Educational Resource • Khalifa University

Cybersecurity Awareness

Explore simple, effective ways to protect your online presence and understand the risks of the darker side of the internet.

What is the “dark web” — and why does it matter?

Layers of the web

  • Surface web: Indexed pages you can find with normal search engines.
  • Deep web: Content behind logins (e.g., private dashboards, cloud storage).
  • Dark web: A small part of the deep web that requires special software to access. It enables anonymity and is used for both privacy tools and, at times, illicit marketplaces.

Important: this site does not link to or access dark‑web sites. Examples shown are synthetic and for teaching only.

Why people are targeted

  • Accounts with weak or reused passwords.
  • Phishing emails that imitate trusted services.
  • Social‑engineering via messaging apps and social media.
How anonymity tools get abused (high‑level, safe)

Some criminals combine privacy tools to hide activity while buying or selling stolen data, malware, or illicit services. This site focuses on recognising signs of these crimes (phishing, account takeover, scam patterns), not on accessing harmful platforms.

Common threats you can spot quickly

Phishing & impostor messages

  • Mismatched sender domains & urgency cues ("verify now" / threats).
  • Links that mask destinations; unexpected attachments.
  • Requests for codes or passwords (legitimate services won't ask).

Account takeovers

  • Reused passwords exposed in breaches.
  • No multi‑factor authentication (MFA).
  • Credential‑stuffing and SIM‑swap attempts.

Marketplace scams

  • Too‑good‑to‑be‑true pricing and pressure to pay off‑platform.
  • New accounts with no history or copied photos.
  • Payment requests via irreversible methods (crypto/gift cards).

Privacy leaks

  • Oversharing personal data on public profiles.
  • Installing risky extensions or apps with broad permissions.
  • Using public Wi‑Fi without a trusted VPN.

Protect yourself in 7 moves

  1. Turn on MFA for email, bank, and social apps.
  2. Use a password manager and unique, long passwords.
  3. Update devices and browsers; enable auto‑updates.
  4. Verify unexpected messages via a second channel.
  5. Limit public profile information and privacy leaks.
  6. Back up important files to a trusted cloud or encrypted drive.
  7. If something feels off, pause and ask — urgency is a common scam tactic.

Tip: many reputable password managers offer discounts; check official vendor offers.

Quick self‑check

This short quiz is anonymous and for learning only. Some items are placeholder scenarios while we expand our bank.

Tip: if you're unsure, choose the most cautious option.

1. A message says your account will be closed in 2 hours unless you verify your password via a link. What’s the safest action?



2. The strongest password below is:



3. A marketplace seller insists on crypto payment and rushes you. Best response?



4. MFA codes should be shared with:



5. On public Wi‑Fi you should:



6. Example message: "Urgent! Confirm your account" with a shortened link. What’s the safest move?



7. You reused your email password on a forum that was breached. Best immediate step?



8. Someone asks for your one‑time code to "help with a login". What do you do?



9. Marketplace listing: brand‑new laptop for 90% off, seller requests gift cards. Safest action?



10. Your browser offers to update. What’s best?



Report & get help

Local support

  • Contact your organisation or workplace IT team for account or network incidents.
  • For hacked accounts, change passwords and follow provider recovery steps.

Online reporting

  • Report phishing and fraud to your email or platform provider.
  • Use national CERT / cyber‑incident reporting portals for serious incidents.

If someone is in immediate danger, contact local emergency services immediately.

Further learning

  • INTERPOL — Cybercrime overview.
  • UNODC — Cybercrime resources.
  • CISA — Stop Ransomware guidance.

These official sources offer broad, non‑technical advice. This site does not link to or endorse illegal content.

About

This site is an independent, educational resource created to help people recognise online threats and take practical steps to protect themselves. Content is for general guidance and not legal advice. Examples and simulations on the site are synthetic and safe.

Questions? Use the contact form on the site or reach out via the listed channels.

Contact

Have a question or suggestion? Use our contact form and we’ll get back to you.

Open Contact Form (opens Google Forms in a new tab)

Privacy note: do not include sensitive personal information in the form. For security incidents, follow the reporting steps above.