SlideShare a Scribd company logo
1 of 120
Cybersecurity
Corporate Training Materials
Module One: Getting
Started
Every organization is responsible
for ensuring cybersecurity. The
ability to protect its information
systems from impairment or
even theft is essential to success.
At the end of the
day, the goals
are simple:
safety and
security.
Jodi Rell
Workshop Objectives
Understand
malware and
breaches
Know cyber-
attacks
Develop
prevention
methods
Module Two: Cybersecurity
Fundamentals
Before developing and implementing
security measures to prevent
cyberattacks, you must understand
basic concepts associated with
cybersecurity and what cyberattacks
are.
U.S. computer
networks and
databases are
under daily
cyber-attack by
nation states,
international
crime
organizations,
subnational
groups, and
individual
hackers.
John O. Brennan
What is Cyberspace?
Networks Devices
Software Processes
What is Cybersecurity?
Prevents attacks
Prevents disruption
Controls physical access
Protects against code injection
Why is Cybersecurity
Important?
Protects against
Data security
breaches
Sabotage
What is a Hacker?
Grey hat
Black hat
White hat
Case Study
Patrick and Willow are opening answering service
business
Patrick says security is not necessary
Willow says hackers can break in
This will disrupt business
Module Two: Review Questions
1. Cyberspace refers to which of the following?
a) Computer-to-computer activity.
b) Individual-to-individual activity.
c) Supervisor-to-employee activity.
d) Computer-to-physical location activity.
Cyberspace is not a physical location. It is an environment where computer transaction take
place.
2. What is an item that is included in cyberspace?
a) Network.
b) Software.
c) Application.
d) All of the above.
In addition to the above, devices, processes, and information storage are a part of cyberspace.
Module Two: Review Questions
3. Why is cybersecurity implemented?
a) To speed up the network of a company’s computers.
b) To avoid the disruption of a company’s business.
c) To increase the number of clients a company has.
d) To lessen the number of employees a company employs.
Cybersecurity helps companies avoid disruption inflicted by hackers, thus
not slowing down the company’s productivity.
4. Cybersecurity helps control physical access to and prevents danger that
may come in from:
a) Hardware.
b) Network access.
c) Code injection.
d) All of the above.
This helps prevent damage to the company’s entire information systems.
Module Two: Review Questions
5. What type of information is NOT secure information that is likely to be compromised in a data
security breach?
a) Intellectual property.
b) Credit card information.
c) The name of a company’s CEO.
d) Social security numbers.
The name of a company’s CEO is public information. Information that is not considered public, such as
names and social security numbers and bank details could fall victim to a data security breach.
6. What is the main purpose of computer sabotage?
a) To disable a company’s computers or networks to prevent it from conducting business.
b) To disable a company’s computers or networks to prevent it from being able to obtain a business
license.
c) To disable a company’s computers or networks to prevent it from being able to hire employees.
d) To disable a company’s computers or networks to prevent it from being able to give its employees
raises.
Data security breaches and sabotage can both have dire effects on a company and/or its clients.
Module Two: Review Questions
7. Why do “grey hat” hackers typically hack into computers?
a) To steal data for monetary gain.
b) For the fun of it.
c) To find vulnerabilities in a computer system so the company can fix them before hackers with
bad intentions can exploit them.
d) To sell data for monetary gain.
There are three types of hacker:
Grey hats: These hackers do so “for the fun of it”.
Black hats: These hackers have malevolent reasons for doing so, such as stealing and/or selling
data for monetary gain.
White hats: These hackers are employed by companies to hack into systems to find where the
company is vulnerable, with the intention of ensuring the safety of the data from hackers
with ill intentions.
Module Two: Review Questions
8. Why do “white hat” hackers typically hack into computers?
a) To steal data for monetary gain.
b) For the fun of it.
c) To find vulnerabilities in a computer system so the company can fix them before hackers with
bad intentions can exploit them.
d) To sell data for monetary gain.
There are three types of hacker:
Grey hats: These hackers do so “for the fun of it”.
Black hats: These hackers have malevolent reasons for doing so, such as stealing and/or selling
data for monetary gain.
White hats: These hackers are employed by companies to hack into systems to find where the
company is vulnerable, with the intention of ensuring the safety of the data from hackers
with ill intentions.
Module Two: Review Questions
9. What type of business are Patrick and Willow opening?
a) Restaurant.
b) Flower shop.
c) Answering service.
d) Bike shop.
Patrick and Willow are in the process of opening an answering service business, and they are
trying to decide whether or not they need security for their computer systems.
10. Does Willow think they need security for their computers? What is her reasoning?
a) No, because their business is small.
b) Yes, because they are vulnerable to hackers.
c) No, because the type of business they run doesn’t require it.
d) Yes, because federal law requires them to have it.
Willow believes they need security for their systems because she recognizes their vulnerability
to hackers. Patrick doesn’t believe it’s necessary because they have a small business.
Module Three: Types of
Malware
”Malware” is the shortened form for
malicious software, which is intrusive
software, used to perform actions
such as interrupting computer
operations and obtaining sensitive
information.
Cyber bullies can
hide behind a
mask of
anonymity
online, and do
not need direct
physical access
to their victims
to do
unimaginable
harm.
Anna Maria
Chavez
Worms
Damage
caused
Bandwidth consumption
Stops Anti-Malware
Turns off Safe Mode
No auto update
Viruses
Corrupt files
Slow down computer
Take over basic functions
Spyware
Collects
personal
data
Redirects
web browser
Changes
computer
settings
Trojans
Crash
computer
Delete files Corrupt data
Log
keystrokes
Case Study
Employees notice their computers are moving slowly
Harry’s computer settings have changed
Tom’s files have been deleted
Jerry’s computer has similar issues
Module Three: Review Questions
1. How do worms work?
a) They are always downloaded as email attachments.
b) They are automatically installed on every computer.
c) They must attach themselves to existing programs in order to spread.
d) They reproduce themselves to infect other computers.
Worms are independent malware programs that can spread to other computers.
2. Which of the following does the lesson NOT list as damage that worms can cause?
a) Bandwidth consumption.
b) Immobilizing Safe Mode.
c) Corrupting files.
d) Stopping active anti-malware service.
In addition to the above, worms can hindering Windows auto update.
Module Three: Review Questions
3. When can infected files infect other computers?
a) When the file is shared with other computers.
b) Whether or not the file is shared with other computers.
c) They automatically infect other computers within the same network of the originally infected
computer
d) Never.
It can infect files and when the file is opened, spread the virus throughout your computer. The virus
will further spread if the infected file is shared with others.
4. Which of the following does the lesson NOT list as damage that viruses can cause?
a) Computer slowdown.
b) Corrupting files.
c) Taking over basic functions of the operating system.
d) Bandwidth consumption.
A computer virus is a program that hides within a harmless program that reproduces itself to perform
actions such as destroying data.
Module Three: Review Questions
5. Spyware is commonly used to bombard the user with:
a) Emails without attachments.
b) Unsolicited text messages.
c) Emails with attachments.
d) Pop-up ads.
Spyware is also used to obtain information about an individual or company without their
knowledge or consent. The data gathered from this act of “spying” is sometimes sent to
another entity. It can also be used to gain control over one’s computer without the user
realizing it.
6. Which of the following does the lesson NOT list as damage that Spyware can cause?
a) Crashing the computer.
b) Collecting personal information.
c) Installing unsolicited software.
d) Redirecting web browsers.
In addition to the above, the lesson mentions that Spyware can change computer settings and
slow down the Internet connection.
Module Three: Review Questions
7. How do Trojans gain access to computers?
a) By being installed via a disk.
b) By misleading the user of its true intention.
c) By spreading via legitimate email attachments.
d) None of the above.
They spread in sneaky ways. For example, a user may receive an email attachment that appears to be
legitimate, but when he/she opens it, it in fact gives the attacker the opportunity to obtain the
user’s personal information, such as banking details and passwords.
8. Which of the following does the lesson NOT list as damage that Trojans can cause?
a) Crashing the computer.
b) Deleting files.
c) Corrupting data.
d) Redirecting web browsers.
In addition to the above, the lesson mentions that Trojans can log keystrokes.
Module Three: Review Questions
9. What do many employees at XYZ Company notice about their computers?
a) That they are running slowly.
b) That they have crashed.
c) That their files have become corrupt.
d) That Safe Mode is no longer working.
Many employees at XYZ Company have noticed that their computers are moving slowly. In
addition, Harry has noticed changes to the settings of his computer and the redirecting of
his browser. Files that are supposed to be on Tom’s computer have been deleted.
10. What does Harry say has happened to his computer?
a) Computer setting changes and web browser redirecting.
b) Deleted files.
c) Bandwidth consumption.
d) Computer crashed.
Many employees at XYZ Company have noticed that their computers are moving slowly. In
addition, Harry has noticed changes to the settings of his computer and the redirecting of
his browser. Files that are supposed to be on Tom’s computer have been deleted.
Module Four: Cyber Security
Breaches
Cyber security breaches are the
result of secure information being
released to a treacherous
environment.
Choosing a
hard-to-guess,
but easy-to-
remember
password is
important!
Kevin Mitnick
Phishing
Appears
legitimate
Is actually a
spoof
Don’t click link Will steal data
Identity Theft
Be mindful
Use Anti-Virus Software
Use Anti-Malware Software
Don’t respond to unsolicited
requests
Harassment
No immediate
response
Tell to stop
Contact
authorities
Cyberstalking
Physical access control
Protect password
Updated security software
Case Study
Paula banks and works for 123 Bank
She received “unauthorized transaction” email
Paula asked Emily if she should click on link in
email
Emily said company would not send that email
Module Four: Review Questions
1. How do phishing scam criminals attract their victims?
a) By appearing to be a legitimate source.
b) By threatening them.
c) Both of the above.
d) None of the above.
Phishing scams are typically carried out by the perpetrator appearing to be helpful. Once the
victim has been lured in, the attack takes place.
2. What is not one of the ways phishing uses individuals’ information?
a) To obtain identifying information such as social security number, for malicious purposes.
b) To commit crimes in the person’s name.
c) To steal banking details for personal gain.
d) To keep the person’s information safe.
The intention of the phishing scammer is never to do anything that benefits the victim.
Module Four: Review Questions
3. What quote is mentioned in the “Identity Theft” lesson?
a) Identity theft is a serious crime that affects millions of Americans each year.
b) I don’t need to worry about identity theft because no one wants to be me.
c) An ounce of prevention is worth a pound of cure.
d) If we don’t act now to safeguard our privacy, we could all become victims of identity theft.
This quote basically means taking steps beforehand to prevent identity theft from taking place
can save the headache of recovering from falling victim to identity theft.
4. Of the following, which is not mentioned in the “Identity Theft” lesson as a way to help
prevent identity theft?
a) Be mindful of phishing websites.
b) Protect your passwords.
c) Utilize an Anti-Virus / Anti-Malware program.
d) Don’t respond to unsolicited requests for secure information.
Those who seek to steal another’s identity typically do so and move on quickly, making it
difficult to track and prosecute the perpetrator, so it is best to work to prevent it from
happening in the first place.
Module Four: Review Questions
5. What is the first thing to do when you discover you have been a victim of cyberbullying?
a) Respond immediately.
b) Compose yourself before responding.
c) Call the police.
d) Shut down your computer.
Immediately responding to a cyberbully attack may worsen the situation because the response
will most likely come from a place of emotion. It is best to respond once you gather your
thoughts and the things you want to say.
6. What is a characteristic of cyber bullying?
a) Can affect companies as well as individuals.
b) Is limited to adults.
c) Is limited to teenagers.
d) Only affects companies.
Although cyberbullying is most commonly seen as an issue that teenagers deal with, it can also
affect individual adults and companies.
.
Module Four: Review Questions
7. What does the lesson mention on how cyberstalking is punishable?
a) Monetary penalties only.
b) Monetary penalties and jail time.
c) Restraining order and monetary penalties.
d) Restraining order and jail time.
There are many ways to be punished when found guilty of cyberstalking. However, the lesson only
mentions a restraining order and jail time.
8. What is not mentioned in the “Cyberstalking” lesson as an anti-stalking tip?
a) Log out of programs before stepping away from your desk.
b) Do not leave on your computer through the night.
c) Protect passwords.
d) Keep security software updated.
Although not leaving on the computer through the night may be helpful, the lesson does not mention
this.
Module Four: Review Questions
9. Receiving an email that says, “We suspect an unauthorized transaction on your account. To
ensure that your account is not compromised, please click the link below and confirm your
identity”, is MOST likely characteristic of what?
a) Cyberbullying.
b) Cyberstalking.
c) Harassment.
d) Phishing.
With phishing, cyber thieves may send emails that appear to be from legitimate sources,
requesting that the user click on a link to confirm information. Clicking on the link allows the
thieves to steal some of the user’s information, which could ultimately lead to identity
theft.
10. What does Emily tell Paula about the email she received?
a) Their company does that all of the time and she should click the link.
b) Their company does that sometimes, but she should confirm with their supervisor.
c) Their company doesn’t do that, and most companies don’t.
d) She is not sure what Paula should do.
Emily doesn’t believe it is wise for Paula to click on the link.
Module Five: Types of Cyber
Attacks
Cyber attacks are orchestrated by
individuals or groups to destroy the
information systems, networks, etc.
of others.
Love is great,
but not as a
password.
Matt
Mullenweg
Password Attacks
Letters, numbers,
and symbols
Long
Update
regularly
Denial of Service Attacks
Performs slowly
Inaccessible
website
Spam
Passive Attack
Finds vulnerabilities
Does not change data
Penetration Testing
Likelihood of
attack
Detects
vulnerabilities
Determines
impact of
attack
Assesses risk
management
Case Study
Kurt and Jeff are setting up passwords
Kurt wants to create password with various
characters
Jeff wants to create password with letters only
Jeff has to call technical support
Module Five: Review Questions
1. You should create a password that is:
a) Easy for you to remember and easy for others to figure out.
b) Difficult for you to remember but easy for others to figure out.
c) Easy for you to remember but difficult for others to figure out.
d) Difficult for you to remember and difficult for others to figure out.
One of the purposes of creating a strong password is to prevent unauthorized users from having
access to it. Because of this, the password should be something that only you can easily
remember.
2. What should your password include?
a) Upper and lower case letters.
b) Upper and lower case letters, numbers, and symbols.
c) Numbers and symbols.
d) Upper case letters, numbers, and symbols.
Part of creating a strong password, is crafting one that is difficult for others to figure out. Using a
variety of characters such as upper and lower case letters, numbers, and symbols should help
accomplish that.
Module Five: Review Questions
3. What is a denial of service attack?
a) An attack that prevents unintended users from being able to access a network.
b) An attack that prevents users from being able to access a network in the early morning hours
only.
c) An attack that prevents users from being able to access a network in the late night hours
only.
d) An attack that prevents intended users from being able to access a network.
This can manifest as although the user puts in the correct password, the system says it’s
incorrect and after a certain number of times locks out the user. It can also overload the
network so that no one can get in.
Module Five: Review Questions
4. Which of the following is not mentioned in the “Denial of Service Attack” lesson as damage
that denial of service attacks can cause?
a) Network performs slowly.
b) A particular website is inaccessible.
c) Receiving a large amount of spam emails.
d) None of the above.
In addition to the above, the lesson mentions that this type of attack could make it so no
website is accessible.
5. What is the purpose of a passive attack?
a) To find network vulnerabilities and immediately change data.
b) To warn the network user of an impending active attack.
c) To find network vulnerabilities but not change data at the time.
d) To warn the network user of vulnerabilities so the user can fix them.
Although it may seem like a harmless act at the time, if the intruder is able to obtain the “right”
information, he/she can use that in the future to cause irreparable damage.
Module Five: Review Questions
6. In the lesson, passive attacks are likened to:
a) Eavesdropping.
b) Murder.
c) Downloading.
d) Overloading.
Although in this type of attack, the goal is not to cause immediate damage, if the intruder happens to
hear significant information, it will likely be employed against the user in the future.
7. What is penetration testing used for?
a) In a controlled environment, to find vulnerabilities in the network, but not exploit them.
b) In a controlled environment, to find vulnerabilities in the network and exploit those vulnerabilities
to see what impact an actual attack would have.
c) In an uncontrolled environment, to find vulnerabilities in the network and exploit those
vulnerabilities to see what impact an actual attack would have.
d) In an uncontrolled environment, to find vulnerabilities in the network, but not exploit them.
Companies use penetration testing within their organization to determine if there are vulnerabilities in
their network system, and if there are some, what impact would occur as a result of an attack
against it.
Module Five: Review Questions
8. Which of these is discussed in the “Penetration Testing” lesson as a reason that companies
implement such testing?
a) Establish the likelihood of a specific attack occurring.
b) Detect high risk vulnerabilities that can result from a grouping of low risk vulnerabilities that take
place in a particular pattern.
c) Determine the bearing an attack will have on a company.
d) All of the above.
In addition to the above, a company would implement penetration testing to assess the company’s
network risk management capabilities.
9. Kurt’s password will consist of:
a) Numbers, letters, and symbols.
b) Numbers only.
c) Letters only.
d) Symbols only.
Kurt’s logic behind creating a password with numbers, letters, and symbols is that doing so will make
it harder for others to figure it out.
Module Five: Review Questions
10. Receiving a large amount of spam mail and being locked out of the system after putting in the
correct password, but not given access are characteristic of which of the following?
a) Password attack.
b) Denial of service.
c) Denial of service and password attack.
d) None of the above.
Additionally, denial of service can manifest as the network performing slowly, the inability to access a
particular website, and the inability to access the Internet as a whole.
Module Six: Prevention Tips
Although it may not be possible to
completely avoid falling victim to
cybercrime, having a tool kit of
prevention methods could help your
organization minimize the risk of
such crimes damaging the reputation
of your company or faith of your
clients/customers.
Identity theft is
one of the
fastest-growing
crimes in the
nation -
especially in the
suburbs.
Melissa Bean
Crafting a Strong Password
Unique
Various
characters
No common
words
No consecutive
characters
Two-Step Verification
Token
Key
Password
Pin
Fingerprint
Voice recognition
Download Attachments with
Care
Update software patches
Go with your gut
Save and scan
Question Legitimacy of Websites
Type URL
Question
sender’s
intention
Anti-Virus and
Anti-Spyware
Case Study
Ann is discussing security tips with trainees
She says to create a strong password
Ann talks about Two-Step Verification
Carl is curious about policy for opening
attachments
Module Six: Review Questions
1. What is the best way to store a password?
a) On a sticky note on your desk.
b) In your memory.
c) In your phone.
d) In a notebook located in an unlocked desk.
When it comes to storing a password, the ideal scenario would be to memorize it. If
that is not possible, store it in a secure location that few people have access to.
2. When is it best to use one password for all of your accounts?
a) If you have no more than two accounts.
b) If you have no more than three accounts.
c) Never.
d) If you have no more than four accounts.
Using different passwords for each of your accounts is the most effective way to keep
your accounts safe.
Module Six: Review Questions
3. In the “Two-Step Verification” lesson, which of these is mentioned as something that may be
used for authentication purposes?
a) Token.
b) Key.
c) Password.
d) All of the above.
This lesson states that a token, key, password, pin, fingerprint, and voice recognition can be
used to authenticate an individual’s identity.
4. The “Two-Step Verification” lesson states that which of these can be used to confirm an
individual’s identity?
a) Pin.
b) Fingerprint.
c) Voice recognition.
d) All of the above.
This lesson states that a token, key, password, pin, fingerprint, and voice recognition can be
used to authenticate an individual’s identity.
Module Six: Review Questions
5. What is true of an email attachment with an extension of .doc?
a) It could be a Trojan.
b) It should never be downloaded.
c) It will always be a legitimate attachment.
d) It should only be downloaded if it is sent from a co-worker.
Email attachments should always be opened with caution. Even if it appears to come
from someone you know and has a legitimate extension, it could still be
something that will attack your computer.
6. What is a way to protect yourself when it comes to opening attachments?
a) Regularly update software patches.
b) Go with your gut.
c) Save and scan the true sender of the attachment.
d) All of the above.
These are just a few of the many ways to protect yourself when deciding whether or
not you should open an attachment.
Module Six: Review Questions
7. Opening a website that appears to be legitimate but is a spoof can do all of the following, except:
a) Slow down the speed of your computer.
b) Cause a loss of files.
c) Increase the speed of your computer.
d) Cause a stolen identity.
The purpose of spoof sites is to steal the user’s information or damage their computer in some way.
8. Which of these is not mentioned as a precautionary measure to avoid opening a spoof website?
a) Type the complete URL in the browser.
b) Question the intention of the sender of an unsolicited request to visit a website.
c) Ensure your Anti-Virus / Anti-Spyware is up-to-date.
d) Visit the website from at least two different computers to make sure it is legitimate.
Module Six: Review Questions
9. What does Ann tell the trainees about why the company has a two-step verification process?
a) Because the federal law requires it.
b) Because the state law requires it.
c) So that only the authorized user can access the account.
d) So they can weed out the employees who are not serious about computer security.
Two-step verification is an extra measure of security that can make the difference between only
authorized users having access to a system and unauthorized users having access to it.
10. Who asks about the company’s policy on opening email attachments?
a) Carl.
b) Ann.
c) An unnamed trainee.
d) Sybil.
Carl asks about the company’s policy on opening email attachments and is likely doing so
because he understands the importance of downloading attachments with care and would
could happen as a result if unsafe attachments are opened.
Module Seven: Mobile Protection
It is just as important to protect your
Smartphone as it is your computer.
With phones having many of the
same capabilities as computers, they
are open to many of the same
vulnerabilities that computers face.
The beginnings
of the hacker
culture as we
know it today
can be
conveniently
dated to 1961,
the year MIT
acquired the
first PDP-1.
Eric S. Raymond
No Credit Card Numbers
Tokenization Encryption
Place Lock on Phone
Unique password
Various characters
Avoid common words
Avoid consecutive characters
Don’t Save Passwords
Do not store on
phone
Lock in safe
Password
manager
service
No Personalized Contacts
Listed
You’ve created a lock on your phone and regularly lock it when
it’s not in use. You quickly step away from your desk with your
phone on it, and forget to lock it. Someone who doesn’t have
permission to touch your phone, decides to go through your
contact list.
Case Study
Delores and Earl have cell phones to conduct business
Their manager told them to lock their phones
Delores wants to save credit card data on
phone
Earl says that’s not a good idea
Module Seven: Review Questions
1. Credit card numbers:
a) Should only be stored in your phone if you have less than three credit cards.
b) Should only be stored in your phone if you have less than two credit cards.
c) Should always be stored in your phone.
d) Should not be stored in your phone, if possible.
The easy access you have to credit card numbers stored in your phone can unfortunately also be
available to unauthorized users.
2. What is a way to safeguard credit card information that you must store on your phone?
a) Encryption.
b) Tokenization.
c) Both of the above.
d) None of the above.
If possible, it is best to avoid storing credit card information on your phone. If you must,
safeguard the data with tokenization and/or encryption.
Module Seven: Review Questions
3. When setting up a lock on your phone that can be opened with a password:
a) Use a password that is the same as all of your other passwords.
b) Use a password that is different from all of your other passwords.
c) Use a password that has no more than five characters.
d) Use a password that has no more than three characters.
It may be tempting to set up your phone with the same password you use for another
account, but to help ensure the security of your phone, it is best to use something
different.
4. To create a strong password, it should have:
a) Letters and numbers.
b) Numbers and symbols.
c) Letters, numbers, and symbols.
d) Letters and symbols.
A strong password includes various types of characters, such as letters, numbers, symbols,
and emoticons.
Module Seven: Review Questions
5. What should be your back-up method if you cannot remember your password?
a) Write down and place in a secure location.
b) Save it on your phone.
c) Write it down and leave it with a person you trust.
d) Any of the above.
The ideal situation is to remember your password, but if that is not possible, write it down and
store securely. Never share your passwords with anyone and do not save it in your phone, in
case you lose it or an unauthorized person uses it.
6. The “Don’t Save Passwords” lesson states that passwords should be secured where?
a) In a co-worker’s files.
b) On the main screen of your phone.
c) In a closet.
d) In a safe.
If you must write down your password, secure it in a safe or locked drawer.
Module Seven: Review Questions
7. What is the name of the person in the contact list?
a) Bill Johnson.
b) John Taylor.
c) Jim Smith.
d) Bob Jones.
Bob Jones, the manager of ABC Company was in the contact list.
8. What was the job title of the person in the contact list?
a) Quality representative.
b) Manager.
c) Account manager.
d) Client relations representative.
Bob Jones, the manager of ABC Company was in the contact list.
Module Seven: Review Questions
9. What does Delores want to save on her phone?
a) Customers’ credit card information.
b) Passwords for her social media accounts.
c) Her boss’ birthday.
d) The address to a client’s office.
Delores was happy about receiving the company phone because she saw it as a convenient way to
store customers’ credit card information.
10. What does Delores and Earl’s manager encourage them to do?
a) Recharge their phones every three hours.
b) Only use their phones after 2:00 p.m.
c) Save customers’ credit card information on their phones.
d) Lock their phones when they’re not in use.
In addition to instructing them to lock their phones, Delores and Earl’s manager advised them to
put a password on the phone and memorize it.
Module Eight: Social Network
Security
Many people forget that with social
networking, although they are not
meeting with people face-to-face,
revealing too much information
about oneself could still lead to
dangerous situations, such as social
engineering attacks.
The hacker
mindset doesn't
actually see
what happens
on the other
side, to the
victim.
Kevin Mitnick
Don’t Reveal Location
Fake location
Different city/state
Leave field blank
Keep Birthdate Hidden
Especially don’t give birth year.
Have Private Profile
Facebook Instagram
Twitter LinkedIn
Don’t Link Accounts
Automated posting
Identity theft
Spam
Case Study
Reagan is setting up business social media accounts
She wants to link business account to personal
accounts
She discusses her plan with Isabel
Isabel questions the idea
Module Eight: Review Questions
1. What is the MOST effective thing to do if a social media site requires you to put in your address?
a) Put in your actual location.
b) Put in a fake address.
c) Contact customer service and complain.
d) Refuse to open an account.
Many social media platforms require that you add your location. For your safety and the security of
your personal information, it is best to get around this by inputting a fake address.
2. Which of these is NOT mentioned in the “Don’t Reveal Location” lesson of potential things that can
happen as a result of inputting your real location?
a) Burglary.
b) Harassment.
c) Stalking.
d) Stolen identity.
Although stolen identity, among other things are possible when disclosing information about yourself,
it is not mentioned in this lesson as a potential danger.
Module Eight: Review Questions
3. If your birthday is visible on your account, what part of it should you not include?
a) Month.
b) Day.
c) Year.
d) Day of the week you were born.
If at all possible, it’s best to avoid including your birthday. If the birthday must be visible, avoid
including the year. Knowing an individual’s full birthday, along with other pieces of information,
makes it easier for someone to maliciously use the data.
4. The first sentence of the “Keep Birthdate Hidden” lesson says, “Giving away your birthday seems
like a ______ act...”
a) Harmless.
b) Wise.
c) Foolish.
d) Noble.
According to the lesson, “Giving away your birthdate seems like a harmless act, but when a criminal
has your birthday, they have one of the several pieces of information needed to steal your
identity.”
Module Eight: Review Questions
5. Which of these is NOT mentioned in “Have Private Profile” as one of the common
social media platforms used?
a) Facebook.
b) YouTube.
c) Instagram.
d) Twitter.
This lesson mentions Facebook, Instagram, Twitter, Google+, LinkedIn, and Pinterest.
6. Of the following, which is NOT listed in “Have Private Profile” as a common social
media website?
a) Google+.
b) LinkedIn.
c) Flickr.
d) Pinterest.
This lesson mentions Facebook, Instagram, Twitter, Google+, LinkedIn, and Pinterest.
Module Eight: Review Questions
7. You should:
a) Always link your business and personal accounts.
b) Never link your business and personal accounts.
c) Only link your business and personal accounts if you have only one of each.
d) Only link your business and personal accounts if you have less than three of each.
Never link your business and personal accounts. What seems appropriate for your
personal account may be completely inappropriate for your business account.
8. Which of these is NOT listed as a reason to not link your social media accounts?
a) Decreased risk of identity theft.
b) Automated posting.
c) Same messages across different platforms.
d) Increased risk of identity theft.
In addition to the above, the lesson mentions “More of a chance of receiving spam in
inbox (which can be malware and/or viruses)” as a reason not to link accounts.
Module Eight: Review Questions
9. Who wants to link their personal and business social media accounts?
a) Isabel.
b) Reagan.
c) Both Reagan and Isabel.
d) Neither Reagan nor Isabel.
Reagan believes it’s a good idea to link the two so they don’t have to work as hard to drive
traffic to the business’ account.
10. Who is responsible for setting up and managing the candy shop’s social media account?
a) Isabel.
b) Reagan.
c) Both Reagan and Isabel.
d) Neither Reagan for Isabel.
Reagan is excited about this duty because she enjoys engaging in her own social media accounts
in her free time.
Module Nine: Prevention Software
Now we’ve gotten to the good stuff!
We’ve thoroughly covered the many
dangers lurking, with the hopes of
taking over your computer systems
and even steal your identity. It’s now
time to talk about the proactive steps
you can take to protect yourself and
your business.
As the United
States attorney
in Manhattan, I
have come to
worry about few
things as much
as the gathering
cyber threat.
Preet Bharara
Firewalls
Network firewalls
Host-based firewalls
Virtual Private Networks
Remote Access
Site-to-Site
Anti-Virus & Anti-Spyware
McAfee
Kaspersky
Bitdefender
Norton
Routine Updates
High priority
Suggested
Drivers
Case Study
Greg and Richard are discussing a cyber-attack
Greg says they should invest in Anti-Virus/Anti-
Spyware
Greg asks what security should be in place when away
from office
Richard says they should look into fire walls and
routine updates
Module Nine: Review Questions
1. Which of the following are two types of firewalls?
a) Network and host-based.
b) Anti-Virus and Anti-Spyware.
c) Network and Internet.
d) Host-based and Intranet.
Network firewalls specifically filter the flow of traffic concerning at least two networks, while
host-based firewalls deal with one host that manages the traffic in and out of that particular
machine.
2. What are firewalls designed to do?
a) Keep track of but not regulate incoming and outgoing traffic of your network system.
b) Keep track of incoming traffic of your network system.
c) Keep track of and regulate incoming and outgoing traffic of your network system.
d) Keep track of outgoing traffic of your network system.
Think of a fire wall as a blockade between the internal network, which is a trusted source, and
external networks which are presumed to not be safe.
Module Nine: Review Questions
3. An example of using a VPN is a company that gives its employees access to its Intranet while
not inside of the office. What type of VPN is this?
a) Site-to-site.
b) Remote access.
c) Public access.
d) Telecommute.
Virtual private networks (VPNs) are private networks that spread across a public network (the
Internet). VPNs enable users to send and receive information across the public network as if
they are connected to the private networks.
4. Of the following, which is an actual VPN protocol?
a) Internet Protocol Security.
b) Layer 2 Tunneling.
c) Point-to-Point Tunneling.
d) All of the above.
In addition to the above, the lesson mentions protocols such as OpenVPN, Secure Shell, Secure
Sockets Layer and Transport Layer Security.
Module Nine: Review Questions
5. What are threats that Anti-Virus software protects against?
a) Trojans.
b) Viruses.
c) Browser hijackers.
d) All of the above.
In addition, it protects against rootkits, worms, and Ransomware.
6. Which of these companies offers Anti-Virus and Anti-Spyware software?
a) McAfee.
b) Norton.
c) Kaspersky.
d) All of the above.
Another company that offers such software is Bitdefender.
Module Nine: Review Questions
7. Which of these is typically the MOST complicated update to install?
a) High priority.
b) Suggested.
c) Drivers.
d) None of the above.
High priority updates are just as their name states. They are very important and should be non-
negotiable. Examples of such updates include security patches and bug fixes.
Suggested updates can help improve the performance of your computer, but not typically do
not allow for major problems, if not installed.
Drivers can be a bit more complicated if you’re not versed in what they are and how to install
them.
8. How often do operating systems release updates?
a) Regularly.
b) Once every year.
c) Once every two years.
d) Once every three years.
These updates fall into three categories: high priority, suggested, and drivers.
Module Nine: Review Questions
9. Greg says at a minimum, they should invest in:
a) Making sure their operating system performs its routine updates.
b) Firewalls.
c) Anti-Virus and Anti-Spyware software.
d) VPNs.
Richard agrees that they should at least invest in Anti-Virus and Anti-Spyware software, but also
look into firewalls and making sure their operating system is performing routine updates.
10. What is Greg concerned about?
a) What security will be in place when they are on vacation?
b) What security will be in place when they are working away from the office?
c) What security will be in place through the night?
d) What security will be in place on weekends?
Since Greg is concerned about computer security when they are working on their computers
while away from the office, this would be a good opportunity to begin discussion on investing in a
VPN.
Module Ten: Critical Cyber Threats
Critical cyber threats are those that if
carried out, could have a debilitating
effect on an organization or even a
country.
Cyber war takes
place largely in
secret, unknown
to the general
public on both
sides.
Noah Feldman
Critical Cyber Threats
Finance
Commercial
facilities
Information
technology
Cyberterrorism
Large
scale
Threats Attacks
Cyberwarfare
Viruses
Denial of Service Attacks
Cyberespionage
Cracking
Trojans
Spyware
Case Study
Lucky’s Cleaners has been receiving harassing emails
A local competitor says they will ruin Lucky’s
Martha is concerned
Martha sits down with Robert to discuss the
problem
Module Ten: Review Questions
1. According to the “Critical Cyber Threats” lesson, which of these is mentioned as a
critical infrastructure?
a) Energy.
b) Defense.
c) Transportation.
d) All of the above.
In addition to the above, the lesson mentions food and agriculture, emergency
services, and communications.
2. Which of the following is NOT listed in “Critical Cyber Threats” as a type of critical
infrastructure?
a) Food and agriculture.
b) Emergency services.
c) Communications.
d) None of the above.
In addition to the above, the lesson mentions energy, defense, and transportation.
Module Ten: Review Questions
3. In the white supremacist example of cyberterrorism, what state’s ISP
was temporarily disabled?
a) Oregon.
b) Massachusetts.
c) Alabama.
d) New Mexico.
In 1996, a computer hacker allegedly associated with the White
Supremacist movement temporarily disabled a Massachusetts ISP
and damaged part of the ISP's record keeping system. The ISP had
attempted to stop the hacker from sending out worldwide racist
messages under the ISP's name. The hacker signed off with the
threat, "you have yet to see true electronic terrorism. This is a
promise."
Module Ten: Review Questions
4. In the Institute for Global Communications cyberterrorism example, protesters from what
country bombarded the institute with thousands of bogus e-mails?
a) Spain.
b) France.
c) Nigeria.
d) China.
In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with
thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's
users, and support lines were tied up with people who couldn't get their mail. The
protestors also spammed IGC staff and member accounts, clogged their Web page with
bogus credit card orders, and threatened to employ the same tactics against
organizations using IGC services. They demanded that IGC stop hosting the Web site for
the Euskal Herria Journal, a New York-based publication supporting Basque
independence. Protestors said IGC supported terrorism because a section on the Web
pages contained materials on the terrorist group ETA, which claimed responsibility for
assassinations of Spanish political and security officials, and attacks on military
installations. IGC finally relented and pulled the site because of the "mail bombings."
Module Ten: Review Questions
5. In the cyberwarfare examples, in 1998, the United States hacked into what country’s air
defense system?
a) North Korea.
b) Russia.
c) Serbia.
d) Germany.
In 1998, the United States hacked into Serbia's air defense system to compromise air traffic
control and facilitate the bombing of Serbian targets.
6. In 2009, a cyber spy network called ______ accessed confidential information belonging to
both governmental and private organizations.
a) GhostNet.
b) Internet Spy.
c) CyberNet.
d) Ghost Town.
A cyber spy network called "GhostNet" accessed confidential information belonging to both
governmental and private organizations in over 100 countries around the world.
Module Ten: Review Questions
7. In one of the examples in the “Cyberespionage” lesson,
an unnamed government official told the Wall Street Journal
that cyber spies from which countries had broken into
computer systems?
a) Israel and Italy.
b) Japan and India.
c) Poland and Scotland.
d) China and Russia.
An unnamed government official told the Wall Street Journal
that cyber spies from China and Russia had broken into
computer systems used by companies maintaining the
three North American electrical grids.
Module Ten: Review Questions
8. Canadian researchers revealed in late March that a cyber-spy network based in what country had
broken into diplomatic computer systems involving 103 different countries?
a) China.
b) Ireland.
c) Turkey.
d) Iraq.
Canadian researchers revealed in late March that a cyber-spy network based in China had broken into
diplomatic computer systems involving 103 different countries. Beijing denied any official
involvement, but the investigation had begun when the Dalai Lama, Tibet's leader-in-exile,
noticed that sensitive documents from his own PCs had turned up in Chinese hands.
9. In the case study, what’s the name of the business that is receiving threats?
a) Larry’s Lube.
b) Lucy’s Malt Shop.
c) Lucky’s Cleaners.
d) Linda’s Computer Repair.
Lucky’s Cleaners is receiving threats from a competitor that they will destroy its business.
Module Ten: Review Questions
10. What is Martha concerned about?
a) That its competitor will bad mouth her business to
prospective clients.
b) That its competitor will bad mouth her business to
prospective clients and try to disable its computer system.
c) That its competitor will try to disable her business’
computer system.
d) None of the above.
Martha and Robert are discussing the possibility of the above
because their company has been receiving email threats
from their competitor.
Module Eleven: Defense Against
Hackers
”The best defense is a good offense”.
Rather than reacting to attacks once
they’ve occurred, a wise strategy is to
prepare proactive measures, so that
if the time comes, you can
completely bypass the attack or
lessen the blow of it.
Cyber-attacks
are not what
makes the cool
war 'cool.' As a
strategic matter,
they do not
differ
fundamentally
from older tools
of espionage
and sabotage.
Noah Feldman
Cryptography
IDEA
AES
DES
Digital Forensics
Collects
Analyzes
Data
Intrusion Detection
Business need
IDS?
Network support
IDS?
Afford IDS?
Legal Recourse
Accessing
Computer
and
Obtaining
Information
Extortion
Involving
Computers
Trafficking in
Passwords
Case Study
Frank and Joel are trying to prevent hackers
Frank suggests considering encryption
Joel says they need an intrusion detection system
Both agree to research digital forensics and legal
recourse
Module Eleven: Review Questions
1. What is cryptography?
a) Secret method of hearing.
b) Secret method of speaking.
c) Secret method of writing.
d) Secret method of seeing.
Cryptography is basically defined as a secret method of writing. This is done so that only
authorized parties are able to interpret the message.
2. Which of these is NOT an encryption method mentioned in the “Cryptography” lesson?
a) IDEA.
b) YAR.
c) AES.
d) DES.
Examples of encryption methods in the lesson include:
 International Data Encryption Method (IDEA)
 Advanced Encryption Standard (AES)
 Data Encryption Standard (DES)
Module Eleven: Review Questions
3. The “Digital Forensics” lesson says that whom collects and analyzes the data?
a) Company CEO.
b) Independent forensics specialists.
c) Company employees.
d) Law enforcement.
In digital forensics, law enforcement collects and analyzes the data in such a way that it can be
used in court against the perpetrator.
4. In the Sharon Lopatka example in “Digital Forensics” lesson, who was found to be the person
who murdered her?
a) Robert Glass.
b) Lisa Billingsley.
c) John Smith.
d) Renee Porter.
Hundreds of emails on Lopatka's computer lead investigators to her killer, Robert Glass.
Module Eleven: Review Questions
5. What is NOT a question that the “Intrusion Detection” lesson states that one must ask before
investing in an IDS?
a) What does our business need in an IDS?
b) Does state law allow our business to have an IDS?
c) Can we afford an IDS?
d) Will our network support the IDS system?
The lesson mentions these questions:
 What does our business need in an IDS?
 Will our network support the IDS system?
 Can we afford an IDS?
 What do we do if something goes wrong with the IDS?
 As our business grows, we can still use this IDS?
Module Eleven: Review Questions
6. Which of these companies is mentioned as a manufacturer of IDSs?
a) Dakota Alert, Inc.
b) Juniper Networks.
c) Linear, LLC.
d) All of the above.
In addition to the above, the lesson states PureTech Systems, Inc. and Telguard are
manufacturers of IDSs.
7. The majority of computer hacking crimes are punishable under:
a) Computer Fraud and Abuse Act.
b) Civil Rights Act.
c) National Security Act.
d) Workforce Investment Act.
The majority of computer hacking crimes are punishable under the Computer Fraud and Abuse
Act (18 U.S.C. §1030). There may be additional penalties under state law.
Module Eleven: Review Questions
8. The “Legal Recourse” lesson states there are penalties for committing the following offenses
involving computer:
a) Trafficking in Passwords.
b) Accessing a Computer to Defraud & Obtain Value.
c) Recklessly Damaging by Intentional Access.
d) All of the above.
There are penalties for committing the following offenses involving the computer:
 Obtaining National Security Information
 Accessing a Computer and Obtaining Information
 Trespassing in a Government Computer
 Accessing a Computer to Defraud & Obtain Value
 Intentionally Damaging by Knowing Transmission
 Recklessly Damaging by Intentional Access
 Negligently Causing Damage & Loss by Intentional Access
 Trafficking in Passwords
 Extortion Involving Computers
Module Eleven: Review Questions
9. What method of defense does Frank say they should consider?
a) VPN.
b) Anti-Virus software.
c) Encryption.
d) Anti-Spyware software.
Since their bank holds a lot of private information, an encryption service that only allows
employees to interpret data would be helpful.
10. What do intrusion detection systems do?
a) Notify the intruder that he/she will be arrested.
b) Notify the company of suspicious activity.
c) Notify the company that an intrusion report has been sent to the federal government.
d) Notify the intruder that the company is aware of his/her presence and will be fining them.
Intrusion detection systems do as their name states. They locate cases of the system being
accessed by someone who does not have the authority to do so or an unauthorized program
being installed. It then informs the administrator or a security information and event
management system of the activity.
Module Twelve:
Wrapping Up
Although this workshop is coming to a
close, we hope that your journey to
learning about Cybersecurity is just
beginning.
Please take a moment to review and
update your action plan. This will be a key
tool to guide your progress in the days,
weeks, months, and years to come. We
wish you the best of luck on the rest of
your travels!
People ask me
all the time,
'What keeps you
up at night?'
And I say, 'Spicy
Mexican food,
weapons of
mass
destruction, and
cyber-attacks.
Dutch
Ruppersberger
Words from the Wise
Frank
Abagnale:
• The police can't protect consumers. People
need to be more aware and educated
about identity theft. You need to be a little
bit wiser, a little bit smarter and there's
nothing wrong with being skeptical. We live
in a time when if you make it easy for
someone to steal from you, someone will
Janet Reno
• Everybody should want to make sure that
we have the cyber tools necessary to
investigate cyber-crimes, and to be
prepared to defend against them and to
bring people to justice who commit it.

More Related Content

Similar to Cybersecurity.pptx

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Information security questions
Information security questions Information security questions
Information security questions gamemaker762
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfSujanTimalsina5
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

Similar to Cybersecurity.pptx (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Network security
Network securityNetwork security
Network security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Information security questions
Information security questions Information security questions
Information security questions
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 

More from ssuser2209e8

How to win friends and influence people Arabic.pdf
How to win friends and influence people Arabic.pdfHow to win friends and influence people Arabic.pdf
How to win friends and influence people Arabic.pdfssuser2209e8
 
1 minute communication.pdf
1 minute communication.pdf1 minute communication.pdf
1 minute communication.pdfssuser2209e8
 
RH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdfRH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdfssuser2209e8
 
DRAFT CYBER SECURITY PLAN Dec 5 2015.pdf
DRAFT CYBER SECURITY PLAN  Dec 5 2015.pdfDRAFT CYBER SECURITY PLAN  Dec 5 2015.pdf
DRAFT CYBER SECURITY PLAN Dec 5 2015.pdfssuser2209e8
 
info sys risk management.pdf
info sys risk management.pdfinfo sys risk management.pdf
info sys risk management.pdfssuser2209e8
 
information-security-training.pdf
information-security-training.pdfinformation-security-training.pdf
information-security-training.pdfssuser2209e8
 
Theories behind Gamification of Learning and Instruction.pptx
Theories behind Gamification of Learning and Instruction.pptxTheories behind Gamification of Learning and Instruction.pptx
Theories behind Gamification of Learning and Instruction.pptxssuser2209e8
 
How to design a leadership program.pdf
How to design a leadership program.pdfHow to design a leadership program.pdf
How to design a leadership program.pdfssuser2209e8
 
اسس الادارة الصفية.ppt
اسس الادارة الصفية.pptاسس الادارة الصفية.ppt
اسس الادارة الصفية.pptssuser2209e8
 
الاتصال والتواصل.PPT
الاتصال والتواصل.PPTالاتصال والتواصل.PPT
الاتصال والتواصل.PPTssuser2209e8
 
Training Manual (1).docx
Training Manual (1).docxTraining Manual (1).docx
Training Manual (1).docxssuser2209e8
 
ادارة الوقت بفاعلية.ppt
ادارة الوقت بفاعلية.pptادارة الوقت بفاعلية.ppt
ادارة الوقت بفاعلية.pptssuser2209e8
 

More from ssuser2209e8 (17)

How to win friends and influence people Arabic.pdf
How to win friends and influence people Arabic.pdfHow to win friends and influence people Arabic.pdf
How to win friends and influence people Arabic.pdf
 
1 minute communication.pdf
1 minute communication.pdf1 minute communication.pdf
1 minute communication.pdf
 
RH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdfRH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdf
 
DRAFT CYBER SECURITY PLAN Dec 5 2015.pdf
DRAFT CYBER SECURITY PLAN  Dec 5 2015.pdfDRAFT CYBER SECURITY PLAN  Dec 5 2015.pdf
DRAFT CYBER SECURITY PLAN Dec 5 2015.pdf
 
info sys risk management.pdf
info sys risk management.pdfinfo sys risk management.pdf
info sys risk management.pdf
 
information-security-training.pdf
information-security-training.pdfinformation-security-training.pdf
information-security-training.pdf
 
11869841.ppt
11869841.ppt11869841.ppt
11869841.ppt
 
Theories behind Gamification of Learning and Instruction.pptx
Theories behind Gamification of Learning and Instruction.pptxTheories behind Gamification of Learning and Instruction.pptx
Theories behind Gamification of Learning and Instruction.pptx
 
slide 24.pdf
slide 24.pdfslide 24.pdf
slide 24.pdf
 
slide 13.pdf
slide 13.pdfslide 13.pdf
slide 13.pdf
 
slide 10.pdf
slide 10.pdfslide 10.pdf
slide 10.pdf
 
slide 5.pdf
slide 5.pdfslide 5.pdf
slide 5.pdf
 
How to design a leadership program.pdf
How to design a leadership program.pdfHow to design a leadership program.pdf
How to design a leadership program.pdf
 
اسس الادارة الصفية.ppt
اسس الادارة الصفية.pptاسس الادارة الصفية.ppt
اسس الادارة الصفية.ppt
 
الاتصال والتواصل.PPT
الاتصال والتواصل.PPTالاتصال والتواصل.PPT
الاتصال والتواصل.PPT
 
Training Manual (1).docx
Training Manual (1).docxTraining Manual (1).docx
Training Manual (1).docx
 
ادارة الوقت بفاعلية.ppt
ادارة الوقت بفاعلية.pptادارة الوقت بفاعلية.ppt
ادارة الوقت بفاعلية.ppt
 

Recently uploaded

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 

Recently uploaded (20)

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 

Cybersecurity.pptx

  • 2. Module One: Getting Started Every organization is responsible for ensuring cybersecurity. The ability to protect its information systems from impairment or even theft is essential to success. At the end of the day, the goals are simple: safety and security. Jodi Rell
  • 3. Workshop Objectives Understand malware and breaches Know cyber- attacks Develop prevention methods
  • 4. Module Two: Cybersecurity Fundamentals Before developing and implementing security measures to prevent cyberattacks, you must understand basic concepts associated with cybersecurity and what cyberattacks are. U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations, subnational groups, and individual hackers. John O. Brennan
  • 5. What is Cyberspace? Networks Devices Software Processes
  • 6. What is Cybersecurity? Prevents attacks Prevents disruption Controls physical access Protects against code injection
  • 7. Why is Cybersecurity Important? Protects against Data security breaches Sabotage
  • 8. What is a Hacker? Grey hat Black hat White hat
  • 9. Case Study Patrick and Willow are opening answering service business Patrick says security is not necessary Willow says hackers can break in This will disrupt business
  • 10. Module Two: Review Questions 1. Cyberspace refers to which of the following? a) Computer-to-computer activity. b) Individual-to-individual activity. c) Supervisor-to-employee activity. d) Computer-to-physical location activity. Cyberspace is not a physical location. It is an environment where computer transaction take place. 2. What is an item that is included in cyberspace? a) Network. b) Software. c) Application. d) All of the above. In addition to the above, devices, processes, and information storage are a part of cyberspace.
  • 11. Module Two: Review Questions 3. Why is cybersecurity implemented? a) To speed up the network of a company’s computers. b) To avoid the disruption of a company’s business. c) To increase the number of clients a company has. d) To lessen the number of employees a company employs. Cybersecurity helps companies avoid disruption inflicted by hackers, thus not slowing down the company’s productivity. 4. Cybersecurity helps control physical access to and prevents danger that may come in from: a) Hardware. b) Network access. c) Code injection. d) All of the above. This helps prevent damage to the company’s entire information systems.
  • 12. Module Two: Review Questions 5. What type of information is NOT secure information that is likely to be compromised in a data security breach? a) Intellectual property. b) Credit card information. c) The name of a company’s CEO. d) Social security numbers. The name of a company’s CEO is public information. Information that is not considered public, such as names and social security numbers and bank details could fall victim to a data security breach. 6. What is the main purpose of computer sabotage? a) To disable a company’s computers or networks to prevent it from conducting business. b) To disable a company’s computers or networks to prevent it from being able to obtain a business license. c) To disable a company’s computers or networks to prevent it from being able to hire employees. d) To disable a company’s computers or networks to prevent it from being able to give its employees raises. Data security breaches and sabotage can both have dire effects on a company and/or its clients.
  • 13. Module Two: Review Questions 7. Why do “grey hat” hackers typically hack into computers? a) To steal data for monetary gain. b) For the fun of it. c) To find vulnerabilities in a computer system so the company can fix them before hackers with bad intentions can exploit them. d) To sell data for monetary gain. There are three types of hacker: Grey hats: These hackers do so “for the fun of it”. Black hats: These hackers have malevolent reasons for doing so, such as stealing and/or selling data for monetary gain. White hats: These hackers are employed by companies to hack into systems to find where the company is vulnerable, with the intention of ensuring the safety of the data from hackers with ill intentions.
  • 14. Module Two: Review Questions 8. Why do “white hat” hackers typically hack into computers? a) To steal data for monetary gain. b) For the fun of it. c) To find vulnerabilities in a computer system so the company can fix them before hackers with bad intentions can exploit them. d) To sell data for monetary gain. There are three types of hacker: Grey hats: These hackers do so “for the fun of it”. Black hats: These hackers have malevolent reasons for doing so, such as stealing and/or selling data for monetary gain. White hats: These hackers are employed by companies to hack into systems to find where the company is vulnerable, with the intention of ensuring the safety of the data from hackers with ill intentions.
  • 15. Module Two: Review Questions 9. What type of business are Patrick and Willow opening? a) Restaurant. b) Flower shop. c) Answering service. d) Bike shop. Patrick and Willow are in the process of opening an answering service business, and they are trying to decide whether or not they need security for their computer systems. 10. Does Willow think they need security for their computers? What is her reasoning? a) No, because their business is small. b) Yes, because they are vulnerable to hackers. c) No, because the type of business they run doesn’t require it. d) Yes, because federal law requires them to have it. Willow believes they need security for their systems because she recognizes their vulnerability to hackers. Patrick doesn’t believe it’s necessary because they have a small business.
  • 16. Module Three: Types of Malware ”Malware” is the shortened form for malicious software, which is intrusive software, used to perform actions such as interrupting computer operations and obtaining sensitive information. Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm. Anna Maria Chavez
  • 18. Viruses Corrupt files Slow down computer Take over basic functions
  • 21. Case Study Employees notice their computers are moving slowly Harry’s computer settings have changed Tom’s files have been deleted Jerry’s computer has similar issues
  • 22. Module Three: Review Questions 1. How do worms work? a) They are always downloaded as email attachments. b) They are automatically installed on every computer. c) They must attach themselves to existing programs in order to spread. d) They reproduce themselves to infect other computers. Worms are independent malware programs that can spread to other computers. 2. Which of the following does the lesson NOT list as damage that worms can cause? a) Bandwidth consumption. b) Immobilizing Safe Mode. c) Corrupting files. d) Stopping active anti-malware service. In addition to the above, worms can hindering Windows auto update.
  • 23. Module Three: Review Questions 3. When can infected files infect other computers? a) When the file is shared with other computers. b) Whether or not the file is shared with other computers. c) They automatically infect other computers within the same network of the originally infected computer d) Never. It can infect files and when the file is opened, spread the virus throughout your computer. The virus will further spread if the infected file is shared with others. 4. Which of the following does the lesson NOT list as damage that viruses can cause? a) Computer slowdown. b) Corrupting files. c) Taking over basic functions of the operating system. d) Bandwidth consumption. A computer virus is a program that hides within a harmless program that reproduces itself to perform actions such as destroying data.
  • 24. Module Three: Review Questions 5. Spyware is commonly used to bombard the user with: a) Emails without attachments. b) Unsolicited text messages. c) Emails with attachments. d) Pop-up ads. Spyware is also used to obtain information about an individual or company without their knowledge or consent. The data gathered from this act of “spying” is sometimes sent to another entity. It can also be used to gain control over one’s computer without the user realizing it. 6. Which of the following does the lesson NOT list as damage that Spyware can cause? a) Crashing the computer. b) Collecting personal information. c) Installing unsolicited software. d) Redirecting web browsers. In addition to the above, the lesson mentions that Spyware can change computer settings and slow down the Internet connection.
  • 25. Module Three: Review Questions 7. How do Trojans gain access to computers? a) By being installed via a disk. b) By misleading the user of its true intention. c) By spreading via legitimate email attachments. d) None of the above. They spread in sneaky ways. For example, a user may receive an email attachment that appears to be legitimate, but when he/she opens it, it in fact gives the attacker the opportunity to obtain the user’s personal information, such as banking details and passwords. 8. Which of the following does the lesson NOT list as damage that Trojans can cause? a) Crashing the computer. b) Deleting files. c) Corrupting data. d) Redirecting web browsers. In addition to the above, the lesson mentions that Trojans can log keystrokes.
  • 26. Module Three: Review Questions 9. What do many employees at XYZ Company notice about their computers? a) That they are running slowly. b) That they have crashed. c) That their files have become corrupt. d) That Safe Mode is no longer working. Many employees at XYZ Company have noticed that their computers are moving slowly. In addition, Harry has noticed changes to the settings of his computer and the redirecting of his browser. Files that are supposed to be on Tom’s computer have been deleted. 10. What does Harry say has happened to his computer? a) Computer setting changes and web browser redirecting. b) Deleted files. c) Bandwidth consumption. d) Computer crashed. Many employees at XYZ Company have noticed that their computers are moving slowly. In addition, Harry has noticed changes to the settings of his computer and the redirecting of his browser. Files that are supposed to be on Tom’s computer have been deleted.
  • 27. Module Four: Cyber Security Breaches Cyber security breaches are the result of secure information being released to a treacherous environment. Choosing a hard-to-guess, but easy-to- remember password is important! Kevin Mitnick
  • 29. Identity Theft Be mindful Use Anti-Virus Software Use Anti-Malware Software Don’t respond to unsolicited requests
  • 30. Harassment No immediate response Tell to stop Contact authorities
  • 31. Cyberstalking Physical access control Protect password Updated security software
  • 32. Case Study Paula banks and works for 123 Bank She received “unauthorized transaction” email Paula asked Emily if she should click on link in email Emily said company would not send that email
  • 33. Module Four: Review Questions 1. How do phishing scam criminals attract their victims? a) By appearing to be a legitimate source. b) By threatening them. c) Both of the above. d) None of the above. Phishing scams are typically carried out by the perpetrator appearing to be helpful. Once the victim has been lured in, the attack takes place. 2. What is not one of the ways phishing uses individuals’ information? a) To obtain identifying information such as social security number, for malicious purposes. b) To commit crimes in the person’s name. c) To steal banking details for personal gain. d) To keep the person’s information safe. The intention of the phishing scammer is never to do anything that benefits the victim.
  • 34. Module Four: Review Questions 3. What quote is mentioned in the “Identity Theft” lesson? a) Identity theft is a serious crime that affects millions of Americans each year. b) I don’t need to worry about identity theft because no one wants to be me. c) An ounce of prevention is worth a pound of cure. d) If we don’t act now to safeguard our privacy, we could all become victims of identity theft. This quote basically means taking steps beforehand to prevent identity theft from taking place can save the headache of recovering from falling victim to identity theft. 4. Of the following, which is not mentioned in the “Identity Theft” lesson as a way to help prevent identity theft? a) Be mindful of phishing websites. b) Protect your passwords. c) Utilize an Anti-Virus / Anti-Malware program. d) Don’t respond to unsolicited requests for secure information. Those who seek to steal another’s identity typically do so and move on quickly, making it difficult to track and prosecute the perpetrator, so it is best to work to prevent it from happening in the first place.
  • 35. Module Four: Review Questions 5. What is the first thing to do when you discover you have been a victim of cyberbullying? a) Respond immediately. b) Compose yourself before responding. c) Call the police. d) Shut down your computer. Immediately responding to a cyberbully attack may worsen the situation because the response will most likely come from a place of emotion. It is best to respond once you gather your thoughts and the things you want to say. 6. What is a characteristic of cyber bullying? a) Can affect companies as well as individuals. b) Is limited to adults. c) Is limited to teenagers. d) Only affects companies. Although cyberbullying is most commonly seen as an issue that teenagers deal with, it can also affect individual adults and companies. .
  • 36. Module Four: Review Questions 7. What does the lesson mention on how cyberstalking is punishable? a) Monetary penalties only. b) Monetary penalties and jail time. c) Restraining order and monetary penalties. d) Restraining order and jail time. There are many ways to be punished when found guilty of cyberstalking. However, the lesson only mentions a restraining order and jail time. 8. What is not mentioned in the “Cyberstalking” lesson as an anti-stalking tip? a) Log out of programs before stepping away from your desk. b) Do not leave on your computer through the night. c) Protect passwords. d) Keep security software updated. Although not leaving on the computer through the night may be helpful, the lesson does not mention this.
  • 37. Module Four: Review Questions 9. Receiving an email that says, “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity”, is MOST likely characteristic of what? a) Cyberbullying. b) Cyberstalking. c) Harassment. d) Phishing. With phishing, cyber thieves may send emails that appear to be from legitimate sources, requesting that the user click on a link to confirm information. Clicking on the link allows the thieves to steal some of the user’s information, which could ultimately lead to identity theft. 10. What does Emily tell Paula about the email she received? a) Their company does that all of the time and she should click the link. b) Their company does that sometimes, but she should confirm with their supervisor. c) Their company doesn’t do that, and most companies don’t. d) She is not sure what Paula should do. Emily doesn’t believe it is wise for Paula to click on the link.
  • 38. Module Five: Types of Cyber Attacks Cyber attacks are orchestrated by individuals or groups to destroy the information systems, networks, etc. of others. Love is great, but not as a password. Matt Mullenweg
  • 39. Password Attacks Letters, numbers, and symbols Long Update regularly
  • 40. Denial of Service Attacks Performs slowly Inaccessible website Spam
  • 43. Case Study Kurt and Jeff are setting up passwords Kurt wants to create password with various characters Jeff wants to create password with letters only Jeff has to call technical support
  • 44. Module Five: Review Questions 1. You should create a password that is: a) Easy for you to remember and easy for others to figure out. b) Difficult for you to remember but easy for others to figure out. c) Easy for you to remember but difficult for others to figure out. d) Difficult for you to remember and difficult for others to figure out. One of the purposes of creating a strong password is to prevent unauthorized users from having access to it. Because of this, the password should be something that only you can easily remember. 2. What should your password include? a) Upper and lower case letters. b) Upper and lower case letters, numbers, and symbols. c) Numbers and symbols. d) Upper case letters, numbers, and symbols. Part of creating a strong password, is crafting one that is difficult for others to figure out. Using a variety of characters such as upper and lower case letters, numbers, and symbols should help accomplish that.
  • 45. Module Five: Review Questions 3. What is a denial of service attack? a) An attack that prevents unintended users from being able to access a network. b) An attack that prevents users from being able to access a network in the early morning hours only. c) An attack that prevents users from being able to access a network in the late night hours only. d) An attack that prevents intended users from being able to access a network. This can manifest as although the user puts in the correct password, the system says it’s incorrect and after a certain number of times locks out the user. It can also overload the network so that no one can get in.
  • 46. Module Five: Review Questions 4. Which of the following is not mentioned in the “Denial of Service Attack” lesson as damage that denial of service attacks can cause? a) Network performs slowly. b) A particular website is inaccessible. c) Receiving a large amount of spam emails. d) None of the above. In addition to the above, the lesson mentions that this type of attack could make it so no website is accessible. 5. What is the purpose of a passive attack? a) To find network vulnerabilities and immediately change data. b) To warn the network user of an impending active attack. c) To find network vulnerabilities but not change data at the time. d) To warn the network user of vulnerabilities so the user can fix them. Although it may seem like a harmless act at the time, if the intruder is able to obtain the “right” information, he/she can use that in the future to cause irreparable damage.
  • 47. Module Five: Review Questions 6. In the lesson, passive attacks are likened to: a) Eavesdropping. b) Murder. c) Downloading. d) Overloading. Although in this type of attack, the goal is not to cause immediate damage, if the intruder happens to hear significant information, it will likely be employed against the user in the future. 7. What is penetration testing used for? a) In a controlled environment, to find vulnerabilities in the network, but not exploit them. b) In a controlled environment, to find vulnerabilities in the network and exploit those vulnerabilities to see what impact an actual attack would have. c) In an uncontrolled environment, to find vulnerabilities in the network and exploit those vulnerabilities to see what impact an actual attack would have. d) In an uncontrolled environment, to find vulnerabilities in the network, but not exploit them. Companies use penetration testing within their organization to determine if there are vulnerabilities in their network system, and if there are some, what impact would occur as a result of an attack against it.
  • 48. Module Five: Review Questions 8. Which of these is discussed in the “Penetration Testing” lesson as a reason that companies implement such testing? a) Establish the likelihood of a specific attack occurring. b) Detect high risk vulnerabilities that can result from a grouping of low risk vulnerabilities that take place in a particular pattern. c) Determine the bearing an attack will have on a company. d) All of the above. In addition to the above, a company would implement penetration testing to assess the company’s network risk management capabilities. 9. Kurt’s password will consist of: a) Numbers, letters, and symbols. b) Numbers only. c) Letters only. d) Symbols only. Kurt’s logic behind creating a password with numbers, letters, and symbols is that doing so will make it harder for others to figure it out.
  • 49. Module Five: Review Questions 10. Receiving a large amount of spam mail and being locked out of the system after putting in the correct password, but not given access are characteristic of which of the following? a) Password attack. b) Denial of service. c) Denial of service and password attack. d) None of the above. Additionally, denial of service can manifest as the network performing slowly, the inability to access a particular website, and the inability to access the Internet as a whole.
  • 50. Module Six: Prevention Tips Although it may not be possible to completely avoid falling victim to cybercrime, having a tool kit of prevention methods could help your organization minimize the risk of such crimes damaging the reputation of your company or faith of your clients/customers. Identity theft is one of the fastest-growing crimes in the nation - especially in the suburbs. Melissa Bean
  • 51. Crafting a Strong Password Unique Various characters No common words No consecutive characters
  • 53. Download Attachments with Care Update software patches Go with your gut Save and scan
  • 54. Question Legitimacy of Websites Type URL Question sender’s intention Anti-Virus and Anti-Spyware
  • 55. Case Study Ann is discussing security tips with trainees She says to create a strong password Ann talks about Two-Step Verification Carl is curious about policy for opening attachments
  • 56. Module Six: Review Questions 1. What is the best way to store a password? a) On a sticky note on your desk. b) In your memory. c) In your phone. d) In a notebook located in an unlocked desk. When it comes to storing a password, the ideal scenario would be to memorize it. If that is not possible, store it in a secure location that few people have access to. 2. When is it best to use one password for all of your accounts? a) If you have no more than two accounts. b) If you have no more than three accounts. c) Never. d) If you have no more than four accounts. Using different passwords for each of your accounts is the most effective way to keep your accounts safe.
  • 57. Module Six: Review Questions 3. In the “Two-Step Verification” lesson, which of these is mentioned as something that may be used for authentication purposes? a) Token. b) Key. c) Password. d) All of the above. This lesson states that a token, key, password, pin, fingerprint, and voice recognition can be used to authenticate an individual’s identity. 4. The “Two-Step Verification” lesson states that which of these can be used to confirm an individual’s identity? a) Pin. b) Fingerprint. c) Voice recognition. d) All of the above. This lesson states that a token, key, password, pin, fingerprint, and voice recognition can be used to authenticate an individual’s identity.
  • 58. Module Six: Review Questions 5. What is true of an email attachment with an extension of .doc? a) It could be a Trojan. b) It should never be downloaded. c) It will always be a legitimate attachment. d) It should only be downloaded if it is sent from a co-worker. Email attachments should always be opened with caution. Even if it appears to come from someone you know and has a legitimate extension, it could still be something that will attack your computer. 6. What is a way to protect yourself when it comes to opening attachments? a) Regularly update software patches. b) Go with your gut. c) Save and scan the true sender of the attachment. d) All of the above. These are just a few of the many ways to protect yourself when deciding whether or not you should open an attachment.
  • 59. Module Six: Review Questions 7. Opening a website that appears to be legitimate but is a spoof can do all of the following, except: a) Slow down the speed of your computer. b) Cause a loss of files. c) Increase the speed of your computer. d) Cause a stolen identity. The purpose of spoof sites is to steal the user’s information or damage their computer in some way. 8. Which of these is not mentioned as a precautionary measure to avoid opening a spoof website? a) Type the complete URL in the browser. b) Question the intention of the sender of an unsolicited request to visit a website. c) Ensure your Anti-Virus / Anti-Spyware is up-to-date. d) Visit the website from at least two different computers to make sure it is legitimate.
  • 60. Module Six: Review Questions 9. What does Ann tell the trainees about why the company has a two-step verification process? a) Because the federal law requires it. b) Because the state law requires it. c) So that only the authorized user can access the account. d) So they can weed out the employees who are not serious about computer security. Two-step verification is an extra measure of security that can make the difference between only authorized users having access to a system and unauthorized users having access to it. 10. Who asks about the company’s policy on opening email attachments? a) Carl. b) Ann. c) An unnamed trainee. d) Sybil. Carl asks about the company’s policy on opening email attachments and is likely doing so because he understands the importance of downloading attachments with care and would could happen as a result if unsafe attachments are opened.
  • 61. Module Seven: Mobile Protection It is just as important to protect your Smartphone as it is your computer. With phones having many of the same capabilities as computers, they are open to many of the same vulnerabilities that computers face. The beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1. Eric S. Raymond
  • 62. No Credit Card Numbers Tokenization Encryption
  • 63. Place Lock on Phone Unique password Various characters Avoid common words Avoid consecutive characters
  • 64. Don’t Save Passwords Do not store on phone Lock in safe Password manager service
  • 65. No Personalized Contacts Listed You’ve created a lock on your phone and regularly lock it when it’s not in use. You quickly step away from your desk with your phone on it, and forget to lock it. Someone who doesn’t have permission to touch your phone, decides to go through your contact list.
  • 66. Case Study Delores and Earl have cell phones to conduct business Their manager told them to lock their phones Delores wants to save credit card data on phone Earl says that’s not a good idea
  • 67. Module Seven: Review Questions 1. Credit card numbers: a) Should only be stored in your phone if you have less than three credit cards. b) Should only be stored in your phone if you have less than two credit cards. c) Should always be stored in your phone. d) Should not be stored in your phone, if possible. The easy access you have to credit card numbers stored in your phone can unfortunately also be available to unauthorized users. 2. What is a way to safeguard credit card information that you must store on your phone? a) Encryption. b) Tokenization. c) Both of the above. d) None of the above. If possible, it is best to avoid storing credit card information on your phone. If you must, safeguard the data with tokenization and/or encryption.
  • 68. Module Seven: Review Questions 3. When setting up a lock on your phone that can be opened with a password: a) Use a password that is the same as all of your other passwords. b) Use a password that is different from all of your other passwords. c) Use a password that has no more than five characters. d) Use a password that has no more than three characters. It may be tempting to set up your phone with the same password you use for another account, but to help ensure the security of your phone, it is best to use something different. 4. To create a strong password, it should have: a) Letters and numbers. b) Numbers and symbols. c) Letters, numbers, and symbols. d) Letters and symbols. A strong password includes various types of characters, such as letters, numbers, symbols, and emoticons.
  • 69. Module Seven: Review Questions 5. What should be your back-up method if you cannot remember your password? a) Write down and place in a secure location. b) Save it on your phone. c) Write it down and leave it with a person you trust. d) Any of the above. The ideal situation is to remember your password, but if that is not possible, write it down and store securely. Never share your passwords with anyone and do not save it in your phone, in case you lose it or an unauthorized person uses it. 6. The “Don’t Save Passwords” lesson states that passwords should be secured where? a) In a co-worker’s files. b) On the main screen of your phone. c) In a closet. d) In a safe. If you must write down your password, secure it in a safe or locked drawer.
  • 70. Module Seven: Review Questions 7. What is the name of the person in the contact list? a) Bill Johnson. b) John Taylor. c) Jim Smith. d) Bob Jones. Bob Jones, the manager of ABC Company was in the contact list. 8. What was the job title of the person in the contact list? a) Quality representative. b) Manager. c) Account manager. d) Client relations representative. Bob Jones, the manager of ABC Company was in the contact list.
  • 71. Module Seven: Review Questions 9. What does Delores want to save on her phone? a) Customers’ credit card information. b) Passwords for her social media accounts. c) Her boss’ birthday. d) The address to a client’s office. Delores was happy about receiving the company phone because she saw it as a convenient way to store customers’ credit card information. 10. What does Delores and Earl’s manager encourage them to do? a) Recharge their phones every three hours. b) Only use their phones after 2:00 p.m. c) Save customers’ credit card information on their phones. d) Lock their phones when they’re not in use. In addition to instructing them to lock their phones, Delores and Earl’s manager advised them to put a password on the phone and memorize it.
  • 72. Module Eight: Social Network Security Many people forget that with social networking, although they are not meeting with people face-to-face, revealing too much information about oneself could still lead to dangerous situations, such as social engineering attacks. The hacker mindset doesn't actually see what happens on the other side, to the victim. Kevin Mitnick
  • 73. Don’t Reveal Location Fake location Different city/state Leave field blank
  • 74. Keep Birthdate Hidden Especially don’t give birth year.
  • 75. Have Private Profile Facebook Instagram Twitter LinkedIn
  • 76. Don’t Link Accounts Automated posting Identity theft Spam
  • 77. Case Study Reagan is setting up business social media accounts She wants to link business account to personal accounts She discusses her plan with Isabel Isabel questions the idea
  • 78. Module Eight: Review Questions 1. What is the MOST effective thing to do if a social media site requires you to put in your address? a) Put in your actual location. b) Put in a fake address. c) Contact customer service and complain. d) Refuse to open an account. Many social media platforms require that you add your location. For your safety and the security of your personal information, it is best to get around this by inputting a fake address. 2. Which of these is NOT mentioned in the “Don’t Reveal Location” lesson of potential things that can happen as a result of inputting your real location? a) Burglary. b) Harassment. c) Stalking. d) Stolen identity. Although stolen identity, among other things are possible when disclosing information about yourself, it is not mentioned in this lesson as a potential danger.
  • 79. Module Eight: Review Questions 3. If your birthday is visible on your account, what part of it should you not include? a) Month. b) Day. c) Year. d) Day of the week you were born. If at all possible, it’s best to avoid including your birthday. If the birthday must be visible, avoid including the year. Knowing an individual’s full birthday, along with other pieces of information, makes it easier for someone to maliciously use the data. 4. The first sentence of the “Keep Birthdate Hidden” lesson says, “Giving away your birthday seems like a ______ act...” a) Harmless. b) Wise. c) Foolish. d) Noble. According to the lesson, “Giving away your birthdate seems like a harmless act, but when a criminal has your birthday, they have one of the several pieces of information needed to steal your identity.”
  • 80. Module Eight: Review Questions 5. Which of these is NOT mentioned in “Have Private Profile” as one of the common social media platforms used? a) Facebook. b) YouTube. c) Instagram. d) Twitter. This lesson mentions Facebook, Instagram, Twitter, Google+, LinkedIn, and Pinterest. 6. Of the following, which is NOT listed in “Have Private Profile” as a common social media website? a) Google+. b) LinkedIn. c) Flickr. d) Pinterest. This lesson mentions Facebook, Instagram, Twitter, Google+, LinkedIn, and Pinterest.
  • 81. Module Eight: Review Questions 7. You should: a) Always link your business and personal accounts. b) Never link your business and personal accounts. c) Only link your business and personal accounts if you have only one of each. d) Only link your business and personal accounts if you have less than three of each. Never link your business and personal accounts. What seems appropriate for your personal account may be completely inappropriate for your business account. 8. Which of these is NOT listed as a reason to not link your social media accounts? a) Decreased risk of identity theft. b) Automated posting. c) Same messages across different platforms. d) Increased risk of identity theft. In addition to the above, the lesson mentions “More of a chance of receiving spam in inbox (which can be malware and/or viruses)” as a reason not to link accounts.
  • 82. Module Eight: Review Questions 9. Who wants to link their personal and business social media accounts? a) Isabel. b) Reagan. c) Both Reagan and Isabel. d) Neither Reagan nor Isabel. Reagan believes it’s a good idea to link the two so they don’t have to work as hard to drive traffic to the business’ account. 10. Who is responsible for setting up and managing the candy shop’s social media account? a) Isabel. b) Reagan. c) Both Reagan and Isabel. d) Neither Reagan for Isabel. Reagan is excited about this duty because she enjoys engaging in her own social media accounts in her free time.
  • 83. Module Nine: Prevention Software Now we’ve gotten to the good stuff! We’ve thoroughly covered the many dangers lurking, with the hopes of taking over your computer systems and even steal your identity. It’s now time to talk about the proactive steps you can take to protect yourself and your business. As the United States attorney in Manhattan, I have come to worry about few things as much as the gathering cyber threat. Preet Bharara
  • 85. Virtual Private Networks Remote Access Site-to-Site
  • 88. Case Study Greg and Richard are discussing a cyber-attack Greg says they should invest in Anti-Virus/Anti- Spyware Greg asks what security should be in place when away from office Richard says they should look into fire walls and routine updates
  • 89. Module Nine: Review Questions 1. Which of the following are two types of firewalls? a) Network and host-based. b) Anti-Virus and Anti-Spyware. c) Network and Internet. d) Host-based and Intranet. Network firewalls specifically filter the flow of traffic concerning at least two networks, while host-based firewalls deal with one host that manages the traffic in and out of that particular machine. 2. What are firewalls designed to do? a) Keep track of but not regulate incoming and outgoing traffic of your network system. b) Keep track of incoming traffic of your network system. c) Keep track of and regulate incoming and outgoing traffic of your network system. d) Keep track of outgoing traffic of your network system. Think of a fire wall as a blockade between the internal network, which is a trusted source, and external networks which are presumed to not be safe.
  • 90. Module Nine: Review Questions 3. An example of using a VPN is a company that gives its employees access to its Intranet while not inside of the office. What type of VPN is this? a) Site-to-site. b) Remote access. c) Public access. d) Telecommute. Virtual private networks (VPNs) are private networks that spread across a public network (the Internet). VPNs enable users to send and receive information across the public network as if they are connected to the private networks. 4. Of the following, which is an actual VPN protocol? a) Internet Protocol Security. b) Layer 2 Tunneling. c) Point-to-Point Tunneling. d) All of the above. In addition to the above, the lesson mentions protocols such as OpenVPN, Secure Shell, Secure Sockets Layer and Transport Layer Security.
  • 91. Module Nine: Review Questions 5. What are threats that Anti-Virus software protects against? a) Trojans. b) Viruses. c) Browser hijackers. d) All of the above. In addition, it protects against rootkits, worms, and Ransomware. 6. Which of these companies offers Anti-Virus and Anti-Spyware software? a) McAfee. b) Norton. c) Kaspersky. d) All of the above. Another company that offers such software is Bitdefender.
  • 92. Module Nine: Review Questions 7. Which of these is typically the MOST complicated update to install? a) High priority. b) Suggested. c) Drivers. d) None of the above. High priority updates are just as their name states. They are very important and should be non- negotiable. Examples of such updates include security patches and bug fixes. Suggested updates can help improve the performance of your computer, but not typically do not allow for major problems, if not installed. Drivers can be a bit more complicated if you’re not versed in what they are and how to install them. 8. How often do operating systems release updates? a) Regularly. b) Once every year. c) Once every two years. d) Once every three years. These updates fall into three categories: high priority, suggested, and drivers.
  • 93. Module Nine: Review Questions 9. Greg says at a minimum, they should invest in: a) Making sure their operating system performs its routine updates. b) Firewalls. c) Anti-Virus and Anti-Spyware software. d) VPNs. Richard agrees that they should at least invest in Anti-Virus and Anti-Spyware software, but also look into firewalls and making sure their operating system is performing routine updates. 10. What is Greg concerned about? a) What security will be in place when they are on vacation? b) What security will be in place when they are working away from the office? c) What security will be in place through the night? d) What security will be in place on weekends? Since Greg is concerned about computer security when they are working on their computers while away from the office, this would be a good opportunity to begin discussion on investing in a VPN.
  • 94. Module Ten: Critical Cyber Threats Critical cyber threats are those that if carried out, could have a debilitating effect on an organization or even a country. Cyber war takes place largely in secret, unknown to the general public on both sides. Noah Feldman
  • 99. Case Study Lucky’s Cleaners has been receiving harassing emails A local competitor says they will ruin Lucky’s Martha is concerned Martha sits down with Robert to discuss the problem
  • 100. Module Ten: Review Questions 1. According to the “Critical Cyber Threats” lesson, which of these is mentioned as a critical infrastructure? a) Energy. b) Defense. c) Transportation. d) All of the above. In addition to the above, the lesson mentions food and agriculture, emergency services, and communications. 2. Which of the following is NOT listed in “Critical Cyber Threats” as a type of critical infrastructure? a) Food and agriculture. b) Emergency services. c) Communications. d) None of the above. In addition to the above, the lesson mentions energy, defense, and transportation.
  • 101. Module Ten: Review Questions 3. In the white supremacist example of cyberterrorism, what state’s ISP was temporarily disabled? a) Oregon. b) Massachusetts. c) Alabama. d) New Mexico. In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise."
  • 102. Module Ten: Review Questions 4. In the Institute for Global Communications cyberterrorism example, protesters from what country bombarded the institute with thousands of bogus e-mails? a) Spain. b) France. c) Nigeria. d) China. In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services. They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group ETA, which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings."
  • 103. Module Ten: Review Questions 5. In the cyberwarfare examples, in 1998, the United States hacked into what country’s air defense system? a) North Korea. b) Russia. c) Serbia. d) Germany. In 1998, the United States hacked into Serbia's air defense system to compromise air traffic control and facilitate the bombing of Serbian targets. 6. In 2009, a cyber spy network called ______ accessed confidential information belonging to both governmental and private organizations. a) GhostNet. b) Internet Spy. c) CyberNet. d) Ghost Town. A cyber spy network called "GhostNet" accessed confidential information belonging to both governmental and private organizations in over 100 countries around the world.
  • 104. Module Ten: Review Questions 7. In one of the examples in the “Cyberespionage” lesson, an unnamed government official told the Wall Street Journal that cyber spies from which countries had broken into computer systems? a) Israel and Italy. b) Japan and India. c) Poland and Scotland. d) China and Russia. An unnamed government official told the Wall Street Journal that cyber spies from China and Russia had broken into computer systems used by companies maintaining the three North American electrical grids.
  • 105. Module Ten: Review Questions 8. Canadian researchers revealed in late March that a cyber-spy network based in what country had broken into diplomatic computer systems involving 103 different countries? a) China. b) Ireland. c) Turkey. d) Iraq. Canadian researchers revealed in late March that a cyber-spy network based in China had broken into diplomatic computer systems involving 103 different countries. Beijing denied any official involvement, but the investigation had begun when the Dalai Lama, Tibet's leader-in-exile, noticed that sensitive documents from his own PCs had turned up in Chinese hands. 9. In the case study, what’s the name of the business that is receiving threats? a) Larry’s Lube. b) Lucy’s Malt Shop. c) Lucky’s Cleaners. d) Linda’s Computer Repair. Lucky’s Cleaners is receiving threats from a competitor that they will destroy its business.
  • 106. Module Ten: Review Questions 10. What is Martha concerned about? a) That its competitor will bad mouth her business to prospective clients. b) That its competitor will bad mouth her business to prospective clients and try to disable its computer system. c) That its competitor will try to disable her business’ computer system. d) None of the above. Martha and Robert are discussing the possibility of the above because their company has been receiving email threats from their competitor.
  • 107. Module Eleven: Defense Against Hackers ”The best defense is a good offense”. Rather than reacting to attacks once they’ve occurred, a wise strategy is to prepare proactive measures, so that if the time comes, you can completely bypass the attack or lessen the blow of it. Cyber-attacks are not what makes the cool war 'cool.' As a strategic matter, they do not differ fundamentally from older tools of espionage and sabotage. Noah Feldman
  • 112. Case Study Frank and Joel are trying to prevent hackers Frank suggests considering encryption Joel says they need an intrusion detection system Both agree to research digital forensics and legal recourse
  • 113. Module Eleven: Review Questions 1. What is cryptography? a) Secret method of hearing. b) Secret method of speaking. c) Secret method of writing. d) Secret method of seeing. Cryptography is basically defined as a secret method of writing. This is done so that only authorized parties are able to interpret the message. 2. Which of these is NOT an encryption method mentioned in the “Cryptography” lesson? a) IDEA. b) YAR. c) AES. d) DES. Examples of encryption methods in the lesson include:  International Data Encryption Method (IDEA)  Advanced Encryption Standard (AES)  Data Encryption Standard (DES)
  • 114. Module Eleven: Review Questions 3. The “Digital Forensics” lesson says that whom collects and analyzes the data? a) Company CEO. b) Independent forensics specialists. c) Company employees. d) Law enforcement. In digital forensics, law enforcement collects and analyzes the data in such a way that it can be used in court against the perpetrator. 4. In the Sharon Lopatka example in “Digital Forensics” lesson, who was found to be the person who murdered her? a) Robert Glass. b) Lisa Billingsley. c) John Smith. d) Renee Porter. Hundreds of emails on Lopatka's computer lead investigators to her killer, Robert Glass.
  • 115. Module Eleven: Review Questions 5. What is NOT a question that the “Intrusion Detection” lesson states that one must ask before investing in an IDS? a) What does our business need in an IDS? b) Does state law allow our business to have an IDS? c) Can we afford an IDS? d) Will our network support the IDS system? The lesson mentions these questions:  What does our business need in an IDS?  Will our network support the IDS system?  Can we afford an IDS?  What do we do if something goes wrong with the IDS?  As our business grows, we can still use this IDS?
  • 116. Module Eleven: Review Questions 6. Which of these companies is mentioned as a manufacturer of IDSs? a) Dakota Alert, Inc. b) Juniper Networks. c) Linear, LLC. d) All of the above. In addition to the above, the lesson states PureTech Systems, Inc. and Telguard are manufacturers of IDSs. 7. The majority of computer hacking crimes are punishable under: a) Computer Fraud and Abuse Act. b) Civil Rights Act. c) National Security Act. d) Workforce Investment Act. The majority of computer hacking crimes are punishable under the Computer Fraud and Abuse Act (18 U.S.C. §1030). There may be additional penalties under state law.
  • 117. Module Eleven: Review Questions 8. The “Legal Recourse” lesson states there are penalties for committing the following offenses involving computer: a) Trafficking in Passwords. b) Accessing a Computer to Defraud & Obtain Value. c) Recklessly Damaging by Intentional Access. d) All of the above. There are penalties for committing the following offenses involving the computer:  Obtaining National Security Information  Accessing a Computer and Obtaining Information  Trespassing in a Government Computer  Accessing a Computer to Defraud & Obtain Value  Intentionally Damaging by Knowing Transmission  Recklessly Damaging by Intentional Access  Negligently Causing Damage & Loss by Intentional Access  Trafficking in Passwords  Extortion Involving Computers
  • 118. Module Eleven: Review Questions 9. What method of defense does Frank say they should consider? a) VPN. b) Anti-Virus software. c) Encryption. d) Anti-Spyware software. Since their bank holds a lot of private information, an encryption service that only allows employees to interpret data would be helpful. 10. What do intrusion detection systems do? a) Notify the intruder that he/she will be arrested. b) Notify the company of suspicious activity. c) Notify the company that an intrusion report has been sent to the federal government. d) Notify the intruder that the company is aware of his/her presence and will be fining them. Intrusion detection systems do as their name states. They locate cases of the system being accessed by someone who does not have the authority to do so or an unauthorized program being installed. It then informs the administrator or a security information and event management system of the activity.
  • 119. Module Twelve: Wrapping Up Although this workshop is coming to a close, we hope that your journey to learning about Cybersecurity is just beginning. Please take a moment to review and update your action plan. This will be a key tool to guide your progress in the days, weeks, months, and years to come. We wish you the best of luck on the rest of your travels! People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy Mexican food, weapons of mass destruction, and cyber-attacks. Dutch Ruppersberger
  • 120. Words from the Wise Frank Abagnale: • The police can't protect consumers. People need to be more aware and educated about identity theft. You need to be a little bit wiser, a little bit smarter and there's nothing wrong with being skeptical. We live in a time when if you make it easy for someone to steal from you, someone will Janet Reno • Everybody should want to make sure that we have the cyber tools necessary to investigate cyber-crimes, and to be prepared to defend against them and to bring people to justice who commit it.