Types of phishing attacks
How is Artificial Intelligence/Machine Learning impacting criminals ability to do cyber crime?
What are easy ways to avoid falling victim to cyber crime?
Identity and Access Management
Common Threats for Municipalities
100

This type of phishing attack relies on the targets downloading attachments from emails or clicking on fraudulent or bogus links.

What is email phishing?

100

This type of tool allows threat actors to use artificial intelligence to predict common passwords based on previously breached data before trying all possible combinations of numbers, letters, and special characters.

What is a brute force attack?

100

This processes involves ensuring you are the intended recipient of the email message after receiving an email or phone call with an attachment you were not expecting from someone you do not normally contact. 

Reaching out to the sender in a different form of communication that the original message. 

100

This tennant of IAM refers to threat actors ability to be physically present at a machine or system.

What is physical security?

100

This threat is involved hackers encrypting data or systems and demand payment to restore access. These attacks can paralyze city operations, including water systems, emergency services, and administrative functions. 

What is ransomware?

200

This type of phishing attack uses oral communication as the primary tool.

What is Vishing? (Voice Phishing)

200

This type of tool allows threat actors to create realistic copies or fakes of a person's voice, image, or likeness. Threats can create videos of people, or audio recordings using this tool. 

What are Deep Fakes?

200

This processes involves making sure when you get up from your computer no one else can have access to your session, even without you being present. 

What is locking your computer? 

200

This is a tool used to ensure that users only receive access to information and resources that they need to do their jobs. 

What is the principle of least privilege?

200

This threat is characterized by cybercriminals using deceptive emails, phone calls, or websites to trick employees into revealing sensitive information (like login credentials or financial information)

What are phishing attacks?

300

This type of attack works by sending SMS text messages to users with bad, misleading, or fraudulent hyperlinks.

What is SMS phishing?

300

Through artificial intelligence, attackers are able to have an application comb through social media profiles, organizational directories, and other publicly available information to identify targets for attacks

What is automated phishing?

300

What is the action we do to ensure room, building, or area is secure when after we leave?

What is locking the door or gate?

300

This encompasses the creation, maintenance, and eventual deactivation of user identities. 

What is lifecycle management?

300
This threat is characterized generally by employees, contractors, or third-parties who cause harm, either by unintentionally harming systems or mishandling information, or intentionally leaking data/breaking systems. 

What are insider threats?

400

This attack focuses on finding as much information about specific targets as possible using open sources to seem more realistic

What is Spear Phishing?

400

The application of technology, programs, robotics, or processes to achieve outcomes with minimal human input.

What is automation?

400

This is a simple and effective way to protect your online accounts from unauthorized access

What is using strong passwords?

400

This process ensure that critical tasks or sensitive actions are divided among multiple individuals to make it more difficult for any one account to carry out a cyber attack. 

What is Segregation of Duties?

400

This attack is characterized by attacks manipulating or deceiving employees into performing actions that compromise security, such as transferring funds, providing confidential information, or clicking on harmful links. 

what is social engineering?

500

This type of attack focuses on one, or a few key individuals who are either high level employees, or have specific access to the resources the attacker wants.

What is Whaling? 

500

This process relies on AI's ability to generate custom packages that adapt to different systems and evades detection by security software more effectively. 

What is automated malware generation?

500

What is an additional security step that requires both your password and a code sent to your phone?

What is multi-factor authentication?

500

These types of attacks try to circumvent identity and access management by compromising user identities?

What is Phishing?

500
This attack is generally carried out when hackers use stolen or leaked credentials to attempt to break into municipal accounts, especially if employees reuse passwords across different sites or systems.

What is credential stuffing?