Basics of Cybersecurity. Comprehending the Fundamental Rules of Cybersecurity
What is the first element to check in order to identify a potential phishing campaign?
The time the message was sent.
The sender's ip address.
The sender's email address.
How can we minimise the risk of a Man in The Middle attack?
By using VPNs, even if they are free or unknown
Protecting the company Wi-Fi network with at least WPA2-AES and strong passwords.
Accessing secure websites with HTTP certificates.
The 7 phases of a cyber attack are:
Preliminary attack- Weaponization - Delivery - Exploitation - Instalation - Command and conquer- Action on objective
Profile hacking - Attack- Delivery - Management - Instalation - Command and conquer- Action on objective
Reconnaissance - Weaponization - Delivery - Exploitation - Instalation - Command and control - Action on objective
Configure privacy settings for corporate social networks.
Use a password with two-factor authentication.
Open attachments if we doubt their origin.
A good teleworking cyber security policy does not include:
Remote workstation protection regulations
Raise employee awareness before starting to telework.
The prohibition of the use of the personal computer for teleworking.