1.2 Types of Cybersecurity Threats:
Cybersecurity threats come in different forms and can cause severe harm to individuals, organizations, and even governments. Here are some of the most common types of cybersecurity threats:
What is malware?
Which type of social engineering technique uses fraudulent emails or websites?
What are insider threats
What is a denial-of-service (DoS) attack?
What is a denial-of-service (DoS) attack?
Which of the following are types of malware? (Select all that apply)
Which of the following is a social engineering attack that involves creating a sense of urgency or panic to trick someone into divulging sensitive information or performing an action?
What are insider threats? (Select all that apply)
What are advanced persistent threats (APTs)?
Which of the following is a type of denial-of-service (DoS) attack? (Select all that apply)
______ is a type of malware that can spread by attaching itself to files and programs.
viruses______ is a social engineering attack that involves tricking someone into divulging sensitive information or performing an action by creating a sense of urgency or panic.
scarewareInsider threats can be intentional or unintentional actions by ______ , contractors, or partners that compromise the confidentiality, integrity, or availability of an organization's information.
employeessophisticated______ is a type of denial-of-service (DoS) attack that floods a network with a high volume of traffic to cause it to crash.
floodingSort the following types of cybersecurity threats in order of severity, from most severe to least severe:
Malware
Social engineering
Insider threatsArrange the different types of malware in order of the level of damage they can cause, from most damaging to least damaging:
Worms
Ransomware
Trojans
VirusesWhich type of social engineering technique involves the use of fraudulent emails or websites to trick people into giving away sensitive information?
Phishing
Baiting
PretextingWhat are insider threats in cybersecurity?
Cybersecurity threats that originate from outside an organization
Cybersecurity threats that originate from within an organization
Cybersecurity threats caused by natural disastersWhat is the primary goal of cybersecurity?
To protect against all types of cyber attacks
To protect the confidentiality, integrity, and availability of data
To ensure that no one can access a computer system without permission
Match the type of cybersecurity threat with its definition:
A type of cyber threat that tricks victims into giving away sensitive information ➢Malware
A type of cyber threat that involves malicious software that can harm computer systems ➢ Social engineering
A type of cyber threat that involves an attack by a hacker who gains access to a network and remains undetected for a long period of time ➢ Insider threats
A type of cyber threat that comes from within an organization, often by an employee who has authorized access to company data ➢ Advanced persistent threats
A type of cyber threat that floods a network with traffic to make it unusable ➢ Denial-of-service attacks Match the following types of malware with their definitions:
A type of malware that is designed to replicate itself and spread from computer to computer ➢ Viruses
A type of malware that is disguised as legitimate software, but is designed to steal information or harm computer systems ➢ Trojans
A type of malware that is designed to spread quickly through a network, often causing damage as it goes ➢ Worms
A type of malware that locks a user out of their computer or files until a ransom is paid ➢ Ransomware
Match the following social engineering attacks with their definitions:
A type of social engineering attack that involves sending emails or messages that appear to be from a legitimate source in order to trick victims into revealing sensitive information ➢ Phishing
A type of social engineering attack that involves leaving a bait, such as a USB drive, in a public place in order to entice someone to pick it up and plug it into their computer ➢ Baiting
A type of social engineering attack that involves creating a fake scenario or persona in order to trick victims into revealing sensitive information ➢ Pretexting Match the following insider threats with their definitions:
An insider threat that involves stealing sensitive data from an organization and using it for personal gain ➢ Data theft
An insider threat that involves intentionally damaging or disrupting an organization's systems or operations ➢ Sabotage
An insider threat that involves unintentionally causing harm or damage to an organization's systems or operations ➢ NegligenceMatch the following denial-of-service attacks with their definitions:
A type of DoS attack that floods a network with traffic in order to make it unusable ➢ Network-based attacks
A type of DoS attack that targets specific applications or services in order to make them unavailable ➢ Application-based attacks
A type of DoS attack that involves using multiple sources to flood a network with traffic ➢ Distributed attacks Fill in the blank:
{viruses} is a type of malware that can spread by attaching itself to files and programs.
Fill in the blank:
{scareware} is a social engineering attack that involves tricking someone into divulging sensitive information or performing an action by creating a sense of urgency or panic.
Fill in the blank:
Insider threats can be intentional or unintentional actions by {employees}, contractors, or partners that compromise the confidentiality, integrity, or availability of an organization's information.
Fill in the blank:
Fill in the blank:
{flooding} is a type of denial-of-service (DoS) attack that floods a network with a high volume of traffic to cause it to crash.
Have you ever fallen victim to a phishing attack?
How often do you update your anti-virus software?
Have you ever witnessed an insider threat in your workplace?
Have you or anyone you know been a victim of ransomware?
How familiar are you with denial-of-service (DoS) attacks? (Very Familiar/Somewhat Familiar/Not Familiar At All)