Ways to avoid computer infection
Social engineering
Encryption
All three
100

Antivirus software (AVS) is...

Antivirus software (AVS) is a special program designed to detect, prevent, and remove viruses and other malware from a computer

100

what is social engineering?

Social engineering is a type of cyberattack that uses human psychology and emotions to gain access to information, systems or networks, for example in a company.

100

What is encryption?

Encryption is the process of converting plain text or data into a coded from to prevent unauthorized access.

100

What is ransomware?

Ransomware is a type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.

200

protecting computers in our modern world

In today's digital world, protecting computers from malware and cyber-attacks is a critical aspect of information security. The use of anti-virus software (AVS) is one of the main methods of protecting computers, including signature detection, behavioral analysis and cloud protection.

200

why is social engineering so prevalent today?

Today it is often easier to manipulate people than to hack the system.

200

The difference between symmetric encryption and asymmetric encryption.

Symmetric encryption

Uses the same key for encryption and decryption


Asymmetric encryption

Uses two keys, a public key and a private key, to encrypt and decrypt data.

200

Why are Proactive measures and Reactive measures needed?

By implementing these measures, individuals and organizations can reduce the risk of ransomware attacks and minimize the impact of a successful attack.

300

What are Cyber weapons, Cyber-military attacks?

Cyber-military attacks are malicious acts carried out using information technology to damage computer systems, networks or data, as well as to counter, intelligence or disinformation.

Cyber weapons are advanced tools or software designed to carry out attack in cyberspace.

300

Name three types of social engineering.

Phishing

Vishing

Smishing

300

What applications use encryption?

email communication

online banking

e-commerce

secure file transfer protocols

300

Social engineering in our modern world

Social engineering will evolve as the ways to protect information grow every day. Therefore, it is easier to deceive a person than to try to hack a program.

400

Ways to avoid computer infection:(4)

  • Update OS, applications and software
  • Beware of downloading files from untrusted sources
  • Use reliable antivirus software and update it
  • regularly.
  • Use unique passwords for online accounts.
  • Be careful about opening links from suspicious sources
  • Turn on the firewall on your computer
400

Methods of protection against social engineering.

using strong and unique passwords

two-factor authentication

keeping your software and security systems up to date

being careful about emails, phone calls, or text messages that ask you to provide confidential information


400

why do you need encryption?

it provides security against cyber threats and unauthorized access

it helps protect sensitive data from cybercriminals, hackers, and other malicious actors

without encryption data can be easily intercepted and compromised

400

What are the reactive measures?

Use antivirus software: Make sure your antivirus software is up to date and running on all devices.

Use firewalls: Firewalls can help block unauthorized access to your network and prevent ransomware attacks. 

Limit access to sensitive data: Only authorized employees should have access to sensitive data. 

Have a disaster recovery plan: The plan should include steps to isolate infected systems, restore data from backups, and report the incident to law enforcement.

500

Antivirus software techniques:

  • Signature detection - searches for virus signatures in files and computer memory, and blocking found matches.
  • Behavior Analysis – Monitor program activity and detect suspicious activity such as changes to system files or system settings.
  • Cloud protection - the use of cloud services to analyze files on remote servers, allowing you to quickly identify new threats without updating the signature database on your computer.
500

What is Phishing, Vishing, Smishing?

Phishing attacks usually involve sending an email that appears to be a legitimate source, such as a bank, to force a person to give confidential information.

Vishing is a type of social engineering attack that involves using voice messages to get people to tell confidential information. 

Smishing is a type of social engineering attack that involves using text messages to get people to tell confidential information.

500

What are the preventive measures?

Use antivirus software: Make sure your antivirus software is up to date and running on all devices.

 Use firewalls: Firewalls can help block unauthorized access to your network and prevent ransomware attacks.

 Limit access to sensitive data: Only authorized employees should have access to sensitive data.

 Have a disaster recovery plan: The plan should include steps to isolate infected systems, restore data from backups, and report the incident to law enforcement.

500

Cyber weapons techniques:

Malicious Software: Software specifically designed to infiltrate, disrupt or detect instances of systems or networks

Exploits: Code or techniques that exploit vulnerabilities in software, hardware, or network configurations.

Botnets: Networks of hijacked computers or devices that can be controlled remotely for coordinated attacks.