What is a motive for a cybersecurity attack?
Money,Power,Political
How can you detect a scam phone call?
If the caller speaks with authority,intimidation,trust, and/or familiarity.
What is a lottery scam?
You will get an email or text message claiming, “You were randomly selected to win this jackpot!”
These are fake - you can never win an online lottery without entering it
You will be prompted to click a link where they can take your personal info.
What is Voice AI technology?
Anyone here can have their voice cloned and have their voice say anything
What is cybersecurity?
Cybersecurity is the practice of protecting sensitive information from digital attacks
What is an impersonating family scam?
Scammers will pretend to be your child or grandchild and say they are in desperate need of a lot of money. They will ask you to wire thousands of dollars to them immediately. These hacks are very common.
What is one of the best ways you can keep your online account safe?
Multi-factor Authentication
What is deep fake technology?
A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
What are two infamous cybersecurity attacks?
Yahoo! 2016 attack,Election Fraud 2020 just to name a few
Describe a government imposter scam
Scammers contact people claiming to be representatives from a well-known government agency. This could include Medicare, the Internal Revenue Service (IRS), or the Social Security Administration (SSA).
What is one way you can know that a text is a red flag?
The contact name is long and sketchy,they are asking you to click a link.
How much time does it take for someone to clone your voice using voice ai technology?
2 minutes
What % of cyber attacks occur due to human error?
What is dangerous in Facebook identity theft?
Scammers create profiles that look like somebody you may know, and reach out asking for something such as money, personal information, etc.
What is a phishing scam?
Phishing is a type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source – an internet service provider, a bank, or a mortgage company, for example. It asks the consumer to provide personal identifying information.
What is Blockchain?
distributed ledger technology that provides a secure and transparent way to store and transfer data.
How much money was lost last year due to cyber crime?
Over 10 billion dollars
what are 4 pieces of criteria that go into creating a strong password?
At least 8 characters (the longer the better)
Use a mix of uppercase letters, lowercase letters, numbers, and special symbols
Don’t use common phrases or numbers (Ex: password1 or 12345)
Not based on your personal information
Birthday
Name
Hobbies
What is Hactivism?
Using hacking techniques for political or social causes
What are firewalls?
A firewall is a type of network security system that keeps an eye on and regulates incoming and outgoing network traffic