Basics of Cybersecurity. Comprehending the Fundamental Rules of Cybersecurity
What is the first element to check in order to identify a potential phishing campaign?
The sender's email address.
The sender's ip address.
The time the message was sent.
How can we minimise the risk of a Man in The Middle attack?
Accessing secure websites with HTTP certificates.
By using VPNs, even if they are free or unknown
Protecting the company Wi-Fi network with at least WPA2-AES and strong passwords.
The 7 phases of a cyber attack are:
Reconnaissance - Weaponization - Delivery - Exploitation - Instalation - Command and control - Action on objective
Profile hacking - Attack- Delivery - Management - Instalation - Command and conquer- Action on objective
Preliminary attack- Weaponization - Delivery - Exploitation - Instalation - Command and conquer- Action on objective
Configure privacy settings for corporate social networks.
Open attachments if we doubt their origin.
Use a password with two-factor authentication.
A good teleworking cyber security policy does not include:
Raise employee awareness before starting to telework.
The prohibition of the use of the personal computer for teleworking.
Remote workstation protection regulations