Facebook and Twitter are two examples of these that are used by attackers to gather information on a target and spread malware.
What are social networking websites?
Received from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.
What is an email scam?
This is a self-replicating program that sometimes spreads by itself into other executable code or documents
What is a virus?
This group is responsible for information security.
Who is everyone?
"Hey! Click on this cat video. It's adorable!!"
This could be an example of what type of attack on social media?
What is "phishing"?
Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these.
What are indicators of phishing?
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.
What is a Trojan Horse?
What do you do if you suspect that you clicked on a phishing email?
What is a contact IT Support or Information Security?
Following someone into the office because "You forgot your badge" is an example of what type of social engineering attack?
What is piggybacking?
Carried with you and not properly password protected and encrypted can result in a cyber security breach.
What are mobile devices?
Both are programs that self-replicate (can download automatically), but only this one requires you to do something, such as click on an email link, to actually activate it.
What is a virus?
You'd use this when you're in a hotel to make your connection over the public network more secure.
What is a VPN?
The practice or industry of hunting and killing whales for their oil, meat, or whalebone or targeting high-profile end users with an email that appears as if it's from a trusted source are examples of what?
What is whaling?
This credit bureau had over 145.5 million records affected by its data breach.
Who is Equifax?
Defined as programs that track where you go on the Internet and what you type into your keyboard.
What is spyware?
Someone watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device is an example of this.
What is shoulder surfing?
An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email, or social networks.
What is social engineering?
According to the 2018 Verizon Data Breach Investigations Report, 58% of breach victims fall under what category?
Who are small businesses?
Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this.
What is a malware infection?
This security tool assists in generating and retrieving complex passwords, potentially storing such passwords in an encrypted database or calculating them on demand
What is a password manager?