0% found this document useful (0 votes)
64 views1 page

Sample Article Summary Assignment

Three sentences summarizing the key points: Cyber attacks can disguise themselves as messages from known contacts or familiar businesses to trick users into opening malicious files or clicking links. If a cyber attack is successful, the attacker may encrypt files and demand a ransom payment in cryptocurrency to regain access. The best defense is to be cautious of any unfamiliar messages, files, or links and to avoid downloading apps or opening files from unknown sources to prevent becoming vulnerable to attacks.

Uploaded by

DB
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views1 page

Sample Article Summary Assignment

Three sentences summarizing the key points: Cyber attacks can disguise themselves as messages from known contacts or familiar businesses to trick users into opening malicious files or clicking links. If a cyber attack is successful, the attacker may encrypt files and demand a ransom payment in cryptocurrency to regain access. The best defense is to be cautious of any unfamiliar messages, files, or links and to avoid downloading apps or opening files from unknown sources to prevent becoming vulnerable to attacks.

Uploaded by

DB
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Sample Article Summary Assignment #1

Prepared by: Dr. Cindi Nadelman

Date: May 26. 2018

ECS 6200 – Managing Information Security

Article Title: Could a Cyber Attack Knock Out Your Computer?


Reference: https://www.lifewire.com/cyber-attacks-4147067

Cyber-attacks disguise themselves in a variety of ways ranging from email messages


that appear to be sent from a person in your contacts list, to malicious files sent as
attachments from a familiar source such as your bank or other businesses you frequent.
Understanding what not to do may be just as important as what to do when these
events occur.

In the event of a successful cyber-attack, the attacker may demand some form of ransom
payment to regain access to your files that have either been compromised or stolen.
Releasing control is usually requested in the form of cryptocurrency which is much
more difficult to track.

Downloading apps from unknown developers, opening files from random email
sources, visiting infected web sites, or clicking on links that are unfamiliar to you may
all be ways you are lured in and cause you to be more vulnerable to attacks.

The best way to protect yourself is to be keenly aware as you search the web or read
through your email messages. Training yourself to spot a potential attack is your best
defense and the the best way to protect yourself from cyber-attacks.

You might also like