This is the most common method cybercriminals use to gain unauthorized access to systems.
Phishing.
This allows an organization to bring together and organize the needed resources to deal with an adverse event related to the safety and security of information system resources.
Cyber Incident Response Plan
Cybersecurity Incident Response Plan
This is a string of characters which serves as authentication of a person's identity and may be used to grant or deny access to private or shared data.
A password.
This is a type of malware that encrypts a victim's files or locks them out of their own system, demanding a ransom (typically in cryptocurrency) to provide the decryption key or to unlock the system.
Ransomware.
This is what you do if you receive a phishing email.
Report it as phishing on the email system.
This is the first step to managing a cybersecurity incident.
Preparation.
This is a tool that securely stores and generates passwords.
A password manager or password management tool.
Bitwarden.
Name a way malware can enter a device.
Through an email attachment, by downloading something, or through exploiting a software vulnerability.
This is the person you contact if you accidentally clicked on a phishing link.
IT Support/Systems Admin
This is the person you contact if someone has resigned to initiate the process of resetting account credentials.
HR
This is the minimum number of characters a password should have.
8.
Provide at least 3 common signs of malware infection on a computer.
1. You are locked out of an account/device/file.
2. Unexpected pop-up ads.
3. Changes in system/browser settings.
4. Unexplained data usage.
5. Slow computer performance.
6. Disabled antivirus or security software.
7. System crashes or freezes.
8. Unwanted toolbars.
9. Unusual hard drive activity.
10. Strange emails or messages.
Provide at least 4 signs that an email may be a phishing attempt.
1. Sender's email looks weird/suspicious.
2. It has a sense of urgency/threat.
3. There is a weird link in the email.
4. There is an unsolicited/weird attachment in the email.
5. Misspelled words or grammatical errors.
6. It sounds too good to be true.
7. Mismatched logos and branding.
8. The sender requests personal information.
9. The sender requests the receiver perform an unusual action.
This mechanism provides an extra layer of security when logging into an application by requiring an additional form of verification, besides your password.
2FA or two-factor authentication.
Multi-factor authentication.
Name at least 4 types of common malware.
Viruses, Trojans, worms, spyware, ransomware, adware, keyloggers, botnets, rootkits, browser hijackers, scareware, RAM scrapers, malicious macros