Podcast
Questions and Answers
What is cybersecurity?
What is cybersecurity?
What is social engineering?
What is social engineering?
A broad range of malicious activities accomplished through human interactions.
Phishing is a type of social engineering.
Phishing is a type of social engineering.
True
What does SMiShing involve?
What does SMiShing involve?
Signup and view all the answers
Ransomware allows access to a computer system until a payment is made.
Ransomware allows access to a computer system until a payment is made.
Signup and view all the answers
Ransomware examples include WannaCry, NotPetya, and _____ .
Ransomware examples include WannaCry, NotPetya, and _____ .
Signup and view all the answers
What is cryptojacking?
What is cryptojacking?
Signup and view all the answers
What is spyware?
What is spyware?
Signup and view all the answers
Which of the following is a way to protect your data privacy?
Which of the following is a way to protect your data privacy?
Signup and view all the answers
Study Notes
Introduction to Data & Information Security
- Acknowledge potential interception of information during online interactions.
- Cybersecurity is crucial for protecting systems from cyber threats.
Cybersecurity Overview
- Definition: Protection of internet-connected systems (hardware, software, data).
- Sources of data include:
- Call data records from mobile phones.
- Social networks (Facebook, Twitter, Instagram).
- GPS data from mobile devices and photos.
- License plate and congestion charge camera data.
- Financial transactions (credit/debit cards, PayPal, ATM).
- Airline passenger and loyalty program records.
- User identification and device details (MAC address, IP address).
- Loyalty cards, shipping info, and passport scanners.
Social Engineering
- Definition: Malicious activities through human interactions and psychological manipulation.
- Techniques can lead to security mistakes and disclose sensitive information.
Phishing Types
- Phishing: Fraudulent messages aimed at revealing sensitive information or deploying malware.
- Smishing: Phishing via mobile devices, targeting personal data such as bank information.
- Vishing: Phishing through phone calls, seeking personal information via direct interaction or voicemails.
Protection Strategies
- Education on cybersecurity practices.
- Verify sources before sharing information.
- Maintain caution during online engagements.
Malicious Software
- Ransomware: Blocks access to systems until a ransom is paid.
- Notable examples:
- WannaCry (2017)
- NotPetya (2017)
- Locky (2016)
- Cryptolocker (2013)
- Ryuk (2018)
- Sodinokibi (REvil) (2019)
- DoppelPaymer (2019)
- Maze (2019)
- DarkSide (2020)
- Medusa (2023)
- Notable examples:
Other Malware Types
- Cryptomining Malware/Cryptojacking: Uses target’s resources to mine cryptocurrencies.
- Spyware Viruses: Collect personal information without consent and relay it to unauthorized parties.
Internet Data Privacy
- Refers to individual's privacy protection while online.
- Strategies to enhance data privacy include:
- Securing accounts.
- Protecting web browsing activities.
- Utilizing antivirus software.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers key concepts from Lecture 2 of IT Social and Professional Issues, focusing on data and information security. It explores the fundamentals of cybersecurity and the various threats posed to internet-connected systems. Test your understanding of the measures required to protect hardware, software, and data from cyberattacks.