10 Cyber Security Awareness Month questions to ask your friends - F-Secure Blog (2022)

When the first Cyber Security Awareness Month was observed in October of 2004, there was no Instagram, no iPhone, no Alexa. The move toward mass digitalization had already begun well before the Y2K freak-out, but the energy, manufacturing and financial sectors were not nearly as dependent on the security of their networks as they are now.

Today, if you hear a bank has been robbed, it’s likely that it was done by criminals on another continent, perhaps backed by a nation-state, than by masked robbers fleeing in a getaway car.

Be your own cyber security advisor

In the new normal, we all have to possess some basic cyber security expertise to operate like normal human beings. And that’s the point of Cyber Security Awareness Month.

In the US, the advice users are given is framed through the slogan “Own IT. Secure IT. Protect IT.” European Cyber Security Month centers the premise “Cyber security is a Shared Responsibility” around the theme of “ Stop | Think | Connect”.

Ideally, these activities focus us on the basics of cyber security as we begin the time when digital transactions peak for the year, from Singles Day on November 11—the biggest online sales day of the year—until New Year’s Day.

If you want to know how ready you are, you can try out European Cyber Security Month’s Network and Information Security quiz. Or give our Digital Life Test a try.

Test your friends, colleagues, and family

Want to test the cyber security basics of the people in your life?

Here are 10 quick questions that will help them know if they’re ready to face the digital rush of the shopping season securely.

(Video) What's Your Password?

1. What does the “https://” at the beginning of a URL denote, as opposed to “http://” (without the “s”)?
A. That the site has special high definition
B. That information entered into the site is encrypted
C. That the site is the newest version available
D. That the site is not accessible to certain computers
E. None of the above

2. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
C. Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
D. All of the above

3. A group of computers that is networked together and used by hackers to steal information is called a …
A. Botnet
B. Rootkit
C. DDoS
D. Operating system
E. Don’t know

4. Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?

A.
10 Cyber Security Awareness Month questions to ask your friends - F-Secure Blog (1)

B.
10 Cyber Security Awareness Month questions to ask your friends - F-Secure Blog (2)
C.
10 Cyber Security Awareness Month questions to ask your friends - F-Secure Blog (3)

D. None of these

5. Which of the following four passwords is the most secure?
A. Boat123
B. WTh!5Z
C. into*48
D. 123456

(Video) Cyber Security Awareness Training For Employees (FULL Version)

6. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
A. Botnet
B. Ransomware
C. Driving
D. Spam
E. None of the above

7. “Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser.

Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?
A. Yes
B. No

8. Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.
A. True
B. False

9. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?
A. Yes, it is safe
B. No, it is not safe

10. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
A. Use of insecure Wi-Fi networks
B. Key-logging
C. De-anonymization by network operators
D. Phishing attacks

Here are the answers

1. What does the “https://” at the beginning of a URL denote, as opposed to “http://” (without the “s”)?
B. That information entered into the site is encrypted

But seeing that “s” in “https://” doesn’t mean your information is secured. Here are 5 ways to know if a website is secure.

(Video) 3 Tips for Simple Security in a Complex World | What the Cyber?

2. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
C. Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
D. All of the above

Yes, all of them. You can even be phished over the phone. Here’s how to avoid these scams.

3. A group of computers that is networked together and used by hackers to steal information is called a …
A. Botnet

Use our Online Scanner to check if your PC has been turned into a zombie participant in a botnet.

4. Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?
A.
10 Cyber Security Awareness Month questions to ask your friends - F-Secure Blog (4)

A. is the right answer. You can use email, and then SMS as your second step for authentication. But our experts recommend you use an app like Google’s Authenticator, which is less likely to be compromised, if you can.

5. Which of the following four passwords is the most secure?
B. WTh!5Z

Any password that includes 123 or any word from a dictionary is terrible. In fact, any password you can remember is terrible. And no matter how good your password is, if you use on more than one account, it is terrible. Use a password manager to avoid terrible passwords.

(Video) Information Security Thought Leader Panel - Cyber Security Awareness Month - Curricula Webinar

6. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
B. Ransomware

Here’s how you can avoid being extorted by malware.

7. “Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?
B. No

If you want to hide your activity from your service provider, consider a VPN.

8. Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.
B. False

If it were only that easy. A 2018 Princeton study found that a device’s time zone and information from its sensors can be combined with public information like maps to estimate your location, even without GPS data.

9. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?
B. No, it is not safe

When you are on a public network, your device and traffic are vulnerable to anyone who is in the same hotspot or the hotspot owner.

(Video) 058| Paths to Infosec: From ER to IR

10. What kind of cyber security risks can be minimized by using a Virtual Private Network (VPN)?
A. Use of insecure Wi-Fi networks

Some VPNs—like our FREEDOME—can also protect you from bad websites that serve up phishing scams.

FAQs

What are 5 things you should know about cyber security? ›

5 Cybersecurity Tips Everyone Should Know
  • Keep your software up to date. You might get impatient waiting for a software update to finish on your phone or laptop, but it's worth your time. ...
  • Create strong passwords. ...
  • Backup your data regularly. ...
  • Use antivirus software. ...
  • Use public Wi-Fi with caution.

What are the 6 tips of cyber security awareness? ›

The Top 10 Personal Cyber Security Tips
  • Keep Your Software Up to Date. ...
  • Use Anti-Virus Protection & Firewall. ...
  • Use Strong Passwords & Use a Password Management Tool. ...
  • Use Two-Factor or Multi-Factor Authentication. ...
  • Learn about Phishing Scams – be very suspicious of emails, phone calls, and flyers.

How do you promote cyber security awareness in community? ›

How to Promote Employee Cyber Awareness
  1. Gain Executive Buy-In. As with any organization-wide initiative, a successful awareness program begins at the top. ...
  2. Make Cybersecurity Everyone's Role. ...
  3. Understand the Threats Your Business Faces. ...
  4. Coach Mindfulness. ...
  5. Offer Incentives. ...
  6. Remember That Cyber Awareness Is a Journey.

What are the biggest cybersecurity threats right now? ›

Those risks potentially include data theft, malware attacks, ransomware and even nation-state backed cyber espionage. But one of the most significant cybersecurity threats is also one of the most simple attacks that cyber criminals can carry out: phishing .

Why is cyber security important? ›

Cybersecurity is crucial because it safeguards all types of data against theft and loss. Sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and government and business information systems are all included.

What are the 7 types of cyber security? ›

The Different Types of Cybersecurity
  • Network Security. Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. ...
  • Cloud Security. ...
  • Endpoint Security. ...
  • Mobile Security. ...
  • IoT Security. ...
  • Application Security. ...
  • Zero Trust.

What are the 5 types of cyber security? ›

Cybersecurity can be categorized into five distinct types:
  • Critical infrastructure security.
  • Application security.
  • Network security.
  • Cloud security.
  • Internet of Things (IoT) security.

What are the 10 recommended tips for cyber security? ›

Top 11 tips for cyber security
  • Back up your data. ...
  • Keep your devices and your apps up-to-date. ...
  • Choose unique passwords. ...
  • Turn on two-factor authentication. ...
  • Be creative with the answers to your account recovery questions. ...
  • Avoid sensitive transactions on free wifi. ...
  • Install an antivirus and scan for viruses regularly.

What are 10 good cybersecurity practices? ›

Top Cybersecurity Tips in 2022
  • Keep software up-to-date. ...
  • Avoid opening suspicious emails. ...
  • Keep hardware up-to-date. ...
  • Use a secure file-sharing solution to encrypt data. ...
  • Use anti-virus and anti-malware. ...
  • Use a VPN to privatize your connections. ...
  • Check links before you click. ...
  • Don't be lazy with your passwords!

What are 3 safety tips for computer security? ›

Tips to protect your computer
  • Use a firewall. ...
  • Keep all software up to date. ...
  • Use antivirus software and keep it current. ...
  • Make sure your passwords are well-chosen and protected. ...
  • Don't open suspicious attachments or click unusual links in messages. ...
  • Browse the web safely. ...
  • Stay away from pirated material.

How important is cybersecurity awareness to our daily lives? ›

Cybersecurity is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems.

What is Cyber Security Awareness for students? ›

Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior.

What is the# 1 cybersecurity threat today? ›

1) Phishing Attacks

The biggest, most damaging and most widespread threat facing small businesses are phishing attacks. Phishing accounts for 90% of all breaches that organizations face, they've grown 65% over the last year, and they account for over $12 billion in business losses.

What are the Top 5 cyber attacks? ›

6. What are the top 5 Cyber Attacks? Businesses' most challenging cyber attacks are phishing attacks, ransomware, malware attacks, insider threats, and weak passwords.

Why is security important in life? ›

Safety and security represent many things, including a stable income, consistent housing, clothing, and food supplies as part of the predictability of daily life, protection from crime, and psychological security.

What would happen without cyber security? ›

Your files can be copied, altered, or destroyed. Depending on what sorts of files you possess and how important they are to your daily operations, not having cybersecurity can result in a range of damage ranging from being inconvenienced to shut down completely.

How many cyber-attacks happen per day? ›

However, considering there are around 2,200 cyberattacks per day, that could equate to more than 800,000 people being hacked per year.

What are the three 3 types of cyber threats? ›

Types of cyber threats your institution should be aware of include: Malware. Ransomware. Distributed denial of service (DDoS) attacks.

What is a risk in cyber security? ›

Cybersecurity risks relate to the loss of confidentiality, integrity, or availability of information, data, or information (or control) systems and reflect the potential adverse impacts to organizational operations (i.e., mission, functions, image, or reputation) and assets, individuals, other organizations, and the ...

What are the 4 main types of vulnerability in cyber security? ›

Security Vulnerability Types
  • Network Vulnerabilities. These are issues with a network's hardware or software that expose it to possible intrusion by an outside party. ...
  • Operating System Vulnerabilities. ...
  • Human Vulnerabilities. ...
  • Process Vulnerabilities.

Why should people be safe online? ›

Most people store a lot of personal information on their computers. If you don't protect your computer properly when you're online, it's possible that personal details could be stolen or deleted without your knowledge. Your computer can be attacked in a number of ways over the internet.

What are three of the most important things about internet safety? ›

Essential internet safety tips
  • #1: Make sure your internet connection is secure. ...
  • #2: Choose strong passwords. ...
  • #3: Enable multi-factor authentication where you can. ...
  • #4: Keep software and operating systems up-to-date. ...
  • #5: Check that websites look and feel reliable.

What are common security threats? ›

  • Viruses and worms. Viruses and worms are malicious software programs (malware) aimed at destroying an organization's systems, data and network. ...
  • Botnets. ...
  • Drive-by download attacks. ...
  • Phishing attacks. ...
  • Distributed denial-of-service (DDoS) attacks. ...
  • Ransomware. ...
  • Exploit kits. ...
  • Advanced persistent threat attacks.

What are 4 types of information security? ›

There are four types of information technology security you should consider or improve upon:
  • Network Security.
  • Cloud Security.
  • Application Security.
  • Internet of Things Security.
3 Feb 2022

What are types of threats? ›

Types of Threats

Threats can be classified into four different categories; direct, indirect, veiled, conditional.

What is personal cyber security? ›

Personal cybersecurity involves the techniques and best practices used to protect your privacy, data, and devices from unauthorized access and malicious cyberattacks.

What is the importance of cyber security Brainly? ›

Cyber security refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. Technology is evolving at rates faster than ever before. With all this new tech comes the growing number of opportunities for cyber criminals to exploit.

What are best security practices? ›

Top 10 Security Practices
  • & 2. ...
  • Use a strong password. ...
  • Log off public computers. ...
  • Back up important information ... and verify that you can restore it. ...
  • Keep personal information safe. ...
  • Limit social network information. ...
  • Download files legally. ...
  • Ctrl-ALt-Delete before you leave your seat!

Who is responsible for cyber security? ›

Although the CIO, or CISO, still carries primary responsibility for cybersecurity in 85% of organisations (1), it is the entire organisation and everyone working in the business who holds the secondary responsibility for it. Cyberattacks can be targeted at anyone in the business.

What are the 4 steps to protect your computer? ›

Basic Steps for Protecting Computers

Use a password-protected screen saver. Configure your computer to lock the screen automatically after 10-15 minutes. Turn on the system firewall. Keep your operating system updated.

Why is cyber security so hard? ›

Some factors that make cyber security hard to learn are: Large numbers of tools. Since there are so many potential attacks, a cyber security professional must be familiar with various complex cybersecurity tools, technical skills, and software.

Which is not the common reason of poor cyber security answers? ›

Improper Configuration, User Error.

What is cyber security in it? ›

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

What is a great discovery question you would ask your customer to understand their security requirements? ›

Top 10 security questions to ask your prospects

What, if any, security processes do you have integrated with your current business processes? What do you perceive as your major security risks? Have you identified how unauthorized disclosure of your data may occur?

What is the most important skill in cyber security? ›

Top 5 Cybersecurity Skills
  • Networking and System Administration. ...
  • Knowledge of Operating Systems and Virtual Machines. ...
  • Network Security Control. ...
  • Coding. ...
  • Cloud Security. ...
  • Blockchain Security. ...
  • The Internet of Things (IoT) ...
  • Artificial Intelligence (AI)
20 Jul 2022

What is the first thing to learn in cyber security? ›

The first thing you need to tackle when it comes to cybersecurity is the basics of IT systems and networks, for example, the different types of networks available and their protocols. Once you are familiar with the fundamentals you can delve into the basics of networking traffic, security, and communication principles.

What are the top 3 personal attributes important to a cyber professional? ›

The traits you'll need to be successful in cyber security
  • An eye for attention. ...
  • Listening ability. ...
  • A hunger to learn. ...
  • Writing and speaking. ...
  • Courtesy and professionalism. ...
  • Ethical standards. ...
  • Passion for the field.
10 Feb 2020

What is the most common cause of security incident? ›

Phishing is still the leading cause of security incidents.

What is the most common problem threat an organization faces? ›

One of the most common threats faced by organization is employees with a negative approach. Remember; nothing can harm an organization more than unfaithful employees.

What are common security threats? ›

  • Viruses and worms. Viruses and worms are malicious software programs (malware) aimed at destroying an organization's systems, data and network. ...
  • Botnets. ...
  • Drive-by download attacks. ...
  • Phishing attacks. ...
  • Distributed denial-of-service (DDoS) attacks. ...
  • Ransomware. ...
  • Exploit kits. ...
  • Advanced persistent threat attacks.

What are the 7 types of cyber security? ›

The Different Types of Cybersecurity
  • Network Security. Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. ...
  • Cloud Security. ...
  • Endpoint Security. ...
  • Mobile Security. ...
  • IoT Security. ...
  • Application Security. ...
  • Zero Trust.

What are the 5 types of cyber security? ›

Cybersecurity can be categorized into five distinct types:
  • Critical infrastructure security.
  • Application security.
  • Network security.
  • Cloud security.
  • Internet of Things (IoT) security.

What are the 5 types of cyber attacks? ›

The different types of cyber-attacks are malware attack, password attack, phishing attack, and SQL injection attack.

What is a discovery question? ›

Discovery questions are questions you ask a prospect to gauge whether or not they are a good fit for your product or service. These questions should be open-ended and focus on the prospect's obstacles, processes, and goals as they relate to the product or service you are offering.

What questions can be asked when developing a process to monitor security? ›

The 5 Questions Your Security Team Should Be Able to Answer
  • Who can access data? ...
  • Where does sensitive data live? ...
  • How do you protect data? ...
  • How do you verify that controls and policies are working? ...
  • Do you have an audit trail of activity?

Videos

1. New Course: End User Security Awareness
(CBT Nuggets)
2. National Cyber Security Awareness Month Webinar Session 2 : Cybersecurity for Woman and Child Safety
(National Forensic Sciences University)
3. SecTalk – Cyber Security Awareness26th November 2020
(Centria TKI)
4. Ep 162 Security Awareness Series What Cows Can Teach You About Infosec with John Strand
(SocialEngineerOrg)
5. Silvercore Podcast Ep. 66: The Gun Blog with Nicolas Johnson
(Silvercore)
6. An Authoritarian Internet? - Security Now 765
(Security Now)

Top Articles

Latest Posts

Article information

Author: Msgr. Benton Quitzon

Last Updated: 09/05/2022

Views: 6136

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.