\documentclass[10pt,a4paper]{article} % Packages \usepackage{fancyhdr} % For header and footer \usepackage{multicol} % Allows multicols in tables \usepackage{tabularx} % Intelligent column widths \usepackage{tabulary} % Used in header and footer \usepackage{hhline} % Border under tables \usepackage{graphicx} % For images \usepackage{xcolor} % For hex colours %\usepackage[utf8x]{inputenc} % For unicode character support \usepackage[T1]{fontenc} % Without this we get weird character replacements \usepackage{colortbl} % For coloured tables \usepackage{setspace} % For line height \usepackage{lastpage} % Needed for total page number \usepackage{seqsplit} % Splits long words. %\usepackage{opensans} % Can't make this work so far. Shame. Would be lovely. \usepackage[normalem]{ulem} % For underlining links % Most of the following are not required for the majority % of cheat sheets but are needed for some symbol support. \usepackage{amsmath} % Symbols \usepackage{MnSymbol} % Symbols \usepackage{wasysym} % Symbols %\usepackage[english,german,french,spanish,italian]{babel} % Languages % Document Info \author{gonax133} \pdfinfo{ /Title (awareness-module-3.pdf) /Creator (Cheatography) /Author (gonax133) /Subject (Awareness Module 3 Cheat Sheet) } % Lengths and widths \addtolength{\textwidth}{6cm} \addtolength{\textheight}{-1cm} \addtolength{\hoffset}{-3cm} \addtolength{\voffset}{-2cm} \setlength{\tabcolsep}{0.2cm} % Space between columns \setlength{\headsep}{-12pt} % Reduce space between header and content \setlength{\headheight}{85pt} % If less, LaTeX automatically increases it \renewcommand{\footrulewidth}{0pt} % Remove footer line \renewcommand{\headrulewidth}{0pt} % Remove header line \renewcommand{\seqinsert}{\ifmmode\allowbreak\else\-\fi} % Hyphens in seqsplit % This two commands together give roughly % the right line height in the tables \renewcommand{\arraystretch}{1.3} \onehalfspacing % Commands \newcommand{\SetRowColor}[1]{\noalign{\gdef\RowColorName{#1}}\rowcolor{\RowColorName}} % Shortcut for row colour \newcommand{\mymulticolumn}[3]{\multicolumn{#1}{>{\columncolor{\RowColorName}}#2}{#3}} % For coloured multi-cols \newcolumntype{x}[1]{>{\raggedright}p{#1}} % New column types for ragged-right paragraph columns \newcommand{\tn}{\tabularnewline} % Required as custom column type in use % Font and Colours \definecolor{HeadBackground}{HTML}{333333} \definecolor{FootBackground}{HTML}{666666} \definecolor{TextColor}{HTML}{333333} \definecolor{DarkBackground}{HTML}{4F4F4F} \definecolor{LightBackground}{HTML}{F4F4F4} \renewcommand{\familydefault}{\sfdefault} \color{TextColor} % Header and Footer \pagestyle{fancy} \fancyhead{} % Set header to blank \fancyfoot{} % Set footer to blank \fancyhead[L]{ \noindent \begin{multicols}{3} \begin{tabulary}{5.8cm}{C} \SetRowColor{DarkBackground} \vspace{-7pt} {\parbox{\dimexpr\textwidth-2\fboxsep\relax}{\noindent \hspace*{-6pt}\includegraphics[width=5.8cm]{/web/www.cheatography.com/public/images/cheatography_logo.pdf}} } \end{tabulary} \columnbreak \begin{tabulary}{11cm}{L} \vspace{-2pt}\large{\bf{\textcolor{DarkBackground}{\textrm{Awareness Module 3 Cheat Sheet}}}} \\ \normalsize{by \textcolor{DarkBackground}{gonax133} via \textcolor{DarkBackground}{\uline{cheatography.com/211069/cs/45683/}}} \end{tabulary} \end{multicols}} \fancyfoot[L]{ \footnotesize \noindent \begin{multicols}{3} \begin{tabulary}{5.8cm}{LL} \SetRowColor{FootBackground} \mymulticolumn{2}{p{5.377cm}}{\bf\textcolor{white}{Cheatographer}} \\ \vspace{-2pt}gonax133 \\ \uline{cheatography.com/gonax133} \\ \end{tabulary} \vfill \columnbreak \begin{tabulary}{5.8cm}{L} \SetRowColor{FootBackground} \mymulticolumn{1}{p{5.377cm}}{\bf\textcolor{white}{Cheat Sheet}} \\ \vspace{-2pt}Not Yet Published.\\ Updated 16th September, 2025.\\ Page {\thepage} of \pageref{LastPage}. \end{tabulary} \vfill \columnbreak \begin{tabulary}{5.8cm}{L} \SetRowColor{FootBackground} \mymulticolumn{1}{p{5.377cm}}{\bf\textcolor{white}{Sponsor}} \\ \SetRowColor{white} \vspace{-5pt} %\includegraphics[width=48px,height=48px]{dave.jpeg} Measure your website readability!\\ www.readability-score.com \end{tabulary} \end{multicols}} \begin{document} \raggedright \raggedcolumns % Set font size to small. Switch to any value % from this page to resize cheat sheet text: % www.emerson.emory.edu/services/latex/latex_169.html \footnotesize % Small font. \begin{multicols*}{2} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Malware}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{Malware is intrusive software designed by cybercriminals to steal data or harm systems (Cisco).% Row Count 2 (+ 2) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{x{2.96 cm} x{5.04 cm} } \SetRowColor{DarkBackground} \mymulticolumn{2}{x{8.4cm}}{\bf\textcolor{white}{Types of malware}} \tn % Row 0 \SetRowColor{LightBackground} Adware & Displays unwanted advertisements on your screen. \tn % Row Count 2 (+ 2) % Row 1 \SetRowColor{white} Spyware & Observes your computer activity and reports it to the attacker. \tn % Row Count 5 (+ 3) % Row 2 \SetRowColor{LightBackground} Viruses & Infects files or system areas and spreads by self-replicating \tn % Row Count 8 (+ 3) % Row 3 \SetRowColor{white} Worms & Spreads by self-replicating without user action. \tn % Row Count 10 (+ 2) % Row 4 \SetRowColor{LightBackground} Trojans & Masquerades as legitimate software while executing malicious actions. \tn % Row Count 13 (+ 3) % Row 5 \SetRowColor{white} Ransomware & Encrypts systems and data, demanding ransom for decryption \tn % Row Count 16 (+ 3) % Row 6 \SetRowColor{LightBackground} Rootkit & Gains admin access and is difficult to remove. \tn % Row Count 18 (+ 2) % Row 7 \SetRowColor{white} Keyloggers & Programs that log keystrokes. \tn % Row Count 20 (+ 2) % Row 8 \SetRowColor{LightBackground} Malicious crypto miners & Uses your computer to mine cryptocurrency for attackers \tn % Row Count 23 (+ 3) \hhline{>{\arrayrulecolor{DarkBackground}}--} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Malware Detection \& Prevention}} \tn % Row 0 \SetRowColor{LightBackground} \mymulticolumn{1}{x{8.4cm}}{First Step if Infected:} \tn \mymulticolumn{1}{x{8.4cm}}{\hspace*{6 px}\rule{2px}{6px}\hspace*{6 px}Disconnect from the network immediately.} \tn % Row Count 2 (+ 2) % Row 1 \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{Detection/Removal Tools} \tn \mymulticolumn{1}{x{8.4cm}}{\hspace*{6 px}\rule{2px}{6px}\hspace*{6 px}Anti-malware, endpoint security, network monitoring, Antivirus software (updated regularly).} \tn % Row Count 5 (+ 3) \hhline{>{\arrayrulecolor{DarkBackground}}-} \SetRowColor{LightBackground} \mymulticolumn{1}{x{8.4cm}}{{\bf{Prevention Tips}} \newline - Keep OS/apps patched and updated. \newline - Verify email senders before opening attachments. \newline - Avoid suspicious downloads and links. \newline - Disable macros in Office documents (unless needed). \newline - Use antivirus, firewalls, and email filters. \newline - Beware of social engineering attempts.} \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{How Malware Spreads}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{1) Opening a malicious email attachment. \newline % Row Count 1 (+ 1) 2) Visiting unsafe websites. \newline % Row Count 2 (+ 1) 3) Downloading files from untrusted sources. \newline % Row Count 3 (+ 1) 4) Clicking malicious links in messages (e.g., WhatsApp, Facebook). \newline % Row Count 5 (+ 2) 5) Using unknown USBs, SD cards, or CDs% Row Count 6 (+ 1) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \SetRowColor{LightBackground} \mymulticolumn{1}{x{8.4cm}}{{\bf{{\emph{Key Reminder}} : Never use USB memory sticks that you may have found in common areas. They may have been planted there intentionally for you to find with the hope you would insert them into your computer}}} \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Zero-day Attacks}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{A zero-day attack exploits an unknown hardware, firmware, or software vulnerability with no available immediate fix. \newline % Row Count 3 (+ 3) {\bf{Life Cycle}}: Vulnerability found → exploit created → attack occurs → vendor discovers → patch released.% Row Count 6 (+ 3) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \SetRowColor{LightBackground} \mymulticolumn{1}{x{8.4cm}}{{\bf{{\emph{Key Note:}} Users usually cannot stop zero-day attacks directly. Only way to prevent it is wareness + safe practices (patching, avoiding phishing, careful downloads) reduce risk.}}} \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Viruses}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{According to CISA, a virus infects files or system areas and self-replicates% Row Count 2 (+ 2) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{x{2.888 cm} x{2.736 cm} x{1.976 cm} } \SetRowColor{DarkBackground} \mymulticolumn{3}{x{8.4cm}}{\bf\textcolor{white}{Virus Symptoms}} \tn % Row 0 \SetRowColor{LightBackground} Slow performance & Corrupted or missing files & Pop-up and adware \tn % Row Count 2 (+ 2) % Row 1 \SetRowColor{white} Program and operating crash & Spinning hard drive & System \seqsplit{malfunctions} \tn % Row Count 4 (+ 2) \hhline{>{\arrayrulecolor{DarkBackground}}---} \SetRowColor{LightBackground} \mymulticolumn{3}{x{8.4cm}}{{\bf{{\emph{Effects:}} Stolen personal information i.e. Identity theft \& Lost account access}}} \tn \hhline{>{\arrayrulecolor{DarkBackground}}---} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Ransomware}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{Malware that encrypts files, making them and related systems unusable. \newline % Row Count 2 (+ 2) Ransomware encrypts files, demanding payment for decryption. It's a major threat to all industries, often spread through phishing emails with malicious attachments.% Row Count 6 (+ 4) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Denial-of-Service (Dos) Attacks}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{A Denial-of-Service (DoS) attack disrupts systems, devices, or networks by overwhelming them with traffic, preventing legitimate access. This can halt business operations, affect services like email, websites, and messaging, and result in financial loss. Attackers may be motivated by financial gain, hacktivism, or system access attempts% Row Count 7 (+ 7) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Distributed DoS (DDos)}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{A Distributed Denial-of-Service (DDoS) attack occurs when multiple hijacked devices overwhelm a target system. Attackers exploit vulnerabilities to control these devices and direct them to flood the host with traffic% Row Count 5 (+ 5) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Advance persistent threat}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{An Advanced Persistent Threat (APT) is a long-term, stealthy attack on networks by nation-states, state-sponsored groups, or organized crime, aiming for intelligence, military, or financial gains.% Row Count 4 (+ 4) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \SetRowColor{LightBackground} \mymulticolumn{1}{x{8.4cm}}{{\bf{Protection}} \newline 1. Use Multi-Factor Authentication (MFA). \newline 2. Never share credentials. \newline 3. Report suspicious activity (e.g., mouse moving by itself, odd files appearing). \newline 4. Cyber teams monitor for unusual patterns, but users are often first line of defense.} \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{x{3.52 cm} x{4.48 cm} } \SetRowColor{DarkBackground} \mymulticolumn{2}{x{8.4cm}}{\bf\textcolor{white}{Signs of a DoS/DDoS Attack:}} \tn % Row 0 \SetRowColor{LightBackground} Slow network performance & Inaccessible websites \tn % Row Count 2 (+ 2) % Row 1 \SetRowColor{white} Inaccessible servers & Failed authentication attempts \tn % Row Count 4 (+ 2) \hhline{>{\arrayrulecolor{DarkBackground}}--} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Avoiding DDoS/DoS Attacks}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{1) Use antivirus software on personal devices. \newline % Row Count 1 (+ 1) 2) Enable a firewall for protection. \newline % Row Count 2 (+ 1) 3) Secure your devices vulnerabilities on hardware/ software% Row Count 4 (+ 2) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} % That's all folks \end{multicols*} \end{document}