Basics of Cyber Attacks
Types of Attacks
Attack Techniques
Famous Incidents
Prevention & Protection
100

This is the unauthorized access, disruption, or damage to computer systems or networks.

What is a cyber attack?

100

This attack tricks people into revealing confidential information by pretending to be trustworthy.

What is phishing?

100

This technique uses fake emails to lure victims.

What is email spoofing?

100

This 2017 ransomware attack affected systems worldwide, including hospitals.

What is WannaCry?

100

This software detects and removes malicious programs.

What is antivirus software?

200

The individual or group that launches a cyber attack is called this.

Who is a hacker?

200

This attack locks a user’s files and demands payment to unlock them.

What is ransomware?

200

Attackers exploit weaknesses in software through this type of error.

What is a vulnerability?

200

This attack targeted the Ukrainian power grid and caused blackouts.

What is the BlackEnergy attack?

200

A strong example of this includes upper/lowercase, numbers, and symbols

What is a strong password?

300

This common target of cyber attacks stores sensitive user data and processes transactions.

What is a server?

300

This type of attack monitors and captures keystrokes to steal data.

What is a keylogger?

300

This technique involves injecting malicious code into forms or URLs.

What is SQL injection?

300

A major data breach at this credit reporting agency exposed data of over 140 million people.

What is Equifax?

300

This is the practice of verifying identity before granting system access.

What is authentication?

400

This term refers to stealing personal data to impersonate someone online.

What is identity theft?

400

A virus that replicates itself and spreads across networks is called this.

  • What is a worm?


400

The act of secretly observing someone's device usage or screen.

What is shoulder surfing?

400

In 2020, this US government software vendor was compromised in a major supply chain attack. 

What is SolarWinds?

400

This device filters incoming and outgoing network traffic.

What is a firewall?

500

This is a coordinated cyber attack involving multiple systems overwhelming a target system.

What is a Distributed Denial of Service (DDoS) attack?

500

An attack where malicious code is inserted into a trusted website to infect visitors.

What is a drive-by download attack?

500

A cyber attack that occurs before the software flaw is known by the vendor.

What is a zero-day attack?

500

This highly sophisticated worm targeted Iranian nuclear facilities.

What is Stuxnet?

500

This principle ensures users only have access necessary for their role.

  • What is the principle of least privilege?

M
e
n
u