Malware Types
Vulnerabilities & Threats
Cookies
Social Engineering & Data Collection
IoT, Ubicomp, & BYOD
100

This malware is hidden inside other software that appears to be harmless.

What is a Trojan Horse?

100

A flaw or potential for harm in a system.

What is a Vulnerability?

100

Small text files saved on the computer for web browsers and websites.

What is a Cookie?

100

Technology that tracks a user's keystrokes on the keyboard.

What is a Keylogger?

100

Computing embedded into everyday objects and environments; also called "pervasive computing."

What is Ubiquitous Computing (Ubicomp)?

200

This form of malware allows the hacker to use an embedded backdoor to gain administrative control of the victim's computer.

What is a Remote Access Trojan (RAT)?

200

Something that takes a vulnerability to a level where it can be exploited.

What is a Threat?

200

A cookie that exists only as long as the web browser is open.

What is a Session Cookie?

200

Software installed on a computer that collects data on the user and redirects advertising sites to the web browser.

What is Adware?

200

Revolves around incorporating computing technology into atypical devices to allow communication with other devices and the Internet.

What is the Internet of Things (IoT)?

300

This malware encrypts data so the user cannot access it until a fee is paid to the hacker.

What is Ransomware?

300

A vulnerability that exists in software when it was released and remains unknown until it is exploited by hackers.

What is a Zero-Day Vulnerability?

300

A cookie that stays on your computer until an expiration date is met.

What is a Persistent Cookie?

300

Using a lie or scam to obtain private information.

What is Pretexting?

300

Policies that allow employees and students to use personal devices on organizational networks.

What is BYOD (Bring Your Own Device)?

400

This malware changes its characteristics in attempts to avoid detection from antivirus programs.

What is a Polymorphic virus?

400

Secret or unknown access point into a system.

What is a Backdoor?

400

Unique code assigned to the user's connection for a period of time to keep track of the website state.

What is a Session ID?

400

Digging through the trash for useful information.

What is Dumpster Diving?

400

Organization approves a set of user-owned devices.

What is CYOD (Choose Your Own Device)?

500

This virus infects a computer before the operating system loads.

What is a Rootkit?

500

Software that is embedded in hardware.

What is Firmware?

500

When a malicious actor gets possession of a user's active Session ID and impersonates the user in a connection to the website.

What is Session Hijacking?

500

Information about a person left behind by his or her actions on the Internet.

What is a Digital Footprint?

500

Company provides device for both work and personal use.

What is COPE (Company-Owned, Personally-Enabled)?

M
e
n
u