Show Menu
Cheatography

Awareness Module 5 Cheat Sheet (DRAFT) by

This cheat sheet summarizes the key concepts from Module 5 to help with quiz preparation.

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Steps to secure the network

Strong Wi-Fi Password
Change the default password to a unique, complex one
Enable Encryption
Use WPA3 or WPA2 for secure Wi-Fi.
Update Firmware
Regularly update your router’s firmware for security patches.
Use Newer Hardware
Upgrade to a modern router­/modem for better security and perfor­mance.
Create a Guest Network
Isolate guest users to prevent access to your main network.
Secure IoT Devices
Use strong, unique passwords and update firmware regularly
Enable Firewall
Configure your router's firewall to block unwanted traffic

Classified vs. Public Data

Sensit­ive­/Cl­ass­ified
Public
PII, health, financial, legal docs, trade secrets.
Newsle­tters, Public flyers.
Rule: If unsure, treat as sensitive.

Urgent vs. Non-Urgent (Florida Law §282.3185)

Level
State
Report Within
Emergency
Ransomware disabling emergency services
12 hours
Severe
Large-­scale data exposure
48 hours
High
Credential theft, DoS attack
48 hours
Medium
Suspicious but contained
Report IT
Low
minimal risk (forgotten password, scan alerts)
Report IT

Incident Detection and Response

In the context of cybers­ecu­rity, an incident is an abnormal event that might impact an organi­zat­ion's or agency's normal operat­ions.

Cybers­ecurity Awareness

We must all learn about cybers­ecurity to protect ourselves and our agencies. Continuous education on cyber threats, risks, and best practices is essential.

We all have a respon­sib­ility to learn about emerging threats. By doing so, we can:

1) Prevent incidents proact­ively
2) Identify vulner­abi­lities in systems
3) Adapt training, plans, and policies as needed
 

Firewall

Firewalls are barriers between trusted networks and untrusted networks.

Firewall rules:
1) Deny traffic from certain network addresses or geographic regions
2) Deny services, ports, and applic­ations
3) Allow traffic from trusted networks

Data backup

Creating backup protects against accidental deletion, malware, ransom­ware, disasters and hardware failure.
Methods: external drives, NAS, tapes, cloud services.

Data backup strategies

Increm­ental Backup
Only new or modified data is backed up, saving time and disk space. Ensures you always have the latest version of your data.
Full Backup
Copies all data and allows restoring different versions as needed.to the backup location. Can quickly consume storage if old backups aren’t deleted.

Cloud provider for data Backups

Check IT policy before storing company data.
Consid­era­tions: regula­tions, data ownership, service agreem­ents.
Best practices: strong passwords, limit access, encrypt before upload, monitor usage.
DO NOT use personal Google Drive, Dropbox, iCloud, or personal email for sensitive data. Always use approved secure channels.

Indicators of Incidents

Traffic from Unkown Network Addresses
Multiple Failed Login Attempts
Increased Network Bandwidth Usage
Suspicious Emails and Phone Calls
Unlocked Secure Areas
Deleted or Altered Files
Unusual Activities During Off-hours
New Users and Devices in the Network

Proper Storage & Sharing

Store on approved encrypted systems (servers, secure cloud, encrypted drives).
Use access control (limit who can view).
Data minimi­zation – keep only what’s necessary.
Share via encrypted channels (secure transfer tools, encrypted email).
Never use unencr­ypted email, personal cloud, or messaging apps.