Cybersecurity Threats and Protections
8 Questions
0 Views

Cybersecurity Threats and Protections

Created by
@UpscaleMendelevium8109

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are identity thieves known for?

  • Obtaining unauthorized access to personal information (correct)
  • Stealing unsecured Wi-Fi connections
  • Hacking into computer systems
  • Creating malware programs
  • Which of the following is a form of malware?

  • Phishing
  • Virus (correct)
  • Firewall
  • Social Engineering
  • Phishing only occurs through emails.

    False

    What is a top action to protect passwords?

    <p>Never share your passwords with anyone.</p> Signup and view all the answers

    What should you do to prevent identity theft?

    <p>Protect other people's information like your own</p> Signup and view all the answers

    Provide one tip to avoid phishing scams.

    <p>Be skeptical of messages that require 'immediate action'.</p> Signup and view all the answers

    Phishing can steal personal information by tricking you into ________.

    <p>clicking a link</p> Signup and view all the answers

    Match the following cybersecurity actions with their purposes:

    <p>Protect Passwords = Create strong and unique passwords Prevent Identity Theft = Safeguard personal information Beware of Phishing = Recognize and avoid deceptive messages Run Antivirus Software = Detect and eliminate malware threats</p> Signup and view all the answers

    Study Notes

    Cybersecurity Threats

    • Identity Thieves - Obtain unauthorized access to personal information such as FSUID, SSN, bank accounts and passwords to commit fraud or theft.
    • Hackers - Secretly access computer systems to steal information or cause damage.
    • Malware - Malicious software including computer viruses, worms, Trojans and spyware that harms a computer user.
    • Phishing - Steals personal information by tricking users into clicking a link or entering their username and password through emails, phone calls, and website downloads.

    Cybersecurity Actions

    • Protect Passwords

      • Never share passwords with anyone.
      • Create strong passwords that are difficult to guess, avoid dictionary words and common passwords.
      • Change passwords periodically.
      • Use at least 8 characters with a mix of uppercase and lowercase letters, numbers, and symbols.
      • Use mnemonics to remember complex passwords.
      • Use different passwords for different sites.
      • Store passwords in a safe place.
      • Avoid keeping passwords on sticky notes.
      • Consider password vaults like LastPass or KeePass.
    • Prevent Identity Theft

      • Do not share Social Security numbers, driver's license numbers, bank account numbers or other personal information unless you know who you are providing it to.
      • Protect other people's information as you would your own.
      • Never send personal or confidential information via email, text message, or instant message.
    • Beware of Phishing

      • Phishing attacks trick users into clicking links or entering credentials.
      • Phishing comes in many forms including emails, phone calls, and website downloads.
      • Phishing attempts may look like they are from Florida State University (IT Services or the Service Desk).
      • FSU will never ask for your FSUID username and password in an email or phone call.
    • Tips to Avoid Phishing Scams

      • Be skeptical of messages requiring “immediate action” or threatening loss.
      • Type website addresses in the browser to access sites directly instead of clicking links.
      • Hover over links to display the true URL and see if it's a reputable website.
      • Think before clicking email and website links and never click links that you don't trust.
      • Do not open unexpected attachments, especially ZIP files, and never run .exe files.
      • Avoid providing personal information over the phone from unsolicited calls.
      • Never send credit card or other sensitive information via email.
      • Use common sense; if it looks like spam, it probably is.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers essential cybersecurity threats such as identity theft, hacking, malware, and phishing. Additionally, it provides actionable steps to protect personal information and passwords. Test your knowledge on how to stay safe online and defend against various cyber threats.

    More Like This

    Cyber Security Threats Quiz
    10 questions
    Cybersecurity Threats: Phishing and Identity Theft
    30 questions
    Cybersecurity Basics
    7 questions

    Cybersecurity Basics

    SubstantivePedalSteelGuitar avatar
    SubstantivePedalSteelGuitar
    Use Quizgecko on...
    Browser
    Browser