Settings
Language
Color Theme
What is cyber security?
Cyber security is the practice of protecting computer systems and networks from digital attacks, theft, and damage. It helps to protect sensitive information and prevent disruptions.
What is cyber security?
Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage. It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of information and systems.
View Options Again
A method of encrypting data to protect it from unauthorized access.
The practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage.
A software program used to secure computer networks.
A type of computer virus that infects and spreads through a network of computers.
Why is cyber security important?
Cyber security is important as it protects against cyber attacks, which can result in theft of sensitive data, financial loss, reputational damage, and other negative consequences. By understanding and guarding against these threats, individuals and organizations can better safeguard their information and critical assets.
View Options Again
To protect against accidental injury.
To protect against trusted employees accidentally destroying digital information or computer systems.
To protect against weather-related disasters.
To protect against cyber criminals looking to inflict personal, financial or reputational loss in cyber space.
Types of cyber attacks
Cyber attacks are malicious actions taken by individuals or groups to gain unauthorized access to, use, disclose, disrupt, modify, or destroy information and systems. The three most common types of cyber attacks include:
Malware attacks
Phishing attacks
Denial of Service (DoS) attacks
Malware is a type of software that is designed to harm or gain unauthorized access to a computer system. There are many different types of malware, including viruses, worms, trojans, and ransomware, which can be spread through the internet or through email attachments.
These attacks involve sending fraudulent emails or messages that appear to come from a legitimate source, with the goal of tricking the recipient into giving away sensitive information, such as passwords or financial data.
DoS attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. These attacks can be launched using botnets, which are networks of compromised computers that are controlled by the attacker. DoS attacks can cause significant disruption and can be difficult to defend against.
Is the following statement True or False:
A Denial of Service attack involves the delivery of an email designed to steal sensitive information
Denial of Service (DoS) attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. The statement listed in this question described a phishing attack.
View Options Again
True
False
Protecting Your Devices
To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, install antivirus software and keep it up-to-date.
Which of the following is NOT a way to protect your devices?
Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts.
View Options Again
Install antivirus software.
Always use single-factor authentication.
Always use strong, unique passwords.
Keep your computer up to date with security patches.
Protecting Your Data
To protect your data from cyber attacks, you should:
Encrypt your data
Back up your data
Use unique passwords
It's good to encrypt your data because it adds an extra layer of protection against cyber attacks. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.
It's good to back up your data because it provides a way to restore your data in the event of a cyber attack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.
It's good to use unique passwords when securing data because it helps makes it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a cyber breach or password dump, they will only have limited access to your online identity and not access to everything.
What's the best method to protect your data from cyber attacks?
To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password.
View Options Again
Use an aluminum apparatus to protect the wearer's head from anomalous transmissions.
Regularly back up any sensitive data and store the backup in a secure location.
Stay away from the internet and computers in general.
Encrypt sensitive data with a password you use across all your accounts so you won't forget it.
Protecting Against Phishing
The best way to protect against phishing is to be cautious of unexpected emails, especially if they contain urgent or threatening language. Additionally, verify the sender through an external method before performing any action it requests.
What's the best method to protect against phishing attacks?
The best method to protect against phishing is to always remain cautious of unsolicited or suspicious emails.
View Options Again
Remain cautious of any unsolicited or suspicious-looking email.
Respond to emails from unknown sources only if they're urgent.
Click on links or download attachments from unknown sources.
Ignore suspicious or unsolicited emails and leave them in your inbox.
Understanding Cyber Criminals
Cyber criminals are motivated by a variety of factors, including but not limited to: Financial gain, political or ideological gain, hacktivism and corporate espionage. Regardless of the motivator, the attacks follow a common lifecycle.
Preparing for the crime
Performing the crime
Profiting from the crime
Cyber criminals typically perform reconnaissance to gather information about their target and identify potential vulnerabilities. This may involve researching the social media accounts of employees, websites, and public information about a company to gather intelligence.
Cyber criminals commonly use exploits to infiltrate a system or use social engineering tactics to trick people into giving them access. Once they have gained access, cyber criminals may install keyloggers to capture passwords, ransomware to encrypt and hold data hostage, or other types of malware designed to disrupt or damage systems.
Cyber criminals typically seek to monetise their attack by selling stolen data on the dark web, using it to commit fraud or corporate espionage, using it for political gain, or using it to extort victims. Once this objective has been achieved, cyber criminals will commonly look to leverage their access to launch new attacks.
Is the following statement True or False:
Cyber criminals typically use social engineering or exploits to gain access to systems.
Cyber criminals commonly use exploits to infiltrate a system, or use social engineering tactics to trick people into giving them access.
View Options Again
True
False
Wrapping up
The best ways to stay cyber secure is to follow best practices such as: Using strong, unique passwords. Enabling multi-factor authentication. Remaining cautious of unsolicited or suspicious emails. And finally, ensuring your antivirus is up-to-date.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Cyber-Security
[88, "Cyber-Security", "Cyber-Security"],
What is cyber security?
[89, "What is cyber security?", "What is cyber security?"],
Cyber security is the practice of protecting computer systems and networks from digital attacks, theft, and damage. It helps to protect sensitive information and prevent disruptions.
[90, "Cyber security is the practice of protecting computer systems and networks from digital attacks, theft, and damage. It helps to protect sensitive information and prevent disruptions.", "Cyber security is the practice of protecting computer systems and networks from digital attacks, theft, and damage. It helps to protect sensitive information and prevent disruptions."],
What is cyber security?
[91, "What is cyber security?", "What is cyber security?"],
A type of computer virus that infects and spreads through a network of computers.
[92, "A type of computer virus that infects and spreads through a network of computers.", "A type of computer virus that infects and spreads through a network of computers."],
A method of encrypting data to protect it from unauthorized access.
[93, "A method of encrypting data to protect it from unauthorized access.", "A method of encrypting data to protect it from unauthorized access."],
The practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage.
[94, "The practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage.", "The practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage."],
A software program used to secure computer networks.
[95, "A software program used to secure computer networks.", "A software program used to secure computer networks."],
Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage. It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of information and systems.
[96, "Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage. It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of information and systems. ", "Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage. It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of information and systems. "],
Why is cyber security important?
[97, "Why is cyber security important?", "Why is cyber security important?"],
To protect against accidental injury.
[98, "To protect against accidental injury.", "To protect against accidental injury."],
To protect against trusted employees accidentally destroying digital information or computer systems.
[99, "To protect against trusted employees accidentally destroying digital information or computer systems.", "To protect against trusted employees accidentally destroying digital information or computer systems."],
To protect against weather-related disasters.
[100, "To protect against weather-related disasters.", "To protect against weather-related disasters."],
To protect against cyber criminals looking to inflict personal, financial or reputational loss in cyber space.
[101, "To protect against cyber criminals looking to inflict personal, financial or reputational loss in cyber space.", "To protect against cyber criminals looking to inflict personal, financial or reputational loss in cyber space."],
Cyber security is important as it protects against cyber attacks, which can result in theft of sensitive data, financial loss, reputational damage, and other negative consequences. By understanding and guarding against these threats, individuals and organizations can better safeguard their information and critical assets.
[102, "Cyber security is important as it protects against cyber attacks, which can result in theft of sensitive data, financial loss, reputational damage, and other negative consequences. By understanding and guarding against these threats, individuals and organizations can better safeguard their information and critical assets.", "Cyber security is important as it protects against cyber attacks, which can result in theft of sensitive data, financial loss, reputational damage, and other negative consequences. By understanding and guarding against these threats, individuals and organizations can better safeguard their information and critical assets."],
Types of cyber attacks
[103, "Types of cyber attacks", "Types of cyber attacks"],
Cyber attacks are malicious actions taken by individuals or groups to gain unauthorized access to, use, disclose, disrupt, modify, or destroy information and systems. The three most common types of cyber attacks include:
[104, "Cyber attacks are malicious actions taken by individuals or groups to gain unauthorized access to, use, disclose, disrupt, modify, or destroy information and systems. The three most common types of cyber attacks include:", "Cyber attacks are malicious actions taken by individuals or groups to gain unauthorized access to, use, disclose, disrupt, modify, or destroy information and systems. The three most common types of cyber attacks include:"],
Malware attacks
[105, "Malware attacks", "Malware attacks"],
Malware is a type of software that is designed to harm or gain unauthorized access to a computer system. There are many different types of malware, including viruses, worms, trojans, and ransomware, which can be spread through the internet or through email attachments.
[106, "Malware is a type of software that is designed to harm or gain unauthorized access to a computer system. There are many different types of malware, including viruses, worms, trojans, and ransomware, which can be spread through the internet or through email attachments.", "Malware is a type of software that is designed to harm or gain unauthorized access to a computer system. There are many different types of malware, including viruses, worms, trojans, and ransomware, which can be spread through the internet or through email attachments."],
Phishing attacks
[107, "Phishing attacks", "Phishing attacks"],
These attacks involve sending fraudulent emails or messages that appear to come from a legitimate source, with the goal of tricking the recipient into giving away sensitive information, such as passwords or financial data.
[108, "These attacks involve sending fraudulent emails or messages that appear to come from a legitimate source, with the goal of tricking the recipient into giving away sensitive information, such as passwords or financial data.", "These attacks involve sending fraudulent emails or messages that appear to come from a legitimate source, with the goal of tricking the recipient into giving away sensitive information, such as passwords or financial data."],
Denial of Service (DoS) attacks
[109, "Denial of Service (DoS) attacks", "Denial of Service (DoS) attacks"],
DoS attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. These attacks can be launched using botnets, which are networks of compromised computers that are controlled by the attacker. DoS attacks can cause significant disruption and can be difficult to defend against.
[110, "DoS attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. These attacks can be launched using botnets, which are networks of compromised computers that are controlled by the attacker. DoS attacks can cause significant disruption and can be difficult to defend against.", "DoS attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. These attacks can be launched using botnets, which are networks of compromised computers that are controlled by the attacker. DoS attacks can cause significant disruption and can be difficult to defend against."],
A Denial of Service attack involves the delivery of an email designed to steal sensitive information
[111, "A Denial of Service attack involves the delivery of an email designed to steal sensitive information", "A Denial of Service attack involves the delivery of an email designed to steal sensitive information"],
Denial of Service (DoS) attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. The statement listed in this question described a phishing attack.
[112, "Denial of Service (DoS) attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. The statement listed in this question described a phishing attack.", "Denial of Service (DoS) attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. The statement listed in this question described a phishing attack."],
Protecting Your Devices
[113, "Protecting Your Devices", "Protecting Your Devices"],
To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, install antivirus software and keep it up-to-date.
[114, "To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, install antivirus software and keep it up-to-date.", "To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, install antivirus software and keep it up-to-date."],
Which of the following is NOT a way to protect your devices?
[115, "Which of the following is NOT a way to protect your devices?", "Which of the following is NOT a way to protect your devices?"],
Install antivirus software.
[116, "Install antivirus software.", "Install antivirus software."],
Keep your computer up to date with security patches.
[117, "Keep your computer up to date with security patches.", "Keep your computer up to date with security patches."],
Always use single-factor authentication.
[118, "Always use single-factor authentication.", "Always use single-factor authentication."],
Always use strong, unique passwords.
[119, "Always use strong, unique passwords.", "Always use strong, unique passwords."],
Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts.
[120, "Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts.", "Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts."],
Protecting Your Data
[121, "Protecting Your Data", "Protecting Your Data"],
To protect your data from cyber attacks, you should:
[122, "To protect your data from cyber attacks, you should:", "To protect your data from cyber attacks, you should:"],
Encrypt your data
[123, "Encrypt your data", "Encrypt your data"],
It's good to encrypt your data because it adds an extra layer of protection against cyber attacks. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.
[124, "It's good to encrypt your data because it adds an extra layer of protection against cyber attacks. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.", "It's good to encrypt your data because it adds an extra layer of protection against cyber attacks. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it."],
Back up your data
[125, "Back up your data", "Back up your data"],
It's good to back up your data because it provides a way to restore your data in the event of a cyber attack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.
[126, "It's good to back up your data because it provides a way to restore your data in the event of a cyber attack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.", "It's good to back up your data because it provides a way to restore your data in the event of a cyber attack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster."],
Use unique passwords
[127, "Use unique passwords", "Use unique passwords"],
It's good to use unique passwords when securing data because it helps makes it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a cyber breach or password dump, they will only have limited access to your online identity and not access to everything.
[128, "It's good to use unique passwords when securing data because it helps makes it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a cyber breach or password dump, they will only have limited access to your online identity and not access to everything.", "It's good to use unique passwords when securing data because it helps makes it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a cyber breach or password dump, they will only have limited access to your online identity and not access to everything."],
What's the best method to protect your data from cyber attacks?
[129, "What's the best method to protect your data from cyber attacks?", "What's the best method to protect your data from cyber attacks?"],
Stay away from the internet and computers in general.
[130, "Stay away from the internet and computers in general.", "Stay away from the internet and computers in general."],
Use an aluminum apparatus to protect the wearer's head from anomalous transmissions.
[131, "Use an aluminum apparatus to protect the wearer's head from anomalous transmissions.", "Use an aluminum apparatus to protect the wearer's head from anomalous transmissions."],
Regularly back up any sensitive data and store the backup in a secure location.
[132, "Regularly back up any sensitive data and store the backup in a secure location.", "Regularly back up any sensitive data and store the backup in a secure location."],
Encrypt sensitive data with a password you use across all your accounts so you won't forget it.
[133, "Encrypt sensitive data with a password you use across all your accounts so you won't forget it.", "Encrypt sensitive data with a password you use across all your accounts so you won't forget it."],
To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password.
[134, "To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password.", "To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password."],
Protecting Against Phishing
[135, "Protecting Against Phishing", "Protecting Against Phishing"],
The best way to protect against phishing is to be cautious of unexpected emails, especially if they contain urgent or threatening language. Additionally, verify the sender through an external method before performing any action it requests.
[136, "The best way to protect against phishing is to be cautious of unexpected emails, especially if they contain urgent or threatening language. Additionally, verify the sender through an external method before performing any action it requests.", "The best way to protect against phishing is to be cautious of unexpected emails, especially if they contain urgent or threatening language. Additionally, verify the sender through an external method before performing any action it requests."],
What's the best method to protect against phishing attacks?
[137, "What's the best method to protect against phishing attacks?", "What's the best method to protect against phishing attacks?"],
Click on links or download attachments from unknown sources.
[138, "Click on links or download attachments from unknown sources.", "Click on links or download attachments from unknown sources."],
Ignore suspicious or unsolicited emails and leave them in your inbox.
[139, "Ignore suspicious or unsolicited emails and leave them in your inbox.", "Ignore suspicious or unsolicited emails and leave them in your inbox."],
Respond to emails from unknown sources only if they're urgent.
[140, "Respond to emails from unknown sources only if they're urgent.", "Respond to emails from unknown sources only if they're urgent."],
Remain cautious of any unsolicited or suspicious-looking email.
[141, "Remain cautious of any unsolicited or suspicious-looking email.", "Remain cautious of any unsolicited or suspicious-looking email."],
The best method to protect against phishing is to always remain cautious of unsolicited or suspicious emails.
[142, "The best method to protect against phishing is to always remain cautious of unsolicited or suspicious emails.", "The best method to protect against phishing is to always remain cautious of unsolicited or suspicious emails."],
Understanding Cyber Criminals
[143, "Understanding Cyber Criminals", "Understanding Cyber Criminals"],
Cyber criminals are motivated by a variety of factors, including but not limited to: Financial gain, political or ideological gain, hacktivism and corporate espionage. Regardless of the motivator, the attacks follow a common lifecycle.
[144, "Cyber criminals are motivated by a variety of factors, including but not limited to: Financial gain, political or ideological gain, hacktivism and corporate espionage. Regardless of the motivator, the attacks follow a common lifecycle.", "Cyber criminals are motivated by a variety of factors, including but not limited to: Financial gain, political or ideological gain, hacktivism and corporate espionage. Regardless of the motivator, the attacks follow a common lifecycle."],
Preparing for the crime
[145, "Preparing for the crime", "Preparing for the crime"],
Cyber criminals typically perform reconnaissance to gather information about their target and identify potential vulnerabilities. This may involve researching the social media accounts of employees, websites, and public information about a company to gather intelligence.
[146, "Cyber criminals typically perform reconnaissance to gather information about their target and identify potential vulnerabilities. This may involve researching the social media accounts of employees, websites, and public information about a company to gather intelligence.", "Cyber criminals typically perform reconnaissance to gather information about their target and identify potential vulnerabilities. This may involve researching the social media accounts of employees, websites, and public information about a company to gather intelligence."],
Performing the crime
[147, "Performing the crime", "Performing the crime"],
Cyber criminals commonly use exploits to infiltrate a system or use social engineering tactics to trick people into giving them access. Once they have gained access, cyber criminals may install keyloggers to capture passwords, ransomware to encrypt and hold data hostage, or other types of malware designed to disrupt or damage systems.
[148, "Cyber criminals commonly use exploits to infiltrate a system or use social engineering tactics to trick people into giving them access. Once they have gained access, cyber criminals may install keyloggers to capture passwords, ransomware to encrypt and hold data hostage, or other types of malware designed to disrupt or damage systems.", "Cyber criminals commonly use exploits to infiltrate a system or use social engineering tactics to trick people into giving them access. Once they have gained access, cyber criminals may install keyloggers to capture passwords, ransomware to encrypt and hold data hostage, or other types of malware designed to disrupt or damage systems."],
Profiting from the crime
[149, "Profiting from the crime", "Profiting from the crime"],
Cyber criminals typically seek to monetise their attack by selling stolen data on the dark web, using it to commit fraud or corporate espionage, using it for political gain, or using it to extort victims. Once this objective has been achieved, cyber criminals will commonly look to leverage their access to launch new attacks.
[150, " Cyber criminals typically seek to monetise their attack by selling stolen data on the dark web, using it to commit fraud or corporate espionage, using it for political gain, or using it to extort victims. Once this objective has been achieved, cyber criminals will commonly look to leverage their access to launch new attacks.", " Cyber criminals typically seek to monetise their attack by selling stolen data on the dark web, using it to commit fraud or corporate espionage, using it for political gain, or using it to extort victims. Once this objective has been achieved, cyber criminals will commonly look to leverage their access to launch new attacks."],
Cyber criminals typically use social engineering or exploits to gain access to systems.
[151, "Cyber criminals typically use social engineering or exploits to gain access to systems.", "Cyber criminals typically use social engineering or exploits to gain access to systems."],
Cyber criminals commonly use exploits to infiltrate a system, or use social engineering tactics to trick people into giving them access.
[152, "Cyber criminals commonly use exploits to infiltrate a system, or use social engineering tactics to trick people into giving them access.", "Cyber criminals commonly use exploits to infiltrate a system, or use social engineering tactics to trick people into giving them access."],
Wrapping up
[153, "Wrapping up", "Wrapping up"],
The best ways to stay cyber secure is to follow best practices such as: Using strong, unique passwords. Enabling multi-factor authentication. Remaining cautious of unsolicited or suspicious emails. And finally, ensuring your antivirus is up-to-date.
[154, "The best ways to stay cyber secure is to follow best practices such as: Using strong, unique passwords. Enabling multi-factor authentication. Remaining cautious of unsolicited or suspicious emails. And finally, ensuring your antivirus is up-to-date.", "The best ways to stay cyber secure is to follow best practices such as: Using strong, unique passwords. Enabling multi-factor authentication. Remaining cautious of unsolicited or suspicious emails. And finally, ensuring your antivirus is up-to-date."],
[155, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.