expecting improvement and others expressing uncertainty and some are not sure that how it will impact them.
  • 19. The data shows that only handful amount of people are doing well with cybersecurity, but others and most of them need to improve a lot. We should teach different groups how to stay safe online through targeted campaigns. Since cyber threats keep changing, we need to keep learning and updating our security measures. By doing this, we can better protect ourselves and make the internet safer for everyone. This can be done with the efforts of each and every individual. By combining proactive education efforts with vigilant monitoring and adaptation, organizations and individuals can better protect themselves against cybersecurity threats and contribute to a safer online environment for everyone.