Cybersecurity in ASEAN
Hello, ASEAN Youth! We hope you are having a great day. We are the ASEAN Cybersecurity Skilling Programme Team. One of the activities of our programme is to conduct a baseline study to help assess the knowledge and awareness, as well as the market needs on Cybersecurity in the region. The outcome of this survey will help our team with solid input for curriculum development and organisation of our Training of Trainers. Please feel free to answer as honestly as possible. We are assuring you that any information you provide to us will solely be used for the purpose of this study. If any of your qualitative feedback will be published, we will request your permission. Thank you in advance for your time and effort in filling out this survey.
A. Personal Information
In this section, we are kindly asking you to provide us with your personal information. Your name and your current affiliation (work/study) are not mandatory. Any information you provide will remain confidential.
Name
First Name
Last Name
Email
*
example@example.com
Age
*
Country
*
Brunei
Cambodia
Indonesia
Laos
Malaysia
Myanmar
Singapore
The Philippines
Thailand
Vietnam
Sex at birth
*
Male
Female
Do not want to say
Highest educational attainment
*
University Student
University Graduate
Post-Graduate Student
PhD Student
PhD Holder
Other
University/College Degree
*
STEM
Social Science
Arts and Humanities
Other
Organisation/University
Back
Next
B. Knowledge
This section is composed of questions related to the basics of Cybersecurity. Please answer as honestly as possible. We will attach the answer sheet at the end of the survey.
Cyber criminals only target large companies.
*
True
False
Not Sure
You have received an email from Google explaining that your password is out of date, and you must set a new one. The link within the email guide you through it. What do you do?
*
Reset your password manually
Ignore the email and delete it
Follow the link and reset your password
Not sure
What does the https:// at the beginning of a URL denote, as opposed to “http://” (without the “s”)?
*
That the site has special definition
That the site is accessible to certain computers
That the site is the newest version available
That the information entered into the site is encrypted
What is "phishing"?
*
It encompasses various types of attacks including spyware, viruses, and worms.
An attack which involves sending mass amounts of fraudulent emails to unsuspecting users, disguised as coming from a reliable source.
Happens when an attacker intercepts a two-party transaction, inserting themselves in the middle. From there, cyber attacker can steal and manipulate data by interrupting traffic.
None of the above
Not sure
What do you call a group of computers running malicious programs that are remotely controlled by cybercriminals?
*
Botnet
Online friends
Robots
AI
Not sure
Which of the following five passwords is the most secure?
*
pAMPh$3let
12345678
Angela01
05031995
P@ssw0rd
All of the above
Your computer has been infected with Ransomware and the hacker is demanding $5,000 before releasing it. What should you do?
*
Pay the ransom. Your files are important!
Report it to the IT guy in your office
Try to negotiate with the hacker
Disconnect your computer from network
If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive cases such as online banking?
*
Yes
No
Not sure
Turning off the GPS function of your smartphone prevents any tracking of your phone's location.
*
True
False
Not sure
What kind of cybersecurity risks can be minimised by using VPN?
*
Man-in-the-Middle (MitM) Attack
Internet of Things (IoT) Attack
Use of insecure Wi-Fi networks
Zero-day exploit
None of the above
Back
Next
C. Practices and Barriers
This section covers the practices of ASEAN youth in relation to Cybersecurity.
How confident are you in terms of protecting yourself online?
*
Extremely confident
1
2
3
4
Extremely unconfident
5
1 is Extremely confident, 5 is Extremely unconfident
What are the safety practices you follow to protect yourself online?
*
I do not open emails from people I do not know
I have installed anti-virus software
I only visit websites I know and trust
I only use my own computer
I am less likely to enter personal information on website
I use different passwords for different websites
I use a complex password
I do not connect to the internet through unsecured hotpspots
I regularly change my password
Have you been a victim of cyber-attack?
*
Yes
No
If yes, what actions did you take?
I ignored it
I took the evidence and report the scam to the authority
I forwarded the message to the IT department (if the scam is organisation-related)
I asked for advice from friends and family
Other
If you answer Other to the previous question, can you please specify?
If you become a victim of cyber-attack now, what would you do?
*
Take the evidence and report it to the authorities
Ask help from the IT department (if the scam is organisation-related)
Ask for advice from friends and family
Ignore it
Other
If you answer Other to the previous question, can you please specify?
Back
Next
D. Attitude
In this section, we are kindly asking you to rate the following statements from 1 (lowest) to 5 (highest).
Cybersecurity should be added to school curricula.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
Cybersecurity courses should be available in the community's local language.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
It is important to have cybersecurity courses that are inclusive.
*
Worst
1
2
3
4
Best
5
1 is Worst, 5 is Best
I am motivated to learn the procedures for reporting a cyber-attack.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
I would apply for a course on Cybersecurity as long as the module is interesting and the price is affordable.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
Cybersecurity is an important skill to enter a job market.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
There is a need to incorporate ethics and values in the courses on Cybersecurity.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
It is important to teach children about Cybersecurity as early as possible.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
Cybersecurity practitioners need to come from a technical or STEM background.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
Managers and organisational leaders need to learn the basics of Cybersecurity.
*
Strongly Disagree
1
2
3
4
Strongly Agree
5
1 is Strongly Disagree, 5 is Strongly Agree
Back
Next
E. Barriers
Thank you for making it this far! We are almost done! :) In this section, we would like to know what you think are the barriers youth face in learning about and pursuing a career in Cybersecurity.
In your opinion, what are the barriers for youth to learning about Cybersecurity?
*
Lack of access
Language difference
Financial capabilities
Inclusivity of the content
Time management
Personal preference
Non-practical modules
Other
If you answer Other to the previous question, can you please specify?
In your opinion, what are the barriers for youth to pursuing a career about Cybersecurity?
*
Gender discrimination
Financial limitation
Lack of access to information
Geographical location
Lack of technical competency
Other
If you answer Other to the previous question, can you please specify?
What do you think is the best approach to increase youth's interest in learning about cybersecurity?
*
Providing training modules in their local language
Having partnership with business entity in the tech sector
Expanding the training outreach towards rural area
Creating an affordable and interactive courses for the youth to access
Providing an all-inclusive knowledge (both technical and non-technical)
Providing information on how to start/switch to a career in Cybersecurity
Providing lessons on both defensive and offensive Cybersecurity strategies
If you answer Other to the previous question, can you please specify?
Back
Next
F. On Cybersecurity Skilling Programme
Yay! You made it to our last section. This is the part where we ask you questions that will help us in developing the module for the ASEAN Cybersecurity Skilling Programme.
What motivates you when taking a new course online?
*
Certificate
Accreditation of the institution
Personal curiousity
Friend's recommendation
Accessibility
Practical knowledge
Interactive courses
Academic qualification
Other
If you answer Other to the previous question, please specify here.
What topics would you like to see in a Cybersecurity course?
*
Basics of Cybersecurity
How to protect yourself against cybercrimes
Reporting proceudre
Technical skills
How to switch careers to Cybersecurity
Pandemic and its impact to our data protection
Training for managers and industry leaders
Ethics & values in Cybersecurity
General framework for offensive and defensive approach in Cybersecurity
Socio-cultural aspects of Cybersecurity
Other
If you answer Other to the previous question, please specify here.
What do you look for in an online learning platform?
*
Interactive activities (e.g., games, quizzes)
Recorded lecture of practitioners/field experts
Instructional materials (e.g., audio, visual, audiovisual)
Practical lessons
Technical lessons
Other
If you answer Other to the previous question, please specify here.
How many hours can you spend learning about Cybersecurity?
*
0.5-1 hour
1-2 hours
2-4 hours
4 hours and above
Submit
Should be Empty: