COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Follow the link and reset password.
|
|
Ignore the email and delete it.
|
|
Reset your password manually.
|
|
None of the above
|
Detailed explanation-1: -Unexpected or suspicious email attachments should never be opened. They may execute a disguised program (malware, adware, spyware, virus, etc.) that could damage or steal your data. If in doubt, call the sender to verify.
Detailed explanation-2: -For example: The user is redirected to myuniversity.edurenewal.com, a bogus page appearing exactly like the real renewal page, where both new and existing passwords are requested. The attacker, monitoring the page, hijacks the original password to gain access to secured areas on the university network.
Detailed explanation-3: -Which of the following is an example of a “phishing” attack? Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.
Detailed explanation-4: -If you got a phishing email, forward it to the Anti-Phishing Working Group at reportphishingapwg.org . If you got a phishing text message, forward it to SPAM (7726). Report the phishing attempt to the FTC at ReportFraud.ftc.gov.