What are some of the basics of cybersecurity
Strong passwords, Software updates, Data backup, Network security, & Password management
What is one common type of cyber attack
Phishing
What is cyberthreat
A cyberthreat refers to anything that has the potential to cause serious harm to a computer system.
What year did the first cyber-attack occur?
1834
What is phishing in the context of cybersecurity?
Phishing is a cyber-attack that involves tricking individuals into providing sensitive information, such as usernames and passwords, often through deceptive emails or websites.
What is the design method that minimizes losses when a risk is realized?
Passive Safety
What are the common signs that a computer may be infected with malware?
Common signs of malware infection include slow performance, frequent crashes, unexpected pop-ups, programs opening or closing automatically, and unauthorized access to personal information.
Name three types of cyber attacks
Malware, Password attack, Phishing, DNS tunneling, Spoofing, Insider threat, & Cryptojacking.
(If you said any of the 7 you can get points)
Data loss due to the people already in the organization
Insider threat
True or False:
The importance of cyberspace today has led to a uniform definition for what cyberspace is. Basically, it is a global domain within the information environment whose character is defined by the use of electronics and the electromagnetic spectrum.
False
What is a cyber-attack where criminals intercept and alter network traffic between IT systems.
Man-in-the-middle (MITM) attack
An individual or group that can manifest a threat. Internal or external, based on their capabilities, intentions and past actions.
e.g hacktivists, cyber terrorists
Threat Actor
Which of the following includes not only technical issues such as viruses and denial of service attacks, but also human matters such as insider deception as well as normal human mistakes?
Cyber Security
What's the name for a program that holds a computer "hostage" while demanding a ransom?
Ransomware
Name at least three of the six attack actors
Cybercriminals
Online social hackers
Hacktivists
Nation states
Corporations
Cyber terrorists