Phishin'
Definitions
Cyber Attacks
Reporting
IT
100

An attempt that involves spoofed emails

What is email phishing?

100

The protection of data, information, networks and computers

What is cybersecurity?

100

This library had 600GB of data stolen and is the largest attack against a library recorded to date

What is the British Library attack?

100

This is the first step that should be taken when you receive a suspected phishing email

What is screenshot the email?

100

This type of filtering scans emails as they come in based on certain criteria

What is email filtering?

200

An attempt that targets individuals via phone calls

What is vishing?

200

Software that is used to extort money from companies by encrypting or blocking access to an organization's files.

What is ransomware?

200

This attack stole data from 8,000 former and current staff from the library system

What is the Toronto Public Library attack?

200

After screenshotting, the next step should be _________

What is report it to IT shop?

200

These are thing that are used to scan programs and devices for malicious software

What are scanning tools?

300

An attempt to target high level individuals in an organization

What is whaling?

300

A form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.

What is phishing?

300

This breach included data from 26,000 patrons

What is the Seattle Public Library attack?

300

Please for all that is good and holy don't do this if you receive an email that you suspect is a phishing attempt

What is click on any links?

300

This is software that is used to protect computers (mostly in the form of antivirus)

What is Endpoint Protection?

400

An attempt to target a certain group of individuals in an organization

What is spear phishing?

400

The process of transforming information in a way that, ideally, only authorized parties can decode.

What is encryption?

400

This ransomware attack stole 56 GB of data.

What is the Delaware state Library attack?
400

They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.

What is state sponsored hacking?

400
The contents of electronic documents that can carry out or trigger actions automatically, on a computer platform, without the intervention of a user. Active content includes built in macro processing, scripting languages, or virtual machines. A significant share of today’s malware involves this type of programs.
What is Active Content?
M
e
n
u