Cyber Attack Response
Cyber Attack Prevention
Solving Crimes
Skills
Cyber Crime Team
100

A factor that a city needs to take into account when dealing with ransomware.

What is...

Will Paying The Ransom Encourage Others?

Who Will Suffer From The Decision and Who Will Benefit?

Would It Be Worth It To Wait It Out?

100

A common attack where a person sends a fake email with a fraudulent link.

What is Phishing?

100

a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

 What is a Computer Virus?

100

The ability to clearly express your thoughts to others both verbally and written.

What are Communication Skills?

100

These people combine law enforcement and tech knowledge to solve crimes.

Who are Cyberinvestigators?

200

Once an organization has contained an attack. They should let these people know about it.

Who is

Customers

The Public

?

200

A type of malware that denies you access to your data until you pay a ransom.

What is Ransomware?

200

3 Warning Signs That Your Computer Might Be Hacked

What is/are...

The Appearance Of Apps You Didn't Install

Friends and Family Receiving Strange Messages From You

Passwords not working

Unwanted Browser Tool Bars/Search Engines (pop up ads and redirecting search engines)

Unwanted Software Installation

?

200

Thoroughness in accomplishing a task through concern for all the areas involved, no matter how small.

What is Attention to Detail?

200

These people try to break into secure computer programs with the consent of the company they are breaking into.

Who are...

Penetration Testers

Ethical Hackers

White Hat Hackers

PenTesters

?

300

This strategy is developed in case of an incident occuring.

What is...

Response Strategy

Incident Response Strategy

?

300

Ways To Spot a Phishing Attack

What is...

Bad Grammar

Urgency in Emails

Changing of Web Addresses

Emails Asking For You To Confirm Your Username And Password

?

300

In order to find a hacker you may need to do this.

What is

Think like a hacker

Retrace steps

Look for clues

?

300

The capacity to accept or tolerate delay, trouble, or suffering without getting angry or upset.

What is Patience?

300

These people write the encryption programs companies use to protect their data.


What are Cryptographers?

400

Ways Government Services could be affected if a hacker shut down their computer system.

What is

Stoplights could stop working

Police and Firefighters communication could be interrupted

People could be unable to conduct city business (pay parking tickets, doing taxes online)

City Courts would have to use paper for all trials

Computers that monitor water safety might stop working

?

400

The amount of time passed before you should change your password

What is 3 months?

400

Bits of information left on the internet

What are Data Packets?

400

Sets of abilities or knowledge used to perform practical tasks in the areas of science, the arts, technology, engineering, and math.

What are Technical Skills

400

These people do the same thing as penetration testers/ethical hackers, but they look for threats happening in real-time. These people monitor a company's computer system to watch for signs that someone is trying to hack in. 

Who are Threat Hunters?

500

Understanding the extent of the attack, the source, and determining what further action might need to happen. 

What is Identify the Threat?

500

The process cell phone companies use to know the location of your devices

What is Geolocation?

500

The route or path data packets take to get from your computer to a website.

What are Traceroutes?

500

The excitement, need, and desire, to continue educating yourself and your professional skills.

What is Aspiration to Learn?

500

These people design cybersecurity systems. They test a company's security plan to look for weaknesses. Then they create a plan to make the computer systems more secure.

Who are Security Architects?

M
e
n
u