ANNOUNCEMENTS
ANNOUNCEMENTS
State - Level Workshop on Cyber Security: Addressing Online Threats and Government Initiatives from a Gender Perspective
Workshop Format The workshop had two structured sessions: The following agenda and activities were undertaken during the workshop: 1. Introduction to the topic (Session 1) - our resource person gave us a clear perspective of the definitions of Cyber Security and Digital Security and also the difference between Cyber Security and Digital Security 2. Session 2: - Threats in Digital World and a Hands-on Session on how to avoid them - The ongoing threats and scams faced by people were explained at length by the resource person. She also gave us some real-life examples of some scams then she proceeded with hands-on session where she taught us some tricks to avoid sharing confidential information unknowingly to the hands of the hackers (Using Camera, LinkedIn and Gmail) An interactive session at the end of the workshop where students and teachers shared their stories of facing cyber security related problems and asked questions about them Learning Outcomes At the end of the Workshop the participants were able to: Overall, the workshop enhanced awareness and equipped attendees with essential skills to maintain cyber security in their daily lives. Impact and Feedback The workshop made a strong impact by raising awareness of key cyber security issues and motivating participants to adopt safer online practices. Feedback was overwhelmingly positive, with attendees appreciating the practical sessions, expert insights, and interactive activities that made complex topics easy to understand and apply. Conclusion The State Level Workshop on Cyber Security: Addressing Online Threats and Government Initiatives from a Gender Perspective successfully attained the objectives of educating and empowering attendees with essential cyber security knowledge. It reinforced the importance of staying vigilant in the digital world and highlighted the need for continuous learning to adapt to evolving cyber threats.
|
|||