SlideShare a Scribd company logo
1 of 10
GROUP 3
1. BEHAVIOUR CYBER-RISKS
MANAGEMENT
2. CONTENT CYBER-RISKS
MANAGEMENT
3. COMMERCIAL & COMMUNITY
CYBER-RISK MANAGEMENT
People are able to control
their online behaviour in
order to contribute to
encouraging and supportive
online communities. They
also show kindness while
interacting with others
online and are aware of the
safety measures in place.
As a victim or bystander in
behavioural cyber risk
occurrences, people can
acquire the necessary
technical, socio-cognitive,
communicative, and decision-
making abilities to handle the
situation and acquire helpful
coping mechanisms to deal
with these unpleasant online
encounters.
Individuals are aware of the
many forms of behavioural
cyberthreats (such as
harassment, stalking, and
cyberbullying), how to avoid
them, how they could be
affected by them and how to
come up with coping
mechanisms.
The ability to identify, mitigate and manage content cyber risks online
People can acquire the necessary
technical, socio-cognitive,
communicative, and decision-
making skills to respond to
incidents of behavioral cyber risks,
whether they find themselves in
the role of a bystander or a victim.
Additionally, they can gain
valuable coping tools to navigate
and address these adverse online
experiences
KNOWLEDGE ATTITUDE/VALUES
SKILLS
Individual comprehend
various forms of behavioral
cyber threats, such as
cyberbullying, harassment,
and stalking. They grasp how
these risks may manifest, the
potential impact on them, and
how to develop strategies to
address these challenges.
People demonstrate acts of
kindness in the online space,
understand the support
systems available for
addressing risks, and possess
the ability to regulate their
online conduct, thereby
contributing to the creation of
positive and supportive online
communities.
1. PERSONAL CYBER SECURITY
MANAGEMENT
2. NETWORK SECURITY
MANAGEMENT
3. ORGANISATIONAL CYBER
SECURITY MANAGEMENT
People are able to recognize
cyberthreats, employ pertinent cyber
security procedures (such as using
firewalls, anti-malware software, and
secure passwords), and utilize
technology without endangering their
devices or data.
When it comes to actions that could
jeopardize the security of their own or
other people's data and devices, people
show resilience, vigilance, and
confidence in their ability to handle
issues.
People are aware of their individual
online risk profiles and know how to
spot various cyberthreats.(such as
malware, scams, and hacking), and also
list the available tactics and resources
they can utilize to stay clear of such
risks.
WHAT IS IT ?
The concept of processes, policies
and technological implementations
to protect the integrity and
confidentiality of data in a shared
network / cloud database. It focuses
on preventing unauthorized access,
attacks and disruptions to the
network infrastructure.
install firewalls /
prevention systems
/ network
segmentation
regular risk
assessments
analyze network
traffic and logs
to detect
security breach
encryption protocols ;-
Virtual Private Networks
(VPN)
strong access
controls such as user
authentication,
authorization and
accounting
mechanism
HOW
IS IT
DONE?
People value cybersecurity and
actively promote it inside their
company by offering suggestions and
direction on best practices, risk
mitigation techniques, and possible
hazards. In order to guarantee the
adoption and observance of security
policies and standards that permit
workable and secure living and
working environments, this entails
developing communication strategies
for communities and organisations.
The operation and financial success of the
company are impacted by the cognitive and
technical abilities people acquire for enhancing
the cyber security systems within their
companies. They predict and evaluate current
and future security threats, and they create and
put into practice intervention plans to proactively
safeguard and maximise an organization's IT
resources in accordance with internal guidelines,
procedures, pertinent laws, and business plans.
In the event of a crisis or tragedy, they also make
it possible for vital IT systems and infrastructure
to recover quickly. Corporate security policies,
frameworks, and guidelines are created and
distributed by them to guarantee that regular
business operations are safe from risks, threats,
and vulnerabilities.
People are aware of the policies,
practices, support architectures, and
processes that organisations use to
control threats, such as antimalware
software that is connected to
organisational data, devices, and
systems. They can create and carry
out their own digital resiliency
strategies and are knowledgeable on
how to manage, use, and store an
organization's IT assets to reduce
possible risks to the business or the
law.
DIGITAL SAFETY & DIGITAL SECURITY in education

More Related Content

Similar to DIGITAL SAFETY & DIGITAL SECURITY in education

Defensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptxDefensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptxInfosectrain3
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemAustin Eppstein
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxsoulscout02
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
Top 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemTop 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemChinmayee Behera
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USACompanySeceon
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-managementMark Gibson
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 

Similar to DIGITAL SAFETY & DIGITAL SECURITY in education (20)

digital marketing
digital marketingdigital marketing
digital marketing
 
Defensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptxDefensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptx
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Cyber Security Companies
Cyber Security CompaniesCyber Security Companies
Cyber Security Companies
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
Top 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemTop 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent Them
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 

More from Mohd Shahril Nizam Shaharom (9)

Drone-based Learning for Project-based Learning (for printing only-real).pptx
Drone-based Learning for Project-based Learning (for printing only-real).pptxDrone-based Learning for Project-based Learning (for printing only-real).pptx
Drone-based Learning for Project-based Learning (for printing only-real).pptx
 
Higher Order Thingking & Lower Order Thinking for Gen Z
Higher Order Thingking & Lower Order Thinking for Gen ZHigher Order Thingking & Lower Order Thinking for Gen Z
Higher Order Thingking & Lower Order Thinking for Gen Z
 
KTP's programmes (Master & PhD).ppt
KTP's programmes (Master & PhD).pptKTP's programmes (Master & PhD).ppt
KTP's programmes (Master & PhD).ppt
 
Team-Based Learning
Team-Based LearningTeam-Based Learning
Team-Based Learning
 
Teams Vs Meet.pptx
Teams Vs Meet.pptxTeams Vs Meet.pptx
Teams Vs Meet.pptx
 
Google Classroom (Lecture 01).pptx
Google Classroom (Lecture 01).pptxGoogle Classroom (Lecture 01).pptx
Google Classroom (Lecture 01).pptx
 
Nota Flowchart.pdf
Nota Flowchart.pdfNota Flowchart.pdf
Nota Flowchart.pdf
 
Minor Teknologi (2022 v ersion).pptx
Minor Teknologi (2022 v ersion).pptxMinor Teknologi (2022 v ersion).pptx
Minor Teknologi (2022 v ersion).pptx
 
Ice Breaking Session
Ice Breaking SessionIce Breaking Session
Ice Breaking Session
 

Recently uploaded

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Recently uploaded (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

DIGITAL SAFETY & DIGITAL SECURITY in education

  • 2.
  • 3. 1. BEHAVIOUR CYBER-RISKS MANAGEMENT 2. CONTENT CYBER-RISKS MANAGEMENT 3. COMMERCIAL & COMMUNITY CYBER-RISK MANAGEMENT
  • 4. People are able to control their online behaviour in order to contribute to encouraging and supportive online communities. They also show kindness while interacting with others online and are aware of the safety measures in place. As a victim or bystander in behavioural cyber risk occurrences, people can acquire the necessary technical, socio-cognitive, communicative, and decision- making abilities to handle the situation and acquire helpful coping mechanisms to deal with these unpleasant online encounters. Individuals are aware of the many forms of behavioural cyberthreats (such as harassment, stalking, and cyberbullying), how to avoid them, how they could be affected by them and how to come up with coping mechanisms.
  • 5. The ability to identify, mitigate and manage content cyber risks online People can acquire the necessary technical, socio-cognitive, communicative, and decision- making skills to respond to incidents of behavioral cyber risks, whether they find themselves in the role of a bystander or a victim. Additionally, they can gain valuable coping tools to navigate and address these adverse online experiences KNOWLEDGE ATTITUDE/VALUES SKILLS Individual comprehend various forms of behavioral cyber threats, such as cyberbullying, harassment, and stalking. They grasp how these risks may manifest, the potential impact on them, and how to develop strategies to address these challenges. People demonstrate acts of kindness in the online space, understand the support systems available for addressing risks, and possess the ability to regulate their online conduct, thereby contributing to the creation of positive and supportive online communities.
  • 6. 1. PERSONAL CYBER SECURITY MANAGEMENT 2. NETWORK SECURITY MANAGEMENT 3. ORGANISATIONAL CYBER SECURITY MANAGEMENT
  • 7. People are able to recognize cyberthreats, employ pertinent cyber security procedures (such as using firewalls, anti-malware software, and secure passwords), and utilize technology without endangering their devices or data. When it comes to actions that could jeopardize the security of their own or other people's data and devices, people show resilience, vigilance, and confidence in their ability to handle issues. People are aware of their individual online risk profiles and know how to spot various cyberthreats.(such as malware, scams, and hacking), and also list the available tactics and resources they can utilize to stay clear of such risks.
  • 8. WHAT IS IT ? The concept of processes, policies and technological implementations to protect the integrity and confidentiality of data in a shared network / cloud database. It focuses on preventing unauthorized access, attacks and disruptions to the network infrastructure. install firewalls / prevention systems / network segmentation regular risk assessments analyze network traffic and logs to detect security breach encryption protocols ;- Virtual Private Networks (VPN) strong access controls such as user authentication, authorization and accounting mechanism HOW IS IT DONE?
  • 9. People value cybersecurity and actively promote it inside their company by offering suggestions and direction on best practices, risk mitigation techniques, and possible hazards. In order to guarantee the adoption and observance of security policies and standards that permit workable and secure living and working environments, this entails developing communication strategies for communities and organisations. The operation and financial success of the company are impacted by the cognitive and technical abilities people acquire for enhancing the cyber security systems within their companies. They predict and evaluate current and future security threats, and they create and put into practice intervention plans to proactively safeguard and maximise an organization's IT resources in accordance with internal guidelines, procedures, pertinent laws, and business plans. In the event of a crisis or tragedy, they also make it possible for vital IT systems and infrastructure to recover quickly. Corporate security policies, frameworks, and guidelines are created and distributed by them to guarantee that regular business operations are safe from risks, threats, and vulnerabilities. People are aware of the policies, practices, support architectures, and processes that organisations use to control threats, such as antimalware software that is connected to organisational data, devices, and systems. They can create and carry out their own digital resiliency strategies and are knowledgeable on how to manage, use, and store an organization's IT assets to reduce possible risks to the business or the law.