
Project Digifence
(NPCC PYA)
NPCC Police Youth Ambassador
Raising awareness on Digital Defence
The NPCC Police Youth Ambassador (PYA) Project is a VIA project that cadets are to conduct outside of the school community to understand the importance of taking ownership in improving the safety and security of the community beyond school. As part of the PYA Project, cadets from our unit have created and shared this website with our family and friends, raising awareness on digital defence among others.
About our campaign!
What is Project Digifence?
We are Chanel, Charlotte, Jillianne, Sophia and Yaqi from CHIJ St Nicholas Girls' School's NPCC Unit and we are working on an online campaign to raise awareness on Digital Defence to the public with the help of NEXUS. As technology advances, Digital Defence is becoming increasingly important. We hope to share useful information about Digital Defence through our campaign and help keep you safe online.
To view our team's project individual and combined reflections, click on the button below.
Phishing
What is phishing?
What is Phishing?
Phishing is where someone is posing as a legitimate institution or personnel through messages and emails to lure individuals into providing sensitive data.
Anyone can be a victim of phishing so be on your guard when online.
Want to find out more about the various phishing techniques? Click on the button below.


Phishing Techniques
1. Spear Phishing
Classic phishing campaigns send mass emails to as many people as possible, but spear phishing is much more targeted. The hacker has either a certain individual(s) or organization they want to compromise and are after more valuable info than credit card data. They do research on the target in order to make the attack more personalized and increase their chances of success.
2. Session Hijacking
In session hijacking, the phisher exploits the web session control mechanism to steal information from the user. In a simple session hacking procedure known as session sniffing, the phisher can use a sniffer to intercept relevant information so that he or she can access the Web server illegally.
3. Email/Spam
Using the most common phishing technique, the same email is sent to millions of users with a request to fill in personal details. These details will be used by the phishers for their illegal activities. Most of the messages have an urgent note which requires the user to enter credentials to update account information, change details, or verify accounts. Sometimes, they may be asked to fill out a form to access a new service through a link which is provided in the email.
4. Content Injection
Content injection is the technique where the phisher changes a part of the content on the page of a reliable website. (example: wikipedia page changes by unauthorised people this is more identity theft , adding weird links to websites) This is done to mislead the user to go to a page outside the legitimate website where the user is then asked to enter personal information.
5. Phishing through Search Engines
Some phishing scams involve search engines where the user is directed to product sites which may offer low cost products or services. When the user tries to buy the product by entering the credit card details, it’s collected by the phishing site. There are many fake bank websites offering credit cards or loans to users at a low rate but they are actually phishing sites.
6. Link Manipulation
Link manipulation is the technique in which the phisher sends a link to a fake website. When the user clicks on the deceptive link, it opens up the phisher’s website instead of the website mentioned in the link. Hovering the mouse over the link to view the actual address stops users from falling for link manipulation.
7. Vishing (Voice Phishing)
In voice phishing, the phisher makes phone calls to the user and asks the user to dial a number. The purpose is to get personal information of the bank account through the phone. Vishing is mostly done with a fake caller ID.
8. Smishing (SMS Phishing)
Phishing conducted via Short Message Service (SMS), a telephone-based text messaging service. A smishing text, for example, attempts to entice a victim into revealing personal information via a link that leads to a phishing website.
9. Trojan
A Trojan horse is a type of malware designed to mislead the user with an action that looks legitimate, but actually allows unauthorized access to the user account to collect credentials through the local machine. The acquired information is then transmitted to cybercriminals.
10. Malware
Phishing scams involving malware require it to be run on the user’s computer. The malware is usually attached to the email sent to the user by the phishers. Once you click on the link, the malware will start functioning. Sometimes, the malware may also be attached to downloadable files.
11. Malvertising
Malvertising is malicious advertising that contains active scripts designed to download malware or force unwanted content onto your computer. Exploits in Adobe PDF and Flash are the most common methods used in malvertisements.
12. Ransomware
Ransomware denies access to a device or files until a ransom has been paid. Ransomware for PC's is malware that gets installed on a user’s workstation using a social engineering attack where the user gets tricked in clicking on a link, opening an attachment, or clicking on malvertising.
13. Website Forgery
Forged websites are built by hackers made to look exactly like legitimate websites. The goal of website forgery is to get users to enter information that could be used to defraud or launch further attacks against the victim.
14. Domain Spoofing
One example is CEO fraud and similar attacks. The victim gets an email that looks like it's coming from the boss or a colleague, with the attacker asking for things like W-2 information or funds transfers.
15. Evil Twin Wi-Fi
Hackers use devices like a pineapple - a tool used by hackers containing two radios to set up their own Wi-Fi network. They will use legitimate-sounding network names which is common in a lot of public places. If you're not paying attention and access the network controlled by hackers, they can intercept any information you may enter in your session such as banking data.
16. Social Engineering
Users can be manipulated into clicking questionable content for many different technical and social reasons. For example, a malicious attachment might at first glance look like an invoice related to your job. Hackers count on victims not thinking twice before infecting the network.
17. Web Based Delivery
Web based delivery is one of the most sophisticated phishing techniques. Also known as “man-in-the-middle,” the hacker is located in between the original website and the phishing system. The phisher traces details during a transaction between the legitimate website and the user. As the user continues to pass information, it is gathered by the phishers, without the user knowing about it.
18. Keyloggers
Keyloggers refer to the malware used to identify inputs from the keyboard. The information is sent to the hackers who will decipher passwords and other types of information. To prevent keyloggers from accessing personal information, secure websites provide options to use mouse clicks to make entries through the virtual keyboard.
However, these may not be the only phishing techniques as phishers may come up with new ways as time passes. Hence, we have to always be vigilant to protect ourselves from these scams.

Keeping your digital devices safe
How can you protect your digital devices?
Use an anti-virus software
Use strong passwords and enable 2fa (2-Factor Authentication)
Spot signs of phishing (examples: grammatical errors, spelling mistakes, getting messages/emails about a contest you never entered)
Update your software asap (that 'later' button looks tempting but no)
Never leak personal data online, be it through social media posts or other platforms
NLB sure campaign launched in 2013:
S.U.R.E. distills key Information Literacy (IL) concepts into 4 simple ways:
Source: Look as its origins. Is it trustworthy?
Understand: Know what you’re reading. Search for clarity.
Research: Dig deeper. Go beyond the initial source.
Evaluate: Find the balance. Exercise fair judgement.
APA citation
NLB. (2020, October 14). About the SURE campaign. Retrieved from https://sure.nlb.gov.sg/about-us/sure-campaign/

Keeping your personal data safe online
How can you stay safe online?
Definition of personal data:
Personal data is any information that relates to an identified or identifiable living individual.
Examples of personal data:
○ A name or surname
○ A home address
○ An identification card number
It is important to keep personal data safe because they can be exploited by individuals. For instance, personal data can be altered and be used to create fake documents, hijack mailboxes and phone calls or harass people. Personal data can also be used to create fake online identity to gather data from other users more easily.
Meet Our Team

Jillianne Lim
Group Leader
In charge of organising the team and updating the website.

Chanel Chia
Research IC
In charge of gathering information about phishing and how to keep digital devices safe.

Leong Yaqi
Research IC
In charge of gathering information on keeping personal data safe and real-life examples pertaining to digital defence.

Charlotte Pong
Design IC
In charge of designing the website.

Sophia Chen
Design IC
In charge of designing the website.
Individual Reflections
Working on this project was definitely an enriching and insightful experience for me. Throughout the project, I managed to learn more about digital defence myself and also got the chance to bond with my squadmates. I am also extremely grateful for my team members for working closely together to make this project a success, as well as our teachers for their guidance and support.
Jillianne Lim
Through this project I learnt more about digital defence and creating a website. Adapting to the problems such as making sure the website was user-friendly on both laptop and mobile was an interesting experience as well. Additionally, I enjoyed working with my squadmates through initial proposal stage, researching and creating the website, and have come to understand them better and had fun with them through this project.
Chanel Chia
Through this project, I learnt more about online scams and got more exposure to online platform, making me more tech-savvy. Our group also did a good job cooperating and overcoming challenges. I hope that after reading through our website, people will be able to identify online scams and not fall victim to them.
Leong Yaqi
I feel that our group was able to cooperate to do a good job on the website. We learnt much more about digital defence through our research and I hope that we are able to share this knowledge with more people.
Charlotte Pong
I feel that my group was able to cooperate work together as a team. In addition, while researching for this project, we gained an even deeper understanding on digital defense, helping us learn more about the dangers of cyber space.
Sophia Chen
Team Reflection
Through this project, we learnt the importance of effective communication as well as some communication skills as we worked together as one team to complete the project.
Due to the pandemic, we faced a few challenges such as not being able to meet physically to complete the project. However, we overcame these challenges as a team, for example, using video calls to hold meetings.
Our team also demonstrated and understood the importance of certain NPCC Values through this project. We demonstrated resilience when we encountered challenges throughout the project and we will continue to apply this in our daily lives when faced with difficult tasks. We also demonstrated teamwork as we needed everyone to do their part in the project. We will continue to apply teamwork in our lives as we work with different people on various tasks we are assigned to.
In overall, we are extremely thankful for this opportunity to carry out this project and have gained meaningful and useful insights from the project.
Sharing our Website
Speading awareness about digital defence to others

THANK YOU
Proudly presented by SNNPCC
https://sngsnpcc.wordpress.com/