CC0002 Notes
CC0002 Notes
15 <
3RT
3. RT 715
RT > 5 his
Module 3: Cybersecurity
Phishing
- Check who the sender of the email is
- Be cautious before clicking on any hyperlinks (Type the correct address yourself
to ensure you are viewing the actual website)
- Look out for the lock icon in the address bar to ensure the website starts with
https
- Report suspicious email to ServiceNow@NTU
- Delete the email
- Do not forward the email to anyone
- CIA
o C: Confidentiality
Protect personal information and share only what is necessary
o I: Integrity
Practice cyber hygiene and beware of fake sources of information
o A: Availability
Prevent getting locked out of devices, your actions can affect others
Strong Passwords
- At least 8 characters long
- Contains number
- Contains symbols
- Contains upper case letters
- Contains lower case letters
- Use uncommon and nonstandard words or create a password from a sentence
that makes sense to you
- Do not use personal information that people who know you can guess as your
password
- Use different passwords for different accounts
- Change passwords regularly
- Use Two Factor Authentication or Multi Factor Authentication (MFA)
o By enrolling your mobile number or email address to receive a one-time
password, or through an authentication app
Data Security
- Data can exist in both physical and digital forms
- Data can belong to an individual or an organization
- Levels of Data Security
1. Open:
Data distributed to the public or published on the internet
2. Restrict:
Data made accessible to members to the community and not to the public
(project reports, presentation files)
3. Confidential:
Contractually defined as confidential or by nature confidential (personal
identifiable information, audit reports)
If data is disclosed, target can face statutory penalties ,cause damage to the
organization
4. Classified:
Data covered under the Official Secrets Act
Unauthorised disclosure leads to damage to national security
- Lock workstations when leaving desk
- Adopt clean desk policy and keep desk clear
- Send and store work information through organizational accounts
- Keep data storage devices securely
- Secure sensitive digital information through encryption
Acceptable IT Usage
- Use trusted Wi-Fi networks
- Avoid doing sensitive transactions
- Use BCC instead of CC when sending mass emails to keep the identities
confidential, especially when a third party is incolved
- Be mindful when connecting external devices to computer as it may contain
viruses and malware
- Install antivirus software and always ensure it is up to date
Cybersecurity in NTU
Objectives:
- Confidentiality: Ensuring Data and Information cannot be read by unauthorised
personnel
- Integrity: Data and Information held by NTU remains accurate and unmodified by
unauthorised personnel
- Availability: Data and Information remains usable with sufficient capability to
deliver educational services
Functions:
- The Cyber Security Governance: Responsible for development and maintenance
of NTU Cyber security policies, standards and procedures
- The Cyber Security Engineering: Responsible to explore different technologies to
enhance NTU security capabilities
- The Cyber Security Defence Team: Manage university Security Operations Centre
(SOC). Operates 24/7 365 Days to detect and responds to any cyber-attacks
against NTU
Acceptable IT Usage Policy (AIUP):
- serves to protect information and IT resources
- reduce the risks and damages to the university by governing the usage of all its IT
resources (computer, email account, mobile devices, IT services)
- Dos
o Update your passwords regularly
o Always ensure that you keep your password safe
o Use the NTU email for all official communications
o Use Blind Carbon Copy (BCC) for mass emails
o Keep your software updated with security patches
- DONTs
o Don’t share your password with anyone
o Don’t forward any University document to your personal email address or
online storage that’s not approved by the University
o Don’t install software without appropriate licenses
o Don’t turn off your anti-virus software or cancel any software updates
o Don’t over share information in social media
- Good habits
o Spot the signs of phishing emails
o Use strong passwords
o Enable MFA
o Secure your sensitive digital information through encryption
o Follow the AIUP and conform to the security bets practices
In General
P: Passwords
A: Anti-Virus
S: Software Application
S: Spot signs of phishing
LAMS questions
Module 4 – Fake News
Falsehoods: A statement is false or misleading
Misinformation: The inadvertent dissemination of false information
Disinformation: The intentional dissemination of false information
Fake News:
A type of falsehood intentionally packaged to look like news to deceive others (intention,
format, facticity)
Motives:
- Financial
o Attracting clicks
o Advertising Revenues
- Ideological
o Personal Agenda
o Weapons of Mass Misinformation
- Political satire
- News parody
- Propaganda
- Advertising
- Manipulation
- Fabrication
What makes people vulnerable?
- Sender
o Credible or familiar?
o Trustworthy or similar?
o Proximate or distal?
- Message
o Format
o Plausibility
- Channel
o Trusted or depended on?
o Closed or open?
o Feedback
- Receiver
o Confirmation bias
o Motivations
o Corrections
- Context
o Information overload
o Instability
Different Sources
- Original Source
- Immediate Source
- Invisible Source
- Trusted Source
- Disregarded Source
Message characteristics
- Plausible?
- Mentions Experts?
- Conversation Tone
- Stirs Emotions
- Asks for call to actions (Forwarding the message)?
- Channels where information flows
o Popularity cues
o Reliance
o Lack of gatekeeping
o Information overload
- Higher social media news use= Higher likelihood to believe in fake news
- Avoiding news = more likely to believe in misinformation
- Confirmation Bias: Information that aligns with our existing beliefs
Informational apathy (Why people ignore telling people they are wrong about news?)
- Issue Relevance: Does not concern me
- Interpersonal Relationships: Do not want to offend family/friends
- Personal Efficacy: There is no point in reasoning as people already believe
Consequences of fake news
- Short Term
o Political Decisions
o Business
o Peace and Order
o Reputation
- Long term
o Devaluations of Information
o Erosion of trust in institutions
o Larger social divisions
o Chilling Effect
What can we do?
1. Individuals Authentication
- Internal Acts of Authentication
o The Self: We are old enough to judge and think (experience)
o The Source: Is the source reliable
o The Message: Check the tone and see if its polemical or deliberately
misleading to arouse emotions
o The Message Cues: If there are more likes shares comments
, ,