Cyber Attacks
Cyber Terms
Companies
Jobs
Historical Cyber Attacks
100

Fills the servers with traffic, causing the servers to start running slower until it's eventually unusable?

What is DDoS

100

A defense measure in every computer, tablet, phone, and every electronic.

What is Firewall

100

Company that offers a range of cloud-based security solutions and services.

What is Symantec Cloud Services

100

In this role, you’re the company’s point person for security, ensuring that data remains secure against unauthorized access and cyberattacks.

What is Information Security Specialist

100

A computer worm targeting the Windows operating system that was first discovered in November 2008.

What is Conficker 2009

200

The attacker encrypts your important files with something to freeze them, and will only give them back if the victim pays a sum of money?

What is Ransomware

200

an app/software that protects you from virus'

What is Antivirus

200

Company that provides support and solutions for technology security. They offer products and services to protect individuals and businesses from cyber threats.

What is McAfee

200

In this role, you’re typically put in charge of the day-to-day operations of an organization’s cybersecurity systems.

What is Security Systems Administrator

200

An email worm that filled your computer with malware, often disguised as a love letter.

What is ILOVEYOU Virus (aka love bug virus)

300

Spies into your device taking your info without the knowledge of the user?

What is Spyware

300

A way to hide your IP, or make it seam like you're from another place.

What is VPN

300

A company that offers ML-powered NGFW capabilities as a fully-managed cloud-native service on AWS.

What is Palo Alto

300

Retrieve information from computers and other digital devices to discover how an unauthorized person accessed a system or to gather evidence for legal purposes.

What is Digital Forensic Examiner

300

A worm that exploited a vulnerability discovered by Riley Hassell.

What is Code Red Worm

400

A malicious software hidden inside of another seemingly legit software.

What is Trojan

400

Someone who can infiltrate your software and attack your files.

What is Hacker

400

A cloud-native security-as-a-service company that offers comprehensive security solutions for data-in-motion.

What is Privafy

400

You assess your organization’s technology for potential issues with security, efficiency, and compliance.

What is IT Auditor

400

Malware that steals banking credentials using keylogger functionality and web injection scripts, but infected computers also become part of a botnet used to communicate with other infected computers using peer-to-peer protocols.

What is GameOver Zeus

500

A scare that cyber attackers use to make you give them your information.

What is Spoofing

500

When someone gets into your device and begins to leak your info/data.

What is Data Breach

500

A leading provider of people-centric compliance and security solutions. They help organizations mitigate critical security and compliance risks by offering an integrated, cloud-based suite of solutions.

What is Proofpoint

500

You help businesses identify their security weaknesses before malicious hackers can do the same. You do this by attempting to breach computer networks with the company’s permission.

What is Penetration Tester

500

Mydoom was a computer worm that targeted computers running Microsoft Windows. It also became the fastest spreading email worm.

What is Mydoom

M
e
n
u