What does "phishing" mean?
A deceptive tactic to catch users into revealing sensitive information
What is the recommended length for a strong password?
What is malware
A malicious software is an all-encompassing term for software that intentionally inflicts damage on its users who typically have no idea that they are running it
What does HTTPS mean?
HyperText Transfer Protocol Secure
Name 2 signs of a phishing email
1. You are not addressed by your name
2. Wrong grammar and spelling
Why should you avoid reusing passwords?
If one account is compromised, hackers can potentially access all other accounts using the same password leading to serious security risks
How does social engineering works?
Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
Should you avoid using public wi-fi? Yes or No? Why?
When using public Wi-Fi, avoid accessing sensitive information, engaging in online banking or shopping, and leaving your device unattended, as these activities pose significant security risks.
What is a smishing attack?
Attackers deliver their messages via sms rather than email
What is MFA?
Multi-factor authentication - a security enhancement that requires users to provide multiple verification factors beyond just a password to access an application, file, or system
How does viruses spread?
Viruses spread in cybersecurity primarily through various vectors, including infected files, email attachments, malicious websites, and vulnerable software, exploiting user actions like clicking on links or downloading files to infect devices and networks.
What is a VPN?
A Virtual Private Network (VPN) is a secure, encrypted connection that allows you to connect to a network over the internet, masking your IP address and encrypting your data, enhancing privacy and security
How can you verify a suspicious email sender
1. Recognize red flags
2. Hover over the links
3. Check Sender's Email Address
How does a password manager help?
Utilizing a password manager can help you securely store and manage your passwords, simplifying the login process
Name a real-life cyber attack in Australia
MediSecure cyber security incident
How can you spot a fake website?
1. Check domain name
2. Look for red flags such as poor spelling, incorrect grammar etc.
3. Run a virus scan
What should you do if you fall for a phishing scam?
1. Change passwords immediately
2. Secure accounts
3. Scan device for malware
4. Report the Phishing Attack
5. Educate yourself to prevent future scams
Name a real-life hack caused by weak passwords
1. Financial losses
2. Data exposure
3. Intellectual property theft
What is a zero-day attack?
A zero-day attack exploits a previously unknown vulnerability in software, hardware, or firmware before the vendor or security community has a chance to address it, leaving systems vulnerable to malicious actors.
How can browser extensions be risky?
Browser extensions, while enhancing functionality, can pose security risks like data theft, malware installation, privacy violations, and performance issues, especially if they request excessive permissions or are malicious.