Podcast
Questions and Answers
What are identity thieves known for?
What are identity thieves known for?
Which of the following is a form of malware?
Which of the following is a form of malware?
Phishing only occurs through emails.
Phishing only occurs through emails.
False
What is a top action to protect passwords?
What is a top action to protect passwords?
Signup and view all the answers
What should you do to prevent identity theft?
What should you do to prevent identity theft?
Signup and view all the answers
Provide one tip to avoid phishing scams.
Provide one tip to avoid phishing scams.
Signup and view all the answers
Phishing can steal personal information by tricking you into ________.
Phishing can steal personal information by tricking you into ________.
Signup and view all the answers
Match the following cybersecurity actions with their purposes:
Match the following cybersecurity actions with their purposes:
Signup and view all the answers
Study Notes
Cybersecurity Threats
- Identity Thieves - Obtain unauthorized access to personal information such as FSUID, SSN, bank accounts and passwords to commit fraud or theft.
- Hackers - Secretly access computer systems to steal information or cause damage.
- Malware - Malicious software including computer viruses, worms, Trojans and spyware that harms a computer user.
- Phishing - Steals personal information by tricking users into clicking a link or entering their username and password through emails, phone calls, and website downloads.
Cybersecurity Actions
-
Protect Passwords
- Never share passwords with anyone.
- Create strong passwords that are difficult to guess, avoid dictionary words and common passwords.
- Change passwords periodically.
- Use at least 8 characters with a mix of uppercase and lowercase letters, numbers, and symbols.
- Use mnemonics to remember complex passwords.
- Use different passwords for different sites.
- Store passwords in a safe place.
- Avoid keeping passwords on sticky notes.
- Consider password vaults like LastPass or KeePass.
-
Prevent Identity Theft
- Do not share Social Security numbers, driver's license numbers, bank account numbers or other personal information unless you know who you are providing it to.
- Protect other people's information as you would your own.
- Never send personal or confidential information via email, text message, or instant message.
-
Beware of Phishing
- Phishing attacks trick users into clicking links or entering credentials.
- Phishing comes in many forms including emails, phone calls, and website downloads.
- Phishing attempts may look like they are from Florida State University (IT Services or the Service Desk).
- FSU will never ask for your FSUID username and password in an email or phone call.
-
Tips to Avoid Phishing Scams
- Be skeptical of messages requiring “immediate action” or threatening loss.
- Type website addresses in the browser to access sites directly instead of clicking links.
- Hover over links to display the true URL and see if it's a reputable website.
- Think before clicking email and website links and never click links that you don't trust.
- Do not open unexpected attachments, especially ZIP files, and never run .exe files.
- Avoid providing personal information over the phone from unsolicited calls.
- Never send credit card or other sensitive information via email.
- Use common sense; if it looks like spam, it probably is.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential cybersecurity threats such as identity theft, hacking, malware, and phishing. Additionally, it provides actionable steps to protect personal information and passwords. Test your knowledge on how to stay safe online and defend against various cyber threats.