The art of manipulating people to get information you want
1) What is social engineering?
2) What is manipulation?
3) What is security?
1) What is social engineering?
Received from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.
1) What are foreign emails?
2) What is an email scam?
3) What are ways to get free money?
2) What is an email scam?
Which of the following statements best describes the modern-day hacker?
A. Bored and lonely anti-social teenagers who hack as a challenge and sometimes for profit.
B. Computer savvy people who hack individuals and businesses as a form of competition.
C. Highly-organized crime gangs run like businesses who deploy highly automated and sometimes highly targeted attacks against individuals and businesses for profit.
D. All of the above.
D. All of the above.
Computer is locked out, personal files and data are encrypted, and the information is held hostage until the hacker is paid
1) What is a browser Hijacker?
2) What is a Brute-force attack?
3) What is Ransomware?
3) What is Ransomware?
Which of the below is an example of a strong password?
A.Password
B.hello!
C.#I@v3Fly!ng2018
D.Passw@rd1
C.#I@v3Fly!ng2018
Facebook and Twitter are two examples of these that are used by United employees
1) What are social networking websites?
2) What is social media?
3) What are popular sites?
1) What are social networking websites?
Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these.
1) What do bad writers do?
2) What are telltale signs of a scam?
3) What do nosy people do?
2) What are telltale signs of a scam?
Threats can intercept your login credentials or data
Threats having the ability to hack your device
An easy way for threats to infect your device with malware and viruses
1) What are threats?
2) What is malware?
3) What is the risk of connecting to an unsecured network?
3) What is the risk of connecting to an unsecured network?
The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?
<Choose all that apply>
A. Call your co-workers over so they can see
B. Disconnect your computer from the network
C. Unplug your mouse
D. Contact the Help Desk and the Tech Hub
E. Turn your computer off
F. Run anti-virus
G. All of the above
Answer: B & D
You are on a business trip and sitting in the local café trying to send emails to your colleagues to catch up on a few tasks.
To protect your communications over these public networks, you should always do the following:
A. Find the strongest Wi-Fi signal near you
B. Connect to the first Wi-Fi signal you find
C. Turn off your file sharing
D. Use a Virtual Private Network (VPN)
D. Use a Virtual Private Network (VPN)
Social networking scams, vulnerability exploits, mobile malware, malicious spam runs, and targeted attacks are all examples of these.
1) What are online threats?
2) What are security risks?
3) What is CyberSecurity
1) What are online threats?
United sends Phishing emails to its employees?
1) True
2) False
1) True
United does participate in Phishing campaign with its employees. Everyone at United gets tested.
You are sending confidential information to a colleague across the internet. How can you protect this message from being read by individuals other than the intended recipient.
You can use encryption or a password protected zip file
Assist with the protection and proper use of information assets
Know the processes to protect information assets
Build proper security practices into your day
How do you protect company assets?
You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?
A. The purpose of a firewall and security software is to block malicious code getting into your computer in the first place so no action is needed.
B. You need to update and run your anti-virus software.
C. You need to contact your IT help desk or Information Security team.
D. Keep an eye on the performance of your computer.
C. You need to contact your IT help desk or Information Security team.
An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.
What is social engineering?
You receive an email from an acquaintance who you are rarely in contact with that contains a web link and/or that appears to be from you bank asking you to enter your account number and password and/or but the web address looks unfamiliar, that starts “Dear,” claiming that you won a contest and asking you to click on the link.
What is a Phishing Attack?
Name one potential legal risk to you and the company when using the internet
1. Going to sites with offensive material can present a legal risk to you and the company
2. Duplicating or downloading copyrighted material can present a legal risk to you and the company
3. Downloading information from questionable sites can put your company at risk to hacker probes
I have anti-virus protection installed, so when it comes to network security, I’m all set.
1) True
2) False
2. False. Just because you have anti-virus installed, doesn’t mean you can let your guard down. Cyber threat actors are consistently looking for new ways to access your files.
Where should you store the encryption passphrase for your laptop?
Use the password management tool supplied/authorized by your organization.
Human beings, chain mail, a computer
Who or what at the weakest links in the security chain?
Someone trying to create a sense of urgency
Someone asking for your email address
Someone telling you that your unpaid bill is going to collections
Someone asking for information that they either should already know or not have access to
3) What is a warning sign of a social engineering attack?
Criminals, Governments and Hacktivists
What are groups that exploit cyber vulnerabilities?
Name one of the biggest virus that impacted companies in the US.
Melissa Virus
Love Letter or I Love You Virus
Name three ways to protect your laptop computer when you carry it away from your office
1. Never leave your laptop unattended
2. Utilize a security cable or similar device and attach to a solid fixture in a conference room
3. Never check your laptop as luggage
4. Make sure your path trough the metal detector at the airport is clear
5. Don’t be distracted by a decoy while an accomplice grabs your computer laptop
6. At a hotel carry your laptop to the room don’t let the bellman carry it.