HOME Topic #1 What is Cyber Safety? Topic #2

Cyber Safety

Information on Cyber Safety Topics

What is Cyber Safety?


Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good internet etiquette. Cybersecurity prevents hackers stealing your information for often monetary.

Cyber Safety Rules


1. Keep Personal Information Professional and Limited

2. Keep Your Privacy Settings On

3. Practice Safe Browsing

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

Topic #1 What is Cyber Attack?


Cyberattacks can be referenced where computers or computer networks has been attempted to being exposed, altered, disabled, destroyed, or gain unauthorized access. This can happen to many businesses or even government facilities. This usually on a daily basis, and many people have to struggle with the attack coming in. Common types of cyberattacks include malware, phishing, DNS Tunneling, and SQL ijection. The most common one is malware, where it is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Make sure to keep your software updated, have a firewall, and get solid wifi security to prevent attacks to occur.

There are 7 phases of a cyber attack:

Step 1 - Reconnaissance, where hackers first identify a vulnerable target and explore the best ways to exploit it

Step 2 - Weaponization, where the hacker uses the information that they gathered in the previous phase to create the things they will need to get into the network.

Step 3 - Delivery, where phishing e-mails are sent, Watering Hole web pages are posted to the Internet and the attacker waits for all the data they need to start rolling in.

Step 4 - Exploitation, where the hacker tries usenames and passwords against web-based e-mail systems or VPN connections to the company network.

Step 5 - Installation, where the attacker makes sure that they continue to have access to the network.

Step 6 - Command and control, where they have access to the network, administrator accounts, and all the needed tools are in place.

Step 7 - Action on objective, where now they have control of their objectives.

Topic #2 What is phishing?


Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat. Victims are usually tricked into disclosing information they know should be kept private. In a phishing email, cybercriminals will typically ask for your:

Date of birth

Social security numbers

Phone numbers

Credit card details

Home address

Password information

Just like everything else on the internet, phishing email attacks have evolved over the years to become more intricate, enticing, and tougher to spot. To successfully pinpoint and flag suspicious messages in their inbox, all your users must be familiar with the different forms a phishing email can take on. Examples of phishing include: Phishing Emai, Spear Phishing, Link Manipulation, Fake Websites, and Session Hijacking.