Home » Articles posted by Shraddha Khedkar

Author Archives: Shraddha Khedkar

News/Events@HB

International TPRM Alliance – 10th TPRM Roundtable 2024 – Post Summit Quiz

0%
5

You have 20 mins to complete this QUIZ! Wish you all the best!

Time is UP!


10RTInternationalTPRMAlliance

10th TPRM Roundtable 2024

Please enter your full name, email address and location for certificate/score-generations! You will receive a certificate only if you score above 70%.

1 / 20

Category: 10RTInternationalTPRMAlliance

1. Your company is onboarding a new vendor to handle a major aspect of operations, but the due diligence and risk assessment processes are taking longer than expected. However, operations depend on this vendor being integrated as soon as possible. What should be the priority when the due diligence process for onboarding a vendor is delayed?

2 / 20

Category: 10RTInternationalTPRMAlliance

2. Please mention the TPRM topics on which you would like to get a KT! (feedback question - unscored)

3 / 20

Category: 10RTInternationalTPRMAlliance

3. How was the roundtable ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below
(feedback question - unscored)

4 / 20

Category: 10RTInternationalTPRMAlliance

4. What is the principle of least privilege?

5 / 20

Category: 10RTInternationalTPRMAlliance

5. What from the below should be included in a vendor’s security policies from a TPRM perspective?

6 / 20

Category: 10RTInternationalTPRMAlliance

6. Your company has multiple vendors that are classified as high-risk due to the nature of the services they provide (e.g., data processing and financial services). You have limited resources for risk management. How should your company prioritize its risk management efforts with multiple high-risk vendors?

7 / 20

Category: 10RTInternationalTPRMAlliance

7. You are conducting a routine review of your vendors and need to classify them based on risk. A vendor that handles sensitive financial data has been flagged for operational issues in the past year. How should you classify a vendor handling sensitive financial data with past operational issues in terms of risk?

8 / 20

Category: 10RTInternationalTPRMAlliance

8. What is your top priority when evaluating a proactive monitoring solution to protect third-party organizations from cyber threats?

9 / 20

Category: 10RTInternationalTPRMAlliance

9. Your esteemed feedback about the event ?

10 / 20

Category: 10RTInternationalTPRMAlliance

10. You discover that a critical vendor in your supply chain lacks strong cybersecurity measures. They handle sensitive customer data for your company, making them a high-risk third party. What should your organization do to manage the risk of a vendor lacking strong cybersecurity protocols?

11 / 20

Category: 10RTInternationalTPRMAlliance

11. A third-party logistics vendor responsible for delivering products has consistently failed to meet the agreed-upon performance metrics outlined in the SLA, leading to customer complaints. How should your organization address the consistent underperformance of a third-party logistics vendor?

12 / 20

Category: 10RTInternationalTPRMAlliance

12. During a routine financial review, you discover that one of your major vendors, responsible for supplying critical components, is showing signs of financial instability and may be at risk of bankruptcy. What should your company do to manage the risk posed by this financially unstable vendor?

13 / 20

Category: 10RTInternationalTPRMAlliance

13. Fill in the blanks:
___risk is a banking term describing the level of risk in a bank's portfolio arising from ____ to a single counterparty, sector or country.

14 / 20

Category: 10RTInternationalTPRMAlliance

14. Which of the following best describes a fourth-party risk?

15 / 20

Category: 10RTInternationalTPRMAlliance

15. You realize that your contract with a critical vendor, which includes essential service-level agreements (SLAs) for performance, is set to expire in one week. Renewing the contract requires a new risk assessment. What should your next step be if a contract with a critical vendor is about to expire?

16 / 20

Category: 10RTInternationalTPRMAlliance

16. What is the primary focus of Supply Chain Security in the context of TPRM?

17 / 20

Category: 10RTInternationalTPRMAlliance

17. A third-party vendor your company uses is suddenly involved in a public scandal related to unethical business practices. This vendor is not directly linked to your core operations, but their involvement could damage your company’s reputation. What action should you take if a third-party vendor is involved in a public scandal that could damage your company’s reputation?

18 / 20

Category: 10RTInternationalTPRMAlliance

18. What is the weakest link in cybersecurity?

19 / 20

Category: 10RTInternationalTPRMAlliance

19. A new regulatory requirement mandates that all third-party vendors handling customer data comply with specific privacy standards. You find that one of your current third-party vendors is not compliant. What is the most appropriate course of action when a third-party vendor is not compliant with a regulatory standard?

20 / 20

Category: 10RTInternationalTPRMAlliance

20. Your company, a financial services provider, has recently learned that one of its key vendors, responsible for data storage, has experienced a data breach. Sensitive customer information may have been compromised. What immediate steps should your company take in response to the vendor’s data breach?

Your score is

0%

Exit

International TPRM Alliance – 9th TPRM Roundtable 2024 – Post Summit Quiz

0%
45

The quiz has expired!

20th National Cyber Security and Cyber Crime Awareness Session at RMDSMS, Pune

0%
713

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

20th National Cyber Security and Cyber Crime Awareness Session at R. M. Dhariwal Sinhgad Management School, Kondhapuri, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. You receive a phone call from the bank that particular person is asking you for your account details for a vertification. Unfortunately, you give your details and your money and has been withdrawn. You have been victim of which cyber attack?

2 / 20

Category: Cyber Security General Awareness

2. Select the fullform of "DDoS"

3 / 20

Category: Cyber Security General Awareness

3. Which portal is used to report a cyber crime in India ?

4 / 20

Category: Cyber Security General Awareness

4. Is the following statement true or false? Reusing the same password across multiple sites is a good idea. It's very convenient after all.

5 / 20

Category: Cyber Security General Awareness

5. You receive a text message from an unknown number. The text says that if you click the link provided, it will redirect you to a site where you can watch the latest award-winning movie that is still in theatres. You see that the link referenced is from a popular URL shortening site. You should:

6 / 20

Category: Cyber Security General Awareness

6. Which of the following best describes a grandparent scam?

7 / 20

Category: Cyber Security General Awareness

7. Which of the following would be the best password (hardest to crack)?

8 / 20

Category: Cyber Security General Awareness

8. You fell victim to a scam, through which an attacker stole money from you. What should you do?

9 / 20

Category: Cyber Security General Awareness

9. What is the meaning of Encryption?

10 / 20

Category: Cyber Security General Awareness

10. Which computer virus records every movement you make on your computer?

11 / 20

Category: Cyber Security General Awareness

11. What is a person called when they try to hurt a group of people with the use of a computer?

12 / 20

Category: Cyber Security General Awareness

12. Is it generally considered safe to use Starbucks Public Wi-Fi network for performing an online banking operation?

13 / 20

Category: Cyber Security General Awareness

13. Which of the following should you NOT publish on social media sites?

14 / 20

Category: Cyber Security General Awareness

14. Is the following statement true or false. Because operating system updates are time consuming and may need to restart the machine it's a good idea to postpone them as long as possible.

15 / 20

Category: Cyber Security General Awareness

15. Mary downloaded a free software program from an unknown website. After installing the program, her computer started behaving strangely and her files were encrypted. What likely happened, and what should Mary do?

16 / 20

Category: Cyber Security General Awareness

16. Rahul sees an advertisement promising immediate job placements in reputable companies without requiring any prior qualifications. All he needs to do is provide his personal information. What should Rahul do?

17 / 20

Category: Cyber Security General Awareness

17. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

18 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

18. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

19 / 20

Category: Cyber Security General Awareness

19. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

19th Cyber Security and Cyber Crime Awareness Session at Balagokulam Delhi NCR

0%
29

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Balagokulam Delhi NCR

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. How can a person executing a phishing attack steal someone's identity?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

Cyber Security Awareness Quiz

This is an initiative by Helping Brainz to spread cyber awareness.

0%
9

You have 5 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security Awareness Month

Cyber Security Awareness Quiz by Helping Brainz

 

Please enter your full name, email address and location for certificate/score-generations! You will receive only if you score above 50%.

1 / 1

Category: Cyber Security Awareness Month

1. Who are the targets of whaling phishing attacks?

Your score is

0%

Music credits: bensound.com

18th Cyber Security and Cyber Crime Awareness Session at SVIMS, Pune

0%
49

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Sadhu Vaswani Institute of Management Studies for Girls, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

17th Cyber Security and Cyber Crime Awareness Session at RMDSMS, Pune

0%
555

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at R. M. Dhariwal Sinhgad Management School, Kondhapuri, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

16th Cyber Security and Cyber Crime Awareness Session at KDK College of Engineering, Nagpur

0%
219

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at KDK College of Engineering, Nagpur

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

15th Cyber Security and Cyber Crime Awareness Session at SIOM, Pune

0%
304

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Sinhgad Institute of Management, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

2 / 20

Category: Cyber Security General Awareness

2. Which portal is used to report a cyber crime in India ?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which is the phishing capital of India ?

12 / 20

Category: Cyber Security General Awareness

12. Which among the following is the safest password ?

13 / 20

Category: Cyber Security General Awareness

13. Who are the targets of modern day hackers?

14 / 20

Category: Cyber Security General Awareness

14. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

#170 – 14th Cyber Security and Cyber Crime Awareness Session, at Ambalika Institute of Professional Studies. 

Our 170th event for the community

With over 11,000 cases reported in 2020, Uttar Pradesh has replaced Karnataka as the state with the highest incidents of cybercrime, data from the latest National Crime Records Bureau (NCRB) report has revealed. The scale, style and type of cyber-crimes has increased dramatically during the pandemic, with technology now allowing criminals to work from all over the world, and law enforcement agencies having to act quickly to keep up with them.

With the rapidly growing cyber-crimes and to talk about its prevention and reporting techniques and hence to make people aware, Delhi based no-to profit organization Helping Brainz and their National Cyber Security and Cyber Crime Awareness team led by Shraddha Khedkar virtually conducted a Cyber Security and Cyber Crime Awareness Session at Ambalika Institute of Professional Studies, Lucknow on February 12, 2022. This was Helping Brainz’s 14th Cyber Security and Cyber Crime Awareness event and their 170th project. Shraddha’s team at Helping Brainz is on a national mission to dedicate their Saturdays for Cyber Security Awareness and Cyber Security Career Counselling Sessions. 

Lt. Cdr. Tejinder Kaur Bhullar (Retd. Navy Veteran)

Lt. Cdr. Tejinder Kaur Bhullar (Retd. Navy Veteran), experienced (17+ years) Human Resource and Operations Management Professional, inaugurated the virtual event and spoke about the importance of data security and why the awareness about the same is the need of the hour.

Prof. (Dr.) M. Chandra Sekhar, CEO, MacLead

Renowned and experienced (33+ years) cyber security and project management professional, Prof. (Dr.) M. Chandra Sekhar, CEO, MacLead presided over as the Guest Speaker. Prof. Chandra Sekhar briefed the audience about cyber security and how global players are highly concerned about the increase in cyber crimes and how the students can become instrumental in preventing the cyber crimes and spreading awareness about the same.

88 students and faculty members from Ambalika Institute of Professional Studies, attended the event. 

Yedhu Krishna Menon, a Third-Party Risk Management and Cyber Security Professional, was the speaker and trainer of the event. During the event, Yedhu spoke about, Cyber Attacks and Attackers, Cyber Crimes, Counts and Stats, Types and Categories of Cyber Crimes, Online Gaming, Social Media Safety, discussed various case studies of Cyber Crimes, Cyber Crime prevention mechanisms, reporting structures (mechanisms, websites, phone numbers, email addresses) and Cyber Laws. Event was followed by a Quiz Competition to check the effectiveness of the understandings derived from the event.  Session aimed at teaching students how to stay secure on the internet and keep their personal information secure. Students were also taught what to do if they ever fall victim to a cyber-crime.

Dr. Prajapati, (Principal, AIPS), Shraddha Khedkar (Project Manager, National Cyber Security and Legal Awareness Sessions, Helping Brainz), Pooja Kulkarni Vaidya (Head of Branding and Advertising, Helping Brainz), Pallabi Bose (Project Manager, Pandemic and Disaster Management and Special Projects), Arushi Mathur (Helping Brainz Volunteer, National Cyber Security and Cyber Crime Awareness Mission) and other faculty members, spoke and led the event from the front. Helping Brainz also takes this opportunity to thank, Prof. Aachal Sharma (Panel Member, Helping Brainz) for all her sincere coordinations and collaborations.

Some open feedback

The event was very informative and not a single second was wasted. I came to know about so many mistakes that I have committed and I have corrected them after listening this session. So thanks for the guidance and please organize these type of events again.
Ayush Dev
AMBALIKA
It was a very good session. I learned a lot about cyber crimes that can happen with me or anyone. It will guide me to be aware in the future as well.
Anushka Shukla
AMBALIKA
Very informative and the best thing about this event was, that they conducted the event with lot of practical examples, and multiple use cases.
Ayush Kushwaha
AMBALIKA
It was an amazing event. Got to learn a lot. Thank you very much.
Priyanka Pandey
AMBALIKA

14th Cyber Security and Cyber Crime Awareness Session

170th Helping Brainz Event