General Awareness
Malware
Threat Actors
Internet of Things
The Cloud
100

This email asks for information, but doesn't seem quite right

What is Phishing?

100

This malware is installed on computers to help attackers find Bitcoin

What is Cryptomining?

100

This malicious threat comes from inside the organisation

What is an insider threat?

100

This is Amazon's IoT device for home automation and more

What is Echo?

100

This form of cloud computing provides a platform and environment to let the developers build apps and services over the internet.

What is PaaS?

200

This process is used when you need to use a secondary method, as well as your password, to access a network or application

What is two factor authentication?

200

This malware requires no human interaction to use computer networks to spread to other machines

What is a worm?

200

This company is known for its vast knowledge of Advance Persistent Threat actors and the quality of it's cyber threat intelligence

Who is FireEye?

200

This Japanese sounding website is used to surf the internet for Things, rather than devices

What is Shodan?

300

This attack makes network resources unavailable by disrupting services of a host connected to the internet

What is a Denial of Service attack?

300

This is the easiest way for an attacker to get malware onto your computer

What is email?

300

This threat actor works for a well known state-sponsored organisation

What is an Advanced Persistent Threat?

300

These machines are considered the first IoT devices, going online as far back as 1974

What is an ATM?

300

This cloud provider services Australian government and Critical National Industry

Who is AUCloud?

400

This is used to disguise a message or information, so that only authorised parties can access it

What is encryption?

400

This type of malware masquerades as legitimate files or software but contains malicious code

What is a Trojan?

400

Born in 1963, this man began hacking at age 16, when he learned to bypass the Los Angeles bus ticket-punching system, allowing him to ride any bus for free. Arrested in 1995 for wire fraud, and having spent 5 years in prison, he is currently considered the most notorious hacker in the world

Who is Kevin Mitnick?

500

This system includes the letters from A to F to make up a 16-character numeral system

What is Hexadecimal?

500

Coming to light in 2017, this worldwide cyber attack affected more than 200,000 computers across 150 countries. Although stopped within days of its execution, worldwide damages are claimed to be in the Billions of dollars

What is WannaCry?

500

This Chinese APT(41) was recently identified as being involved in both espionage and financial crimes

Who is Double Dragon?

500

Born in xxxx, he was educated in the UK and co-founded a successful tech company there before coming to Australia in xxxx, where his company recently achieved VMWare Cloud Verified Status.

Who is Phil Dawson?

M
e
n
u