Lesson Summary

  • You can prevent or lessen the effect of cyberattacks by crafting strong passwords, using two-step verification, being careful while downloading attachments, and taking precautionary measures when you visit websites.
  • You can protect your mobile phone by avoiding saving sensitive or financial data on your mobile phone or safeguarding your data by using specific methods such as tokenization and/or encryption; locking your phone when not in use; avoiding saving passwords, and avoiding saving personalized contacts list.
  • You can protect your social network accounts by avoiding revealing your location, keeping your birthdate hidden, and avoiding linking your social accounts.
  • You can avoid or lessen exposure to cyber threats by using security software such as firewalls, Virtual Private Networks (VPNs), antivirus, and antispyware. You also need to update them regularly.
  • Critical cyber threats are those actions that, if carried out, may have a debilitating effect on organizations or even countries.
  • Critical cyber threats can have different types, such as cyber terrorism, cyber warfare, and cyber espionage.
  • You can utilize and understand effective security methods such as cryptography, digital forensics, intrusion detection, and legal recourses.