Cyber 101
Attacks
Cyberthreats
100

What are some of the basics of cybersecurity

Strong passwords, Software updates, Data backup, Network security, & Password management

100

What is one common type of cyber attack

Phishing


100

What is cyberthreat

A cyberthreat refers to anything that has the potential to cause serious harm to a computer system.

 

200

What year did the first cyber-attack occur?

1834



200

What is phishing in the context of cybersecurity?

Phishing is a cyber-attack that involves tricking individuals into providing sensitive information, such as usernames and passwords, often through deceptive emails or websites.

200

What is the design method that minimizes losses when a risk is realized?

Passive Safety

300

What are the common signs that a computer may be infected with malware?

Common signs of malware infection include slow performance, frequent crashes, unexpected pop-ups, programs opening or closing automatically, and unauthorized access to personal information.

300

Name three types of cyber attacks

Malware, Password attack, Phishing, DNS tunneling, Spoofing, Insider threat, & Cryptojacking. 

(If you said any of the 7 you can get points)

300

Data loss due to the people already in the organization

Insider threat

400

True or False:
The importance of cyberspace today has led to a uniform definition for what cyberspace is. Basically, it is a global domain within the information environment whose character is defined by the use of electronics and the electromagnetic spectrum. 

False 

400

What is a cyber-attack where criminals intercept and alter network traffic between IT systems.

Man-in-the-middle (MITM) attack

400

An individual or group that can manifest a threat. Internal or external, based on their capabilities, intentions and past actions.
e.g hacktivists, cyber terrorists

Threat Actor

500

Which of the following includes not only technical issues such as viruses and denial of service attacks, but also human matters such as insider deception as well as normal human mistakes?

Cyber Security

500

What's the name for a program that holds a computer "hostage" while demanding a ransom? 

Ransomware

500

Name at least three of the six attack actors

Cybercriminals
Online social hackers
Hacktivists
Nation states
Corporations
Cyber terrorists

M
e
n
u