Definition of antivirus software.
It is a type of utility software that looks for and eliminates viruses. Trojans. worms. and other malware.
Definition of cyberspace.
Cyberspace is a virtual world with no boundaries has created by Information and Communication Technology.
Definition of social engineering.
It is a manipulation technique that exploits human errors to gain private information, access, or valuables.
Definitions of encryption and decryption.
Encryption - the process of converting plain text to cipher text. Decryption - the process of converting cipher text to plain text.
Definition of heuristic analyses.
Heuristic analyses – techniques that detect malware by analysing the characteristics and behaviour of suspicious files.
Definition of Denial-of-service (DoS) Attacks.
A Denial of Service (DoS) attack is a malicious attempt to affect the availability of a targeted system, such as a website or application, to legitimate end users. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system.
Name the emotions used in the sentence: "Imagine if you could simply transfer $10 to an investor and see this grow into $10,000 without any effort on your behalf. A carefully worded baiting email tells victims to provide their bank account information and the funds will be transferred".
Curiosity, gullibility, greed.
Decrypt this sentence: “Wpe fd rz plcwtpc.”
Let us go earlier.
Examples of antivirus software.
Popular robust antivirus software includes Norton Anti Virus, Kaspersky Anti-Virus, F-Secure Anti- Virus, Windows Defender, and Avast.
Examples of cyberwarfare attacks. (5 examples)
Espionage, Sabotage, Denial-of-service (DoS) Attacks, Electrical Power Grid, Propaganda Attacks, Economic Disruption, Surprise Attacks.
Definitions of shouldering, baiting and tailgating.
Shouldering occurs when someone surreptitiously watches over your shoulder to nab valuable information. Baiting is an online and physical social engineering attack that promises the victim some gain. Tailgating relies on human trust to give the criminal physical access to a secure building or area.
In what areas is encryption used?
Computer security, Internet, finance.
Do you need antivirus software on your device. Why?
Let’s discuss.
What economic spheres does cyber weapon strike most often?
Likely targets of cyber weapons are electronic national defence systems, hospitals, water supplies, fully-automated transportation control systems, air traffic controls, electricity grid management, systems communication and data networks.
Examples of vishing, fishing, smishing.
too big answer
Why does the internet need encryption?
Let's discuss.