Let's check about your cyber security knowledge General awareness Welcome to your Genaral awareness 1. What is the primary goal of data protection? A) Data sharing B) Data privacy C) Data collection 2. How can individuals protect their personal data online? A) Using weak passwords B) Avoiding two-factor authentication C) Keeping software up-to-date 3. What is personally identifiable information (PII)? A) Public Information Index B) Personal Identification Identifier C) Personally identifiable information 4. What is the first step individuals should take to enhance their data privacy? A) Share passwords B) Create strong, unique passwords C) Disable two-factor authentication 5. Why should individuals be cautious about oversharing personal information on public Wi-Fi networks? A) Public Wi-Fi is always secure B) Public Wi-Fi networks lack security measures C) Public Wi-Fi is private Time's upTime is Up! Phishing Welcome to your phishing 1. What is phishing? A) Fishing B) A cyber attack method C) A type of social media 2. How can individuals recognize a phishing email? By its colour By checking the sender's email address and looking for warning signs By the font size 3. What is the primary goal of a phishing attack? A) To promote a product B) To trick individuals into revealing sensitive information C) To spread awareness about cyber-security 4. How does spear phishing differ from regular phishing? A) Spear phishing is more targeted, customized for specific individuals B) Regular phishing uses physical bait C) Spear phishing is a type of fishing 5. What should individuals do if they receive an unexpected email attachment? A) Open it immediately B) Forward it to colleagues C) Avoid opening unexpected email attachments, especially from unknown sources Time's upTime is Up! phone-based attack Welcome to your phone-based attack 1. What does a virtual private network (VPN) do for mobile devices? A) Enhances battery life B) Encrypts internet connections C) Increases data storage capacity 2. Why is regularly backing up data on a mobile device important? A) Improves device performance B) Enhances network speed C) Allows for data recovery in case of compromise 3. What is the primary purpose of two-factor authentication (2FA) on mobile devices? A) Increases screen brightness B) Adds an extra layer of security C) Speeds up internet connectivity 4. How can users protect their data from shoulder surfing attacks in public spaces? A) Use public Wi-Fi networks B) Shield the screen when entering sensitive information C) Share passwords with nearby individuals 5. What is the primary purpose of locking and password-protecting mobile devices? A) Enhances device aesthetics B) Adds an additional layer of security C) Reduces battery consumption Time's upTime is Up! Impersonation and Pretexting Welcome to your impersonation and pretexting 1. What is the primary goal of impersonation in cyber-security? A) Gaining authorized access B) Encrypting data C) Gaining unauthorized access 2. Which type of information is commonly targeted in impersonation attacks? A) Publicly available information B) Sensitive personal and financial data C) Random data points 3. Why is role-based access control crucial for data protection against impersonation? A) Increases data exposure B) Minimizes the impact of attacks C) Slows down data access 4. What is the purpose of regularly updating and patching software in data protection? A) Enhances system performance B) Encrypts data automatically C) Addresses known vulnerabilities 5. How does incident response planning contribute to data protection against pretexting? A) Accelerates data access B) Mitigates the impact of breaches promptly C) Increases data exposure Time's upTime is Up! Online and Offline Safety Welcome to your Online and Offline Safety 1. How can individuals protect their personal information during online transactions? A. Share sensitive information freely B. Use secure and reputable websites C. Disable two-factor authentication 2. What is the role of geotagging in compromising offline safety? A. Enhances physical security B. Ensures privacy in online transactions C. Reveals the location of photos and posts 3. Why is it crucial to review and understand the privacy policies of online platforms? To create strong passwords To understand how user data is handled To enable multi-factor authentication 4. What role does encryption play in ensuring the confidentiality of online communication? A. Scrambles data, making it unreadable to unauthorized users B. Enhances internet speed C. Allows access to data without authentication 5. What should individuals do if they suspect they have fallen victim to identity theft? A. Ignore the incident B. Report to relevant authorities C. Share the information on social media Time's upTime is Up! social media trends Welcome to your social media trends 1. What is social engineering? A: Manipulation of computer systems B: Manipulation of individuals for information C: A type of encryption 2. How do attackers use pretexting in social engineering attacks? A: Sending fake emails B: Creating a fabricated scenario to obtain information C: Only impersonating high-profile individuals 3. How is AI integrated into social engineering attacks? A: Analyzing coffee preferences B: Enhancing sophistication and effectiveness C: Only in voice-based attacks 4. Q: How have social engineering tactics adapted during the COVID-19 pandemic? A: Decreased in frequency B: Focused exclusively on email attacks C: Exploited pandemic-related fears through various channels 5. Q: What is the importance of user awareness in preventing social engineering attacks? A: Increasing internet speed B: Recognizing and resisting social engineering attempts C: Developing new software Time's upTime is Up! Recognising Manipulative Tactics Welcome to your Educating others 1. 1. Why is educating others on data protection important in the digital age? A. To create strong passwords B. To empower individuals with the knowledge to safeguard personal information C. To enhance internet speed 2. How does knowledge about data protection empower individuals? A. By encouraging reckless online behaviour B. By fostering a sense of digital citizenship C. By minimizing the importance of privacy 3. What role does education play in building a culture of responsibility regarding data protection? A. Encouraging negligence B. Fostering accountability and responsibility C. Promoting data hoarding 4. How can understanding the risks associated with online activities positively impact individual habits? A. By encouraging risky behaviours B. By discouraging critical thinking C. By leading to improved personal digital security 5. In what ways does educating others contribute to mitigating cyber-security threats? A. By making individuals more susceptible to cyber threats B. By reducing the success rate of cyber-security threats C. By promoting cyber-criminal activities Time's upTime is Up! Educating others Welcome to your Reducing Vulnerabilities 1. How does encryption contribute to data protection? A) By organizing data B) By converting data into an unreadable format C) By compressing data 2. What does the principle of least privilege aim to achieve in access control? A) Maximize user privileges B) Limit user access rights to the minimum necessary C) Grant unrestricted access to all users 3. What is the purpose of regular backups in reducing vulnerabilities? A) To create duplicates for easy access B) To recover data in the event of a breach C) To speed up system processes 4. How does the zero-trust security model approach user access? A) Trusting every user by default B) Requiring verification for every access attempt C) Granting access without authentication 5. What is the role of SIEM systems in vulnerability reduction? A) Analyzing market trends B) Collecting and analyzing security data C) Developing software applications Time's upTime is Up! Reducing Vulnerabilities Welcome to your Recognising Manipulative Tactics 1. What is the primary purpose of social engineering in the context of manipulative tactics? A) Enhancing network security B) Manipulating individuals for personal gain C) Automating cyber-attacks 2. Manipulating individuals for personal gain How do phishing attacks typically operate? A) Encrypting files for ransom B) Manipulating user behaviour with AI C) Using deceptive emails or messages 3. What is the term for malicious software that compromises data integrity? A) Firewall B) Ransomware C) Social engineering 4. What is a common sign of a potential social engineering attack in a workplace setting? A) Regular security audits B) Unusual requests for sensitive information C) Two-factor authentication 5. How can organizations mitigate the risk of phishing attacks? A) Regular security audits B) Employee training and multi-factor authentication C) Using AI-powered tools Time's upTime is Up!