Antivirus software
Cyberwarfare attacks, cyber weapon
Social engineering
Encryption
100

Definition of antivirus software.

It is a type of utility software that looks for and eliminates viruses. Trojans. worms. and other malware.

100

Definition of cyberspace.

Cyberspace is a virtual world with no boundaries has created by Information and Communication Technology.

100

Definition of social engineering.

It is a manipulation technique that exploits human errors to gain private information, access, or valuables.

100

Definitions of encryption and decryption.

Encryption - the process of converting plain text to cipher text. Decryption - the process of converting cipher text to plain text.

200

Definition of heuristic analyses.

Heuristic analyses – techniques that detect malware by analysing the characteristics and behaviour of suspicious files.

200

Definition of Denial-of-service (DoS) Attacks.

A Denial of Service (DoS) attack is a malicious attempt to affect the availability of a targeted system, such as a website or application, to legitimate end users. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system.

200

Name the emotions used in the sentence: "Imagine if you could simply transfer $10 to an investor and see this grow into $10,000 without any effort on your behalf. A carefully worded baiting email tells victims to provide their bank account information and the funds will be transferred".

Curiosity, gullibility, greed.

200

Decrypt this sentence: “Wpe fd rz plcwtpc.”

Let us go earlier.

300

Examples of antivirus software.

Popular robust antivirus software includes Norton Anti Virus, Kaspersky Anti-Virus, F-Secure Anti- Virus, Windows Defender, and Avast.

300

Examples of cyberwarfare attacks. (5 examples)

Espionage, Sabotage, Denial-of-service (DoS) Attacks, Electrical Power Grid, Propaganda Attacks, Economic Disruption, Surprise Attacks.

300

Definitions of shouldering, baiting and tailgating.

Shouldering occurs when someone surreptitiously watches over your shoulder to nab valuable information. Baiting is an online and physical social engineering attack that promises the victim some gain. Tailgating relies on human trust to give the criminal physical access to a secure building or area.

300

In what areas is encryption used?

Computer security, Internet, finance.

400

Do you need antivirus software on your device. Why?

Let’s discuss.

400

What economic spheres does cyber weapon strike most often?

Likely targets of cyber weapons are electronic national defence systems, hospitals, water supplies, fully-automated transportation control systems, air traffic controls, electricity grid management, systems communication and data networks.

400

Examples of vishing, fishing, smishing.

too big answer

400

Why does the internet need encryption?

Let's discuss.

M
e
n
u