COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
For $1, 000:Chain emails are____
A
A way to ensure you have good luck
B
A way to stay in touch with your friends
C
A way for you to help cybercriminals to spread scams and tricks
D
None of these
Explanation: 

Detailed explanation-1: -Attackers will commonly use phishing emails to distribute malicious links or attachments that can perform a variety of functions. Some will extract login credentials or account information from victims.

Detailed explanation-2: -Spoofing is when someone disguises an email address, sender name, phone number, or website URL-often just by changing one letter, symbol, or number-to convince you that you are interacting with a trusted source.

Detailed explanation-3: -SMS phishing–or smishing–attacks work in much the same way as an email attack; presenting the victim with a fraudulent offer or fake warning as an incentive to click through to a malicious URL.

Detailed explanation-4: -Attackers use publicly available information about your organisation and users to make their phishing (and particularly spear phishing) messages more convincing. This is often gleaned from your website and social media accounts (information known as a ‘digital footprint’).

There is 1 question to complete.