Tutorial Cybersecurity (Student)
Tutorial Cybersecurity (Student)
2. Understand the importance of creating and maintaining Strong Password to secure your user account
and data
3. Understand the process of protecting data from unauthorized access and data corruption throughout
its lifecycle
Discuss:
Discuss the similarities and differences between the two cases
How do you prevent yourself being scammed?
Discuss:
Is the above a good initiative to raise Cyber Safety Awareness by NTU? Why?
Preparation
Download the attached excel
There is a password in the “Password” sheet for you to crack
Discuss:
What other methods do they think hackers can use?
What are the issues of a complex password requirement?
How do we solve the issues of a complex password?
1. A current NTU student Alice did a past project on human behaviour when buying hawker food using
smartphone app. Alice must label the classification level if the project details are to be sent to another
current NTU student Bob because they need the information to do a project in an ICC module. True or
False? Why?
2. Charlie did a student internship project for an external company, as part of his NTU curriculum. NTU
sourced for the company for him, and the company paid him a stipend for doing the internship. During
the internship, he was given a project and he did all the work entirely on his own and delivered the
project. Eventually, he got an A+ for the internship. He published his work and his grade on LinkedIn, a
professional social media website, hoping to attract potential employer. Is this acceptable? Why?
3. A particular school secured a grant from Ministry of Defence to do research. To do the research, the
school needed to engage some external vendors and short listed three of them. The school labelled the
grant document confidential and shares the details in a private tender to all three parties. Is this
acceptable? Why?