Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:emai:spam [2021-06-04 12:30] – vesely | public:emai:spam [2021-10-26 10:01] – vesely | ||
---|---|---|---|
Line 3: | Line 3: | ||
Motto: | Motto: | ||
- | * Bad news = You can not be prepared to all attacker’s inventions | + | * **<font inherit/ |
- | * Good news = Being slightly more clever, than the attacker expects you are, is enough. | + | * **<font inherit/ |
- Quick and automate reaction makes troubles. | - Quick and automate reaction makes troubles. | ||
Line 11: | Line 11: | ||
* Better safe, than sorry. | * Better safe, than sorry. | ||
+ | * Be brave! Never try to conceal your possible mistake - take it in possitive way - we all learn from mistakes. We all :-) | ||
+ | * Cowards who awkwardly try to avoid of mistake revealing usualy make things much worse for them and for the rest of the institution. | ||
- | [[https:// | + | Bonuses: |
+ | |||
+ | [[https:// | ||
[[https:// | [[https:// | ||
Line 18: | Line 22: | ||
---- | ---- | ||
- | See **"[[: | + | See also "**[[: |
+ | |||
+ | and **[[: | ||
---- | ---- | ||
Line 25: | Line 31: | ||
=== spam === | === spam === | ||
+ | |||
+ | [Classification: | ||
* Unsolicited mail, just offers unneeded or annoying things. | * Unsolicited mail, just offers unneeded or annoying things. | ||
Line 31: | Line 39: | ||
=== hoax === | === hoax === | ||
+ | |||
+ | [Classification: | ||
* By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth. | * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth. | ||
Line 37: | Line 47: | ||
=== phishing === | === phishing === | ||
+ | |||
+ | [Classification: | ||
* Ask for confidential and private information, | * Ask for confidential and private information, | ||
Line 43: | Line 55: | ||
=== spoofing === | === spoofing === | ||
+ | |||
+ | [Classification: | ||
* The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc. | * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc. | ||
Line 49: | Line 63: | ||
=== malware === | === malware === | ||
+ | |||
+ | [Classification: | ||
* The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message. | * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message. | ||
Line 54: | Line 70: | ||
=== ransomware === | === ransomware === | ||
+ | |||
+ | [Classification: | ||
* Special malware __encrypting every data__ | * Special malware __encrypting every data__ | ||
* Avoid being infected by malware. | * Avoid being infected by malware. | ||
- | ==== What to do, if you become a target of the cyber attack ==== | + | ==== What to do, if you are uncertain about email (possible |
- | - Thing first, check all circumstances, | + | - Thing first, check all circumstances, |
- | - Do not accept | + | - Do not allow the time presure |
- | - Only if you are sure, make some settings, password change etc. | + | - Only if you are absolutely |
- | - In case of any suspicion, | + | - In case of any suspicion |
- | - If you have by mistake | + | - If you think you have compromised your password |
In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, | In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, | ||