Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Security Theory

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Student Name: ___________________________________________

Activity 1:

Instructions: Match each key term on the left with the definition on the right that best describes it.

Key Term Matching


1. Data Breach information is taken from a system without the
a. Cybercrime
knowledge or authorization of the owner.
b. Malware
2. Cyber Hygiene The steps that users of computers and other
c. Vulnerability devices can take to improve their online security and
maintain system health.
d. Cyber
Hygiene 3. Vulnerability A weakness in a software program that allows
malware to infect your PC (Personal Computer).
e. Data
Breaches 4. Phishing is pretending to be a reliable company and sending
emails to get individuals to reveal personal information (i.e.:
f. Phishing
(Fraud) passwords and credit card numbers)
5. Cyber Security consists of technologies, processes, and
g. Cyber
Hygiene controls designed to protect a system, networks, network,
devices, and data from cyber-attacks.
h. Multi-Factor 6. Cyber Hygiene a set of everyday practices for ensuring the
Authentication
safe handling of critical data and for securing networks.
(MFA)
7. Multi-Factor Authentication An extra layer of security by
i. Cyber
requiring users to provide additional forms of verification to
Security
access their accounts or systems, such as a password and a
one-time verification code sent to their mobile device.
8. Cybercrime Any criminal activity that involves a computer,
network device, or a network.
9. Malware is software that is specifically designed to disrupt,
damage, or gain unauthorized access to a computer system.

Activity 2:

1
Student Name: ___________________________________________
Instructions: Highlight T if the statement is true, F if the statement is false, or write the best answer
in the space provided.

1. Malware only affects computers and does not infect other devices such as smartphones and
tablets. T F

2. Vulnerabilities in software are often discovered and fixed by developers through software updates
and patches. T F

3. Cyber hygiene practices include regularly updating antivirus software and running system scans.
TF

4. Malware can only enter a computer system through email attachments or downloaded files. T F

5. Cyber hygiene practices include using strong and unique passwords for different online accounts.
TF

6. Software vulnerabilities are always the result of intentional design errors or carelessness on the
part of developers. T F

7. Malware hides in the form of real software or files to trick users into installing or opening them. T F

8. Hackers can use software vulnerabilities to gain unauthorized access to private information. T F

9. Malware infections are always instantly detectable and cause obvious system errors and crashes.
TF

10. Phishing is a legitimate way used by companies to gather customer information. T F

11. Phishing attacks can be conducted through email, phone calls, and text messages. T F

12. Data breaches are always caused by external hackers and never by insiders. T F

13. Data breaches can only happen in large organizations and never affect usual people. T F

14. Phishing messages can appear to come from well-known organizations by using their logos and
trademarks to trick recipients. T F

15. Phish messages are always easy to notice because of spelling and grammar mistakes. F

16. By organizing sensitive information, you may prevent unauthorized access to data. T F

17. Protecting data against security attacks is not necessary, as this is the responsibility of the internet
service provider. T F
18. Maintaining cyber hygiene involves updating your security software on a regular basis. T F

19. It is unnecessary to update your software and delete unused programs. T F

2
Student Name: ___________________________________________
20. Sensitive data encryption is not a need for protecting cybersecurity. T F

21. Your privacy and security are improved when you restrict data sharing in the apps you use. T F

22. Regular file backup is not necessary and can be skipped. T F

23. Cybersecurity involves implementing processes and policies, not just hardware and software
solutions. T F

24. Regular employee training and awareness programs are not essential to maintaining strong cyber
security. T F

25. Cybersecurity is the responsibility of IT departments and does not require the participation of all
employees. T F

Activity 3:

Instructions: Match each form of Multi-Factor Authentication (MFA) with its correct description from
the list below.

List of Descriptions:

1. The use of a device or mobile application to generate a unique password that can only be used
once for the verification process.

2. The user must provide answers to predefined questions during the sign-in process.

3. The user must use a physical device (smartcard or USB stick) for identity verification.

4. Sends verification codes to a user's mobile phone via SMS for confirmation.

5. Sends a message to the user's mobile phone for allowing or denying access.

6. Uses voice characteristics, facial recognition, or fingerprint as a verification method.

a. Biometric authentication (6) b. SMS-based verification codes ( 4 )

c. Physical security key (3) d. Push notifications (5)

e. Security questions (2) f. One-time password generator (1)

3
Student Name: ___________________________________________

Activity 4:

Instructions: Fill in the blank with the correct term from the below list:
(A) Data Breach (B) Man-in-the-middle (C) Brute Force (D) Encrypted (E) Access (F) Security
Flaws (G) Auditing (H) Insider threats (I) Adobe Flash (J) Plug-ins (K) Ransomware (L) Denial-
of-Service (M) Guess (N) Lose (O) Hacking (P) Malware (Q) Web App Attacks (R) Support

1. The Hacking is unauthorized access to, or control over, computer network security systems for
some
illegal purpose.
2. The Denial-of-Service is an attack meant to shut down a machine or network, flood the targeted
website with traffic or sending information that triggers a crash. This will prevent real users from
being able to access the website.
3. The Data Breach happens when information is taken from the company database and they either
doesn’t know that it happened or didn’t allow it to happen. This might involve stealing customer
information, trade secrets, etc.
4. The Web App Attacks is an attack that target vulnerabilities in web applications. Attackers exploit
weaknesses in the software to gain unauthorized access, steal data, or disrupt the application's
functioning.
5. The Ransomware is malware that employs encryption to hold a victim’s information at ransom. A
user or organization’s critical data is encrypted so that they cannot access files, databases, or
applications. Money is demanded to provide access.
6. A Brute Force attack is when a hacker uses special software to guess your password and then is
able to access the system. A hacker can try 2.18 trillion password/username combinations in 22
seconds.
7. The use of Adobe Flash on your website can lead to potential problems.
8. Adobe Flash has a long history of Security Flaws malware, and bugs.
9. Due to its security vulnerabilities, most systems no longer Support Adobe Flash.
10. Plug-ins are additional software components that can be added to existing apps or web browsers
to support extra functions.
11. Plug-ins can cause security holes in systems. If a plug-in has a vulnerability, attackers can use it
to gain unauthorized access, spread Malware, or perform damaging activities.
12. Faulty passwords can lead to unauthorized access of your accounts.

4
Student Name: ___________________________________________
13. Hackers can use special software to Guess your password and then are able to access the
system.
14. Lose can occur when employees accidentally change or delete sensitive information.
15. One form of insider threat is when employees insider threats data by mistake.
16. Regular Auditing and monitoring of employee activities can help detect and prevent insider
threats.
17. HTTPS adds security because it prevents Man-in-the-middle attacks
18. When using HTTPS, the data sent back and forth between the user and the website is encrypted
to protect it from others who may try to listen or change it.
Activity 5:

Instructions: Write each of the following acronyms stand for

1. MFA: Multi-factor authentication


2. DDOS: Distributed denial of service
3. OTP: one time password
4. 2FA: two-factor authentication
5. HTTPS: Hypertext transfer protocol secure
6. AV: Audiovisual
7. PII: phase-locked loop
8. SSL: secure sockets layer

You might also like