Be smart online
Device Security
Types of Cyber attacks
True or False
Types of Cyber attacks 2.0
100

You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture?

No

They could screen shot or download it

100

Which of the following are strong password practices? (Choose all that apply.)

1.Passwords should contain a mixture of upper and lower case letters, numbers, and special characters.

2.Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you can remember them more easily.

3.You should immediately change your password in the case of a known data breach.

4.You should store your passwords on paper or in a text document, giving you a backup in the event that you forget them.

1 & 3

100

A cyber attack that attaches itself to a program, file, or disk.

Virus

100

T or F You should always share your age and address with anyone

False

100

Masquerades as a benign program while quietly destroying data or damaging your system.

Trojan Horse

200

You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?

Do not link the link

200

Kylee computer broke and wants to borrow her best friend's Maddie's computer. Should Maddie let her?

No, Kylee could download something suspicious or send an email out. 

200

A link provided leads to a counterfeit webpage, what is this cyver attack?

Pharming

200

T or F Never open an email from someone you don’t recognize

True

200

Software stops working upon certain conditions.

Logic Bomb

300

You’ve just settled into your new hotel room when you realize you need to transfer some funds from your savings account to your checking account. In order to do this, you will need to connect your laptop to the hotel’s public Wi-Fi and log in to your online bank. Should you risk it?

Never (unless you have a VPN (Virtual Private Network))

300

What is a privacy setting you can add to your social media so people cannot see your location? 

friends only or Ghost mode

300

Independent program that replicates itself and sends copies from computer to computer across network connections.

Worms

300

T or F risks caused by poor security knowledge and practice could be Identity Theft and/or Monetary Theft

True

300

You don't pay for netflix and it stops working, what is this an example of?

Logic Bomb

400

You have a long commute. Thankfully, your train just installed public Wi-Fi. Now you can listen to your favorite music or podcast. However, when you check for social media updates around lunch, you find that your account has been hacked. What steps could you take to prevent your mobile device or laptop data from being compromised in the future?

1) Do not connect

2) Use a VPN


400

John gets a friend request from a person he does not know on Instagram. He accepts it because he is trying to build up his following. Why is this dangerous? 

It is someone he does not know and could be a child predator, 

400

A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. What is this type of attack called?

Phishing

400

True or false: Although they operate similarly to computers, most mobile devices (cell phones, tablets, etc.) are not full computers and do not require software, such as anti-virus, to be secure.

False

400

you Download a game: It may be fun but contains hidden code that gathers personal information without your knowledge. what is that cyber attack?

Trojan Horse

500

Passwords often have complex requirements, and most online citizens will need to remember numerous different passwords to access their internet services. What is a way to help you keep track of all these different passwords?

Password Manager- an encrypted vault that can only be unlocked with a single master password

Do not write it down, because anyone can get it

500

What is the method of access control by which users must present multiple, separate pieces of identification, or multiple sets such as a password and phone number, in order to access a system?

Multi-factor authentication (2 step authentication)

500

manipulates people into performing actions or divulging confidential information.

Social Engineering

500

True or false: Automatically updating your machine poses a significant security concern, as it could install unwanted programs/features that disrupt your network or harm your computer.

False


Although updates can occasionally cause problems, they also contain vital patches to help protect your machine against attackers.

500

Someone calls you and says this is John with AASD, we think your account has been hacked and we need to verify your information, can you please confirm your address and social security number.  what type of attack is this?

social engineering 

M
e
n
u