Podcast
Questions and Answers
What is cybersecurity?
What is cybersecurity?
- The protection of internet-connected systems from threats (correct)
- The practice of malicious hacking
- The management of data privacy
- A type of social engineering
What is social engineering?
What is social engineering?
A broad range of malicious activities accomplished through human interactions.
Phishing is a type of social engineering.
Phishing is a type of social engineering.
True (A)
What does SMiShing involve?
What does SMiShing involve?
Ransomware allows access to a computer system until a payment is made.
Ransomware allows access to a computer system until a payment is made.
Ransomware examples include WannaCry, NotPetya, and _____ .
Ransomware examples include WannaCry, NotPetya, and _____ .
What is cryptojacking?
What is cryptojacking?
What is spyware?
What is spyware?
Which of the following is a way to protect your data privacy?
Which of the following is a way to protect your data privacy?
Flashcards are hidden until you start studying
Study Notes
Introduction to Data & Information Security
- Acknowledge potential interception of information during online interactions.
- Cybersecurity is crucial for protecting systems from cyber threats.
Cybersecurity Overview
- Definition: Protection of internet-connected systems (hardware, software, data).
- Sources of data include:
- Call data records from mobile phones.
- Social networks (Facebook, Twitter, Instagram).
- GPS data from mobile devices and photos.
- License plate and congestion charge camera data.
- Financial transactions (credit/debit cards, PayPal, ATM).
- Airline passenger and loyalty program records.
- User identification and device details (MAC address, IP address).
- Loyalty cards, shipping info, and passport scanners.
Social Engineering
- Definition: Malicious activities through human interactions and psychological manipulation.
- Techniques can lead to security mistakes and disclose sensitive information.
Phishing Types
- Phishing: Fraudulent messages aimed at revealing sensitive information or deploying malware.
- Smishing: Phishing via mobile devices, targeting personal data such as bank information.
- Vishing: Phishing through phone calls, seeking personal information via direct interaction or voicemails.
Protection Strategies
- Education on cybersecurity practices.
- Verify sources before sharing information.
- Maintain caution during online engagements.
Malicious Software
- Ransomware: Blocks access to systems until a ransom is paid.
- Notable examples:
- WannaCry (2017)
- NotPetya (2017)
- Locky (2016)
- Cryptolocker (2013)
- Ryuk (2018)
- Sodinokibi (REvil) (2019)
- DoppelPaymer (2019)
- Maze (2019)
- DarkSide (2020)
- Medusa (2023)
- Notable examples:
Other Malware Types
- Cryptomining Malware/Cryptojacking: Uses target’s resources to mine cryptocurrencies.
- Spyware Viruses: Collect personal information without consent and relay it to unauthorized parties.
Internet Data Privacy
- Refers to individual's privacy protection while online.
- Strategies to enhance data privacy include:
- Securing accounts.
- Protecting web browsing activities.
- Utilizing antivirus software.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.