- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Cyber Security Professionals
This guide is for those who are experts in cyber security.
This guide is for those who are experts in cyber security.
This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialogThe NCSC defines a cyber security incident as: A breach of a system’s security policy in order to affect its integrity or availability The unauthorised access or attempted access to a system Cyber incidents can take many forms, such as […]
Read more Incident Management in modal dialogSextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]
Read more Sextortion Guidance in modal dialogCyber and Fraud Centre – Scotland’s ethical hackers have produced a number of cyber security explainer videos.
Read more Cyber Awareness Videos in modal dialogThe use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialogWe are trying to make it easy for people to learn how to stay safe and secure online. We are doing this by providing accessible guidance and a range of ways to learn.
Read more Linking Cyber and Accessibility Project in modal dialog