Cyber Security Awareness
1. Untitled Scene
1.1 Front Page
1.2 Why Cyber Security Is Crucial For Staff At Work, At Home And On The
Move
1.3 Cyber Security – did you know?
1.4 Cyber Security - did you know?
1.5 Cyber Security - did you know?
1.6 How To Protect Data
1.7 How To Protect Data
1.8 How To Protect Data
1.9 How To Protect Data
1.10 Data Threat: Phishing
1.11 Phishing Attack - did you know?
1.12 Phishing Attack: Example
1.13 Phishing Attack: Example
1.14 Tips To Avoid Phishing Attacks
1.15 Tips To Avoid Phishing Attacks
1.16 Data Threat: Malware
1.17 Malware
1.18 Malware - did you know?
1.19 Malware - did you know?
1.20 How do computers get infected?
1.21 Tips To Avoid Malware
1.22 Data Threat: Social Engineering
1.23 Social Engineering
1.24 Tips To Avoid Social Engineering
1.25 Internet Protection: Search Engines
1.26 Internet Protection: HTTPS
1.27 Internet Protection: Public Wi-Fi
1.28 Internet Protection: Spam Emails
1.29 Internet Protection: Attachments
1.30 The highest Root Data Breaches are caused by:
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
X
Malicious
Process Failure
Human Error
Feedback when correct:
That's right! 48% Data Breaches are caused by Malicious
Feedback when incorrect:
You did not select the correct response.
1.31 You stumble upon a USB stick on the floor, what do you do?
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
Pick it up and plug it in to try and find of whom it belongs to, so you can return it
Leave it where it is, It's not your problem
X
Hand it to Computer Services to check for any malicious content
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.32 Highest form of malicious data breaches is done through:
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
Hacking
X
Malware
Social Engineering
Feedback when correct:
That's right! 59% of all total malicious data breaches
Feedback when incorrect:
You did not select the correct response.
1.33 An example of a secure password is?
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
abcd1234
Password123
X
BlackBurn619302!
Feedback when correct:
That's right! Upper/Lower case letters mixing with other characters
Feedback when incorrect:
You did not select the correct response.
1.34 You think you might have inadvertently given away your login details
and someone might have access to your account what should you do
next?
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
Wait and see if anything happens then tel someone if it does
You’re probably mistaken and nothing to worry about.
X
Immediately change your password and inform Computer Services
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.35 Which of these are types of ‘Phishing’ emails:
(Multiple Response, 10 points, 1 attempt permitted)
Correct
Choice
X
Claiming you have won the lottery with a Web link
X
Your bank account has been compromised so they require your details
X
Gained access to your data, asking for ransom payment
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.36 You receive an email from HMRC with an attachment saying you
have a refund, which of the options below should you NOT do?
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
X
Open the attachment to see how much it is
Delete the email
Contact Computer Services to seek advice
Feedback when correct:
That's right! Do NOT open it
Feedback when incorrect:
You did not select the correct response.
1.37 You’ve received an email from Microsoft explaining that your
password is out of date and you must set a new one. The link within the
email will guide you through it. Your next step is?
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
Follow the link and reset your password
Reset your password manually
X
Ignore the email and delete it
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.38 What does the https:// at the beginning of a URL denote, as opposed
to “http://” (without the ‘s’)?
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
The site is not accessible to certain computers
X
The information entered into the site is encrypted
The site is the latest version available
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.39 When browsing online, a new window pops up stating that a virus
has been found on your computer. The window provides a button to click
offering to resolve the issue. Your best course of actions is to:
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
Click on the button to remove the virus
Place your cursor over the button and check the link’s website address (URL). If
the address looks legitimate, click on it.
X
Close both the original browser window and the new “pop-up” window. Do not
return to that site again
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.40 If a public Wi-Fi network (such as in an airport or a hotel) requires a
password to access, is it general y safe to use that network for sensitive
activities such as online banking?
(Multiple Choice, 10 points, 1 attempt permitted)
Correct
Choice
X
No, treat all public Wi-Fi networks as insecure
Yes, as it required a password it must be safe to use it
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.41 Which of these should you NOT do?
(Multiple Response, 10 points, 1 attempt permitted)
Correct
Choice
X
Open attachments or links in an email from an unknown sender
X
Plug in an unknown USB drive to see what is on it
X
Pass on login Id’s/Password to someone else
Feedback when correct:
That's right! You selected the correct response.
Feedback when incorrect:
You did not select the correct response.
1.42 Results Slide
(Results Slide, 0 points, 1 attempt permitted)
Results for
1.30 The highest Root Data Breaches are caused by:
1.31 You stumble upon a USB stick on the floor, what do you do?
1.32 Highest form of malicious data breaches is done through:
1.33 An example of a secure password is?
1.34 You think you might have inadvertently given away your login details and someone might
have access to your account what should you do next?
1.35 Which of these are types of ‘Phishing’ emails:
1.36 You receive an email from HMRC with an attachment saying you have a refund, which of
the options below should you NOT do?
1.37 You’ve received an email from Microsoft explaining that your password is out of date and
you must set a new one. The link within the email wil guide you through it. Your next step is?
1.38 What does the https:// at the beginning of a URL denote, as opposed to “http://” (without
the ‘s’)?
1.39 When browsing online, a new window pops up stating that a virus has been found on your
computer. The window provides a button to click offering to resolve the issue. Your best course
of actions is to:
1.40 If a public Wi-Fi network (such as in an airport or a hotel) requires a password to access, is
it generally safe to use that network for sensitive activities such as online banking?
1.41 Which of these should you NOT do?
Result slide properties
Passing Score
80%
Document Outline