AY Honor Cybersecurity Requirements
Skill Level
3
Year
2024
Version
04.11.2025
Approval authority
Southern Asia-Pacific Division
1. Have the Internet Honor.
2. Explain what is cybersecurity.
3. Define the following sub-categories of cybersecurity:
- a. Network security
 
- b. Application security
 
- c. Information or data security
 
- d. Operational security
 
- e. Cloud security
 
- f. Disaster recovery and business continuity
 
- g. End-user education
 
4. Explain the three classification of cyber threats.
- a. Cybercrime
 
- b. Cyber-attack
 
- c. Cyberterrorism
 
5. Define the following cyber threats:
- a. Malware
 
- b. SQL injection
 
- c. Social engineering
 
- d. Phishing
 
- e. Spear phishing
 
- f. Insider threats
 
- g. Man-in-the-middle (MitM)
 
- h. Distributed denial-of-service (DDoS)
 
- i. Advanced persistent threats (APTs)
 
- j. Romance scams
 
- k. Cryptojacking
 
- l. Zero-day exploits
 
- m. DNS Tunneling
 
6. Define the following types of malware:
- a. Virus
 
- b. Trojans
 
- c. Spyware
 
- d. Ransomware
 
- e. Adware
 
- f. Botnets
 
- g. Worm
 
- h. Dridex
 
- i. Emotet
 
7. Explain the following precautionary measures an individual can take to protect themselves while accessing or sharing information over the internet:
- a. Keep your software up-to-date
 
- b. Use anti-virus protection and firewall
 
- c. Use strong passwords and use a password management tool
 
- d. Use two-factor or multi-factor authentication
 
- e. Learn about phishing scams – be very suspicious of emails, phone calls, and flyers
 
- f. Protect your sensitive personal identifiable information (PII)
 
- g. Use your mobile devices securely
 
- h. Backup your data regularly
 
- i. Don’t use public Wi-Fi
 
- j. Review your online accounts and credit reports regularly for changes
 
8. Explain the following precautionary measures an individual can take to protect themselves while using their smartphone:
- a. Use a strong pin or password on your smartphone
 
- b. Enable biometric logins to your smartphone
 
- c. Disable Wi-Fi and/or Bluetooth when you don’t need them
 
- d. Be careful of the apps you download and the services you allow them to access
 
- e. Disable location services when you don’t need them
 
- f. Be careful about where you plug your smartphone
 
- g. Employ remote wiping software
 
- h. Backup your smartphone often
 
9. Read the following Bible verses and write a short summary of your understanding of the meaning of the Bible verses.
- a. Hebrews 13:5-6
 
- b. Psalm 121:3-5
 
- c. Proverbs 11:15
 
- d. Acts 20:28
 
10. Do two of the following:
- a. Write a brief report with not less than 250 words on what you had done to protect yourself while accessing or sharing information over the internet.
 
- b. Give a three-minute oral report about what you had done to protect yourself while accessing or sharing information over the internet.
 
- c. Create a skit, multimedia presentation, or other interactive display to create an awareness about the importance of cybersecurity knowledge to protect an individual while accessing or sharing information over the internet.
 
- d. Watch a video documentary about cybersecurity and write a summary of the video presentation with not less than 250 words.
 
- e. Interview an IT personnel to understand on the measures taken in their organization to prevent cyber threats.
 

