Phishing & Scams
Password Security
Cyber Attacks
Safe Browsing
100

What does "phishing" mean?

A deceptive tactic to catch users into revealing sensitive information

100

What is the recommended length for a strong password?

(Eight Four Rule) 8=8 characters minimum length. 4= 1 lower case, 1 upper case, 1 number, 1 special character
100

What is malware

A malicious software is an all-encompassing term for software that intentionally inflicts damage on its users who typically have no idea that they are running it

100

What does HTTPS mean?

HyperText Transfer Protocol Secure

200

Name 2 signs of a phishing email

1. You are not addressed by your name

2. Wrong grammar and spelling

200

Why should you avoid reusing passwords?

If one account is compromised, hackers can potentially access all other accounts using the same password leading to serious security risks

200

How does social engineering works?

Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

200

Should you avoid using public wi-fi? Yes or No? Why?

When using public Wi-Fi, avoid accessing sensitive information, engaging in online banking or shopping, and leaving your device unattended, as these activities pose significant security risks.

300

What is a smishing attack?

Attackers deliver their messages via sms rather than email

300

What is MFA?

Multi-factor authentication - a security enhancement that requires users to provide multiple verification factors beyond just a password to access an application, file, or system

300

How does viruses spread?

Viruses spread in cybersecurity primarily through various vectors, including infected files, email attachments, malicious websites, and vulnerable software, exploiting user actions like clicking on links or downloading files to infect devices and networks.

300

What is a VPN?

A Virtual Private Network (VPN) is a secure, encrypted connection that allows you to connect to a network over the internet, masking your IP address and encrypting your data, enhancing privacy and security

400

How can you verify a suspicious email sender

1. Recognize red flags

2. Hover over the links

3. Check Sender's Email Address

400

How does a password manager help?

Utilizing a password manager can help you securely store and manage your passwords, simplifying the login process

400

Name a real-life cyber attack in Australia

MediSecure cyber security incident

400

How can you spot a fake website?

1. Check domain name

2. Look for red flags such as poor spelling, incorrect grammar etc. 

3. Run a virus scan

500

What should you do if you fall for a phishing scam?

1. Change passwords immediately

2. Secure accounts

3. Scan device for malware

4. Report the Phishing Attack

5. Educate yourself to prevent future scams

500

Name a real-life hack caused by weak passwords

1. Financial losses

2. Data exposure

3. Intellectual property theft

500

What is a zero-day attack?

A zero-day attack exploits a previously unknown vulnerability in software, hardware, or firmware before the vendor or security community has a chance to address it, leaving systems vulnerable to malicious actors.

500

How can browser extensions be risky?

Browser extensions, while enhancing functionality, can pose security risks like data theft, malware installation, privacy violations, and performance issues, especially if they request excessive permissions or are malicious.

M
e
n
u