CYBERSECURITY EDUCATION FOR YOUNG GENERATIONS: THREATS, RISKS, AND SELF-PROTECTION STRATEGIES IN THE DIGITAL WORLD
Abstract
The rapid growth of digital technology has increased internet use among young people, especially students who actively use social media, messaging applications, online games, and learning platforms. However, this participation is not always accompanied by adequate cybersecurity literacy. As a result, young users may be exposed to phishing, account takeover, malware, online fraud, personal data leakage, identity misuse, and cyberbullying. This community service activity aimed to introduce practical cybersecurity awareness and self-protection strategies for students and teachers. The activity was conducted at SMA Al Wafi Islamic Boarding School, Depok, on 10 April 2026 from 08.00 to 11.00 WIB, involving approximately 300 participants consisting of senior high school students, grade 9 students, and teachers. The method combined interactive presentation, case-based explanation, simple threat-identification simulation, open discussion, and qualitative evaluation through observation and participant feedback. The materials covered common cyber threats, digital privacy, phishing-link recognition, strong password habits, two-factor authentication, one-time password protection, and responsible social media behavior. The results indicated increased awareness based on participant engagement, questions, and observed ability to restate basic cybersecurity practices. The activity also produced practical learning materials and recommendations for sustainable cybersecurity literacy programs in the school environment.
References
T. Daengsi, P. Pornpongtechavanich, and P. Wuttidittachotti, “Cybersecurity awareness enhancement: A study of the effects of age and gender of Thai employees associated with phishing attacks,” Educ. Inf. Technol. (Dordr)., vol. 27, no. 4, pp. 4729–4752, 2022, doi: 10.1007/s10639-021-10806-7.
C. Natasya, I. Irvin, and A. A. S. Gunawan, “A systematic literature review: Cyber attack: Phishing environments, techniques, and detection mechanism,” International Journal of Computer Science and Humanitarian AI, vol. 1, no. 1, pp. 9–13, 2024, doi: 10.21512/ijcshai.v1i1.12155.
R. Jabir, J. Le, and C. Nguyen, “Phishing attacks in the age of generative artificial intelligence: A systematic review of human factors,” AI, vol. 6, no. 8, p. 174, 2025, doi: 10.3390/ai6080174.
S. Sajid, A. W. Fazil, and M. Hakimi, “AI-based phishing attacks on university networks: A systematic literature review and defense framework,” Journal of Advanced Computer Knowledge and Algorithms, vol. 3, no. 2, pp. 62–75, 2026, doi: 10.29103/jacka.v3i2.26650.
I. T. Union, Guidelines for Parents and Educators on Child Online Protection. Geneva, Switzerland: International Telecommunication Union, 2020.
E. U. A. for Cybersecurity, “Cybersecurity Culture Guidelines: Behavioural Aspects of Cybersecurity,” ENISA, Heraklion, Greece, 2018.
C. Pascoe, S. Quinn, and K. Scarfone, “The NIST Cybersecurity Framework (CSF) 2.0,” National Institute of Standards and Technology, Gaithersburg, MD, USA, 2024. doi: 10.6028/NIST.CSWP.29.
F. T. Commission, “How to recognize and avoid phishing scams,” 2024. [Online]. Available: https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
C. and I. S. Agency, “Recognize and report phishing,” 2024. [Online]. Available: https://www.cisa.gov/secure-our-world/recognize-and-report-phishing
C. and I. S. Agency, “More than a password,” 2024. [Online]. Available: https://www.cisa.gov/MFA
P. A. Grassi, M. E. Garcia, and J. L. Fenton, “Digital Identity Guidelines: Authentication and Lifecycle Management,” National Institute of Standards and Technology, Gaithersburg, MD, USA, 2020. doi: 10.6028/NIST.SP.800-63b.
B. Ulum, Taryo, and D. Sudarno, “Klasifikasi phishing URL pada website berbasis metode ensemble,” Jurnal Teknologi Informasi dan Komputer, vol. 3, no. 1, 2025.
M. Purwadi, M. Makhfud, and A. Jamaludin, “Legal accountability and policy gaps in social engineering-based phishing cybercrimes,” Research Horizon, vol. 5, no. 3, pp. 797–806, 2025, doi: 10.54518/rh.5.3.2025.580.







