An attempt that involves spoofed emails
What is email phishing?
The protection of data, information, networks and computers
What is cybersecurity?
This library had 600GB of data stolen and is the largest attack against a library recorded to date
What is the British Library attack?
This is the first step that should be taken when you receive a suspected phishing email
What is screenshot the email?
This type of filtering scans emails as they come in based on certain criteria
What is email filtering?
An attempt that targets individuals via phone calls
What is vishing?
Software that is used to extort money from companies by encrypting or blocking access to an organization's files.
What is ransomware?
This attack stole data from 8,000 former and current staff from the library system
What is the Toronto Public Library attack?
After screenshotting, the next step should be _________
What is report it to IT shop?
These are thing that are used to scan programs and devices for malicious software
What are scanning tools?
An attempt to target high level individuals in an organization
What is whaling?
A form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
What is phishing?
This breach included data from 26,000 patrons
What is the Seattle Public Library attack?
Please for all that is good and holy don't do this if you receive an email that you suspect is a phishing attempt
What is click on any links?
This is software that is used to protect computers (mostly in the form of antivirus)
What is Endpoint Protection?
An attempt to target a certain group of individuals in an organization
What is spear phishing?
The process of transforming information in a way that, ideally, only authorized parties can decode.
What is encryption?
This ransomware attack stole 56 GB of data.
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking?