Malaysia’s Understanding of the Dark Web
 
Take our Survey and get The Prize Draw for JBL Wireless Earbuds
 
 
dark web buds
 
 

Which best describes the dark web?
An area of the web created by criminals for illicit activity
An area of the web not indexed by traditional search engines like Google
The illegal part of the deep web
Any web page that contains illegal content
Do you understand any of the ways a dark web browser differs from a normal web browser?
No I don’t
Yes - describe here
If yes - please describe here
Does your company have a dark web security strategy?
No – It’s not relevant for us
No – It’s not something we have thought about
No - But it is something we want to look into
Yes
Which do you feel is the most dangerous aspect of the dark web for your own organisation? (tick any that apply)
Your staff / user credentials (such as emails) may be available for sale
Your customer data may be available for sale
Valuable and Proprietary information may be available for sale
Your company’ s reputation is being fraudulently used
My staff may be blackmailed via organisations from the dark web
I have no major concerns
Has your company information been compromised on the dark web?
I have no idea
I don’t think so but I am not 100% sure
I suspect it has been
Yes, our private company data has been made available on the dark web
Which methods have you employed to check if your data is on the dark web – (click all that apply)
I have not checked at all
I have used a browser like Tor
I have used a third-party company to run a dark web scan
I have used an expert security consultant to check
I checked using https://haveibeenpwned.com/
Have you used any of the following browsers to access the dark web?
I have never accessed the dark web
Tor Browser
Firefox Browser
Subgraph OS
Waterfox
I2P – Invisible Internet Project
What best describes Threat Intelligence as below?
Descriptive information about Malwares, Ransomwares and Viruses?
IOCs information containing source IPs, type / category of IOCs, techniques?
TTPs – Tactics, Techniques and Procedures of Threat Actor Groups?
Chatters in forums, darkweb, deepweb, etc on specific individuals, items or companies?
Marketplaces of selling sensitive information I.e. Credit card details, health records, personal identifiable information, etc?
Email, Document and Photo leaks?
I do not know what is Threat Intelligence
Who do you think should be most responsible to safeguard your personal data, I.e credit card information, health records, personal identifiable information, credential leaks? (1 for low level responsibility - 5 for highest level responsibility)
1
2
3
4
5
Ownself?
Company that you worked for?
Merchant that you purchase something?
Banks?
Regulators?
If you have the access to Threat Intelligence, what would you use it for?
Check for individual / personal / staffs data leaks – documents, photos, emails?
Check for customers data leaks – documents, photos, emails?
Prevent a Cyber Attack?
Just to read and be aware about latest cyber incidents?
{"name":"Malaysia’s Understanding of the Dark Web Take our Survey and get The Prize Draw for JBL Wireless Earbuds", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which best describes the dark web?, Do you understand any of the ways a dark web browser differs from a normal web browser?, If yes - please describe here","img":"https://cdn.poll-maker.com/47-1554205/dark-web-buds.jpg?sz=1200"}
Powered by: Quiz Maker