Professional Documents
Culture Documents
Cybersecurity Proficiency Improvement Training
Cybersecurity Proficiency Improvement Training
your data
- An activity, deliberate or unintentional, with the potential for causing harm to unautomated
information system or activity.
"A cyber threat or cybersecurity threat is a malicious act intended to steal or damage data or disrupt the
digital wellbeing and stability of an individual."
Malware
Denial-of-Service (DOS)
Phishing
Spoofing
Identity-Based Attacks
Code Injection Attacks
Supply Chain Attacks
Insider Threats
Social Engineering
Eavesdropping
MALWARE
- Software or firmware intended to perform an unauthorized process that will have adverse
impact on the confidentiality, integrity, or availability of an information system. A virus, worm,
Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware
are also examples
Types of Malware
Virus
Worms
Rootkits
Spyware
Adware
Trojans
Ransomware
PHISHING
A technique for attempting to acquire sensitive data, such as bank account number through a fraudulent
solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or
reputable person.
Phishing Email
Spear Phishing
Whaling
Pharming
SMS Phishing (Smishing)
Voice Phishing (Vishing)
QR Phishing (Quishing)
CEO Fraud
Clone Phishing
Evil Twin Phishing
Social Media Phishing
Privileged Information
TRADE SECRETS
(a) can be used to identify the PII principal to whom such information relates, or
Name
Personal Identification Numbers
Address
Biometric Data
Pictures
Email
In-person
Smartphone
Social Networking
Landline
Phishing
Pretexting
Baiting
Quid pro quo
Tailgating
Passwords
Credit Card Numbers
Bank Account Information
Documents
Messages and Call Records
Contacts
Access to a system
Our Defenses
Limit
Verify
Report
A Secured Website
A Secured Website
Typosquatting
www.google.com
www.goggle.com
www.foogle.com
www.facebook.com
facebok.com
fcebook.com
Spoofed Sites
- These sites are designed to look like a real, familiar site to phish your data.
Typosquatting
- These sites are built on deliberately misspelled or similar URLs and can host malware.
-
Is It Related to the Site You're On? If not, close the pop-up and get off of the site.
Is It Requesting Financial or Personal Information? If so, close it and avoid the site in the future
Is It Telling You There's Something Wrong With Your Computer or Phone? Scareware tries to
trick you into downloading potentially harmful software to your device.
Password hygiene
Try passphrases
Steer clear of password reuse
Employ password managers
Review cycle frequency
Use MFA every- where possible
Cultivate security awareness.