Podcast
Questions and Answers
What is BEC?
What is BEC?
- A type of computer virus
- A type of computer program
- A type of attack process used by hackers (correct)
- A type of encryption technique
What should you do to confirm a request is real?
What should you do to confirm a request is real?
- Check the bank account
- Contact the person directly (correct)
- Follow proper procedure
- Transfer money to an off-shore account
What is one way hackers try to gain access to personal and financial information?
What is one way hackers try to gain access to personal and financial information?
- By sending fake invoices (correct)
- By using proper procedure
- By using encryption techniques
- By using a computer virus
Flashcards are hidden until you start studying
Study Notes
- BEC is a common attack process used by hackers to gain access to personal and financial information.
- The style of the email, punctuation and spelling, and the address of the sender can help identify a BEC attack.
- Always be extremely cautious of requests to transfer money to an off-shore account.
- By contacting the person directly, you can confirm the request is real beyond question.
- Some attackers will use fake invoices that appear to be from a trusted business partner, in this case be careful to check the bank account matches the ones you have in your system.
- Always follow proper procedure, any request to bypass procedure could indicate an attack.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.