4. People are able to control
their online behaviour in
order to contribute to
encouraging and supportive
online communities. They
also show kindness while
interacting with others
online and are aware of the
safety measures in place.
As a victim or bystander in
behavioural cyber risk
occurrences, people can
acquire the necessary
technical, socio-cognitive,
communicative, and decision-
making abilities to handle the
situation and acquire helpful
coping mechanisms to deal
with these unpleasant online
encounters.
Individuals are aware of the
many forms of behavioural
cyberthreats (such as
harassment, stalking, and
cyberbullying), how to avoid
them, how they could be
affected by them and how to
come up with coping
mechanisms.
5. The ability to identify, mitigate and manage content cyber risks online
People can acquire the necessary
technical, socio-cognitive,
communicative, and decision-
making skills to respond to
incidents of behavioral cyber risks,
whether they find themselves in
the role of a bystander or a victim.
Additionally, they can gain
valuable coping tools to navigate
and address these adverse online
experiences
KNOWLEDGE ATTITUDE/VALUES
SKILLS
Individual comprehend
various forms of behavioral
cyber threats, such as
cyberbullying, harassment,
and stalking. They grasp how
these risks may manifest, the
potential impact on them, and
how to develop strategies to
address these challenges.
People demonstrate acts of
kindness in the online space,
understand the support
systems available for
addressing risks, and possess
the ability to regulate their
online conduct, thereby
contributing to the creation of
positive and supportive online
communities.
7. People are able to recognize
cyberthreats, employ pertinent cyber
security procedures (such as using
firewalls, anti-malware software, and
secure passwords), and utilize
technology without endangering their
devices or data.
When it comes to actions that could
jeopardize the security of their own or
other people's data and devices, people
show resilience, vigilance, and
confidence in their ability to handle
issues.
People are aware of their individual
online risk profiles and know how to
spot various cyberthreats.(such as
malware, scams, and hacking), and also
list the available tactics and resources
they can utilize to stay clear of such
risks.
8. WHAT IS IT ?
The concept of processes, policies
and technological implementations
to protect the integrity and
confidentiality of data in a shared
network / cloud database. It focuses
on preventing unauthorized access,
attacks and disruptions to the
network infrastructure.
install firewalls /
prevention systems
/ network
segmentation
regular risk
assessments
analyze network
traffic and logs
to detect
security breach
encryption protocols ;-
Virtual Private Networks
(VPN)
strong access
controls such as user
authentication,
authorization and
accounting
mechanism
HOW
IS IT
DONE?
9. People value cybersecurity and
actively promote it inside their
company by offering suggestions and
direction on best practices, risk
mitigation techniques, and possible
hazards. In order to guarantee the
adoption and observance of security
policies and standards that permit
workable and secure living and
working environments, this entails
developing communication strategies
for communities and organisations.
The operation and financial success of the
company are impacted by the cognitive and
technical abilities people acquire for enhancing
the cyber security systems within their
companies. They predict and evaluate current
and future security threats, and they create and
put into practice intervention plans to proactively
safeguard and maximise an organization's IT
resources in accordance with internal guidelines,
procedures, pertinent laws, and business plans.
In the event of a crisis or tragedy, they also make
it possible for vital IT systems and infrastructure
to recover quickly. Corporate security policies,
frameworks, and guidelines are created and
distributed by them to guarantee that regular
business operations are safe from risks, threats,
and vulnerabilities.
People are aware of the policies,
practices, support architectures, and
processes that organisations use to
control threats, such as antimalware
software that is connected to
organisational data, devices, and
systems. They can create and carry
out their own digital resiliency
strategies and are knowledgeable on
how to manage, use, and store an
organization's IT assets to reduce
possible risks to the business or the
law.