Antivirus software and cyberwarfare attacks
Social engineering
Phishing, vishing and smishing
Encryption
100

What is antivirus software used for? Provide examples of antivirus software.

It is a type of utility software that looks for and eliminates viruses, Trojans, worms, and other malware. It is available for all types of computers and data storage devices, including smartphones, tablets, personal computers and etc.

100

What is tailgating?

It relies on human trust to give the criminal physical access to a secure building or area.

100

What is the difference between phishing and vishing?

Phishing- This tactic includes deceptive emails to steal information.

Vishing- It is voice solicitation over the phone (voice+phishing)

100

What is encryption?

encryption - the process of converting plain text to cipher text

200

How can you protect your device from malware or hacking?

Do not open unfamiliar links, do not download applications from unknown sources, use an antivirus, have two-factor authentication, try to set different passwords everywhere.

200

What is social engineering in terms of IT?


It is a manipulation technique that exploits human errors to gain private information access, or valuables

200

List the emotions that are primarily evoked in the victim.

helpfulness; curiosity; fear; gullibility; urgency

200

What is qr-code? Why could it be dangerous?

QR code is a type of machine-scannable barcode that, as implied by its name, is designed to be read and interpreted instantly by a digital device.QR code can download a malicious file on your device. Many bars and restaurants use QR codes to download a PDF-format menu or install an app enabling patrons to place an order. Attackers could easily tamper with the QR code to try to trick the potential victim into downloading a malicious PDF file or a rogue mobile app.


300

List examples of cyber attacks that you know of? Which cyberattack do you think is the most feared and why?

Espionage, Sabotage, Denial-of-service (DoS) Attacks, Electrical Power Grid, Propaganda Attacks, Economic Disruption, Surprise Attacks

300

Which techniques have attackers devised to deceive their victims?

Shouldering, Pharming, Phishing, Baiting, Spear Phishing, etc.

300

How to avoid becoming a victim of phishing and vishing? (3 points to each other)

Phishing:Don't enter personal information in a pop-up screen. Legitimate companies and organisations don't ask for personal information via pop-up screens.Do not click on any links listed in the email message, and do not open any attachments contained in a suspicious email.

Vishing:Verify the caller's identity. If the person provides a call-back number, it may be part of the scam, so don't use it.Don't press buttons or respond to prompts. Scammers often use these tricks to identify potential targets for more robocalls

300

Advantages of the encryption

Encryption helps protect your online privacy while transmitting personal information into "for your eyes only" messages intended only for those parties who need them and no one else

400

What techniques can antivirus software use to detect malware and how do these techniques work?

To identify malware, antivirus software can look for a vims signature or perform heuristic analyses.A vims signature is a section of program code that contains a unique series of instructions known to be part of a malware exploit. Heuristic analyses — techniques that detect malware by analysing the characteristics and behaviour of suspicious files

400

What information can an attacker look for on social networks to carry out a social engineering attack?

Can search for information about place of residence, date of birth, friends, relatives, appearance and any information from which he will benefit

400

Explain why smishing become so widely spread today.

Mobile Device Usage;Lack of Awareness;Deceptive Tactics

400

How encryption can be used against you? What is ransomware?

Targeted ransomware is a cybercrime that can impact organisations of all sizes, including government offices. Ransomware can also target individual computer users. Attackers deploy ransomware to encrypt the various devices, including computers and servers, of victims. The attackers often demand a ransom before they will provide a key to decrypt the encrypted data. The goal is to persuade victims to pay out as a way to recover access to their important files, data, video and images.


M
e
n
u