Information Assurance - 7 Flashcards

1
Q

It encompasses actions that jeopardize an individual’s or organization’s social media account. As many social media users post or share personal details online, they can be easily taken advantage of by attackers seeking to use their information for money or blackmail.

A

SOCIAL MEDIA ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACTIONS THAT
JEOPARDIZE SOCIAL
MEDIA ACCOUNTS

A
  1. Using weak passwords
  2. Falling for phishing scams
  3. Oversharing personal information
  4. Neglecting to enable security features like two-factor authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Approximately of adults in the U.S have had at
least one of their social media accounts hacked.

A

30%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Globally, every there is a cyber attack,
with social media hacks being major contributors.

A

39 seconds,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IMPACTS OF SOCIAL MEDIA
ATTACKS

A
  1. Damage reputation
  2. Disrupt operations
  3. Impose financial cost
  4. Impose legal liabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TYPES OF SOCIAL MEDIA ATTACKS

A
  1. IDENTITY THEFT
  2. CYBERBULLYING
  3. FAKE GIVEAWAYS
  4. LIFEJACKING
  5. PHISHING SCAMS
  6. DATA BREACH
  7. MALWARE
  8. BRAND IMPERSONATION
  9. AFFILIATE SCAMS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a common social media threat that can happen to anyone who has shared images or personal information online.

A

IDENTITY THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It includes harmful and damaging posts, messages or content shared either directly to a user or publicly. Cyberbullying also happens anonymously.

A

CYBERBULLYING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scammers will create fake brand profiles that promote giveaways for followers to enter and submit their personal information

A

FAKE GIVEAWAYS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a harmful cyberattack that occurs when a hacker gains access to confidential information

A

DATA BREACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a crafty scam hackers use to force users to click the “like” button on a post or page without them knowing they did it.

A

LIFEJACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

method used by scammers to collect personal information through online messages, emails, links and spoof websites.

A

PHISHING SCAMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The scammer’s goal is for the user to click on the falsified news story, which is riddled with a malware virus that can compromise the user’s device or social media account.

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scammers might create a social media account to impersonate a brand and contact customers under the guise that they are the legitimate company.

A

BRAND IMPERSONATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scammers may post content that appears to be an advertisement offering a free gift card, requiring users to enter their personal email address to receive the gift card.

A

AFFILIATE SCAMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HOW DO SOCIAL MEDIA ATTACKS OCCUR?

A

The attacks occur when a user’s personal information and details are accessed online by hackers and scammers.

16
Q

MOST HACKERS CAN FIND BASIC INFORMATION ABOUT YOU BY SCANNING YOUR ACCOUNTS, INCLUDING

A
  1. fullname
  2. address of current town
  3. age
  4. current employer and job title
  5. phone number
  6. email address
  7. past places worked and lived
  8. who you know
  9. hobbies and interests
  10. where you are and when
17
Q

3 WAYS TO AVOID SOCIAL MEDIA ATTACKS

A
  1. Don’t accept friend requests from people you don’t know
  2. Install an Ad Blocker on your Internet browser
  3. Update your login credentials frequently
18
Q
A