What is DDoS attack?
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming it with traffic from multiple sources.
What is Malware?
general term for any software designed to cause harm, steal data, or disrupt systems.
2FA stands for?
Two Factor Authentication
What are the potential impacts of a cyber attack?
data loss, financial loss, reputational damage, operational disruption, and legal consequences.
The potential consequence of DDoS?
Slow or completely unavailable to regular users
Common types of Malware?
viruses, worms, ransomware, spyware, adware, and trojans.
one advantage of Biometric verification?
provides a high level of security as it uses unique physical characteristics (like fingerprints or facial recognition) that are hard to replicate
What is meant by data breach?
refers to an incident where unauthorized access is gained to sensitive, protected, or confidential data.
How Ransomware works?
It makes file in accessible by locking or encryption and demands money to decrypt.
How does Malware typically spread?
through infected email attachments, malicious downloads, compromised websites, or removable media like USB drives.
How does 2FA works?
Something you know (Password)
Something you have (phone, card)
Something you are(fingerprint, facial recognition)
How can cyber attacks affect businesses?
significant financial losses, loss of customer trust, legal issues, and disruptions in operations.
How spyware operates?
It secretly monitors user activity, collecting personal information and sending it to third parties without the user's consent.
Main difference between Virus and Malware?
Malware: A general term for any software designed to cause harm, steal data, or disrupt systems.
Virus: A specific type of malware that self-replicates by attaching its code to other files or programs.
What does 2FA ensures?
one factor is compromised, hacker still need 2nd factor to gain access.
What is the benefit of cybersecurity measure?
Helps protecting the security and privacy risks
Data corrupt or crashing the system is caused by which type of cyber-attack?
Virus
What is Keylogger?
software that records every keystroke made by the user, often used to capture sensitive information like password
How bio metric is convenient?
Eliminates the need of of password, PINs
Common sign that your computer is hacked?
Passwords not working
Accounts are locked
Emails sent from account
Missing files, rename or encrypted