Cyber Crime
Cyber Attacks 1
Cyber Attacks 2
Cyber Security
100

This illegal activity involves using a computer, networked device, or network itself, either as the target or the tool for crimes like fraud or hacking.

What is computer crime (or cybercrime)?

100

This May 2017 ransomware worm exploited Windows vulnerabilities using NSA-leaked tools like EternalBlue and spread via SMB protocol.

What is WannaCry?

100

This 2017 malware disguised itself as ransomware but was later revealed to be a wiper targeting Ukrainian systems via a tax software update.

What is NotPetya?

100

This Windows feature encrypts entire drives using a TPM chip, rendering data useless if a device is stolen.

What is BitLocker?

200

These organized attacks aim to disrupt critical services, compromise national security, or intrude into systems, often orchestrated by groups or nation-states.

What are large cyber attacks?

200

This NSA-developed exploit, leaked by The Shadow Brokers, allowed WannaCry to spread by targeting a flaw in Windows’ SMB protocol.

What is EternalBlue?

200

NotPetya spread by hijacking updates for this Ukrainian tax software, used by nearly 400,000 businesses.

What is M.E.Doc?

200

Azure’s 24/7 monitoring tool that flags weak passwords and unpatched systems using global threat intelligence.

What is Azure Security Center?

300

This type of malware is intentionally spread to corrupt, steal, or delete data, including worms, Trojans, and ransomware.

What is malicious software (or malware)?

300

This British healthcare system was crippled by WannaCry, forcing hospitals to turn away patients due to encrypted MRI machines and blood storage systems.

What is the NHS (National Health Service)?

300

NotPetya attacked on this Ukranian holiday, dated June 27.

What is Constitution Day?

300

This hardware component stores BitLocker encryption keys, preventing offline brute-force attacks.

What is the Trusted Platform Module (TPM)? 

400

This criminal act involves intentionally deleting, encrypting, or altering data to harm an organization or individual. 

What is willful destruction of data?

400

This was the approximate number of devices infected by WannaCry within 24 hours, spanning 150 countries.

What is 230,000?

400

This was the name of the Russian Intelligence hacking group that created NotPetya.

What is "Sandworm"?

400

What does a VPN help do?

Hides and protects your online activities?

500

These penalties, including imprisonment and fines, apply to individuals or groups found guilty of cybercrimes under international or national laws.

What are legal penalties (or consequences) for computer crimes?

500

Microsoft’s VP publicly criticized this U.S. agency for hoarding the EternalBlue exploit instead of disclosing it, leading to the global attack.

Who is the NSA (National Security Agency)?

500

Creating a read-only file with this name could stop NotPetya’s encryption by tricking it into thinking the process was already complete.

What is perfc.dat?

500

What does the GDPR law protect?

People's personal data in Europe

M
e
n
u