You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture?
No
They could screen shot or download it
Which of the following are strong password practices? (Choose all that apply.)
1.Passwords should contain a mixture of upper and lower case letters, numbers, and special characters.
2.Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you can remember them more easily.
3.You should immediately change your password in the case of a known data breach.
4.You should store your passwords on paper or in a text document, giving you a backup in the event that you forget them.
1 & 3
A cyber attack that attaches itself to a program, file, or disk.
Virus
T or F You should always share your age and address with anyone
False
Masquerades as a benign program while quietly destroying data or damaging your system.
Trojan Horse
You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?
Do not link the link
Kylee computer broke and wants to borrow her best friend's Maddie's computer. Should Maddie let her?
No, Kylee could download something suspicious or send an email out.
A link provided leads to a counterfeit webpage, what is this cyver attack?
Pharming
T or F Never open an email from someone you don’t recognize
True
Software stops working upon certain conditions.
Logic Bomb
You’ve just settled into your new hotel room when you realize you need to transfer some funds from your savings account to your checking account. In order to do this, you will need to connect your laptop to the hotel’s public Wi-Fi and log in to your online bank. Should you risk it?
Never (unless you have a VPN (Virtual Private Network))
What is a privacy setting you can add to your social media so people cannot see your location?
friends only or Ghost mode
Independent program that replicates itself and sends copies from computer to computer across network connections.
Worms
T or F risks caused by poor security knowledge and practice could be Identity Theft and/or Monetary Theft
True
You don't pay for netflix and it stops working, what is this an example of?
Logic Bomb
You have a long commute. Thankfully, your train just installed public Wi-Fi. Now you can listen to your favorite music or podcast. However, when you check for social media updates around lunch, you find that your account has been hacked. What steps could you take to prevent your mobile device or laptop data from being compromised in the future?
1) Do not connect
2) Use a VPN
John gets a friend request from a person he does not know on Instagram. He accepts it because he is trying to build up his following. Why is this dangerous?
It is someone he does not know and could be a child predator,
A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. What is this type of attack called?
Phishing
True or false: Although they operate similarly to computers, most mobile devices (cell phones, tablets, etc.) are not full computers and do not require software, such as anti-virus, to be secure.
False
you Download a game: It may be fun but contains hidden code that gathers personal information without your knowledge. what is that cyber attack?
Trojan Horse
Passwords often have complex requirements, and most online citizens will need to remember numerous different passwords to access their internet services. What is a way to help you keep track of all these different passwords?
Password Manager- an encrypted vault that can only be unlocked with a single master password
Do not write it down, because anyone can get it
What is the method of access control by which users must present multiple, separate pieces of identification, or multiple sets such as a password and phone number, in order to access a system?
Multi-factor authentication (2 step authentication)
manipulates people into performing actions or divulging confidential information.
Social Engineering
True or false: Automatically updating your machine poses a significant security concern, as it could install unwanted programs/features that disrupt your network or harm your computer.
False
Although updates can occasionally cause problems, they also contain vital patches to help protect your machine against attackers.
Someone calls you and says this is John with AASD, we think your account has been hacked and we need to verify your information, can you please confirm your address and social security number. what type of attack is this?
social engineering