security_awareness.exe

$ initializing security protocol...

> STATUS: READY

CYBER SECURITY

AWARENESS CAMPAIGN

// Your first line of defense starts with knowledge. Learn to identify threats, protect your data, and become cyber resilient.

0
ATTACKS/SEC
0
% HUMAN ERROR
0
M$ AVG BREACH
0
DAYS TO DETECT
START ASSESSMENT

// KNOWLEDGE_ASSESSMENT

TEST YOUR AWARENESS

Take this assessment first to discover your security knowledge gaps, then learn how to protect yourself.

quiz_module.exe

// PHISHING_SIMULATOR

SPOT THE PHISH

Can you identify which emails are phishing attempts? Analyze each email and decide if it's legitimate or a scam.

email_analyzer.exe

// PASSWORD_ANALYZER

CHECK YOUR STRENGTH

Test how strong your password is. We never store or transmit your password - all analysis happens locally in your browser.

password_strength.sh
Strength Level: Enter a password

> Waiting for input...

> Estimated crack time: -

16+ chars
Uppercase
Numbers
Symbols

// THREAT_DATABASE

KNOW YOUR ENEMY

[01]

PHISHING

Deceptive emails and messages designed to steal credentials and sensitive data. 91% of cyberattacks start with a phishing email.

THREAT LEVEL: CRITICAL
[02]

MALWARE

Malicious software including viruses, trojans, and spyware that can damage systems and steal data without your knowledge.

THREAT LEVEL: CRITICAL
[03]

RANSOMWARE

Encrypts your files and demands payment. Average ransom demand in 2024 exceeded $1.5 million per incident.

THREAT LEVEL: HIGH
[04]

SOCIAL ENGINEERING

Psychological manipulation to trick users into making security mistakes or giving away sensitive information.

THREAT LEVEL: HIGH
[05]

PASSWORD ATTACKS

Brute force, dictionary attacks, and credential stuffing targeting weak or reused passwords across accounts.

THREAT LEVEL: HIGH
[06]

INSIDER THREATS

Security risks from within the organization - whether malicious or accidental, insiders cause 60% of data breaches.

THREAT LEVEL: MEDIUM

// DEFENSE_PROTOCOLS

BUILD YOUR SHIELD

01

USE STRONG, UNIQUE PASSWORDS

Create passwords with 16+ characters using a mix of uppercase, lowercase, numbers, and symbols. Never reuse passwords across accounts.

02

ENABLE MFA EVERYWHERE

Multi-factor authentication blocks 99.9% of automated attacks. Use authenticator apps over SMS when possible.

03

VERIFY BEFORE YOU CLICK

Always verify the sender's identity. Hover over links to preview URLs. When in doubt, contact the sender through a known channel.

04

KEEP SOFTWARE UPDATED

Enable automatic updates for OS and applications. Security patches fix vulnerabilities that attackers actively exploit.

05

BACKUP YOUR DATA

Follow the 3-2-1 rule: 3 copies, 2 different media types, 1 offsite. Regular backups are your last line of defense against ransomware.

security_scan.sh

$ ./security_scan.sh --full

[██████████] 100% Scanning system...

✓ Firewall: ENABLED

✓ Antivirus: UPDATED

✓ MFA Status: ACTIVE

✓ Password Strength: STRONG

✓ Backup Status: CURRENT

✓ Encryption: ENABLED

> System security score: 98/100

> STATUS: PROTECTED

SECURED

// MOBILE_SECURITY

SECURE YOUR DEVICES

📱

LOCK YOUR DEVICE

Use biometrics (Face ID/fingerprint) or a 6+ digit PIN. Avoid pattern locks - they're easy to observe and crack.

🔄

UPDATE REGULARLY

Enable automatic updates for your OS and apps. Updates patch security vulnerabilities that attackers exploit.

📍

MANAGE PERMISSIONS

Review app permissions regularly. Does that flashlight app really need access to your contacts and location?

🏪

OFFICIAL STORES ONLY

Only download apps from official stores (App Store/Google Play). Avoid sideloading APKs from unknown sources.

📶

AVOID PUBLIC WIFI

Public WiFi can be intercepted. Use mobile data for sensitive tasks or connect through a trusted VPN.

🔐

ENABLE FIND MY DEVICE

Set up Find My iPhone/Android Device Manager so you can locate, lock, or wipe your device if lost or stolen.

// REMOTE_WORK_SECURITY

WORK FROM ANYWHERE SAFELY

🏠

SECURE YOUR HOME NETWORK

Change default router passwords, use WPA3 encryption, create a separate network for IoT devices.

🖥️

USE COMPANY-APPROVED TOOLS

Only use authorized software and cloud services. Shadow IT creates security blind spots.

🔒

ALWAYS USE VPN

Connect through your company VPN when accessing work resources. It encrypts your traffic and protects sensitive data.

👀

BEWARE OF SHOULDER SURFING

Be aware of your surroundings in public spaces. Use privacy screens on laptops and don't discuss sensitive info on calls.

🚪

LOCK WHEN YOU LEAVE

Always lock your computer when stepping away (Win+L or Cmd+Ctrl+Q). Even at home - it builds good habits.

📄

SECURE PHYSICAL DOCUMENTS

Shred sensitive documents. Don't leave confidential papers visible during video calls.

// SOCIAL_MEDIA_SECURITY

PROTECT YOUR DIGITAL IDENTITY

danger_zone.log

⚠️ NEVER SHARE:

  • Your full birth date
  • Home address or location tags
  • Vacation plans (post after you return)
  • Workplace badge or ID photos
  • Answers to security questions
  • Financial information
best_practices.log

✓ ALWAYS DO:

  • Review privacy settings regularly
  • Enable login notifications
  • Use unique passwords per platform
  • Verify friend requests before accepting
  • Think before you post
  • Report suspicious accounts

💡 PRO TIP: THE GRANDMA TEST

Before posting anything, ask yourself: "Would I be comfortable if my grandmother saw this? What about my boss? A potential employer?" If the answer is no, don't post it.

// BREACH_ANALYSIS

REAL WORLD BREACHES

Learn from major security incidents. Understanding how breaches happen helps prevent them.

case_001_solarwinds.log

SOLARWINDS ATTACK (2020)

SUPPLY CHAIN

> WHAT HAPPENED:

Attackers compromised SolarWinds' software update system, inserting malware into legitimate updates. 18,000+ organizations downloaded the infected update.

> IMPACT:

US government agencies, Fortune 500 companies, and critical infrastructure were compromised. Attackers had access for months before detection.

> LESSON:

Verify the integrity of software updates. Implement zero-trust architecture. Monitor for unusual network behavior.

case_002_colonial.log

COLONIAL PIPELINE (2021)

RANSOMWARE

> WHAT HAPPENED:

A single compromised password (found on the dark web) gave attackers VPN access. Ransomware shut down the largest fuel pipeline in the US.

> IMPACT:

Fuel shortages across the East Coast. $4.4 million ransom paid. 6-day operational shutdown affecting millions.

> LESSON:

Never reuse passwords. Enable MFA on all accounts, especially VPN. One weak credential can bring down critical infrastructure.

case_003_twitter.log

TWITTER HACK (2020)

SOCIAL ENGINEERING

> WHAT HAPPENED:

A 17-year-old called Twitter employees posing as IT support, convincing them to share credentials. Gained access to internal admin tools.

> IMPACT:

High-profile accounts (Obama, Biden, Musk, Apple) hijacked to promote Bitcoin scam. $120,000 stolen. Massive reputation damage.

> LESSON:

Always verify identity through official channels. IT will never ask for your password. When in doubt, hang up and call back on a known number.

// SECURITY_GLOSSARY

KNOW THE TERMS

MFA / 2FA

Multi-Factor / Two-Factor Authentication. Requires multiple forms of verification (password + phone code) to access accounts.

PHISHING

Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity via email, text, or websites.

RANSOMWARE

Malware that encrypts your files and demands payment for the decryption key. Often spreads through phishing emails.

VPN

Virtual Private Network. Creates an encrypted tunnel for your internet traffic, protecting data from interception.

SOCIAL ENGINEERING

Psychological manipulation to trick people into making security mistakes or revealing sensitive information.

ZERO-DAY

A software vulnerability unknown to the vendor. Called "zero-day" because developers have had zero days to fix it.

ENCRYPTION

Converting data into a coded format that can only be read with the correct decryption key. Protects data at rest and in transit.

FIREWALL

Network security system that monitors and controls incoming/outgoing traffic based on predetermined security rules.

MALWARE

Malicious software designed to damage, disrupt, or gain unauthorized access. Includes viruses, worms, trojans, and spyware.

DATA BREACH

Unauthorized access to confidential data. Can result in exposure of personal information, financial data, or trade secrets.

// INCIDENT_RESPONSE

REPORT AN INCIDENT

If you suspect a security incident, act fast. Quick reporting limits damage and helps protect others.

emergency_protocol.sh

🚨 IMMEDIATE STEPS:

  1. 01. Don't panic - but act quickly
  2. 02. Disconnect from network if malware suspected
  3. 03. Don't click any more links or open files
  4. 04. Document what happened (screenshots, times)
  5. 05. Report immediately to IT Security
  6. 06. Change compromised passwords from clean device

📧 REPORT PHISHING

Forward suspicious emails to:

phishing@company.com

🔒 SECURITY INCIDENT

Report breaches and suspicious activity:

security@company.com

🆘 EMERGENCY HOTLINE

24/7 Security Operations Center:

+1-800-SEC-URITY

💡 REMEMBER

You will NEVER be punished for reporting a security incident in good faith. Early reporting saves time, money, and prevents further damage. When in doubt, report it!

// SECURITY_PROTOCOL

YOUR CHECKLIST

Track your security posture. Complete each task to strengthen your digital defenses.

SECURITY SCORE 0%