What is cyber security?

Cyber security is the practice of protecting computer systems and networks from digital attacks, theft, and damage. It helps to protect sensitive information and prevent disruptions.

What is cyber security?

Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, and networks from digital attacks, theft, and damage. It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of information and systems.

View Options Again

Why is cyber security important?

Cyber security is important as it protects against cyber attacks, which can result in theft of sensitive data, financial loss, reputational damage, and other negative consequences. By understanding and guarding against these threats, individuals and organizations can better safeguard their information and critical assets.

View Options Again

Types of cyber attacks

Cyber attacks are malicious actions taken by individuals or groups to gain unauthorized access to, use, disclose, disrupt, modify, or destroy information and systems. The three most common types of cyber attacks include:
Malware is a type of software that is designed to harm or gain unauthorized access to a computer system. There are many different types of malware, including viruses, worms, trojans, and ransomware, which can be spread through the internet or through email attachments.
These attacks involve sending fraudulent emails or messages that appear to come from a legitimate source, with the goal of tricking the recipient into giving away sensitive information, such as passwords or financial data.
DoS attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. These attacks can be launched using botnets, which are networks of compromised computers that are controlled by the attacker. DoS attacks can cause significant disruption and can be difficult to defend against.

Is the following statement True or False:
A Denial of Service attack involves the delivery of an email designed to steal sensitive information

Denial of Service (DoS) attacks involve overwhelming a website or server with traffic, making it unavailable to legitimate users. The statement listed in this question described a phishing attack.

View Options Again

Protecting Your Devices

To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, install antivirus software and keep it up-to-date.

Which of the following is NOT a way to protect your devices?

Where possible, you should use multi-factor authentication (MFA). MFA helps to prevent attackers from brute-forcing your password or simply stealing it through other means and then accessing your accounts.

View Options Again

Protecting Your Data

To protect your data from cyber attacks, you should:
It's good to encrypt your data because it adds an extra layer of protection against cyber attacks. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.
It's good to back up your data because it provides a way to restore your data in the event of a cyber attack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.
It's good to use unique passwords when securing data because it helps makes it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a cyber breach or password dump, they will only have limited access to your online identity and not access to everything.

What's the best method to protect your data from cyber attacks?

To protect your data from cyber attacks, it's best that you regularly back up your data in a secure location, encrypt your data, and ensure you use unique passwords to prevent attackers from compromising your online identity in the event they find just one password.

View Options Again

Protecting Against Phishing

The best way to protect against phishing is to be cautious of unexpected emails, especially if they contain urgent or threatening language. Additionally, verify the sender through an external method before performing any action it requests.

What's the best method to protect against phishing attacks?

The best method to protect against phishing is to always remain cautious of unsolicited or suspicious emails.

View Options Again

Understanding Cyber Criminals

Cyber criminals are motivated by a variety of factors, including but not limited to: Financial gain, political or ideological gain, hacktivism and corporate espionage. Regardless of the motivator, the attacks follow a common lifecycle.
Cyber criminals typically perform reconnaissance to gather information about their target and identify potential vulnerabilities. This may involve researching the social media accounts of employees, websites, and public information about a company to gather intelligence.
Cyber criminals commonly use exploits to infiltrate a system or use social engineering tactics to trick people into giving them access. Once they have gained access, cyber criminals may install keyloggers to capture passwords, ransomware to encrypt and hold data hostage, or other types of malware designed to disrupt or damage systems.
Cyber criminals typically seek to monetise their attack by selling stolen data on the dark web, using it to commit fraud or corporate espionage, using it for political gain, or using it to extort victims. Once this objective has been achieved, cyber criminals will commonly look to leverage their access to launch new attacks.

Is the following statement True or False:
Cyber criminals typically use social engineering or exploits to gain access to systems.

Cyber criminals commonly use exploits to infiltrate a system, or use social engineering tactics to trick people into giving them access.

View Options Again

Wrapping up

The best ways to stay cyber secure is to follow best practices such as: Using strong, unique passwords. Enabling multi-factor authentication. Remaining cautious of unsolicited or suspicious emails. And finally, ensuring your antivirus is up-to-date.