SlideShare une entreprise Scribd logo
1  sur  11
Copyright © 2014CyberSecurity Malaysia
CyberSecurity Malaysia
CyberSAFE Ambassador Program
2
Program Objectives
To become CSM CyberSAFE Ambassador and roll out
CyberSAFE programs and activities in schools
To educate school students to be become responsible
digital citizen and cyber safety savvy.
Ambassador
Students
Copyright © 2014CyberSecurity Malaysia
3
Program Roadmap
Ambassador Students
Securing the
computer lab
promoting my
school to the world
CyberSAFE
Ambassador
Development
Stage 1
CyberSAFE
@
Schools
Stage 2
School Project
& Community
Engagement
Stage 3
Copyright © 2014CyberSecurity Malaysia
4
Program Lessons
Lesson 1 Introduction to CyberSAFE Website
Lesson 2 Power Search Using Google
Lesson 3 Secure the Computer
Lesson 4 Secure the Human
Lesson 5 WiFi Network Security
Lesson 6 Facebook Security
CSM CyberSAFE
Ambassador Program
Copyright © 2014CyberSecurity Malaysia
5
Program Timeline
DAY 1 DAY 2 DAY 3
0900 - 1030 Introduction,
Admin & Logistic
Lesson 3
Secure the Computer
Lesson 6
Facebook Security
1030 - 1100 Coffee Break
1100 - 1300 Lesson 1
Intro CyberSAFE Portal
Lesson 4
Secure the Human
Presentation
1300 - 1400 Lunch Break
1400 - 1600 Lesson 2
Power Search Google
Lesson 5
WiFi Network Security
Presentation
1600 - 1630 Coffee Break
1630 - 1700 Individual Assignment Individual Assignment End of Class
6
Program Requirements
1
2
3
Venue
Computer
Internet
Copyright © 2014CyberSecurity Malaysia
7
Roles & Responsibilities
1
2
3
Organiser
Trainers
Participants
Copyright © 2014CyberSecurity Malaysia
8
Participant Activity
1
2
3
Presentation Delivery
Select Presentation Topic
Presentation Slide Design
Copyright © 2014CyberSecurity Malaysia
9
Useful Resources
General
Resources
Information
Technology
Resources
Language
Resources
Copyright © 2014CyberSecurity Malaysia
10
We now accept the fact that learning is a lifelong process of keeping abreast of
change. And the most pressing task is to teach people how to learn - Peter Drucker
Copyright © 2013 CyberSecurity Malaysia 11

Contenu connexe

Tendances

BITE Social Case Study 1
BITE Social Case Study 1BITE Social Case Study 1
BITE Social Case Study 1Tamara Wilson
 
2015 brochure majorscience-virageneco
2015 brochure majorscience-virageneco2015 brochure majorscience-virageneco
2015 brochure majorscience-viragenecoMaziar Yari
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 

Tendances (9)

Instagram safety
Instagram safetyInstagram safety
Instagram safety
 
BITE Social Case Study 1
BITE Social Case Study 1BITE Social Case Study 1
BITE Social Case Study 1
 
Naswiz perfect app
Naswiz perfect appNaswiz perfect app
Naswiz perfect app
 
Instagram
InstagramInstagram
Instagram
 
Ingles
InglesIngles
Ingles
 
Mezcal Security Vehicles brochure 2016
Mezcal Security Vehicles brochure 2016Mezcal Security Vehicles brochure 2016
Mezcal Security Vehicles brochure 2016
 
2015 brochure majorscience-virageneco
2015 brochure majorscience-virageneco2015 brochure majorscience-virageneco
2015 brochure majorscience-virageneco
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Naswiz twitterpage app
Naswiz twitterpage appNaswiz twitterpage app
Naswiz twitterpage app
 

En vedette (6)

Taklimat PBPP: 1.pelaksanaan pbppp tot ppd
Taklimat PBPP: 1.pelaksanaan pbppp tot ppdTaklimat PBPP: 1.pelaksanaan pbppp tot ppd
Taklimat PBPP: 1.pelaksanaan pbppp tot ppd
 
Taklimat PBPPP: Muka depan manual am
Taklimat PBPPP: Muka depan manual am Taklimat PBPPP: Muka depan manual am
Taklimat PBPPP: Muka depan manual am
 
Taklimat PBPPP: 5. Instrumen Keberhasilan Pengetua dan Guru Besar
Taklimat PBPPP: 5. Instrumen Keberhasilan Pengetua dan Guru BesarTaklimat PBPPP: 5. Instrumen Keberhasilan Pengetua dan Guru Besar
Taklimat PBPPP: 5. Instrumen Keberhasilan Pengetua dan Guru Besar
 
Taklimat PBPP: Manual am pelaksanaan pbppp
Taklimat PBPP: Manual am pelaksanaan pbpppTaklimat PBPP: Manual am pelaksanaan pbppp
Taklimat PBPP: Manual am pelaksanaan pbppp
 
Taklimat PBPP: 3. Instrumen PBPPP
Taklimat PBPP: 3. Instrumen PBPPPTaklimat PBPP: 3. Instrumen PBPPP
Taklimat PBPP: 3. Instrumen PBPPP
 
Taklimat PBPP: Modul sistem e prestasi
Taklimat PBPP: Modul sistem e prestasiTaklimat PBPP: Modul sistem e prestasi
Taklimat PBPP: Modul sistem e prestasi
 

Similaire à 00 introduction to cyber safe ambassador program

HeartBleed Bug, by Megat Muazzam [APNIC 38]
HeartBleed Bug, by Megat Muazzam [APNIC 38]HeartBleed Bug, by Megat Muazzam [APNIC 38]
HeartBleed Bug, by Megat Muazzam [APNIC 38]APNIC
 
2022 Foreign Technical Training Program SIMP 1 (2).pdf
2022 Foreign Technical Training Program SIMP 1 (2).pdf2022 Foreign Technical Training Program SIMP 1 (2).pdf
2022 Foreign Technical Training Program SIMP 1 (2).pdfveer982728
 
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015Marc Lijour, OCT, BSc, MBA
 
Nasr zayed.cv 03052015
Nasr zayed.cv 03052015Nasr zayed.cv 03052015
Nasr zayed.cv 03052015NaSr Zayed
 
Aventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis School of Management
 
Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0The World Bank
 
Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013Zoraini Wati Abas, EdD
 
History of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumarHistory of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumarSivakumar R D .
 
AAUA E-learning Platform Training.
AAUA  E-learning Platform Training.AAUA  E-learning Platform Training.
AAUA E-learning Platform Training.Rafiat Aliyu
 
Connecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile DevicesConnecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile DevicesJamesDiffin
 
Managing Multiple Project Priorities
Managing Multiple Project PrioritiesManaging Multiple Project Priorities
Managing Multiple Project PrioritiesMike KEPPELL
 
Navigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney InstituteNavigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney Institutestephan Ridgway
 
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)Professor Abd Karim Alias
 
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...Leanne Isaacson
 
120329 isba the way forward web version
120329 isba the way forward   web version120329 isba the way forward   web version
120329 isba the way forward web versionMark S. Steed
 
EdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom ProjectEdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom ProjectHazril Hafiz
 

Similaire à 00 introduction to cyber safe ambassador program (20)

HeartBleed Bug, by Megat Muazzam [APNIC 38]
HeartBleed Bug, by Megat Muazzam [APNIC 38]HeartBleed Bug, by Megat Muazzam [APNIC 38]
HeartBleed Bug, by Megat Muazzam [APNIC 38]
 
CV Hafizah 2019
CV Hafizah 2019CV Hafizah 2019
CV Hafizah 2019
 
2022 Foreign Technical Training Program SIMP 1 (2).pdf
2022 Foreign Technical Training Program SIMP 1 (2).pdf2022 Foreign Technical Training Program SIMP 1 (2).pdf
2022 Foreign Technical Training Program SIMP 1 (2).pdf
 
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
 
Nasr zayed.cv 03052015
Nasr zayed.cv 03052015Nasr zayed.cv 03052015
Nasr zayed.cv 03052015
 
Aventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber security
 
Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0
 
Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013
 
History of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumarHistory of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumar
 
AVBENAKE Chris CV
AVBENAKE Chris CVAVBENAKE Chris CV
AVBENAKE Chris CV
 
AAUA E-learning Platform Training.
AAUA  E-learning Platform Training.AAUA  E-learning Platform Training.
AAUA E-learning Platform Training.
 
Connecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile DevicesConnecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile Devices
 
Managing Multiple Project Priorities
Managing Multiple Project PrioritiesManaging Multiple Project Priorities
Managing Multiple Project Priorities
 
Navigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney InstituteNavigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney Institute
 
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
 
Report%20 Mix#2 2003 Ver
Report%20 Mix#2 2003 VerReport%20 Mix#2 2003 Ver
Report%20 Mix#2 2003 Ver
 
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
 
120329 isba the way forward web version
120329 isba the way forward   web version120329 isba the way forward   web version
120329 isba the way forward web version
 
EdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom ProjectEdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom Project
 
Globalised online learning (shift 9 mheb)
Globalised online learning (shift 9 mheb)Globalised online learning (shift 9 mheb)
Globalised online learning (shift 9 mheb)
 

Plus de Ministry of Education Malaysia

Plus de Ministry of Education Malaysia (20)

Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMKFail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMK
 
Panduan Fail Meja
Panduan Fail MejaPanduan Fail Meja
Panduan Fail Meja
 
Modul 1 Scratch
Modul 1 ScratchModul 1 Scratch
Modul 1 Scratch
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
Hack me now, hack me then @ btp
Hack me now, hack me then @ btpHack me now, hack me then @ btp
Hack me now, hack me then @ btp
 
07 end
07 end07 end
07 end
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
02 power search using google
02 power search using google02 power search using google
02 power search using google
 
Manual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLEManual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLE
 
Mtg v5.0 full pdf bm
Mtg v5.0 full pdf bmMtg v5.0 full pdf bm
Mtg v5.0 full pdf bm
 
Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014 Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014
 
Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7
 
Pembentangan TMK
Pembentangan TMKPembentangan TMK
Pembentangan TMK
 
Makna "PLuG TMK"...
Makna "PLuG TMK"...Makna "PLuG TMK"...
Makna "PLuG TMK"...
 
Kumpulan 6
Kumpulan 6Kumpulan 6
Kumpulan 6
 
Kumpulan 3
Kumpulan 3Kumpulan 3
Kumpulan 3
 

00 introduction to cyber safe ambassador program

Notes de l'éditeur

  1. Welcome! This program is a collaboration between Bahagian Teknologi Pendidikan (BTP), Kementerian Pendidikan Malaysia and CyberSecurity Malaysia (CSM) to raise security awareness among students. The program was officiated by Tan Sri Dato’ Muhyiddin Yassin, Minister of Kementerian Pendidikan Malaysia during the launching of CyberSAFE in School program in 2010 at Kota Marudu Sabah. CyberSAFE ambassador program comprises of six lessons on security awareness and one presentation session in order to develop competencies to become CyberSAFE ambassador. Lets begin our lessons!
  2. The objectives of this program are 1) To become BTP CSM CyberSAFE Ambassador and roll out CyberSAFE programs and activities in schools In order to increase security awareness among students , the role of CyberSAFE ambassador is critical to roll out CyberSAFE programs and activities in schools. This program will train the participants on various aspect of security awareness so that the participants will have sufficient knowledge to become CyberSAFE ambassador. 2) To educate school students to become responsible digital citizen and cyber safety savvy Upon completion of this program, the trained participant will assume the role of CyberSAFE ambassador to impart the CyberSAFE messages to students so that they will become responsible digital citizen and cyber safety savvy.
  3. This program comprises of three stages: Stage 1 - CyberSAFE Ambassador Development The participants will be trained to be CyberSAFE Ambassador which responsible to conduct CyberSAFE Program in their respective schools. This program will disseminate sufficient knowledge, skillset and toolset in cyber safety to the future CyberSAFE Ambassador. Stage 2 - CyberSAFE in Schools The trained participants will relay CyberSAFE message to their students at schools in various format such as speaking engagement (seminar, workshop, talks ) and interactive (treasure hunt, quiz, competition). The main objective is to educate our young generation to be cyber safety savvy. Stage 3 - School Project & Community Engagement There are many potential activities can be organised in order to get active participation from students such as securing the computer lab - to ensure the safe environment in computer lab promoting my school to the world - to positively use of internet
  4. Lesson 1 - Introduction to CyberSAFE Website This lesson will introduce the cyber safety resources website i.e. CyberSAFE website which contains guideline, tips and tricks, video, games and many more. Lesson 2 - Power Search Using Google Participants will learn the internet searching skills to find information on the internet. This lesson teaches the interesting search techniques by using Google search engine. Information is power! Lesson 3 - Secure the Computer It is important for us to secure our computer from malicious attacks. This lesson highlights 10 common mistakes made by computer users in securing their computers. Take notes on how to mitigate the potential threats so that we can protect our computers. Lesson 4 - Secure the Human This lesson exposes the most vulnerable parameter in the security defenses i.e. the computer users. Learn how cyber criminals take advantage of users’ ignorance, interests and trust to compromise our online accounts and computers. Lesson 5 - WiFi Network Security The lesson highlights the flaws in WiFi networks so that we understand the potential threats at WiFi hotspots. Lesson 6 - Facebook Security Learn on how to secure our Facebook account so that our personal info can be protected. We will discuss clickjacking, survey scam and privacy setting.
  5. This program timeline can be adjusted based on case-by-case situation. Our main objective is to has very conducive learning environment in this program. The trainer will seek the common ground on the realistic schedule before commencing the lessons.
  6. The program requirements are as follows 1) Venue classroom setup for maximum of 30 participants classroom is expected for learning environment i.e. cool temperature, sufficient numbers of desks and chairs, electrical power points, microphone, external audio speaker, high resolution projector and white screen) classroom person-in-charge for setting up the class based on requirement 2) Computer there are two options - organiser provides the computer or participants bring own laptop. Windows operating systems - Win XP, Win Vista or Win 7 admin user rights is expected - to install, remove application and to change the configuration Google Chrome as the standard web browser 3) Internet high speed internet connection is highly anticipated for this program bring own wireless broadband is most welcome in order to avoid disappointment if possible – no content filtering mechanism.
  7. In order to have a conducive learning environment for this program, there are roles and responsibility to be assumed by the organiser, trainer(s) and participants. Without clear understanding of our roles and responsibilities, the program will end up with unpleasant circumstances. 1) The roles and responsibilities for the ORGANISER coordinate the program - schedule, trainers, participants, venues program requirements - for TRAINERS (microphones, high resolution projector, white screen, 3-points power extension) - for PARTICIPANT (computer, wireless broadband/wireless card, program materials) - for venue ( classroom setup, power points, high speed WiFi network) resourceful and dedicated person-in-charge to ensure the smooth coordination 2) The roles and responsibilities for the TRAINER(S) communicate with the organiser - coordination (travelling, venue, material, participants) verify all requirements are met with organiser facilitate the participants to digest the materials evaluate the participants achievement 3) The roles and responsibilities for the PARTICIPANTS be serious to learn this material in this program - try not to be a joker in the class no disruption during this program - turn off mobile phone or put in silent mode be on time for every lesson - class will commence as scheduled get ready with program materials, your laptop is ON and internet access is working refer to USEFUL RESOURCES slide for references - terminology , foundation knowledge be proactive and think before you ask - be independent learner
  8. In this program, the participants are expected to conduct 5-minutes presentation before the class at the end of program. The presentation will be evaluated by the trainer(s) in terms of core message development and delivery creativity in slide design and slideware literacy oral communication and presentation competency effort to complete the activity 1) Select Presentation Topic Please consult with the trainer(s) for selection of presentation topic. The nature of this program, we welcome any topics within the following domains how to use antivirus, antispyware and antirootkit software how to use social media , clouds application , online tools how to use Windows-based utility tools , built-in Windows tools how to use web browsers, add-on for web browser 2) Select Slide Design Presentation slide must contains title slide, objectives slide, table of contents slide, intro to tool / application / software slide, features slide, benefit slide, how-to-use slide and conclusion slide. No limit on the number of slides. 3) Presentation Delivery This is a short presentation session. Therefore, the participant is expected to present the presentation content only. No welcome speech and question and answer session. We are not expected entertainment but the slide contents and presentation delivery.
  9. In this program, we are expected to be independent learners. Therefore, spoon-feed type of learners are not welcome in this program. Be proactive! The following are the useful resources : 1) General Resources Wikipedia - http://en.wikipedia.org/ eHow - http://www.ehow.com/ 2) Information Technology Resources Computer Glossary - http://whatis.techtarget.com/ HowStuffWorks (Computer) - http://computer.howstuffworks.com/ Microsoft Windows - http://windows.microsoft.com/en-US/windows/home Microsoft Safety & Security Center - http://www.microsoft.com/security/default.aspx Security Glossary - http://www.sans.org/security-resources/glossary-of-terms/ 3) Language Resources Local Language Translation Tool - http://www.citcat.com/ Dictionary.com - http://dictionary.reference.com/ Merriam-Webster - http://www.merriam-webster.com/dictionary.htm Please refer to this slide for terms and terminology networking and security concept Microsoft products
  10. Crucial Advice The world has dramatically moving in tremendous speed. New innovation and technological advancement require us to unlearn everything we knew. There is no such things as timeless knowledge in information technology domain. Some of our knowledge may be considered as outdated due to it can not be applied in today's reality. However, some of us may think otherwise. The following are three common dogma among us “I have PHD in IT!” In information technology, those who spend their time, attention and energy in specific technology are those who are adept in that technology. Paper qualification is not the parameter to address the specialization in technology. There is a case when the individual who do not possess any paper qualification is the expert of certain specific knowledge domain . “I’m to old for these stuffs” We are not product of circumstances but we are the product of our own choices. We have the choice to choose to learn new stuffs or the choice to be ignorance person. Therefore, we had to choose wisely. “It’s not related to my job scope” If we are exercise creative muscles in our brain, we will find how to make it relevant to our daily life routine. Think – make it relevant or make it irrelevant! Learning is a lifelong journey regardless who we are, what we have and how busy we are. Now lets start our journey to understand about cyber safety.