Learning Materials

Cyber Threats and Digital Safety

Understand the most common cyber threats and learn practical steps to reduce risk at home, in school, and at work.

01
Recognize common patterns
02
Prevent and strengthen protection
03
Respond correctly

Quick warning signs

  • Urgent messages pressuring you to click or pay immediately.
  • Unusual login prompts or suspicious security alerts.
  • Attachments you did not expect (invoice, delivery confirmation, scan).
  • Requests for verification codes (2FA), password reset confirmations, or personal information.

COMMON CATEGORIES OF CYBER THREATS

Each category follows a typical pattern. Recognizing it early helps you stop the attack.

Phishing and Social Engineering

Attackers impersonate trusted institutions (banks, schools, employers) to steal credentials or sensitive information.

Typical pattern
Urgency + link to a fake login page.

Malware and Spyware

Malicious software can steal data, record keystrokes, or take control of a device.

Common entry point
Pirated software, suspicious attachments, or fake updates.

Ransomware

Files are encrypted and a ransom is demanded for recovery. Regular backups are critical.

Best protection
Offline backups + regular updates + least privilege.

Account Takeover

Stolen credentials are reused, allowing attackers to gain full control of your account.

Warning sign
Unexpected password reset or new login notifications.

Unsafe Networks and Wi-Fi

Unsecured Wi-Fi networks can expose your traffic or redirect you to fraudulent pages.

Quick fix
Use WPA2/WPA3 and change default router credentials.

Online Manipulation and Scams

Scammers exploit emotions such as fear, urgency, romance, or authority.

Basic rule
Pause, verify the sender, and never share verification codes.

How Attacks Typically Unfold

Most incidents follow a similar sequence. Understanding it helps you interrupt the attack early.

1
Delivery
Phishing emails, compromised websites, or malicious attachments.
2
Execution
The victim clicks a link, opens a file, or enters credentials.
3
Persistence
The attacker establishes long-term access to the device or account.
4
Impact
Data loss, financial damage, extortion, or reputational harm.
View incident response steps

Baseline protection with the greatest impact

Focus on measures that stop most real-world attacks.

Updates
Enable automatic updates for your operating system and applications.
Passwords
Use a password manager and create unique passwords for every account.
Two-Factor Authentication (2FA)
Prefer authenticator apps over SMS messages.
Backups
Maintain at least one offline backup of important data.
Least Privilege
Use administrator accounts only when absolutely necessary.
Router Security
Change default login credentials and disable WPS.
Most successful attacks exploit weak security habits, not advanced hacking techniques.

WHAT TO DO IF SOMETHING HAPPENED?

A simple checklist for suspicious messages, compromised accounts, or suspected malware.

STEP 1
Stop and isolate the device
Immediately disconnect the device from the internet (Wi-Fi or cable) and stop interacting with it.
STEP 2
Use a trusted device and secure your email
From a clean, trusted device, change your email password, enable 2FA, and review active sessions.
STEP 3
Change passwords for important accounts
Update passwords for banking, work, and social accounts. Use strong, unique passwords.
STEP 4
Check device security
Run a full antivirus scan, remove suspicious apps or extensions, and update your OS and browser.
STEP 5
Monitor and report
Watch for unusual logins or transactions and contact support or your administrator if needed.

Quick self-check (2 minutes)

If you answer “No” too often, focus on the basics. Small changes significantly reduce risk.

Tip: enable 2FA first on email — it protects access to most other accounts.

Mini learning scenarios

Short situations you can recognize instantly.

Scenario 1
You receive a “bank security alert” SMS with a link.
Do not open the link. Open the official banking app/website manually or call the bank using a number from their official site.
Scenario 2
A friend asks you for a verification code “just for a moment”.
Never share codes. Their account may be hijacked. Verify by calling the person and report suspicious behavior.
Scenario 3
Pop-up says your PC is infected and you must install “cleaner”.
Close the browser tab. Do not install anything from pop-ups. Run a scan using trusted security tools and update the system.