Typically using spoofed email addresses and links to trick people into providing login credentials, credit card numbers, or other personal information.
What is Phishing?
Use upper and lower-case letters, numbers, and THESE to create complex passwords
What are Symbols?
This 'Germy' malware spreads from machine to machine with human assistance
What is a virus?
A phone call or email from an unknown person or company is this... Not to be confused with canned meat!
What is Spam?
In these attacks, someone without the proper authentication follows an authenticated employee into a restricted area.
What is Tailgating?
This lets you store all of your passwords in one place.
What is a Password Manager / Password Management System?
Scammers hold your computer hostage with this kind of malware
What is Ransomware?
These people are considered "good guy" hackers.
Who are White Hat Hackers?
A social engineering attack conducted specifically through SMS messages
What is Smishing / SMS-phishing?
THIS requires that more than one credential is entered to access an account.
What is Two-Factor Authentication / Multi-Factor Authentication?
This type of program has a hidden malicious function. (Also how Greek soldiers were able to take the city of Troy).
Who is a Trojan Horse?
This redirects your internet traffic and helps hide your location.
What is a Virtual Private Network (VPN).
When a fraudster attempts to trick a victim into disclosing sensitive information or giving them access to the victim's computer over the telephone.
What are Vishing?
'Whd@b33f!' is an example of this
What is Passphrase?
This malware is able to spread without human assistance.
What is a Worm?
What does iOT stand for?
What is Internet of Things?
A type of phishing attack that targets one person, typically a high-level executive, that often has huge payoffs as the targets has access to high value data.
What is Whaling?
6-12 months is the recommended frequency to do this
What is Change Your Password?
This malware collects your information without your knowledge or consent.
What is Spyware?
What are the 3 components the CIA Triad?
What is Confidentiality, Integrity, and Availability.