Podcast
Questions and Answers
Social engineering attacks rely on which of the following?
Social engineering attacks rely on which of the following?
What should you do upon receiving an urgent email about a critical software update?
What should you do upon receiving an urgent email about a critical software update?
Call your colleague on the phone to confirm that they sent you this message.
What should you do if you suspect you are experiencing a social engineering attack?
What should you do if you suspect you are experiencing a social engineering attack?
End contact with the person and report the suspected attack.
Why do cyber attackers commonly use social engineering attacks?
Why do cyber attackers commonly use social engineering attacks?
Signup and view all the answers
What is the most effective way to detect and stop social engineering attacks?
What is the most effective way to detect and stop social engineering attacks?
Signup and view all the answers
Which of the following is the most likely indicator of a phishing attack?
Which of the following is the most likely indicator of a phishing attack?
Signup and view all the answers
Phishing is what type of attack?
Phishing is what type of attack?
Signup and view all the answers
What should you do if you receive an email from the help desk asking for your password?
What should you do if you receive an email from the help desk asking for your password?
Signup and view all the answers
Which of the following is the best way to confirm that your connection to a website is encrypted?
Which of the following is the best way to confirm that your connection to a website is encrypted?
Signup and view all the answers
What does HTTPS mean?
What does HTTPS mean?
Signup and view all the answers
What should you do if you are worried about using a potentially outdated Internet browser?
What should you do if you are worried about using a potentially outdated Internet browser?
Signup and view all the answers
What is the best way to keep our organization secure when using social networking tools?
What is the best way to keep our organization secure when using social networking tools?
Signup and view all the answers
Why is it important to use a strong, unique passphrase for each of your social networking accounts?
Why is it important to use a strong, unique passphrase for each of your social networking accounts?
Signup and view all the answers
How does two-step verification help protect your social networking accounts?
How does two-step verification help protect your social networking accounts?
Signup and view all the answers
Why is it important to disable Wi-Fi and Bluetooth when you are not using them?
Why is it important to disable Wi-Fi and Bluetooth when you are not using them?
Signup and view all the answers
Why is it important to secure your mobile device with a screen lock?
Why is it important to secure your mobile device with a screen lock?
Signup and view all the answers
When downloading a new app, which criterion should you look for to keep your mobile device secure?
When downloading a new app, which criterion should you look for to keep your mobile device secure?
Signup and view all the answers
Which of the following is an example of two-step verification?
Which of the following is an example of two-step verification?
Signup and view all the answers
Which of the following is the best example of a strong and memorable password?
Which of the following is the best example of a strong and memorable password?
Signup and view all the answers
Which of the following is the best way to create a strong password?
Which of the following is the best way to create a strong password?
Signup and view all the answers
Who or what should be held responsible when sensitive data is mishandled?
Who or what should be held responsible when sensitive data is mishandled?
Signup and view all the answers
What should you do with sensitive data that the organization no longer needs to retain for business use or legal reasons?
What should you do with sensitive data that the organization no longer needs to retain for business use or legal reasons?
Signup and view all the answers
Which of the following describes the best practice for managing third-party access to our organization's sensitive data?
Which of the following describes the best practice for managing third-party access to our organization's sensitive data?
Signup and view all the answers
After visiting several websites, your computer exhibits behavior you recognize from your security awareness training as a sign of a hacked system. What should you do next?
After visiting several websites, your computer exhibits behavior you recognize from your security awareness training as a sign of a hacked system. What should you do next?
Signup and view all the answers
Study Notes
Social Engineering Attacks
- Rely on convincing individuals to perform harmful actions.
- Urgent communication (e.g., software updates) should be confirmed through phone calls to avoid falling victim to scams.
- If a social engineering attack is suspected, cease contact and report it immediately.
Phishing Attacks
- Commonly disguised as legitimate emails, often appearing urgent.
- A major indicator is receiving an email from a coworker but originating from a personal email address (e.g., @gmail.com).
- Phishing is a form of social engineering.
Security Measures
- Organization-wide training is the most effective way to detect and prevent social engineering attacks.
- A padlock icon in the status bar indicates a secure, encrypted connection to a website (HTTPS).
Password and Account Security
- Use a strong, unique passphrase for each account to ensure that if one is compromised, others remain secure.
- Two-step verification adds an extra security layer, requiring an additional step (like a code sent to email) to access accounts.
- Strong and memorable passwords can be created using long phrases (e.g., “the-sound-of-rain-on-the-windowsill”).
Mobile Device Security
- Enable screen locks to protect information on mobile devices from unauthorized access if lost or stolen.
- Disable Wi-Fi and Bluetooth when not in use to prevent automatic connections to risky networks.
- Look for actively updated apps to maintain security when downloading.
Handling Sensitive Data
- Individuals are responsible for mishandling sensitive data.
- Once no longer needed, sensitive data must be securely disposed of, whether physical or digital.
- For third-party access to sensitive data, security requirements should be well-documented and periodically reviewed.
Response Protocols
- If unusual system behavior is observed after visiting websites, report it following the organization's protocol to address potential hacking concerns.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Explore key concepts of evolution in this interactive set of flashcards. Each card presents a term or scenario relevant to the principles of evolution. Test your knowledge and reinforce your understanding of biological evolution through these engaging prompts.