0
0
Cybersecurityknowledge~5 mins

Types of cyber threats in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a phishing attack?
Phishing is a cyber threat where attackers send fake emails or messages pretending to be trustworthy to trick people into giving personal information like passwords or credit card numbers.
Click to reveal answer
beginner
Define malware.
Malware is harmful software designed to damage, disrupt, or gain unauthorized access to a computer system. Examples include viruses, worms, and ransomware.
Click to reveal answer
beginner
What is a Denial of Service (DoS) attack?
A DoS attack floods a website or online service with too much traffic, making it slow or unavailable to real users.
Click to reveal answer
beginner
Explain what ransomware does.
Ransomware is a type of malware that locks or encrypts a victim's files and demands payment to unlock them.
Click to reveal answer
beginner
What is social engineering in cybersecurity?
Social engineering tricks people into giving away confidential information by pretending to be someone trustworthy.
Click to reveal answer
Which of the following is an example of malware?
APassword
BFirewall
CEncryption
DVirus
What does a phishing attack try to steal?
AInternet speed
BElectricity
CPersonal information
DHardware
What is the main goal of a Denial of Service (DoS) attack?
ATo make a service unavailable
BTo steal money
CTo install antivirus
DTo speed up a website
Ransomware usually demands what from victims?
AFree software
BPayment to unlock files
CMore storage space
DFaster internet
Social engineering attacks rely mainly on:
ATricking people
BUsing strong passwords
CInstalling software
DUpgrading hardware
Describe at least three common types of cyber threats and how they affect users.
Think about threats that steal information, damage computers, or block access.
You got /4 concepts.
    Explain how social engineering can be used by attackers to compromise security.
    Focus on how attackers use human trust rather than technical hacking.
    You got /4 concepts.