0% found this document useful (0 votes)
29 views3 pages

Tutorial Cybersecurity (Student)

Uploaded by

Brian Loy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

Tutorial Cybersecurity (Student)

Uploaded by

Brian Loy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Nanyang Technological University

CC0002 Navigating the Digital World

Module 03: Cyber Security Best Practices

Intended Learning Outcomes


1. Identifying phishing sources, consequences of phishing and what to do when receiving phishing
material

2. Understand the importance of creating and maintaining Strong Password to secure your user account
and data

3. Understand the process of protecting data from unauthorized access and data corruption throughout
its lifecycle

Activity 1: Identifying and responding to Phishing material (20 minutes)

Cyber Safety Awareness – Activity 1 (Part I)

Read the following two articles


 https://www.channelnewsasia.com/singapore/scam-jobs-online-savings-lost-scammers-victim-
2445816
 https://www.straitstimes.com/singapore/courts-crime/interpol-alerted-as-couple-go-missing-after-
allegedly-failing-to-deliver-32m-of-luxury-goods-180-police-reports-made

Discuss:
 Discuss the similarities and differences between the two cases
 How do you prevent yourself being scammed?

Module 3 : Cyber Security Best Practices 1 of 3


Nanyang Technological University
CC0002 Navigating the Digital World

Cyber Safety Awareness – Activity 1 (Part II) (10 minutes)

Discuss:
 Is the above a good initiative to raise Cyber Safety Awareness by NTU? Why?

Activity 2: Creating and maintaining strong password (20 minutes)

Preparation
 Download the attached excel
 There is a password in the “Password” sheet for you to crack

Play the role of a hacker:


 In Excel Sheet “Sheet 1”
o In column A2, Key in “0”
 Drag the value until the student gets “9999” or at row “10001”
o In column B2, key in formula =IF(Password!$B$1=A2,1,0)
 Drag the value until row “10001, where it should be =IF(Password!$B$1=A10001,1,0)
o In column E1, key in formula =IF(SUM(B:B)>=1,TRUE,"NOT FOUND")
o In column F1, key in formula =FILTER(A:A, B:B=1)

Discuss:
 What other methods do they think hackers can use?
 What are the issues of a complex password requirement?
 How do we solve the issues of a complex password?

Module 3 : Cyber Security Best Practices 2 of 3


Nanyang Technological University
CC0002 Navigating the Digital World

Activity 3: Data Governance (20 minutes)

Answer the following questions:

1. A current NTU student Alice did a past project on human behaviour when buying hawker food using
smartphone app. Alice must label the classification level if the project details are to be sent to another
current NTU student Bob because they need the information to do a project in an ICC module. True or
False? Why?

2. Charlie did a student internship project for an external company, as part of his NTU curriculum. NTU
sourced for the company for him, and the company paid him a stipend for doing the internship. During
the internship, he was given a project and he did all the work entirely on his own and delivered the
project. Eventually, he got an A+ for the internship. He published his work and his grade on LinkedIn, a
professional social media website, hoping to attract potential employer. Is this acceptable? Why?

3. A particular school secured a grant from Ministry of Defence to do research. To do the research, the
school needed to engage some external vendors and short listed three of them. The school labelled the
grant document confidential and shares the details in a private tender to all three parties. Is this
acceptable? Why?

Module 3 : Cyber Security Best Practices 3 of 3

You might also like