Man-in-the-Middle (MITM)

Welcome to your Man-in-the-Middle (MITM)

Is it safe to connect your laptop or mobile device into the public the following networks? (Mark all that apply)
If I connect into an open unknown or neighboring network, is it safe to enter private information such as passwords, bank account information, etc.?
What is an SSL certificate, and what does it do?
(Check all that apply)
Should I enter private information into a website that doesn’t have an SSL?

Ransomware

Welcome to your Ransomware

Which of the following is an indication of ransomware?

Password Attacks – Brute force

Welcome to your Password Attacks – Brute force

The following password policies should be used
(Check all that apply)

Malware/Adware/Spyware/Viruses

Welcome to your Malware/Adware/Spyware/Viruses

If you receive an alert while visiting a website prompting you to do a scan on your computer because a virus was detected, what should you do?
When you receive pop-ups requesting you to perform an update, what should you do?
How does a virus/adware/malware become installed?
What is more dangerous?
Define Malware
Define Adware
Define a Virus
When downloading something from your web browser (Chrome, Firefox, Edge, Safari, etc.), and a window opens offering free trial software, (i.e.  free anti-virus from McAfee), what should you do?
When a browser asks me to save cookies, what are they, and what should I do? (Mark all that apply)

Insider Attacks

Welcome to your Insider Attacks

If I notice unusual user activity, who should I report it to?

Denial of Service (DoS)

Welcome to your Denial of Service (DoS)

Which of these are potential DDoS attack targets?
Can my computer be used as a DDoS by a hacker?

Phishing

Welcome to your Phishing

How do I verify if an email or link is legitimate?
(Check all that apply)
When you visit a website and are interested in advertising:

Advanced Persistent Threats (APT)

Welcome to your Advanced Persistent Threats (APT)

Is it okay to connect a personal USB or device into a computer?