Team Research Presentation: Cyber Security and Phishing Attacks

Verified

Added on  2022/11/23

|4
|390
|20
Presentation
AI Summary
This assignment is a presentation on cyber security, specifically focusing on phishing attacks. The presentation explores what phishing attacks are, their significance from a business perspective, and current developments in the field. It also addresses the awareness of cyber attacks, limiting factors in cyber security, and solutions to mitigate vulnerabilities. The presentation includes multiple-choice questions based on the material covered. The student's research covers the evolution of phishing attacks, their impact on data handling, and security measures like VPNs and cyber encrypting systems. The presentation also references several sources to support the claims made, providing a comprehensive overview of the topic.
Document Page
Running head: CYBER-SECURITY
Cyber-Security
Name:
Institution:
Date:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER-SECURITY
1. What is a phishing attack ?
A. It is a type of social engineering attack used to to steal data
B. A robotic mission to increase computer malfunctions
C. Systemic subbotage method to ensure innefictiveness in data handling
D. It is a technological advancement scheme to an organization (Abomhara, 2015)
E. A social improvement on technology
2. Has the advancement of phishing in the 80s and 90s led to more awareness
among organizations in technology
A. Agree
B. Strogly agree
C. Neutral
D. Disagree
E. Strongly disagree
3. Does advancement of phishing and cyber attack raised awareness of data
handling and security of information in organizations
A. Yes
B. NO
C. Don’t know
4. What are the limiting factors in cyber attack and technological security
awareness in organizations
A. Lack of awareness
B. Good password and strong password awareness (AlDairi, 2017)
C. Caution before clicking in public and malware attacks
Document Page
CYBER-SECURITY
D. Limiting access to company data and public data
5. What are the ways of limiting cyber attack and cyber vulnerability?
A. Using VPN and Cyber encrypting systems
B. Encouraging sound systems in operations while using the internet (Amini,et al,
2015)
C. Urge caution while using unsecured data
D. Track devices on every component
E. Non of the above
Document Page
CYBER-SECURITY
References
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
AlDairi, A. (2017). Cyber security attacks on smart cities and associated mobile
technologies. Procedia Computer Science, 109, 1086-1091.
Amini, L., Christodorescu, M., Cohen, M. A., Parthasarathy, S., Rao, J., Sailer, R., ... &
Verscheure, O. (2015). U.S. Patent No. 9,032,521. Washington, DC: U.S. Patent and
Trademark Office.
Essa, A., Al-Shoura, T., Al Nabulsi, A., Al-Ali, A. R., & Aloul, F. (2018, August). Cyber
Physical Sensors System Security: Threats, Vulnerabilities, and Solutions. In 2018
2nd International Conference on Smart Grid and Smart Cities (ICSGSC) (pp. 62-67).
IEEE.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]