Cybersecurity: Malware & Social Engineering
45 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of malware replicates itself over a network?

  • Virus
  • Trojan
  • Worm (correct)
  • Spyware
  • What is a characteristic of a Trojan?

  • Infects your computer and takes control of its functions
  • Replicates itself without user intervention
  • Monitors user movements and collects data
  • Facilitates unauthorized access to your workstation (correct)
  • Which of the following statements best describes social engineering?

  • An intricate phishing strategy involving complex software
  • A method to patch human errors in systems
  • An attack that relies on human interactions to gain confidential information (correct)
  • An attack that targets software vulnerabilities
  • What is the main reason social engineering is considered effective?

    <p>It targets individuals and their information directly</p> Signup and view all the answers

    What does spyware primarily do?

    <p>Monitors a user's online activity and movements</p> Signup and view all the answers

    Which type of malware is described as malicious software that can take control of a computer's functions?

    <p>Virus</p> Signup and view all the answers

    Why is human error considered a significant vulnerability in information security?

    <p>Human actions can often bypass technical safeguards</p> Signup and view all the answers

    What is a common misconception about malware types?

    <p>All malware must replicate to be harmful</p> Signup and view all the answers

    What makes social engineering attacks particularly difficult to track?

    <p>They rely on personal manipulation rather than digital methods</p> Signup and view all the answers

    What is a crucial action to take when you step away from your workstation?

    <p>Lock your workstation using Windows key + L</p> Signup and view all the answers

    Why is it essential to keep your operating system and applications updated?

    <p>To receive security patches that address vulnerabilities</p> Signup and view all the answers

    What should you be cautious about when installing applications on your device?

    <p>The permissions the application requests</p> Signup and view all the answers

    What is the best practice regarding passwords for various accounts?

    <p>Employ strong, unique passwords for different accounts</p> Signup and view all the answers

    What should you avoid doing with smartphones and your PC?

    <p>Charging smartphones directly from the PC</p> Signup and view all the answers

    Which of the following statements about data backup is true?

    <p>Always back up sensitive data to prevent loss or damage</p> Signup and view all the answers

    What is a primary focus of incident reporting in information security?

    <p>Effective management of reported incidents</p> Signup and view all the answers

    Which of the following is NOT a characteristic of phishing emails?

    <p>Messages from known contacts</p> Signup and view all the answers

    Which scenario represents a positive outcome in incident reporting?

    <p>Detection of a phishing email before it causes harm</p> Signup and view all the answers

    What can be considered a significant risk in the context of digital information?

    <p>Digital information being more accessible than physical records</p> Signup and view all the answers

    What is an Advanced Persistent Threat (APT)?

    <p>An attack that remains undetected in a network over time</p> Signup and view all the answers

    What might be a potential consequence of a successful phishing attack as represented in the case?

    <p>Long-term damage to customer trust</p> Signup and view all the answers

    Which of the following actions can help prevent APTs?

    <p>Reporting odd user activities</p> Signup and view all the answers

    What is a crucial part of the incident reporting process as outlined?

    <p>Repair and support unit involvement</p> Signup and view all the answers

    What method is utilized in human-based attacks for gaining unauthorized access?

    <p>Impersonation of legitimate users</p> Signup and view all the answers

    Which action is critical within the incident reporting framework after an issue is fixed?

    <p>Documenting the incident and assessing any residual risk</p> Signup and view all the answers

    Which of the following represents a social engineering attack?

    <p>Shoulder surfing</p> Signup and view all the answers

    What is a common technique used in information gathering attacks?

    <p>Utilizing social media to collect data</p> Signup and view all the answers

    How does the awareness session relate to handling online scams effectively?

    <p>By informing staff of potential risks and countermeasures</p> Signup and view all the answers

    What characterizes a phishing attack, based on the examples provided?

    <p>High-level impersonation of trusted entities to obtain sensitive information</p> Signup and view all the answers

    Which of the following terms describes attacks that exploit user trust?

    <p>Human-based attacks</p> Signup and view all the answers

    In which way can staff play a role in preventing the consequences of phishing attacks?

    <p>By promptly reporting any unusual communication to the incident reporting coordinator</p> Signup and view all the answers

    Shoulder surfing primarily aims to achieve what?

    <p>Observing sensitive information being entered</p> Signup and view all the answers

    What is one of the primary roles of staff in information security?

    <p>To be the first line of defense</p> Signup and view all the answers

    What indicates a failed response to a phishing attempt in the scenario provided?

    <p>Responding to the phishing email and sharing personal information</p> Signup and view all the answers

    Which activities are part of dumpster diving as a social engineering attack?

    <p>Searching through trash for sensitive documents</p> Signup and view all the answers

    What is a fundamental guideline for selecting a strong password?

    <p>Mix of upper and lowercase characters</p> Signup and view all the answers

    Which statement best describes the Web of Trust (WOT)?

    <p>WOT displays a colored traffic light indicating website trustworthiness.</p> Signup and view all the answers

    What is one recommended practice for email security?

    <p>Contacting the sender about the attachment if unsure</p> Signup and view all the answers

    Which of the following is a best practice regarding social networking security?

    <p>Evaluate security settings regularly</p> Signup and view all the answers

    What should be done with documents containing sensitive information?

    <p>Use shredders for disposal</p> Signup and view all the answers

    What precaution should be taken when using mobile phones for work?

    <p>Using strong screen locks to protect data</p> Signup and view all the answers

    Which of the following is NOT considered a physical security measure?

    <p>Changing passwords frequently</p> Signup and view all the answers

    What should be the primary action when encountering a suspicious email?

    <p>Contact the IT department for guidance</p> Signup and view all the answers

    What is an important consideration regarding third-party applications on social networks?

    <p>They should be evaluated for their access permissions</p> Signup and view all the answers

    Which of the following is essential for mobile security?

    <p>Download applications from trusted sources only</p> Signup and view all the answers

    Study Notes

    Malware

    • Malware is a malicious software designed to harm computer systems and steal information.
    • Types of malware include: Spyware, Trojans, Viruses, and Worms.
    • Spyware tracks your online activity and sends it to malicious entities, like phishing websites that steal your login information.
    • Trojan viruses are hidden within legitimate programs that appear harmless. Trojans can give adversaries access to your workstation and steal data.
    • A virus can infect your computer and take control of its functions.
    • Worms are viruses that can replicate and spread across a network without human interaction.

    Social Engineering

    • Social engineering is the art of human hacking where adversaries exploit human error to gain access to networks and information.
    • Social engineering is effective because every user has information, which adversaries try to steal.
    • Social Engineering attacks are difficult to detect and track.

    Types of Social Engineering Attacks

    • Social-media vectors, shoulder surfing, dumpster diving, impersonation, phishing, and online scams are all attacks that involve humans.
    • Phishing emails attempt to deceive recipients into clicking malicious links.
    • Phishing email characteristics include deceptive subject lines, attractive or threatening messages, forged sender addresses, and forged content.
    • Advanced Persistent Threats are long-term attacks where adversaries use social engineering to gain access to a network and steal data.

    Information Gathering

    • Staff are the first line of defense against information breaches.

    Incident Reporting

    • Report, fix, and follow-up are the key steps to minimize risks.
    • Staff should report all incidents to the Incident reporting coordinator and Business line manager.
    • The Repair and support unit will fix the issue and the Incident reporting coordinator will follow-up.

    Security Tips and Countermeasures

    • Use HTTPS links to safeguard information while browsing online.
    • Use the Web of Trust (WOT) tool to identify trustworthy websites and ensure safe online shopping and banking.
    • Use strong passwords, don't share them with anyone, and change them frequently.
    • Implement physical security protocols, such as clear desk and screen policies and locking up portable devices.
    • Always back up your sensitive data.
    • Never open email attachments from unknown senders.
    • Be aware of mobile threats and download apps only from trusted sources.
    • Use screen locks on mobile devices.
    • Never plug your phone into a PC.
    • Keep your phone operating system and apps updated.

    Security: Behavior vs Technology

    • Security is 80% about behavior and 20% about technology.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on malware and social engineering tactics used by cyber adversaries. This quiz covers various types of malware, their functions, and different social engineering attack methods. Learn how these threats exploit human vulnerabilities and technological weaknesses.

    More Like This

    Use Quizgecko on...
    Browser
    Browser