Grand Theft Data
Breach Me Baby
Hackers Gonna Hack
Let's Get Social
It's Risky Business
100
Restricted, Confidential, Internal Use and Public
What are our company Information Classification Levels?
100
A UK based telecom company that experienced a significant and sustained cyber-attack, during which personal and banking details of up to four million customers is thought to have been accessed.
Who is Talk Talk?
100
A person who breaks into a computer system for politically or socially motivated purposes.
Who is a hacktivist?
100
This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.
What is social engineering?
100
An approved online cloud storage service being used by our employees.
What is Microsoft OneDrive?
200
The process of scrambling messages or information in such a way that only authorized parties can read it.
What is encryption?
200
* * * DOUBLE JEOPARDY * * * This multi-national technology and media conglomerate was purportedly hacked by North Korea to prevent the release of the film "The Interview" which revolved around a plot to kill the country's leader Kim Jong-un
What is Sony Pictures?
200
Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.
What is malware?
200
An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.
What is phishing?
200
A cyber attack targeting an individual or entity for the purpose of maliciously controlling or disrupting a computing environment to destroy or steal data.
What is a cyber breach?
300
Customer data, network and intellectual property.
What are our crown jewels?
300
The massive breach experienced by a US retailer was traced back to their HVAC contractor as a point of entry.
Who is Target?
300
*** DOUBLE JEOPARDY*** A technique used to attack data-driven applications in which nefarious SQL statements are inserted into an entry field for execution
What is an SQL injection?
300
* * * DOUBLE JEOPARY!!! * * * Linked In or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.
What is spear phishing?
300
If you are leaving your computer unattended you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.
What is Windows button + L key sequence?
400
This self-proclaimed whistleblower was able to steal copious amounts of data while being employed by the National Security Agency (NSA) of the USA.
Who is Edward Snowden?
400
This big-box American-based building supply retailer admitted to having 56 million credit card records breached in 2014.
Who is Home Depot?
400
A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.
What is ransomware?
400
A technique used to retrieve information from a garbage bin and/or trash can, that could be used to carry out an attack against an organization.
What is dumpster diving?
400
Performing this action after opening an email from an unknown source could compromise your computer.
What is clicking on a link / opening an attachment?
M
e
n
u