Grand Theft Data
Fact or Fiction?
Hackers Gonna Hack
Let's Get Social
It's Risky Business
100

Small portable devices used to exfiltrate data in a covert fashion

What is a thumb drive or flash media!

100

The IT department are the only personnel that need to be concerned with cyber threats.

What is fiction?

100

This additional layer of security helps verify a user has authorized access to an online account using a trusted mobile device, an authenticator app, or a secure token.

What is multi-factor authentication?

100

This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.

What is social engineering?

100

An approved online cloud storage service being used by our employees.

What is DropBox?

200

The process of scrambling messages or information in such a way that only authorized parties can read it.

What is encryption?

200

* * * DOUBLE JEOPARDY * * * Universal Pictures was purportedly hacked by North Korea to prevent the release of the film "The Interview" which revolved around a plot to kill the country's leader Kim Jong-un

What is fiction?

200

Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.

What is malware?

200

An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.

What is phishing?

200

A cyber attack targeting an individual or entity for the purpose of maliciously controlling or disrupting a computing environment to destroy or steal data.

What is a cyber breach?

300

Customer data, network and intellectual property.

What are our crown jewels?

300

Allowing automatic updates on your computer system is a good way to keep your system secure.

What is fiction?

300

*** DOUBLE JEOPARDY*** A technique used to attack data-driven applications in which nefarious SQL statements are inserted into an entry field for execution

What is an SQL injection?

300

* * * DOUBLE JEOPARDY!!! * * * Linked In or Facebook are channels that are often used for this targeted attack on upper management which seeks unauthorized access to confidential data.

What is whaling?

300

If you are leaving your computer unattended you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.

What is Windows button + L key sequence?

400

This self-proclaimed whistleblower was able to steal copious amounts of data while being employed by the National Security Agency (NSA) of the USA.

Who is Edward Snowden?

400

Forwarding questionable attachments/links to your supervisor has little impact on an organizations security and is best practice when in doubt.

What is fiction?

400

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.

What is ransomware?

400

A technique used to retrieve information from a garbage bin and/or trash can, that could be used to carry out an attack against an organization.

What is dumpster diving?

400

Performing this action after opening an email from an unknown source could compromise your computer.

What is clicking on a link / opening an attachment?

500

This home or business network tool adds a layer of encryption to replace/hide your true IP address

What is a VPN?

500

Most large enterprise businesses (>1000 employees) are the targets for data breaches.

What is fiction?

500

The first weaponized malware attack that occurred in 2010.

What is Stuxnet?

500

Programs that mimic human behavior, often used by social media platforms to do both helpful and malicious tasks.

What are social media bots?

500

This is currently recognized as the most secure wireless encryption standard in use for home routers.

What is WPA2!

M
e
n
u