Cybersecurity Awareness Quiz
34 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does cybersecurity aim to protect?

  • Only organizational devices
  • Governmental information only
  • Networks, computers, programs, and data (correct)
  • Only personal data
  • Which of the following is a characteristic of personal data?

  • Should not reveal personal information
  • Contains sensitive information that can be profitable (correct)
  • It has no value to hackers
  • Is often public information
  • What is one common motivation for hackers?

  • For financial gain (correct)
  • To increase network speed
  • To enhance cybersecurity awareness
  • To build public trust
  • Which option best describes 'online identity'?

    <p>Your identity in cyberspace that should disclose limited information</p> Signup and view all the answers

    What is the potential value of a medical record on the dark web?

    <p>$350</p> Signup and view all the answers

    How can cyber attacks occur outside of technical means?

    <p>Via social means and manipulation</p> Signup and view all the answers

    Why are username and alias important in online identity?

    <p>They should avoid attracting unwanted attention</p> Signup and view all the answers

    Which of the following is NOT considered a form of hacker motivation?

    <p>Building a community</p> Signup and view all the answers

    What is a significant consequence of ransomware attacks on a computer?

    <p>It may lock the screen or encrypt the data.</p> Signup and view all the answers

    Which type of personal data is typically stored in electronic health records?

    <p>Prescriptions and mental health information.</p> Signup and view all the answers

    What common strategy do hackers use to compromise multiple users simultaneously?

    <p>Sending phishing emails and fake social media giveaways.</p> Signup and view all the answers

    What was a key factor that allowed the WannaCry attack to be effective?

    <p>The software on affected computers was not updated.</p> Signup and view all the answers

    Where can personal data related to store loyalty cards typically be found?

    <p>Stores compiling purchase histories.</p> Signup and view all the answers

    What is recommended to prevent data loss from a ransomware attack?

    <p>Keep a backed-up copy of your data.</p> Signup and view all the answers

    Which of the following is NOT directly considered personal data?

    <p>Combat strategy files.</p> Signup and view all the answers

    What type of records include grades, test scores, and disciplinary reports?

    <p>Educational records.</p> Signup and view all the answers

    What was the main result of the Jeep hacking duo's research on the 2014 Jeep Cherokee?

    <p>They could take over and crash all Jeeps remotely.</p> Signup and view all the answers

    Which of the following best describes Flipper Zero?

    <p>A remote control for various electronic devices.</p> Signup and view all the answers

    What is a key purpose of cyberwarfare?

    <p>To sabotage the infrastructure of adversaries.</p> Signup and view all the answers

    What was Stuxnet specifically designed to damage?

    <p>Iran’s nuclear enrichment plants.</p> Signup and view all the answers

    What percentage of Stuxnet infections were reported to be in Iran?

    <p>60%</p> Signup and view all the answers

    Which feature was used in the design of the Stuxnet malware?

    <p>Modular coding.</p> Signup and view all the answers

    Why might citizens lose confidence during a cyberwarfare attack?

    <p>They believe their government cannot protect them.</p> Signup and view all the answers

    What is one speculated origin of the Stuxnet worm?

    <p>Developed by US and Israel.</p> Signup and view all the answers

    What is a common characteristic of phishing attempts?

    <p>They typically request sensitive information through deception.</p> Signup and view all the answers

    What ensures a secure connection when visiting a website?

    <p>A padlock symbol and HTTPS in the URL.</p> Signup and view all the answers

    What should you do if you receive an email from an unknown source with links?

    <p>Use a trusted method to contact the sender.</p> Signup and view all the answers

    Which of the following breaches was reported the highest percentage for businesses in the last 12 months?

    <p>Phishing attacks.</p> Signup and view all the answers

    What is a primary risk associated with internal security threats?

    <p>They have direct access to sensitive information.</p> Signup and view all the answers

    What type of attack involves manipulating a physical object to cause harm?

    <p>Remote hacking of vehicles.</p> Signup and view all the answers

    What should be done to minimize the risk when making online transactions?

    <p>Ensure to use a credit card or PayPal.</p> Signup and view all the answers

    What is a characteristic of external security threats?

    <p>They can exploit vulnerabilities in computing devices.</p> Signup and view all the answers

    Which option is the best practice to follow if a suspicious email is received?

    <p>Contact the organization directly using a known channel.</p> Signup and view all the answers

    What type of malware involves demanding payment to restore access to data?

    <p>Ransomware.</p> Signup and view all the answers

    Study Notes

    Cybersecurity Awareness

    • Cybersecurity encompasses technologies, processes, and practices safeguarding networks, computers, programs, and data from unauthorized access, damage, or attacks.
    • In computing, "security" often refers to cybersecurity.
    • Protecting personal information, devices, and networks is crucial due to malicious intent.
    • Attacks can occur both online and through social engineering.

    Personal Data

    • Offline Identity: Your identity in everyday life (home, school, work).
    • Online Identity: Your identity in cyberspace, requiring limited information disclosure.
    • Username or Alias: Should not reveal personal information, be appropriate and respectful, and avoid attracting unwanted attention.

    Hacker Motivation

    • Financial Gain: Profiting from stolen information.
    • Reputation Damage: Tarnishing an organization’s reputation.
    • Activism and Political Revenge: Using cyberattacks to achieve political goals or seek retribution.
    • Pride and Challenges: Hacking for recognition or a sense of accomplishment.
    • Fun or Because They Can: Hacking for amusement or out of curiosity.

    The Value of Personal Data

    • Personal information, email addresses, financial details, passwords, and account information are valuable on the dark web.
    • Computers can be exploited for cryptocurrency mining.
    • Hackers can profit from selling large collections of stolen information.

    Types of Personal Data

    • Medical Records: Electronic Health Records (EHR), prescriptions, and other personal health information.
    • Education Records: Grades, test scores, courses taken, awards, degrees, attendance records, and disciplinary reports.
    • Employment and Financial Records: Income, expenditures, tax records (paycheck stubs, credit card statements, credit rating, banking statements), and past employment information.

    Data Locations

    • Medical Records: Doctor’s offices and insurance companies.
    • Store Loyalty Cards: Stores collect purchase data, used by marketing partners for targeted advertising.
    • Online Pictures: Friends and strangers may have copies of your photos.

    Computing Devices

    • Data storage and gateways to online data.

    Low-Effort Attacks

    • Often target thousands of users simultaneously, using tactics like phishing emails, fake social media giveaways, and malicious websites.
    • Such attacks aim for a high volume of attempts, hoping someone will fall victim.

    Ransomware

    • Typically installed through downloads, attachments, or links in emails or websites.
    • Locks the screen or encrypts data, demanding a ransom for access.
    • The Wannacry attack (2017) affected 300,000 computers across 150 countries, including organizations like the NHS, Renault, FedEx, and German railways.

    Tackling Ransomware

    • Back Up Data: Create and maintain a backup copy of data, disconnected from the network.
    • Patch Software: Update software regularly to prevent known vulnerabilities (like those exploited by Wannacry).
    • Caution With Attachments: Avoid clicking on links from emails or SMS messages from untrusted sources.

    Phishing

    • Attempts to deceive users into revealing sensitive information like login credentials, payment card details, or installing malware.
    • Often impersonates legitimate companies or individuals.

    Tackling Phishing

    • Don’t Click on Links: Verify the sender before clicking on any links in an email.
    • Trusted Contact Methods: Use alternative methods like phone numbers, apps, or official websites to contact companies.
    • Mark as Spam: Report suspicious emails as spam.

    Secure Website Indicators

    • Correct Website: Ensure you are on the intended website.
    • HTTPS and Padlock: The "S" in HTTPS indicates a secure connection, preventing man-in-the-middle attacks. This encrypts data, making it unreadable to unauthorized parties.

    Online Transaction Security

    • Credit Card/PayPal: Use trusted methods like credit cards or PayPal when conducting online transactions.

    Internal Security Threats

    • Employees or contractors posing threats, including:
      • Improper handling of confidential data.
      • Compromising internal servers or network infrastructure.
      • Facilitating external attacks by connecting infected USB media to the corporate network.
      • Introducing malware via malicious emails or websites.

    External Security Threats

    • Exploiting vulnerabilities in networks or computing devices.
    • Employing social engineering tactics to gain access.

    The Jeep Hacking Duo

    • Hackers remotely disabled safety systems and hijacked a 2014 Jeep Cherokee’s control, causing crashes.
    • The method exploited the Jeep’s onboard internet connection and demonstrated vulnerability in connected vehicles.

    Flipper Zero

    • A versatile device resembling a remote control, capable of interacting with and controlling various electronic devices.
    • Used by hackers and script kiddies to explore devices and potentially cause mischief in public spaces.

    Cyberwarfare

    • Definition: Conflict conducted in cyberspace.
    • Stuxnet Malware: Designed to disable Iran’s nuclear enrichment plant.
      • Utilized modular coding and stolen digital certificates.

    Purpose of Cyberwarfare

    • Gaining an advantage over adversaries, nations, or competitors.
    • Sabotaging national infrastructure.
    • Blackmailing government personnel.
    • Damaging citizens’ trust in their government.

    Stuxnet Worm

    • Targeted Siemens centrifuge programmable logic controllers (PLCs) used in Iranian nuclear facilities.
    • Caused centrifuges to spin too fast, leading to physical damage.
    • Affected 60% of Stuxnet infections were in Iran.
    • Speculations of US and Israeli involvement, but no direct proof.
    • Supporting documents released by Edward Snowden in 2013.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on cybersecurity concepts, including personal data protection and hacker motivations. This quiz will help you understand the importance of safeguarding your identity and information online and offline. Measure your awareness of cybersecurity practices and potential threats.

    More Like This

    Master the Basics
    10 questions

    Master the Basics

    AbundantPurple avatar
    AbundantPurple
    Cybersecurity Basics Quiz
    40 questions

    Cybersecurity Basics Quiz

    SubstantivePedalSteelGuitar avatar
    SubstantivePedalSteelGuitar
    Use Quizgecko on...
    Browser
    Browser