Page 47 - Cyber Safety C-8
P. 47

Threat Type               Definition                       Working                   Example
                  Emotet           A sophisticated modular         Initially distributed through     Malicious
                                   malware primarily used as       spam emails, it downloads         email
                                   a banking Trojan but later      additional payloads, steals       attachments
                                   evolved into a platform for     credentials, spreads laterally    are spreading
                                   delivering multiple malware  through networks, and                Emotet across
                                   strains.                        creates backdoors for further  corporate
                                                                   attacks.                          networks.

                  DoS / DDoS       Attacks designed to             Attackers use multiple            A commercial
                  Attacks          overwhelm a system,             compromised devices to            website is
                                   network, or service by          send high volumes of traffic,     going offline
                                   flooding it with excessive      exhausting server resources,      due to a
                                   traffic, rendering it           causing slowdowns or              massive DDoS
                                   unavailable to legitimate       complete service outages.         attack.
                                   users.

                  Cloud            Security weaknesses             Arises from poor access           Data
                  Vulnerabilities  in cloud infrastructure,        control, outdated APIs,           leakage from
                                   configurations, or services     misconfigurations, or flaws       misconfigured
                                   can expose sensitive data or  in virtualisation architecture,     cloud storage
                                   compromise digital assets.      enabling unauthorised             buckets.
                                                                   access, data breaches, or
                                                                   service disruption.






                                                                                             21 st
                                          TRUST TRAP ROLE-PLAY                              Century   #Collaboration
                                                                                             Skills  #Social Interaction

                 With the help of role play, demonstrate the concept of social engineering. The tasks for the roleplay are as
                 follows:

                     Students are given scenario cards:
                    o  Fake bank call
                    o  Delivery person asking for OTP

                    o  Fake tech-support
                     One student plays the “attacker,” another plays the “victim.”
                     Class observes and identifies:

                    o  What trick was used (fear, urgency, authority)
                    o  How the victim could stay safe







                                                                                 Cyber Protection and Security Basics  45
   42   43   44   45   46   47   48   49   50   51   52