Page 47 - Cyber Safety C-8
P. 47
Threat Type Definition Working Example
Emotet A sophisticated modular Initially distributed through Malicious
malware primarily used as spam emails, it downloads email
a banking Trojan but later additional payloads, steals attachments
evolved into a platform for credentials, spreads laterally are spreading
delivering multiple malware through networks, and Emotet across
strains. creates backdoors for further corporate
attacks. networks.
DoS / DDoS Attacks designed to Attackers use multiple A commercial
Attacks overwhelm a system, compromised devices to website is
network, or service by send high volumes of traffic, going offline
flooding it with excessive exhausting server resources, due to a
traffic, rendering it causing slowdowns or massive DDoS
unavailable to legitimate complete service outages. attack.
users.
Cloud Security weaknesses Arises from poor access Data
Vulnerabilities in cloud infrastructure, control, outdated APIs, leakage from
configurations, or services misconfigurations, or flaws misconfigured
can expose sensitive data or in virtualisation architecture, cloud storage
compromise digital assets. enabling unauthorised buckets.
access, data breaches, or
service disruption.
21 st
TRUST TRAP ROLE-PLAY Century #Collaboration
Skills #Social Interaction
With the help of role play, demonstrate the concept of social engineering. The tasks for the roleplay are as
follows:
Students are given scenario cards:
o Fake bank call
o Delivery person asking for OTP
o Fake tech-support
One student plays the “attacker,” another plays the “victim.”
Class observes and identifies:
o What trick was used (fear, urgency, authority)
o How the victim could stay safe
Cyber Protection and Security Basics 45

