Cybersecurity For Beginners
Cybersecurity For Beginners
Cybersecurity For Beginners
SECURITY
Micro Lessons
Preface
Welcome to Cyber Security Basics: A Beginner's Guide
Cyber-attacks are more common than you might think. For instance:
Contents
Introduction ...................................................................................................................... 8
1. Introduction to Cybersecurity Hygiene ......................................................................... 8
1.1. Why is Cybersecurity Hygiene Important? ............................................................ 8
1.2. Best Practices for Cybersecurity Hygiene ............................................................. 8
1.2.1. Q and A ........................................................................................................... 9
1.3. Benefits of Cybersecurity Hygiene ...................................................................... 10
1.3.1 Q and A .......................................................................................................... 11
2. The Real-World Examples of Common Cyber Threats .............................................. 12
2.1. Phone Spear Phishing Attack .............................................................................. 12
2.1.2. How Twitter Survived Its Biggest Hack .......................................................... 12
2.1.3. Q and A ......................................................................................................... 13
2.2. Ransomware ....................................................................................................... 14
2.2.1. Key Characteristics ....................................................................................... 14
2.2.2. Types of Ransomwares ................................................................................. 14
2.2.3. Prevention and Mitigation .............................................................................. 15
2.2.4. Q and A ......................................................................................................... 16
2.3. The Colonial Pipeline ransomware attack in 2021 ............................................... 18
2.3.1. How Did the Attack Happen? ........................................................................ 18
2.3.2. Key Lessons Learned .................................................................................... 18
2.3.3. Prevention Strategies .................................................................................... 18
2.3.4. Q and A ......................................................................................................... 19
2.4. Mirai Botnet, Denial-of-Service (DoS) Attacks in 2016 ........................................ 20
2.4.1. What is DDoS Attack? ................................................................................... 20
2.4.2. Types of DDoS Attacks ................................................................................. 20
2.4.3. Mirai Botnet Attack Timeline .......................................................................... 21
2.4.4. The Mirai Botnet Attack Had Significant Consequences ............................... 21
2.4.5. The Maria Botnet Attack and Lessons Learned............................................. 21
2.4.6. Q and A ......................................................................................................... 22
2.5. The WannaCry Ransomware Malware Attack in 2017 ........................................ 22
2.5.1. Lessons Learned from The WannaCry Ransomware Malware Attack .......... 23
The Cyber Security Micro Lesson Asır Digital
ADDITIONS ................................................................................................................... 80
1. The top 10 most misspelled words in the English language, according to the Oxford
Dictionary ................................................................................................................... 80
2. Received Phishing Emails ...................................................................................... 82
References .................................................................................................................... 86
Chapter Overview
Introduction
1. Introduction to Cybersecurity Hygiene
Cybersecurity hygiene refers to the practices and habits that individuals and organizations
can adopt to support the health and security of their digital systems and information. It
involves a set of continuous, repeatable practices that help protect sensitive data and
assets from unauthorized individuals and malicious actors.
Poor cybersecurity hygiene can pose serious risks to organizations, including data
breaches, financial losses, and reputational damage.
It enables organizations to meet regulatory requirements and avoid potential fines and
penalties associated with non-compliance.
• Apply new patches and updates: Keep software and systems up to date with
the latest security patches and updates.
• Use strong passwords: Use strong, unique passwords for all accounts, and
require password changes on a regular basis.
• Encrypt data: Encrypt sensitive data both in transit and at rest to protect it from
unauthorized access.
• Secure routers and firewalls: Ensure that routers and firewalls are properly
configured to prevent unauthorized access.
• Monitor for vulnerabilities: Regularly scan for vulnerabilities and address them
promptly to prevent exploitation.
1.2.1. Q and A
1. Why is it important to regularly back up mission-critical data?
2. What is the purpose of applying new patches and updates to software and
systems?
(PCI-DSS stands for the Payment Card Industry Data Security Standard. It is
a global security standard designed to protect cardholder data and ensure the
secure handling of credit and debit card transactions. It was established by
the Payment Card Industry Security Standards Council (PCI SSC), which includes
major card brands like Visa, MasterCard, American Express, Discover, and JCB.)
1.3.1 Q and A
1. What does "improved security posture" mean in the context of cybersecurity
hygiene?
Whether through fake emails pretending to be your CEO or weak passwords, attackers
target human behavior. Understanding these tactics empowers us to spot the red flags.
Knowing the risks makes us more vigilant, from double-checking emails to reporting
potential threats. Cybersecurity starts with individual actions and ends with collective
defense.
2.1.2. How Twitter Survived Its Biggest Hack—and Plans to Stop the Next One
On July 15, 2020, Twitter experienced one of its most severe security breaches, where
high-profile accounts, including those of Elon Musk, Bill Gates, Kanye West, and Joe
Biden, were hacked to promote a Bitcoin scam. The attack began when hackers executed
a phishing scheme targeting Twitter employees, successfully obtaining credentials and
bypassing multi-factor authentication. By exploiting internal tools, the attackers
compromised 130 accounts, sending fraudulent tweets and causing chaos across the
platform.
all employees to reset credentials and undergo verification processes to regain access to
systems.
Investigations revealed the attack was orchestrated by Graham Ivan Clark, a 17-year-old
from Florida, who previously engaged in online scams. Clark exploited Twitter's internal
admin tools to hijack accounts, escalating from OG username trades to targeting
celebrities and politicians.
With the US presidential election approaching at the time, the hack underscored the
potential for catastrophic consequences if such a breach occurred with intent to disrupt
democracy. Twitter has since rehearsed incident response plans to prepare for future
crises, prioritizing rapid detection and containment of threats.
The July 15 attack revealed Twitter’s need for structural changes to combat insider threats
and external hacking attempts. By reducing trust in individual employee access and
adopting stricter protocols, Twitter aimed to harden its defenses against future
cyberattacks. While no system is invulnerable, the company remains vigilant, knowing it
must act swiftly to prevent smaller incidents from spiraling into larger crises.
2.1.3. Q and A
1. What type of attack did Twitter experience on July 15, 2020?
A. Ransomware attack
B. Phishing attack targeting employees
C. Denial-of-Service (DoS) attack
D. Malware infection
2. What was the goal of the hackers during the Twitter attack?
A. To shut down Twitter permanently
B. To promote a Bitcoin scam through high-profile accounts
C. To steal private messages from politicians
D. To leak sensitive company data
6. What key security measure did Twitter implement after the attack?
A. Mandatory use of physical two-factor authentication for all employees
B. Eliminating access to verified accounts
C. Shutting down all OG usernames permanently
D. Requiring employees to work offline
1.B, 2.B, 3.B, 4.B, 5.A, 6.A
2.2. Ransomware
Ransomware is an ever-evolving form of malware designed to encrypt files on a device,
rendering any files and the systems that rely on them unusable. Malicious actors use
ransomware to extort victims by demanding a “ransom” in exchange for the decryption
key or password to unlock the encrypted data.
• Wipers: Destroys data unless a ransom is paid, sometimes even after payment.
• Scareware: Tries to scare users into paying a ransom, often posing as a law
enforcement agency or virus infection alert.
• Secure your backups. Make sure your backup data is not accessible for
modification or deletion from the systems where the data resides. Ransomware will look
for data backups and encrypt or delete them so they cannot be recovered, so use backup
systems that do not allow direct access to backup files.
• Use security software and keep it up to date. Make sure all your computers and
devices are protected with comprehensive security software and keep all your software
up to date. Make sure you update your devices’ software early and often, as patches for
flaws are typically included in each update.
• Practice safe surfing. Be careful where you click. Don’t respond to emails and
text messages from people you don’t know, and only download applications from trusted
sources. This is important since malware authors often use social engineering to try to
get you to install dangerous files.
• Only use secure networks. Avoid using public Wi-Fi networks, since many of them
are not secure, and cybercriminals can snoop on your internet usage. Instead, consider
installing a VPN, which provides you with a secure connection to the internet no matter
where you go.
• Stay informed. Keep current on the latest ransomwares threats so you know what
to look out for. In the case that you do get a ransomware infection and have not backed
up all your files, know that some decryption tools are made available by tech companies
to help victims.
2.2.4. Q and A
1. What is ransomware?
B. Malware that encrypts files and demands payment for a decryption key.
A. Encrypting ransomware
B. Leakware (doxware)
C. Mobile ransomware
D. Scareware
A. By encrypting files
A. Twitter headquarters
B. Colonial Pipeline
7. What critical lesson was learned from the Colonial Pipeline ransomware attack?
A. It caused fuel shortages and price hikes along the East Coast
10. Why should you avoid public Wi-Fi to prevent ransomware infections?
Colonial Pipeline paid $4.4 million in ransom to recover its data, but restoring systems
remained slow due to the nature of the decryption tools provided. The incident exposed
significant vulnerabilities in critical infrastructure, particularly within the energy and utilities
sector, and highlighted the growing sophistication of ransomware attacks.
• Principle of Least Privilege (PoLP): Limiting user access to only what is necessary
to prevent privilege escalation.
• Endpoint Privilege Management (EPM): Blocking unauthorized processes, such
as ransomware encryption.
• Secure Remote Access: Enforcing multi-factor authentication and privileged
access management to secure remote connections.
The Colonial Pipeline incident serves as a wake-up call for industries to enhance cyber
resilience, particularly as remote access continues to be a critical vulnerability.
The Cyber Security Micro Lesson Asır Digital
2.3.4. Q and A
1. Which major company was affected by the ransomware attack on May 7, 2021?
B. Colonial Pipeline
C. Twitter
D. Microsoft
2. What was the immediate impact of the Colonial Pipeline ransomware attack?
3. How much ransom did the attackers demand from Colonial Pipeline?
A. $1 million USD
C. Firewall security
D. Data encryption
The Cyber Security Micro Lesson Asır Digital
6. Why was restoring Colonial Pipeline's systems slow even after paying the
ransom?
A. The decryption tools provided were slow and inefficient.
A massive cyber-attack known as the Mirai botnet attack occurred, affecting millions of
devices connected to the Internet of Things (IoT). The attack was conducted by a malware
called Mirai, which targeted vulnerable IoT devices, such as web-connected cameras,
routers, and other devices with default passwords.
Background
Mirai was created by three college students, Paras Jha, Josiah White, and Dalton
Norman, who rented out their botnet to cybercriminals for DDoS attacks and click fraud.
DDoS attackers aim to exhaust the target’s Internet bandwidth and RAM, causing the
system to become unresponsive or crash. This disrupts normal business operations,
prevents legitimate users from accessing online services, and can result in significant
financial losses.
The malware was designed to scan for and infect IoT devices running on the ARC
processor and Linux operating system.
The attacks resulted in significant financial losses for affected organizations, including
Dyn’s estimated $1 million daily losses during the peak of the attack.
The affected websites included: PayPal, Twitter, Reddit, Sony, Amazon, Netflix, Spotify,
Pinterest, SoundCloud, Squarespace.
The Cyber Security Micro Lesson Asır Digital
2.4.6. Q and A
1. What was the primary target of the Mirai botnet attack in October 2016?
A. Financial institutions
B. A DNS provider called Dyn
C. Personal computers
D. Gaming consoles.
In May 2017, the WannaCry ransomware malware attack spread rapidly across the globe,
infecting over 200,000 computers in more than 150 countries, including the United
Kingdom’s National Health Service (NHS), FedEx, Honda, Nissan, and many others. The
attack was unprecedented in its scale and impact, causing widespread disruption to
healthcare, transportation, and other critical infrastructure.
The Cyber Security Micro Lesson Asır Digital
Aftermath:
An example is the Fancy Bear Cyber Espionage Group, which used social engineering
techniques to target political organizations and individuals, stealing sensitive information.
In 2016, Fancy Bear hacked the World Anti-Doping Agency (WADA) database,
compromising confidential athlete medical data, including information on US athletes
such as Serena and Venus Williams, and Simone Biles.
In 2019, the group targeted at least 16 national and international sporting and anti-doping
organizations across three continents, using IoT devices to hack corporate networks. The
attacks occurred just before the news broke that the World Anti-Doping Agency was
planning to take further action ahead of the 2020 Summer Olympics.
In 2023, the headquarters of Fancy Bear and the entire military unit were targeted by
Ukrainian drones, resulting in the collapse of a rooftop on an adjacent building.
An analysis of a sample published by the US government shows that Fancy Bear has
stripped down its initial infector to defeat ML-based defenses, hiding malicious
functionality in benign code.
The Cyber Security Micro Lesson Asır Digital
2.7. Q and A
1. What was the primary method used in the 2020 Twitter phishing attack?
2. What was the significant impact of the Colonial Pipeline ransomware attack in
2021?
3. Which type of cyber threat was responsible for the Mirai botnet attack in 2016,
and what did it target?
4. What was one of the major lessons learned from the WannaCry ransomware
attack in 2017?
A. Social engineering is the most dangerous type of attack.
5. What type of cyber threat was Fancy Bear known for, and what was one of their
notable targets in 2016?
B. Phishing; Twitter
Let’s go over in finer detail four reasons every business needs to prioritize application
security.
Security risk assessments help define controls based on the application’s interactions
with data, systems, and infrastructure. Insights for monitoring tools (like SIEM) must be
embedded into design and validated for effectiveness.
The Cyber Security Micro Lesson Asır Digital
3.4. Q and A
1. Why is "Security by Design" important in application development?
4. How do WAFs (Web Application Firewalls) and API Security Gateways protect
applications?
A. By scanning source code for errors.
4. Network Security
For beginners, it’s essential to understand the fundamental layers of network security. By
focusing on these key areas, beginners can establish a solid foundation for network
security, reducing the risk of cyber threats and ensuring the integrity of their digital assets.
4.1. What is Network Security?
Network security is a broad term that encompasses a multitude of technologies, devices,
and processes designed to protect the integrity, confidentiality, and accessibility of
computer networks and data. It involves restricting external access by ensuring:
Firewalls act as barriers that filter incoming and outgoing traffic, allowing only authorized
communication.
VPNs encrypt data transmitted over the internet, ensuring secure communication
between users and the network.
NAC ensures that only authorized users and devices can connect to the network.
• Encryption
The Cyber Security Micro Lesson Asır Digital
Why It Works: Firewalls act as the first line of defense, monitoring and filtering incoming
and outgoing traffic based on predefined rules.
Lesson Learned: Firewalls are essential for preventing unauthorized access and
malicious traffic, particularly against common threats like phishing emails.
4.4.2. VPN for Remote Work
Company and Incident Date:
What Happened: ShopEase Online successfully detected and blocked a brute force
attack using an Intrusion Prevention System (IPS).
Why It Works: IPS continuously monitors network traffic for signs of suspicious or
malicious activity, such as repeated login attempts indicative of brute force attacks and
takes action to stop them.
The Cyber Security Micro Lesson Asır Digital
Lesson Learned: Intrusion Prevention Systems are vital for protecting against real-time
attacks like brute force, which can compromise user credentials and sensitive data.
4.4.4. Conclusion
The increasing reliance on cybersecurity solutions like firewalls, VPNs, and Intrusion
Prevention Systems (IPS) highlights their critical role in safeguarding businesses against
modern cyber threats.
Firewalls serve as the first line of defense, filtering malicious traffic and blocking
unauthorized access, as seen in their effectiveness against phishing attempts.
VPNs ensure secure remote work by encrypting sensitive data, enabling businesses to
adapt quickly to challenges like the COVID-19 pandemic.
Intrusion Prevention Systems (IPS) protect in real time by identifying and blocking
sophisticated attacks, such as brute force attempts, before they compromise sensitive
information.
4.5. Q and A
1. What is the primary purpose of a firewall?
2. Which tool encrypts data for secure communication over the internet?
A. Firewall
B. VPN
C. Antivirus software
D. Router
Think of IAM as the security guard for your digital assets. It ensures that only authorized
individuals can enter specific areas.
Multi-Factor Authentication (MFA) adds extra layers, like a code sent to your phone or
biometric verification (e.g., fingerprint).
5.1.3. Authorization
Authorization determines what actions a user is allowed to perform once authenticated.
• Why It Matters: Role-Based Access Control ensures employees only have access
to resources necessary for their job, reducing the risk of unauthorized access or insider
threats.
• Lesson Learned: IAM principles like RBAC prevent over-permissioning and follow
the principle of least privilege.
The Cyber Security Micro Lesson Asır Digital
• Scenario: An employee logs into their corporate account using a SSO system.
With one login, they gain access to multiple applications like email, HR software, project
management tools (e.g., Jira, Slack), and cloud services.
• Lesson Learned: SSO enhances productivity and reduces password fatigue while
keeping systems secure.
• Scenario: An employee logs into their corporate account using a SSO system.
With one login, they gain access to multiple applications like email, HR software, project
management tools (e.g., Jira, Slack), and cloud services.
• Lesson Learned: SSO enhances productivity and reduces password fatigue while
keeping systems secure.
5.2. Q and A
1. What is the primary goal of IAM?
6. Data Security
Data Security refers to the process of safeguarding digital information throughout its
entire lifecycle to protect it from unauthorized access, theft, corruption, or destruction. It
encompasses various measures to ensure the confidentiality, integrity, and availability of
sensitive data, including:
Auditing: Regularly reviewing and analyzing data access and usage patterns to
•
identify potential security risks.
Backup and recovery: Ensuring data is backed up regularly and can be restored
•
in case of data loss or corruption.
Compliance: Adhering to relevant regulations, standards, and industry best
•
practices to protect sensitive data.
Data security is essential for organizations to:
• Applies to any organization dealing with EU citizens, even outside the EU.
6.2.2. HIPAA (Health Insurance Portability and Accountability Act)
HIPAA is a U.S. law that protects sensitive patient health information.
•Requires healthcare providers, insurers, and their partners to follow strict privacy
and security rules.
• Uber was fined €290m for sending drivers' data to the US without consent
• Meta is facing 11 complaints over its use of personal data to train AI models
without consent
The Cyber Security Micro Lesson Asır Digital
6.4. Q and A
1. What does data security aim to protect?
a) Confidentiality
b) Integrity
c) Efficiency
d) Availability
a) Deletes it
d) Backs it up
6. Which of the following involves regularly reviewing data access and usage?
a) Monitoring
b) Encryption
c) Auditing
d) Backup
b) Intellectual property
c) Regulatory compliance
a) PCI-DSS
b) GDPR
c) HIPAA
d) CISA
13. Which company was fined €91 million for violating GDPR rules on password
storage?
a) Meta
b) Google
c) Uber
d) Amazon
1.D, 2.C, 3.B, 4.B, 5.A, 6.C, 7.B, 8.D, 9.B, 10.C, 11.C, 12.B, 13.A, 14.B, 15. B
The Cyber Security Micro Lesson Asır Digital
7.4. Q and A
1. What is the primary goal of Incident Response (IR)?
a) To create new software
b) To handle a data breach or cyberattack effectively
c) To increase user engagement
d) To sell cybersecurity tools
8.4. Q and A
1. What is the main goal of penetration testing and ethical hacking?
a) To disrupt an organization’s systems
b) To identify vulnerabilities in an organization’s security posture
c) To design new security software
d) To bypass legal restrictions
9. Data Backup
Data backup is the process of creating a copy of digital data, such as files, databases, or
entire systems, and storing it in a separate location, typically for the purpose of recovering
the data in case of loss, corruption, or destruction of the original data due to various
events, including:
• Hardware failure
Data backup provides a safeguard against data loss and ensures business continuity by
allowing organizations to restore their critical data and systems quickly, minimizing
downtime and potential losses.
• Incremental Backup: Copies only changed data since the last full or incremental
backup.
• Differential Backup: Copies all changed data since the last full backup.
• Cloud Backup: Stores backup data in a remote cloud storage service, providing
offsite protection and accessibility.
• Virtual Tape Library (VTL): A virtualized tape library that mimics traditional tape
backup systems but uses disk storage.
• Use multiple backup targets: To ensure data availability and reduce reliance on a
single backup method.
• Verify Backup Integrity: Regularly check backups for completeness and accuracy.
9.3. Q and A
1. What is the primary purpose of data backup?
2. Which of the following is NOT a common cause of data loss that data backup can
protect against?
a) Hardware failure
b) Human error
c) Natural disasters
3. What type of backup copies only the data that has changed since the last full
backup?
a) Full Backup
b) Incremental Backup
c) Differential Backup
d) Synthetic Full Backup
•Avoid links with unusual extensions like ‘.xyz’, ‘.tk’, or long strings of random
characters.
• Hover over links to preview the destination before clicking.
Ensure the website uses HTTPS (the “s” indicates a secure connection). Although HTTPS
doesn’t guarantee the website is completely secure, it’s a basic requirement for online
safety.
• Be wary of websites that offer free products, rewards, or deals that seem
unrealistic.
• “Dangerous site”
• “Fake site ahead”
•If you see frequent prompts to install software or share information, exit
immediately.
• Be cautious of sites that ask for such information without proper verification.
10.11. Q and A
1. What should you check for when looking at a website's URL to ensure it is
legitimate?
3. What does the “S” in HTTPS stand for, and why is it important?
4. If a website uses only HTTP and not HTTPS, what should you do?
7. What should you do if your browser warns, “This site may be unsafe”?
a) Ignore the warning and proceed
b) Refresh the site to see if the warning disappears
c) Close the site and avoid visiting it
d) Click “proceed anyway” to bypass the warning
The Cyber Security Micro Lesson Asır Digital
10. What should you do if a website frequently prompts you to install software?
a) Install it immediately to see what it is
b) Ignore it and stay on the site
c) Exit the website immediately
d) Restart your device
11. What is a major red flag when visiting a website?
a) It uses animations and videos
b) It asks for passwords or bank details through pop-ups
c) The website has many images
d) The site loads quickly
14. What might it mean if a website starts downloading files without your
permission?
a) The site is sharing free tools
b) The site is likely distributing malware
c) It’s a sign the site is fast and efficient
d) Downloads are harmless and can be ignored
The Cyber Security Micro Lesson Asır Digital
15. Why is missing or fake contact information a red flag for a website?
a) It means the site is private
b) It indicates the site may not be legitimate
c) It improves the website’s speed
d) Contact information is optional
16. What could happen if a website runs malicious scripts on your browser?
a) Your browser may slow down, freeze, or show pop-ups
b) The website will load faster than usual
c) Your data is automatically backed up
d) Nothing noticeable will happen
17. If your browser behaves unusually when visiting a webpage, what is the safest
action?
1.B, 2.B, 3.B, 4.A, 5.B, 6.A, 7.C, 8.A, 9.A, 10.C, 11.B, 12.A, 13.A, 14.B, 15.B, 16.A, 17.B
The Cyber Security Micro Lesson Asır Digital
• Preventing Cyber Threats: Reduces risks like phishing, identity theft, and
malware attacks.
• Avoiding Legal Issues: Ensures compliance with privacy laws and regulations,
such as General Data Protection Regulation (GDPR).
• Phishing Attacks:
Cybercriminals send fake messages to trick users into revealing sensitive information
(e.g., passwords, credit card numbers).
• Account Hacking:
Unauthorized access to social media accounts, often leading to malicious posts or
misuse.
• Social Engineering:
• Data Mining:
Collecting user data without consent, often for marketing or malicious purposes.
Create unique, complex passwords for each account and consider using a password
manager.
Add an extra layer of security by requiring a second verification step during login.
Avoid posting sensitive details like home addresses, financial information, or vacation
plans.
Regularly check and customize privacy settings to control who can view and interact with
your content.
Check for unauthorized logins or posts and report unusual activity immediately.
Be selective with apps that request access to your social media accounts, ensuring they
are trustworthy.
The Cyber Security Micro Lesson Asır Digital
11.4. Q and A
1. What is the primary goal of social network security?
• Scanning: Regularly scans computer systems, files, and network traffic for known
and unknown malware patterns.
• Heuristics: Uses algorithms to analyze file behavior and make educated guesses
about potential malware, even if it’s unknown.
• HIPS (Host Intrusion Prevention System): Monitors system activity and blocks
unauthorized changes or behavior that may indicate malware presence.
• Identity Theft Protection: Monitors for and alerts users to potential identity theft
attempts.
• Mobile Security: Protects mobile devices from malware, phishing, and other
threats.
The Cyber Security Micro Lesson Asır Digital
12.3. Q and A
1. What is the primary purpose of antivirus protection?
a) To create a backup of files
b) To prevent, detect, and remove malware from computer systems,
networks, and mobile devices
c) To improve system performance
d) To increase internet speed
This beginner-level Q&A simplifies key concepts like RPO, RTO, redundancy, and testing
while reinforcing the importance of a Disaster Recovery Plan.
Examples:
• RPO of 12 hours means that data loss exceeding 12 hours would exceed the
organization’s tolerance.
• RPO of 5 hours means that data loss exceeding 5 hours would exceed the
organization’s tolerance.
By understanding and implementing a Recovery Point Objective, organizations can
ensure timely and effective disaster recovery, minimizing data loss and business
disruption.
Examples:
13.3. Q&A
1. What is Disaster Recovery (DR)?
C. Marketing personnel.
D. External software vendors.
The Cyber Security Micro Lesson Asır Digital
• Use PINs to lock your phone. Either use the longer numeric PIN or your face or
finger to unlock the phone. The second or two delay is worth the extra security. As part of
your Touch/Face ID and Passcode settings is an option to “erase data” after entering 10
incorrect PIN attempts.
• Think before you connect to any public Wi-Fi network. Don’t automatically
connect to Wi-Fi hotspots by name: hackers like to fool you into thinking that just because
something is named “Starbucks Wi-Fi” it’s safe. Apple makes a Configurator app that can
be used to further lock down its devices: use it. “Ask to Join Networks” should always be
set to the “Ask” option.
• Always download apps from the official Google Play and Apple iTunes stores.
Make sure you have connected properly before you click on that download link. And while
you are checking, make sure you understand the app’s permissions and that they match
what the app is doing. Some developers, such as the financial app Mint, go a step further
and have a menu option in their apps that can show you their privacy policy too.
14.2. Q and A
1. What is mobile device security?
a) Protecting only smartphones from physical damage
b) The full protection of data on portable devices and their connected
networks
c) Ensuring portable devices always stay connected to the internet
d) Only securing laptops from malware attacks
5. What is the most secure way to download apps for your mobile device?
a) Download apps from third-party websites for free.
b) Only use official app stores like Google Play and Apple iTunes.
c) Rely on recommendations from social media links.
d) Use apps that don’t require any permissions.
10. What does "Ask to Join Networks" do, and why is it important?
• Use secure email clients: Use email clients that support encryption and secure
protocols, such as ProtonMail, Tutanota, or Mailfence.
• Avoid attachments: Avoid sending sensitive information as attachments, and
instead, use secure file-sharing services or encrypted messaging apps.
• Use clear and concise language: Avoid using vague or ambiguous language in
your emails, which can increase the risk of misinterpretation and potential security
breaches.
• Proofread and edit: Carefully proofread and edit your emails before sending them
to ensure they are free of errors and typos, which can compromise security.
• Use email templates: Use email templates or boilerplates to ensure consistency
in your email communications and reduce the risk of errors or security breaches.
Unknown Sender: You don’t recognize the email address, or it looks odd.
Generic Email Accounts: Comes from free services like Gmail, Yahoo, or Hotmail
instead of an official organization email.
For this reason, hackers will create a sense of urgency in some of their phishing efforts,
such as mentioning payment deadlines, or the email saying the recipient will receive a
call in the next hour for example.
The Cyber Security Micro Lesson Asır Digital
This technique is very effective in workplace scams. Scammers know that most
employees will drop everything if the big boss sends an important email that must be
actioned immediately!
The attachments are especially nasty, as they are usually infected with malware. These
attachments can be very hard to spot, on many occasions hackers have been
successful by disguising infected PDFs as invoices and payment notifications.
Unexpected Attachments: Files like .exe, .zip, or .docm can contain malware.
Shortened or Misleading Links: Links like bit.ly/abc123 or ones that redirect to unfamiliar
websites.
Tip: Hover over links without clicking to preview where they lead.
Tip: Never download or open any attachment you are unsure of.
When creating phishing emails, attackers will often use a spellchecker or translation
machine, which will give them all the right words but not necessarily in the right context.
• .exe (executables)
• .pdf with strange names
• Office files with macros (.docm or .xlsm)
15.1.7. Spoofed Branding or Visuals
The logo, colors, or branding look slightly “off” or pixelated.
15.1.9. Inconsistencies
The email claims to be from your bank but comes from a strange domain.
15.2. Q and A
1. What is the best way to protect emails from unauthorized access?
2. Which of the following can help verify the authenticity of an email sender?
7. What should you do if an email asks for your password or credit card details?
8. How can poor grammar or spelling help you spot a phishing email?
C. The sender’s email address has the company name spelled perfectly.
11. What should you do if you notice unusual activity in your email account?
1.B, 2.A, 3.B, 4.B, 5.A, 6.B, 7.B, 8.B, 9.D, 10.A, 11.A, 12.B
The Cyber Security Micro Lesson Asır Digital
If an email is creating a sense of urgency or is trying to invoke fear for you to take action,
such as changing your password now, it is likely a phishing scam. Cyber-criminals know
people procrastinate. Even if we receive a high priority email most of us will decide to
deal with it later on. This works against the hacker, as the longer we know/think about
something, the more likely we are to notice if something doesn’t seem right.
Looking at the phishing email again later with a fresh set of eyes or asking a college to
take a quick look can be beneficial in spotting a scam email.
If an email contains hyperlinks that do not match the web addresses for the organization
that it came from, it is likely a phishing scam.
16.2. Always Review the Sender of an Email
You can be sure not to fall victim to a phishing campaign.
Always hover your mouse cursor over hyperlinks in email messages prior to clicking them.
By hovering your mouse over a link, the real web address will be displayed which can be
used to confirm if the link is legitimate or not.
No legitimate business will ever contact you from a ‘@gmail.com’ address, or any other
public domain for that matter! (With the small exception of some sole traders)
Every organization will have its own email domain, for example legitimate emails from
Amazon will be sent from “@amazon.co.uk”
If the domain name is the same as the name of the apparent sender, the email is usually
legitimate.
The best way to check the email domain is legit, is to search for the company and check
the web domain from the search engine.
The Cyber Security Micro Lesson Asır Digital
Prior to logging in on a website, confirm that the address in the address bar is correct,
and ensure that the connection is secure.
To confirm that your connection is secure, look for a green lock near the address bar,
and confirm that the website address begins with “https:// and not http:// “.
or it-support@yourcompany.com).
16.5.Q and A
1. What is a common sign that an email is a phishing attempt?
3. What should you do if an email creates a sense of urgency, like “Change your
password now!”?
A. Immediately follow the instructions.
C. Look for “https://” and a lock icon near the address bar.
7. What is the correct way for Windows users to report a phishing email in Outlook?
A. Press CTRL + ALT + F to forward the email as an attachment.
11. Why do cybercriminals use poor spelling and grammar in phishing emails?
A. They test if the reader is paying attention.
With the right mindset and skills, you can stay one
step ahead and keep your digital life secure.
The Cyber Security Micro Lesson Asır Digital
ADDITIONS
1. The top 10 most misspelled words in the English language, according to the Oxford
Dictionary
10. Accomodate?
This is one that often shows up in business communications, so you want to make sure
you get it right. It actually takes two c's and two m's.
9. Wich?
It seems hard to believe that you could put down "wich" when you really meant "which" -
- but this one has more than two million mentions in the Oxford Dictionary's corpus, more
mentions than any other word on this list.
8. Recieve?
Despite the fact that this is drilled in elementary school and beyond, it's apparently still
challenging to remember that the rule is ... (all together now) "i before e, except after c."
This is one of the c's in question.
7. Untill?
This was originally the correct spelling of the word ... in the Middle Ages. We've (arguably)
advanced since that period of human history, and the word only has one "l" these days.
You can also get away with the abbreviation 'til, if you're feeling bold (it's still grammatically
correct).
6. Occured
Similar to accommodate, you've got double consonants in this one. It might also occur to
you that there's only one r in the word when it's in present tense, which makes it extra
confusing. Welcome to English.
5. Seperate
Again, you want to get this right in business settings, such as when telling your team to
"send separate emails" to different clients.
4. Goverment?
You've got to govern in order to have a government. Don't forget about that n in there.
3. Definately?
This is definitely one you want to get right. If you just remember, "I want to get it right,"
then you can remember that there's an i in the middle there, not an a.
2. Pharoah
Probably not one that'll come up a lot at work (unless you've got quite the totalitarian C-
suite), but still good to know. Also an idea for a Halloween costume.
1. Publically
Whether you use it privately or publicly, this is one you want to make sure is correct.
There has been an automatic security update on your email. Click Here to complete update
Please note that you have within 24 hours to complete this update because you might lose
access to your Email Box.
Thanks
IT Helpdesk
If you have any questions regarding this invoice, please contact your ADP service team at
the number provided on the invoice for assistance.
Please note that your bank account will be debited within one banking business day for the
amount(s) shown on the invoice.
Important: Please do not respond to this message. It comes from an unattended mailbox.
The Cyber Security Micro Lesson Asır Digital
Used: 1.93GB
Available: 2.01GB
This is to inform you that our webmail Admin Server is currently congested, and your
Mailbox is out of date. We are currently deleting all inactive accounts so please confirm that
your e-mail account is still active by updating your current and correct details by CLICKING
HERE
Regards,
Thanks,
Admin Department
Sincerely
System Admin
Access to your mailbox account is about to expire, we recommend that you upgrade to
avoid account suspension.
Your e-mail account was LOGIN today by Unknown IP address, click on the Administrator
link below to validate your e-mail account or your account will be temporary block for
sending more messages
CLICK HERE
You may find this message in your Junk folder due to the unusual activities, kindly move to
your inbox and click on the above link.
Privacy Policy | ©2017 Office of Information Technology. All rights reserved Management
Team
Dear Member,
1 Unread Message
Thank You,
From: Redacted
Sent: Monday, May 8, 2017 4:55 AM
To: UNG Employee (Redacted)
Subject: General Notice,
General Notice,
This is to inform you that there is a change and update in our mail server; all User are
required to update their information to avoid termination or suspension of account.
To update you information CLICK HERE. OR copy this link pest it on your browser bar
<URL REDACTED>
Kindly click above instruction to update your information, we will process your request
once we receive your information.
Thanks
Admin.
Legal Disclaimer
Attention!
Important changes have been made to the "Pay" section of your account.
To view these changes, login with your "user@domain" User ID and Password at: My ADP
Portal
Need help or have questions about your account? Contact the HR/Payroll Department for
assistance.
This email has been sent from an automated system. DO NOT REPLY TO THIS EMAIL.
The Cyber Security Micro Lesson Asır Digital
References
1. Books
• Web Application Security: A Beginner's Guide by Bryan Sullivan and Vincent
Liu
• The Tangled Web: A Guide to Securing Modern Web Applications by Michal
Zalewski
2. Web Resources
• University of North Georgia
Phishing Awareness
OWASP Website
NIST Framework
SANS Website
CIS Controls
3. Industry White Papers and Articles
Security practices for APIs, patch management, and secure SDLC derived
from major tech companies such as Google, Microsoft, and Cisco.
AWS Documentation