This method uses two different forms of identity to verify a user.
Multi-factor Authentication
You receive an email asking you to verify your bank account. What should you do?
Report it as phishing and don’t click the link!
This type of malware locks your files and demands payment.
Ransomware
What is a computer virus?
What is a program that replicates itself by attaching to other files and spreads when those files are shared?
Why is it important to lock your computer when stepping away from your desk?
What is to prevent unauthorized access to your data and systems?
True or False: It’s safe to reuse a strong password across multiple websites.
FALSE
This type of attack involves impersonating a trusted individual to gain access.
Spear phishing
This malware replicates itself and spreads to other systems without user interaction.
What is a worm
True or False: A virus can spread without any user interaction.
What is False? (That’s typically a worm, not a virus.)
This is a tool that stores and generates strong passwords.
What is a password manager?
What is the main benefit of using a password manager?
What is securely storing and generating strong, unique passwords for each account?
This type of phishing uses SMS messages to trick users.
Smishing
This type of malware disguises itself as legitimate software to trick users into installing it.
What is a Trojan horse?
This type of virus activates only when certain conditions are met, like a specific date or action.
What is a logic bomb?
True or False: Public Wi-Fi is always safe to use if it doesn’t require a password.
What is False?
How often should you change your passwords?
What is every 3–6 months or immediately after a breach?
An attacker creates a fake website that looks like your bank’s login page.
website spoofing or pharming
A program that records every keystroke you make.
Keylogger
What’s the main difference between a virus and a worm?
What is a virus needs a host file to spread, while a worm can self-replicate and spread independently?
You should update your software regularly to fix these.
Security Vulnerabilites
What is two-factor authentication (2FA), and why is it important?
What is an extra layer of security that requires a second form of verification, like a code sent to your phone?
This tactic involves impersonating a trusted contact using a spoofed email address to request sensitive data.
Business Email Compromise (BEC)
This type of malware gives attackers remote control over an infected system.
What is a Remote Access Trojan (RAT)
What’s the best way to prevent virus infections on your computer?
What is using updated antivirus software, avoiding suspicious downloads, and keeping your system patched?
This type of software helps detect and block malicious programs.
What is antivirus or anti-malware software?