►
From YouTube: CFCS Main Meeting 20230212
Description
BobG was our speaker for this month's meeting. He spoke on Cyber Security A to Z. Excellent presentation. Please click on the thumbs-up icon to like this video as it will help our YouTube status for our channel.
A
B
You
appreciate
you
all:
attending
and
I
have
a
cool
windy
day
here
in
the
Orlando
area,
but
we'll
get
through
it
and
I'm
glad
nobody's
mentioning
any
any
information
whatsoever
on
the
Super
Bowl
I.
Don't
want
to
hear
the
story,
putting
it
on
a
BCR
but
Bob.
Thank
you
very
much
for
being
here.
Looking
forward
to
your
security
presentation
and
the
floor
is
yours.
B
C
C
C
So
what
is
cyber
security?
Cyber
security
ensures
the
confidentiality,
integrity
and
availability
of
information
and
systems.
This
means
protecting
against
unauthorized
access
or
modification
of
data,
ensuring
that
systems
are
available
for
use
when
needed
and
maintaining
the
privacy
of
information
sit
back
and
let
me
provide
you
with
the
information
needed,
so
you
can
use
best
practices
to
stay
secure.
C
The
next
24,
slides
and
videos
will
give
you
all
the
information
you
need
to
become
a
cyber
security,
Guru
I
know
A
to
Z
should
be
26,
slides,
there's
nothing
interesting
or
important
for
the
letters
X
and
Y,
and
by
the
time
we
finish
this
journey.
That's
probably
a
good
thing:
I
use
chat,
GPT
in
creating
this
presentation
and
edited
it
its
import
to
eliminate
some
errors
and
repetitiveness.
C
Some
repeats,
however,
are
there
to
drive
home
the
information,
let's
start
off,
with
a
always
update
your
software
and
operating
system
to
the
latest
version,
and
there
are
several
reasons
why
this
needs
to
be
done.
Asap
a
always
update
your
software
and
operating
system
to
the
latest
version.
It
is
important
to
always
update
your
software
and
operating
system
to
the
latest
version.
For
a
few
key
reasons.
Security
software
updates
often
include
security
patches
that
fix
vulnerabilities
in
the
software.
C
If
you
don't
update
your
software,
you
may
be
at
risk
of
being
exploited
by
hackers
or
malware
improve
functionality.
Software
updates
often
include
new
features
and
improvements
that
can
enhance
the
performance
and
functionality
of
your
device
bug
fixes
software
updates
often
include
fixes
for
bugs
and
issues
that
can
cause
problems
or
negatively
impact
the
performance
of
your
device.
By
keeping
your
software
and
operating
system
up
to
date,
you
can
ensure
that
your
device
is
running
at
its
best
and
is
protected
from
potential
vulnerabilities.
C
It
is
generally
a
good
idea
to
set
your
device
to
automatically
install
updates
when
they
are
available,
so
that
you
don't
have
to
remember
to
do
it
manually,
be
aware
of
phishing
attacks
and
verify
the
authenticity
of
emails
before
clicking
on
any
links
or
downloading
attachments.
Phishing
attacks
are
a
common
type
of
cyber
crime
in
which
attackers
use
fake
emails
or
websites
to
trick
people
into
revealing
sensitive
information
such
as
passwords
or
financial
information.
C
These
attacks
can
be
difficult
to
detect,
as
the
attackers
often
use
tactics
to
make
their
emails
and
websites
look
legitimate,
B
be
aware
of
phishing
attacks
to
protect
yourself
from
phishing
attacks.
It
is
important
to
be
aware
of
their
existence
and
to
be
vigilant
when
interacting
with
emails
or
websites.
Here
are
a
few
tips
to
help
you
verify
the
authenticity
of
emails
and
avoid
phishing
attacks
be
suspicious
of
emails
that
ask
for
sensitive
information
or
that
contain
urgent
or
threatening
language
check
the
sender's
email
address.
C
Is
it
coming
from
a
familiar
domain,
or
does
it
look
suspicious?
Look
for
typos
or
other
anomalies
in
the
email?
Sometimes
attackers
will
use
slight
variations
of
a
legitimate
email
address
or
website
to
fool.
You
do
not
click
on
links
or
download
attachments
from
unfamiliar
sources.
If
you
are
unsure
whether
an
email
is
legitimate,
you
can
try
hovering
over
the
link
to
see
the
destinations
URL
or
you
can
contact
the
sender
to
verify
the
authenticity
of
the
email.
By
following
these
guidelines,
you
can
help
protect
yourself
from
phishing
attacks
and
other
online
threats.
C
C
C
use,
complex
and
unique
passwords
using
complex
and
unique
passwords
is
an
important
step
in
protecting
your
online
accounts
and
personal
information
using
the
same
password
for
multiple
accounts
or
using
easy
to
guess,
passwords
makes
it
easier
for
attackers
to
gain
access
to
your
accounts.
If
you
have
a
lot
of
accounts,
it
can
be
difficult
to
remember
all
your
unique
passwords.
A
password
manager
can
be
a
helpful
tool.
A
password
manager
is
a
program
that
stores
your
passwords
in
a
secure
way
and
allows
you
to
access
them
with
a
single
master
password.
C
This
way,
you
only
have
to
remember
one
password,
instead
of
trying
to
remember
all
of
your
different
passwords
in
addition
to
using
strong
and
unique
passwords.
It
is
also
important
to
regularly
update
your
passwords
and
enable
two-factor
authentication
on
your
accounts
whenever
possible.
To
fact,
actor
authentication
adds
an
extra
layer
of
security
by
requiring
you
to
enter
a
code
that
is
sent
to
your
phone
or
email.
C
The
data
breach
data
breaches
can
have
serious
consequences,
including
Financial
loss
damage
to
reputation
and
legal
liability.
They
can
also
lead
to
identity
theft
and
other
forms
of
cybercrime.
It
is
important
for
organizations
to
have
a
robust
security
measure
in
place
to
protect
against
data
breaches
and
to
have
a
plan
in
place
for
responding
to
a
breach.
If
one
occurs,
individuals
can
also
take
steps
to
protect
themselves
from
data
breaches
by
using
strong
and
unique
passwords,
enabling
two-factor
authentication
on
their
accounts
and
being
cautious
about
sharing
personal
information
online.
C
It
is
also
a
good
idea
to
regularly
monitor
your
accounts
and
credit
report
for
any
suspicious
activity,
enable
a
firewall
on
your
computer
and
router
to
help
protect
against
external
threats.
E
enable
a
firewall,
a
firewall
is
a
security
system
that
monitors
and
controls
incoming
and
outgoing
Network
traffic
based
on
predetermined
security
rules.
C
Firewalls
can
be
implemented
in
Hardware
software
or
a
combination
of
both
enabling
a
firewall
on
your
computer
and
router
can
help
protect
against
external
threats,
such
as
hacking,
malware
and
other
cyber
attacks.
A
firewall
can
block
unauthorized
access
to
your
network
and
prevent
malicious
traffic
from
entering
your
system.
C
Yes,
broad.
Cyber
fraud
refers
to
the
use
of
Internet
to
commit
Financial
crimes
such
as
stealing
money
or
personal
information
F
cyber
fraud.
Cyber
fraud
can
have
serious
consequences
for
both
individuals
and
organizations
it
can
result
in
financial
loss,
damage
their
reputation
and
legal
liability
to
protect
against
cyber
fraud.
It
is
important
to
be
vigilant
when
interacting
with
emails
websites
and
online
accounts.
C
This
includes
using
strong
and
unique
passwords,
enabling
two-factor
authentication
whenever
possible
and
being
cautious
about
sharing
personal
information
online.
It
is
also
a
good
idea
to
regularly
monitor
your
accounts
and
credit
reports
for
any
suspicious
activity
and
to
report
any
incidents
of
cyber
fraud
to
the
appropriate
authorities.
By
taking
these
precautions,
you
can
help
protect
yourself
and
your
organization
from
cyber
fraud
and
other
online
threats.
C
V
grayware
grayware
refers
to
software.
That
is
not
malicious
in
nature,
but
that
may
still
pose
a
risk
to
an
organization's
security.
Examples
of
grayware
include
adware,
spyware
and
pups,
potentially
unwanted
programs,
G
G
grayware
adware
is
software
that
displays
advertisements
on
a
computer
or
device.
While
it
is
not
typically
malicious
in
nature,
it
can
be
annoying
and
may
slow
down
the
performance
of
the
device.
Spyware
is
software.
That's
designed
to
collect
information
about
a
user
without
their
knowledge
or
consent.
C
Pups
stands
for
potentially
unwanted
programs
or
programs
that
may
be
installed
along
with
other
software,
often
without
the
user's
knowledge,
they
can
include
toolbars
browser,
extensions
and
other
types
of
software
that
may
not
be
malicious
in
themselves,
but
that
may
be
unwanted
or
unnecessary.
Grayware
can
pose
a
risk
to
an
organization's
security
because
it
may
consume
resources,
slow
down,
perform
moments
or
expose
sensitive
data.
It
is
important
for
organizations
to
have
policies
and
procedures
in
place
to
prevent
the
installation
of
grayware
and
to
regularly
scan
for
and
remove
any
existing
grayware.
C
C
There
are
several
reasons
why
it
is
important
to
use
https
security,
as
mentioned
https,
provides
an
extra
layer
of
security
by
encrypting
the
data
being
transmitted.
This
makes
it
more
difficult
for
attackers
to
intercept
and
tamper
with
the
data
privacy
https
helps
to
protect
the
privacy
of
users
by
preventing
third
parties
from
being
able
to
see
the
data
being
transmitted.
This
can
be
particularly
important
for
sensitive
information
such
as
Financial
or
personal
Data.
C
Trust,
using
https
can
help
to
build
trust
with
users,
as
it
demonstrates
that
a
website
is
taking
steps
to
secure
the
data
being
transmitted
compatibility.
Many
modern
web
browsers
and
devices
will
not
work
with
websites
that
do
not
use
https,
so
using
http
s
can
help
ensure
compatibility
with
these
systems.
Overall,
using
https
is
an
important
step
in
preventing
the
security
and
privacy
of
users
and
ensuring
the
Integrity
of
the
data
being
transmitted
over
the
internet.
C
My
identity
theft
is
the
unauthorized
used
of
someone's
personal
information,
such
as
their
name
address,
or
financial
information
for
the
purpose
of
committing
fraud
or
other
crimes.
Identity
theft
can
have
serious
consequences,
including
Financial
loss
and
damage
to
reputation,
I,
identity
theft.
Here
are
a
few
steps
you
can
take
to
protect
yourself
from
identity
theft,
use
a
strong
and
unique
password
for
all
your
accounts
and
avoid
using
the
same
password
for
multiple
accounts.
Consider
using
a
password
manager
to
help
you
keep
track
of
your
passwords,
enable
two-factor
authentication
whenever
possible.
C
On
your
accounts,
this
adds
an
extra
layer
of
security
by
requiring
you
to
enter
a
code
that
is
sent
to
your
phone
or
email
in
addition
to
your
password
when
logging
into
an
account
be
careful
about
sharing
personal
information
online,
especially
on
social
media
or
unfamiliar
websites.
Avoid
posting
sensitive
information,
such
as
your
full
name,
address
or
financial
information
online,
regularly
check
your
accounts
and
credit
reports
for
any
suspicious
activity.
C
This
can
help
you
catch
identity,
theft,
early
on
and
minimize
the
damage
when
accessing
sensitive
information
online
make
sure
you
are
using
a
secure
network
avoid
accessing
sensitive
information
on
public
Wi-Fi
networks,
as
these
are
often
unencrypted
and
can
be
easily
accessed
by
hackers.
This
would
be
a
great
time
to
use
your
VPN
by
following
these
guidelines.
You
can
help
protect
yourself
from
identity
theft
and
other
forms
of
cyber
crime.
C
Yay
JavaScript,
which
is
a
programming
language
that
is
often
used
to
create
interactive
features
on
websites.
Javascript,
can
be
used
to
create
features
such
as
form
validation,
image,
sliders
and
pop-up
Windows
J
JavaScript.
There
are
a
few
reasons
why
you
may
want
to
avoid
JavaScript
Security
JavaScript
can
be
used
to
create
vulnerabilities
that
can
be
exploited
by
attackers.
Disabling
JavaScript
can
help
reduce
the
risk
of
these
types
of
attacks.
C
Performance
JavaScript
can
sometimes
slow
down
the
performance
of
a
website,
especially
on
older
or
less
powerful
devices.
Disabling
JavaScript
can
help
improve
the
performance
of
a
website.
Privacy
JavaScript
can
be
used
to
track
a
user's
online
activity
and
collect
data
about
their
browsing
habits.
Disabling
JavaScript
can
help
protect
your
privacy
by
preventing
websites
from
collecting
this
information.
That
being
said,
JavaScript
is
an
important
and
widely
used
technology
and
in
many
cases
it
is
necessary
for
the
proper
functioning
of
a
website.
C
C
A
a
t
logger
a
key
logger
can
be
used
for
malicious
purposes
such
as
stealing
passwords
or
personal
information.
To
avoid
key
thoughters,
you
can
take
the
following:
precaution:
use
antivirus
software
antivirus
software
can
help,
detect
and
remove
key
loggers
and
other
types
of
malware
be
sure
to
keep
your
antivirus
software
up
to
date
and
run
regular
scans
to
check
for
any
malware
infections
use
a
firewall.
It
can
help
prevent
key
loggers
and
other
types
of
malware
from
entering
your
system,
be
sure
to
enable
your
firewall
and
keep
it
up
to
date.
C
C
D
I
have
a
question.
Okay,
my
question
is,
as
far
as
your
website
goes:
I
love
it
everything's
great,
but
I
was
getting
some
other
Meetup
invitations
and
one
I
wasn't
very
happy
about
so
I
put
it
in
this
junk
mail.
What
I
want
to
know
is
if
I
did,
that
is
that
going
to
affect
me
getting
emails
from
you
because
it
looks
like
the
Meetup
is
the
Meetup
the
same
type
of
program,
so
I
was
a
little
scared.
I
won't
be
getting
your
emails
because
I
junk
mailed,
their
email,
I.
C
A
Colleen,
if
you
in
the
chat,
bring
up
the
chat
and
it
says
to
and
draw
in
the
drop
down,
choose
Stan,
Waller,
SM
Waller
and
then
send
him.
Your
email
address
and
he'll.
Add
he'll.
Add
you
to
our
announcement.
So
you
get
ours
separate
from
Meetup.
D
E
L
before
you
start
again,
Bob
good
just
ask
one
thing:
with
the
JavaScript:
is
it
possible
to
set
up
your
system
to
get
a
notification
that
JavaScript
is
being
used.
C
F
C
Another
question
I:
can
we
can
we
save
it
to
the
end
or
we
have
another
break
in
between
anyway?
Let's
let's
do
it
then
Elle
lucky
ransomware
is
a
type
of
malware
that
encrypts
a
victim's
files
and
demands
a
ransom
be
paid
in
order
to
decrypt
them.
It
is
named
after
the
Lockheed
file
extension
that
it
adds
to
the
encrypted
bios
L,
lucky
ransomware,
to
avoid
ransomware.
You
can
take
the
following
precautions:
keep
your
software
and
operating
system
up
to
date
regularly.
C
Installing
updates
for
your
software
and
operating
system
can
help
protect
against
vulnerabilities
that
can
be
exploited
by
ransomware
use
antivirus
software.
This
can
help
detect
and
remove
ransomware
and
other
types
of
malware
be
sure
to
keep
your
antivirus
software
up
to
date
and
run
regular
scans
to
check
for
any
all.
Wear
infections
enable
a
firewall
it
can
help
prevent
ransomware
and
other
types
of
malware
from
entering
your
system
be
sure
to
enable
your
firewall
and
keep
it
up
to
date,
avoid
clicking
on
links
or
downloading
attachments
from
unknown
sources.
C
Ransomware
is
often
spread
through
phishing
emails
or
malicious
websites,
be
cautious
when
clicking
on
links
or
downloading
attachments,
especially
from
unfamiliar
resources,
use
a
backup
system
regularly
backing
up
your
important
files
can
help
protect
against
ransomware.
If
your
files
are
encrypted
by
ransomware,
you
can
restore
them
from
the
backup,
rather
than
paying
the
ransom.
By
following
these
precautions,
you
can
help
protect
yourself
from
ransomware
and
other
forms
of
malware.
C
M
malware
here
are
a
few
of
the
most
common
types
of
malware
virus.
It's
a
type
of
malware
that
is
designed
to
replicate
itself
and
spread
from
one
computer
to
another.
Viruses
can
cause
a
variety
of
problems,
including
damaging
or
deleting
files
corrupting
data
and
slowing
down
a
system.
Worm
is
a
type
of
malware
that
is
designed
to
spread
itself
from
one
computer
to
another.
Often
without
the
user's
knowledge
worms
can
exploit
vulnerabilities
in
software
or
operating
systems,
to
replicate
and
spread
themselves.
C
Trojans
is
a
type
of
malware
that
is
disguised
as
legitimate
software
and
is
designed
to
gain
unauthorized
access
to
a
system.
Turgens
are
often
used
to
steal,
sensitive
information
such
as
login
credentials
or
financial
data.
Ransomware
is
a
type
of
malware
that
encrypts
a
victim's
files
and
demands
are
Ransom
be
paid
in
order
to
decrypt
them.
Ransomware
can
be
particularly
damaging
because
it
can
hold
a
victim's
files
are
still
until
their
answer
is
paid,
and
there
is
no
guarantee
that
the
attacker
will
actually
decrypt
the
files
after
receiving
payment.
C
Adware
is
a
type
of
malware
that
is
designed
to
display
advertising
on
a
victim's
computer.
Adware
can
be
annoying
and
can
slow
down
a
system,
but
it
is
generally
not
as
harmful
as
other
types
of
malware.
By
being
aware
of
these
common
types
of
malware
and
taking
precautions
to
protect
against
them,
you
can
help
keep
your
system
safe
from
harm
network
security
refers
to
the
measures
taken
to
protect
a
computer's
Network
and
the
device
is
connected
to
it
from
unauthorized
access
or
attacks.
C
Network
security
can
include
measures
such
as
firewalls
and
a
virus.
Software
and
intrusion,
detection
systems,
n
network
security,
setting
up
network
security
involves
implementing
a
variety
of
measures
to
protect
a
computer
network
and
the
devices
connected
to
it
from
unauthorized
access
or
attacks.
Here
are
a
few
steps
you
can
take
to
set
up
network
security,
determine
your
security
needs.
The
first
step
in
setting
up
Network
Security
is
to
assess
your
security
needs
and
determine
what
types
of
threats
you
are
most
likely
to
face.
C
This
will
help
you
determine
which
security
measures
are
most
appropriate
for
your
network
Implement
security
measures.
There
are
many
different
types
of
security
measures
that
you
can
Implement
to
protect
your
network.
Some
common
measures
include
firewalls,
antivirus
software
intrusion,
detection
systems
and
network
access
control
systems,
Monitor,
and
update
your
security
regularly
and
update
your
security
measures
to
ensure
that
they
are
effective
and
up
to
date.
This
may
involve
installing
updates
for
your
security
software,
revising
security
policies
and
responding
to
security
breaches
or
threats.
C
Oh
online
privacy,
which
refers
to
protection
of
personal
information
and
activities
while
using
the
internet,
always
use
caution
when
sharing
private
data
and
financial
information.
Oh
online
privacy.
Here
are
a
few
steps
you
can
take
to
protect
your
online
privacy,
use
strong
and
unique
passwords
for
all
your
online
accounts
and
avoid
using
the
same
password
for
multiple
accounts.
C
You
can
use
a
password
manager
to
help
generate
and
store
strong,
unique
passwords,
enabling
two-factor
authentication
gives
you
an
additional
layer
of
security
that
requires
you
to
provide
a
second
form
of
authentication
such
as
a
security
token
or
a
one-time
password.
In
addition
to
your
password,
enabling
two
fa
can
help
protect
against
unauthorized
access
to
your
accounts,
use
a
virtual
private
Network.
It
encrypts
your
Internet
connection
and
hides
your
IP
address.
C
Use
privacy
focused
browsers
and
search
engines
that
block
tracking
cookies
or
anonymize
your
search
queries
using
these
types
of
tools
can
help
protect
your
online
privacy
by
following
these
steps
and
being
mindful
of
your
online
activity,
you
cannot
protect
your
online
privacy
and
keep
your
personal
information
safe
e.
A
password
is
a
secret
string
of
characters
that
is
used
to
verify
the
identity
of
a
user
for
us
seniors,
there's
another
method
other
than
passwords
to
protect
things
we
share
with
the
younger
generation
more
on
that
after
the
next
video
p.
C
A
password
here
are
a
few
best
practices
for
protecting
your
password,
both
online
and
off,
use,
strong
and
unique
passwords.
Don't
share
your
password
avoid
sharing
your
password
with
anyone,
even
trusted
friends
or
family
members.
If
someone
else
knows
your
password,
they
could
potentially
access
your
accounts
or
cause
harm
to
your
systems,
avoid
using
personal
information
in
your
passwords,
such
as
your
name
address
or
birth
date.
C
In
your
passwords,
this
information
is
often
easily
accessible
to
hackers
and
can
make
it
easier
for
them
to
guess
your
password
use
a
strong
password
manager,
which
is
a
tool
that
helps
you
generate,
store
and
manage
strong,
unique
passwords.
A
password
manager
can
help
you
create
and
use
complex
passwords
without
having
to
remember
them,
and
it
can
help
protect
your
passwords
from
being
stolen
or
exposed
protect
your
passwords
offline.
In
addition
to
protecting
your
passwords
online,
it
is
also
important
to
protect
it
offline.
C
You
quarantine
is
a
security
measure
that
involves
isolating
a
device
or
file
that
is
suspected
of
being
infected
with
malware
or
otherwise
poses
a
threat
to
a
system
you
quarantine.
There
are
a
few
different
ways.
You
can
Implement
quarantine
on
a
system
move
the
suspect
file
to
a
separate
location.
One
way
to
quarantine
a
file
is
to
move
it
to
a
separate
location
on
the
system,
such
as
a
designated
quarantine
folder.
C
This
can
help
prevent
the
file
from
being
accessed
or
executed,
and
it
can
also
make
it
easier
to
analyze
or
remove
the
file
later
disconnect
the
device
from
the
network.
If
a
device
such
as
a
computer
or
smartphone
is
suspected
of
being
infected
with
malware
or
otherwise
poses
a
threat
to
the
system,
you
can
quarantine
it
by
disconnecting
it
from
the
network.
This
can
help
prevent
the
device
from
spreading
malware
or
accessing
sensitive
information
use
security.
Software
some
security
software,
such
as
antivirus
programs
or
mobile
device
management
systems,
may
have
built-in
quarantine
capabilities.
C
These
systems
can
be
configured
to
automatically
move
suspect
files
to
a
quarantine
folder
or
to
disconnect
infected
devices
from
the
network
by
implementing
quarantine
measures.
You
can
help
prevent
the
spread
of
malware
and
protect
against
further
damage
to
your
system.
It
is
important
to
regularly
check
and
maintain
your
quarantine
folder
and
to
remove
any
suspect
files
or
devices
from
quarantine
once
they
have
been
cleaned
or
neutralized.
C
Are
recovery
refers
to
the
process
of
restoring
a
system
or
data
after
a
failure
or
data
loss
event,
recovery
can
involve
a
variety
of
activities
such
as
restoring
from
backups
repair,
damaged
systems
or
data,
and
implementing
contingency
plans
are
recovery.
There
are
a
few
key
steps
you
can
take
to
assure
recovery
is
possible
on
a
system
create
regular
backups
on
your
system,
and
data
is
one
of
the
most
important
steps
you
can
take
to
issue.
A
recovery
is
possible.
C
Backups
can
be
used
to
restore
your
system
and
data
after
a
failure
or
data
loss
event
test
your
backups,
which
is
extremely
important
in
ensuring
that
they
are
functioning
properly
and
that
you
can
successfully
restore
from
them
testing
your
backups
can
help
you
identify
any
issues
or
problems
with
your
backup
process
and
address
them
before
a
recovery
is
necessary,
store,
backups
securely
to
protect
your
backups
from
physical
damage
and
unauthorized
access
by
storing
them
in
a
secure
location
such
as
fireproof,
safe
or
off-site
storage
facility.
Implement.
C
A
disaster
recovery
plan,
which
is
a
set
of
procedures
in
guidelines
for
responding
to
and
recovering
from
a
catastrophic
event,
such
as
a
natural
disaster
or
Cyber
attack.
A
well-crafted
disaster
recovery
plan
can
help
ensure
that
you
are
able
to
recover
your
system
and
data
after
a
disaster
and
minimize
downtime
by
following
these
steps
and
regularly
creating
and
testing
backups,
you
can
help
assure
that
recovery
is
possible
on
your
system
in
the
event
of
a
failure
or
data
loss
event.
C
C
S
social
engineering,
social
engineering
is
the
practice
of
manipulating
people
and
to
performing
actions
or
divulging
confidential
information
Often
by
preying
on
their
trust
or
emotions.
Here
are
some
common
forms
of
social
engineering.
Fishing
is
a
type
of
social
engineering
attack
that
involves
sending
fake
emails
or
text
messages
that
appear
to
come
from
a
legitimate
Source,
such
as
a
bank
or
government
agency.
C
These
messages
often
contain
malicious
links
or
attachments
that,
when
clicked
on
can
compromise,
your
security
baiting
is
a
type
of
social
engineering
attack
that
involves
offering
something
attractive,
such
as
a
gift
or
service
in
exchange
for
sensitive
information
or
access
to
a
system.
Scareware
is
a
type
of
social
engineering
attack
that
involves
tricking
users
into
believing
that
their
computer
is
infected
with
a
virus
or
other
malware.
The
attacker
May
then
offer
to
settle
the
victim.
A
fake
antivirus
solution
to
fix
the
problem.
C
Impersonation
is
a
type
of
social
engineering
attack
in
which
the
attacker
poses
as
a
legitimate
authority
figure
or
trusted
individual
in
order
to
gain
access
to
sensitive
information
or
systems.
Pre-Texting
is
a
type
of
social
engineering
attack
in
which
the
attacker
creates
a
fake,
Identity
or
scenario
in
order
to
obtain
sensitive
information
from
the
victim.
Quid
pro
quo
is
a
type
of
social
engineering
attack
in
which
the
attacker
offers
something
in
exchange
for
sensitive
information
or
access
to
a
system.
This
could
be
something
as
simple
as
offering
assistance
in
exchange
for
a
password.
C
T
two-factor
authentication
here
are
some
reasons
why
setting
up
to
fa
is
important.
It
adds
an
extra
layer
of
protection
with
2fa.
Even
if
an
attacker
guesses,
your
password,
they
still
need
another
form
of
authentication
in
order
to
access
your
account
or
system.
This
makes
it
much
more
difficult
for
them
to
gain
access
and
reduces
the
risk
of
your
account
being
compromised.
It
protects
against
phishing
attacks.
Phishing
attacks
are
common
tactics
used
by
attackers
to
trick
users
into
revealing
their
login
credentials
with
2fa
in
place.
C
Even
if
an
attacker
can
obtain
your
login
credentials,
they
still
need
another
form
of
authentication
in
order
to
access
your
account,
it
helps
prevent
unauthorized
access.
2Fa
can
help
prevent
unauthorized
access
to
your
accounts
and
systems
by
requiring
an
additional
form
of
authentication
Beyond,
just
a
username
and
password.
This
can
help
protect
against
unauthorized
access
from
within
your
organization,
as
well
as
from
external
attackers.
Overall
setting
up
2fa
is
an
important
security
measure
that
can
help
protect
your
accounts
and
systems
from
being
compromised
by
attackers.
C
C
You
user
privacy
here
are
some
best
practices
for
setting
up
user
privacy
use
strong
and
unique
passwords
for
all.
Your
online
accounts
avoid
using
the
same
password
for
multiple
accounts
and
consider
using
a
password
manager
to
help
generate
and
store
strong
password,
enable
two-factor
authentication
on
all
your
online
accounts
that
offer
it.
C
These
updates
often
include
fixes
for
vulnerabilities
that
could
be
exploited
by
attackers,
use
privacy
settings
on
your
social
media
and
other
online
accounts
to
control.
Who
can
see
your
personal
information
and
activity
by
following
these
best
practices.
You
can
help
protect
your
personal
information
and
data
from
unauthorized
access
or
misuse.
It
is
important
to
be
proactive
in
safeguarding
your
user
privacy.
In
today's
digital
world
v,
a
virtual
private
network
is
a
security
solution
that
creates
a
secure
encrypted
connection
between
a
device
and
a
network.
C
It
is
often
used
to
protect
data
transmitted
over
a
public
network
from
being
intercepted
by
Third
parties.
The
a
virtual
private
Network,
a
virtual
private
network,
is
a
security
solution
that
creates
a
secure
encrypted
connection
between
a
device
and
a
network.
Here
are
some
of
the
most
important
reasons
for
using
a
VPN
vpns
can
help
protect
your
online
privacy
by
encrypting,
your
internet
activity
and
hiding
your
IP
address.
This
can
prevent
your
online
activity
from
being
monitored
or
tracked
by
Third.
C
Parties
such
as
your
internet
service
provider
or
the
government
vpns
can
enhance
online
security
by
encrypting
your
internet
connection
and
protecting
it
from
cyber
threats
such
as
hackers
and
malware
vpns
can
help
you
bypass
internet
censorship
and
access,
blocked
or
restricted
websites
and
content.
This
can
be
particularly
useful
when
traveling
or
living
in
a
country
with
strict
internet
censorship
laws
vpns
can
allow
you
to
access
content
that
may
be
restricted
based
on
your
location,
such
as
a
streaming
service
or
websites.
C
Vpns
can
help
protect
your
data
from
being
intercepted
or
accessed
by
unauthorized
parties
when
using
public,
Wi-Fi
or
other
untrusted
networks.
Vpns
can
provide
several
important
benefits
for
online
privacy
and
security.
They
are
a
useful
tool
for
anyone
who
is
concerned
about
protecting
their
online
activity
and
data
from
being
monitored
or
accessed
by
Third
parties.
I
personally
use
avasts
secure
line
find
out
more
about
it
by
following
the
building
listed.
A
There's
yeah
I
was
gonna,
say
in
the
chat,
there's
a
question
from
Christopher
Nance.
He
says:
I
found
three
win32
slash
Lodi
threats
on
my
Windows
10
computer
should
I
delete
these.
C
C
Usually
your
free
one
is
the
least
desirable
one
you're
not
going
to
go
through
all
the
work
and
not
charge
for
it.
So
some
of
the
good
features
are
only
available
in
a
paid
version,
but
the
most
important
thing
that
watch
out
for
is
what
do
they
collect
if
they
collect
nothing,
there's
also
nothing
that
they
can
be
forced
to
pass
along.
A
A
H
It
takes
me
a
minute
somehow
it
isn't
responsive
to
the
unmute
mask
request
when,
when
you
get
a
message
or
something
to
do
an
update,
how
do
you
know
for
sure
that
that
update
came
from
Microsoft
or
or
the
vendor
or
when
you
get
them
out?
When
you
get
I
noticed
you're
using
gay
at
best
and
some
of
those
security
software
things
are
offshore.
How
do
you
know
that
they're
not
reloading
things
in
you?
That
are
time
to
give
you
problems
like.
C
H
You
have
an
extension
on
your
browser
in
another
area.
Could
it
reach
it
and
change
your
system
with
Java
to
take
an
update
from
somebody
else
when
you,
when
you
do
Windows
update.
C
C
C
C
C
Wi-Fi
protected
Access,
Wi-Fi,
protected
access.
Wpa
is
a
security
protocol
that
is
used
to
secure
wireless
networks.
It
provides
stronger
security
than
its
predecessor,
WEP
wired,
equivalent
privacy
by
using
encryption
and
other
security
measures
to
protect
against
unauthorized
access.
The
strongest
version
of
WPA
is
WPA2
Wi-Fi
protected
access.
Wpa3
is
an
updated
version
of
WPA,
which
was
introduced
back
in
2004
and
is
currently
the
most
widely
used
security
protocol
for
wireless
networks.
C
Wpa2
uses
Advanced
encryption
techniques
to
provide
strong
security
for
wireless
networks.
It
uses
a
combination
of
temporal
T,
Integrity
protocol,
tkip
and
advanced
encryption
standard
AES
to
encrypt
wireless
data,
transmitted
between
a
device
and
a
wireless
access
point.
It
is
important
to
use
WPA2
or
the
newer
wpa3
if
available
for
your
wireless
network,
because
it
provides
stronger
security
than
earlier
versions
of
WPA
and
other
security
protocols
to
help
protect
against
unauthorized
access
and
cyber
attacks
such
as
Main
in
the
middle
attacks
and
wireless
eavesdropping.
C
Overall,
it
is
recommended
to
use
WPA2
or
wpa3
for
your
wireless
network
to
ensure
the
strongest
security
possible
yeah.
Are
it
really
any
terms
worth
mentioning
that
start
with
the
letters
X
and
Y?
So
the
final
term
is
z,
0
day
attack
Z
zero
day
attack
a
zero
day
attack
is
an
attack
that
exploits
a
previously
unknown
vulnerability,
a
zero
day,
vulnerability
in
a
system
or
software.
C
These
attacks
can
be
particularly
effective
because
there
is
no
defense
against
them
until
the
vulnerability
is
discovered
and
patched
here
are
some
steps
you
can
take
to
protect
against
zero
day.
Attacks
regularly
apply
software
updates
and
patches,
as
they
often
include
fixes
for
vulnerabilities
that
could
be
exploited
by
attackers
use
a
firewall
which
can
help
protect
against
zero
day
attacks
by
blocking
incoming
traffic
from
unknown
or
untrusted
sources
use
antivirus.
It
can
help,
detect
and
prevent
zero
day
attacks
by
identifying
and
blocking
known
malware
and
other
threats.
I
have
used
Avast
since
2003.
C
more
information
is
available
at
the
link
listed
use,
two-factor
authentication,
which
adds
an
extra
layer
of
security
by
requiring
an
additional
form
of
authentication
Beyond
just
a
password.
This
can
help
prevent
zero
day
attacks
from
being
successful.
Even
if
an
attacker
is
able
to
obtain
a
user's
login
credentials.
C
Implement
Network
segmentation,
which
divides
a
network
into
separate
isolated
segments
or
zones.
It
can
help
prevent
the
spread
of
zero
day
attacks
by
limiting
access
to
specific
areas
of
the
network
and
controlling
the
flow
of
traffic
between
them.
Overall,
it's
important
to
be
proactive
in
protecting
against
zero
date,
attacks
by
implementing
multiple
layers
of
security
and
keeping
your
software
and
systems
up
to
date.
C
C
C
C
C
A
new
teacher
was
trying
to
make
use
of
her
psychology
courses.
She
started
her
class
by
saying
everyone
who
thinks
they're
stupid
stand
up.
After
a
few
seconds,
little
Darry
stood
up
and
the
teacher
said:
do
you
think
you're
stupid,
Larry,
no
ma'am,
but
I
hate
to
see
you
standing
there
all
by
yourself.
Thank
you.
C
C
C
B
See
it
said
my
question
is
a
little
long-winded,
but
I've
someplace
picked
up
the
putting
a
phone
number
into
an
email
might
be
available
to
hackers
and
so
I've
seen
where
people
would
put
in
like
407
t
w
o
s
I
x
s
I
x
is
that
worth
doing
because
I've
tried
to
fact
check
it.
Smokes
doesn't
have
any
answer
fact
check
is,
is
not
even
in
existence
now.
I
guess,
that's
primarily
political.
Have
you
heard
anything
at
all
about
this
month?
Was
it
just
a
waste.
C
Of
time
for
me,
it's
a
waste
of
time.
Hackers
aren't
stupid
if
they
were
stupid.
They'd
never
make
any
money.
So
if
you
try
to
try
to
disguise
the
last
four
digits
in
some
other
way,
other
than
actually
posting
them,
they'll
figure
that
part
out
just
as
readily
as
if
you
posted
the
entire
phone
number.
I
Hi
Bob.
Thank
you
I'm.
Sorry,
thanks
for
another
great
presentation,
could
you
speak
to
how
secure
these
password
managers
are
because
I'm
sure
you're
well
aware
that
the
last
pass
was
hacked
a
few
months
ago.
C
C
All
password
managers,
all
security
companies,
are
constantly
under
attack,
so
it's
up
to
them
to
make
sure
that
they
keep
their
guard
up
to
the
max
at
all
times
and
with
LastPass
somebody
found
a
weak
spot
and
they
exploited
it
most
places.
Now
in
companies,
the
weak
spot
is
the
employee.
Once
they
get
past
the
employee
they'll
wind
up
having
access
to
the
company's
information.
I
C
I
have
not,
and
their
information
hasn't
been
compromised.
There's
been
some
information
that
was
harvested
and
there
are
some
encrypted
information
that
the
hackers
got,
whether
they'll
ever
use
it,
whether
they'll
ever
unencrypt
it
and
what's
exactly
in
it
I,
don't
know,
I
have
no
clue,
but
I
haven't
heard
of
any
real
problems
of
anyone.
Who's
used,
LastPass.
A
A
Just
to
go
through
and
make
sure
that
there's
no,
you
know,
because
even
even
in
the
site
you
go
to,
you
know:
I'm,
a
member
of
of
the
retired
military
and
the
office
of
personnel
management
was
hacked
by
China
and
if
you
I
would
have
thought
one
of
the
most
secure
systems
that
nobody
could
break
into
would
be
OPM,
they
got
everything.
Names
addresses,
Social,
Security
numbers,
birth,
dates,
security,
information,
everything,
so
I
just
changed
my
passwords,
whether
or
not
I'm
concerned
about
the
password
manager
well,.
C
C
G
G
I
just
wanted
to
let
everybody
know
that
when
you
do
set
up
your
two-factor
authentication,
if
you
choose
to
use
a
an
authenticator
app
like
a
Google
authenticator,
there's
no
rule
that
says
that
you
can
only
use
one
authenticator
if
you
would
like
to
set
up
a
second
authenticator,
and
you
have
that
16
digit
code
that
I
had
mentioned
in
the
first
half
of
the
meeting,
you
can
set
up
a
different
authenticator
on
a
different
device
like
Windows
or
your
tablet,
and
as
you
can,
if
your
phone
is
unavailable
or
you
just
don't
want
to
get
it
from
the
other
room,
you
can
have
a
second
two-factor
authentication,
generator
item
or
program
or
app,
whether
it
be
on
Windows
or
Android
or
iPad,
and
have
a
second
way
of
getting
into
your
two-factor
authenticated
protected
websites.
C
F
B
I
also
elected,
thank
you
very
much
for
very
informative,
a
lot
of
good
food
for
thought,
and
it
can't
be
too
safe
out
there
for
sure
they're
trying
to
get
you
okay.
Well,
thanks
for
all
for
coming,
stay,
safe
and
we'll
see
you
next
time,
bye.