1/10
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Influence Campaign
A type of cyberwarfare used to sway the public opinion and spread fake news
Step 1 of the Influencing Process
Create fake users
Step 2 of the Influencing Process
Create content
Step 3 of the Influencing Process
Post on social media
Step 4 of the Influencing Process
Amplify message
Step 5 of the Influencing Process
Wait for real users to interact with and share the content
Step 6 of the Influencing Process
Mass media picks up the story
Tailgating
NoTechHacking, blending in and pretending to belong in a space to gain unauthorized access to a building
Invoice Scams
A spear phishing attack where the attacker sends a fake invoice to the person in charge of payments to gain money
Credential/Password Harvesting
Password theft through clicking on malicious documents that download credential-harvesting malware in the background
Macro-Script Malware
Malicious code embedded in documents to automate harmful actions, such as ransomware or spyware