Physical Security
Social Engineering
The "wares"
Software Threats
Suspicious E-Mails
100

Someone taking a hammer to your laptop would be an example of this.

Physical Damage

100

Not done with a hook and worm but trying to get private information from a user

Phishing

100

Used to display unwanted advertisements

Adware

100
Used to transmit malware

Worm

100

An email from your bank telling you that your account has been compromised with a link to validate your information

Phishing

200

If you leave your laptop on the table at Starbucks while you run to the restroom you might experience this.

Hardware Theft

200

Watching someone enter their login and/or password

Shoulder Surfing

200

Used to report on your computer and possibly steal data

Spyware

200

applications that mask their true intent

Trojan Horse

200

A tasty treat or another word for an unsolicited email

SPAM

300

A thief could steal computer data by plugging one of these into the USB port on your computer.

Thumb/Flash Drive

300

Combining phishing and Voice over IP

Vishing

300

used to extract payments from the infected user

Ransomware

300

used to cause damage and/or disruption

virus

300

You should do this if you receive an email from someone you don't know with a file attached

Delete it

400

When someone goes through your trash looking for confidential information

Dumpster Diving

400

the attacker uses information that appears to come from a trusted source

Spear Phishing

400

If you are infected with Ransomware your only recourse by be to do this

Wipe your system and restore from backup

400

Many viruses are spread as an attachment to this

Email

400

This software threat infects the target systems and then attaches itself to emails the newly infected system sends

Email Virus

500

This comes in an email or on the CD-ROM sleeve with new software and should be kept secure.

License number/license code

500

Social engineering attacks may occur over the phone, by email, or _____________

in person

500

The most common type of adware comes in the form of an add-on toolbar for this application on your computer.

Web Browser

500

These take advantage of flaws in the OS or application

Exploits

500

A type of phishing that goes after a manager or business owner who they can get all the information that they want

Whaling

M
e
n
u