Learn to protect against cyber threats. Choose a module or puzzle to begin.
Phishing emails trick users into sharing sensitive data. Learn to spot them.
Phishing is a cyber attack where someone tries to trick you into giving away sensitive information β like passwords, credit card numbers, or personal details β by pretending to be a trustworthy person or company.
Usually, phishing happens through:
Emails ("Your account is locked! Click here to fix it.")
Text messages ("You won a prize! Claim now.")
Fake websites that look almost identical to real ones.
The goal is to make you panic or excited, so you act quickly without thinking.
Subject: Urgent Account Verification
Dear User,
Verify your account at [Link] to avoid suspension.
Regards,
[Fake Bank]
No attempts yet.
Strong passwords prevent unauthorized access. Learn to create secure ones.
A strong password is one that is hard for others (or computers) to guess or crack.Hereβs what makes a password strong:
π Key Features of a Strong Password:
Length: At least 12 characters long (the longer, the better!).
-Mix of Characters:
Uppercase letters (AβZ), Lowercase letters (aβz), Numbers (0β9), Special symbols (! @ # $ % ^ & *)
No Common Words: Avoid using obvious words like password, 123456, or your own name.
No Personal Information: Donβt use things like your birthday, address, or petβs name.
Randomness: The password should be unpredictable (not just "Summer2024!").
Weak: password123
Strong: X7#mZ9$kL2@pQ8
No attempts yet.
Social engineering manipulates users into sharing sensitive data. Learn to recognize it.
Social engineering is when someone manipulates people into giving away confidential information β like passwords, bank details, or access to systems β by tricking or influencing them, rather than hacking computers directly. In simple terms:
π It's hacking people, not computers.
π Common social engineering tricks:
Phishing emails ("Click this fake link to fix your account.")
Phone scams ("I'm from tech support. Give me your password to fix your computer.")
Fake emergencies ("Your boss needs you to urgently transfer money!")
Pretending to be someone you trust (like a coworker, bank agent, or IT staff).
A caller posing as IT asks for your login credentials to "fix a system issue."
Drag emails into the correct category: Phishing or Legitimate.
Question 1 of 10
Cybersecurity threats are constantly evolving, posing significant risks to organizations. Many employees lack sufficient training to recognize and respond to these threats, making organizations vulnerable to attacks. This project aims to develop a Cybersecurity Awareness Training Platform that provides engaging and interactive training modules for employees. For instance, an employee might unknowingly click on a phishing email, compromising the organization's security. By training employees to identify such threats, the platform can help mitigate these risks.
This platform trains employees on cybersecurity through three modules (Phishing, Password Security, Social Engineering) with 10-question quizzes and a phishing email sorting puzzle with 6 emails.
- Chinmai Chebrolu
- Ajay
- Charan
- Abhishek
- Vigneshwar
All Rights Reserved to Melbourne Institute of Technology