Be Sociable
Phishing
Protecting Home Devices
Malware
Cyber Potpourri
100

This is a platform for broadcasting information through the internet.

What is social media?

100

During the year 2000, mailboxes around the globe were filled with a message titled “ILOVEYOU”. The message body simply said “Kindly check the attached LOVELETTER coming from me”.

What event resulted in the popularity of the term "Phishing" email?

100

A popular term for the ability to check the contents of your refrigerator remotely or to see who is "knocking at your front door".

What is a "Smart Home" ?

100

This is a type of malicious computer program infection that spreads without user interaction such as the WannaCry ransomware.

What is a computer worm?

100

The weakest link in Cybersecurity

What is a Human Being?

200

A platform for electronically communicating through the Internet with friends or the name of 2010 movie about Mark Zuckerberg

What is " The Social Network"

200

Bad spelling and grammar, a link to click so that you can update your information, or a request for personal information are all examples of these.

What are things you should look for in an email that may indicate it is a scam?

200

This image in the top left or right corner of your web browser indicates you are on a secure website.

What is the lock icon?

200

It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.

What is a Trojan Horse?

200

The process of stealing your personal information — like your name, address, Social Security, Driver's License, Credit Card number and email address — and using it to purchase goods, open accounts, withdraw money from bank accounts without your consent.

What is Identity Theft

300

A popular cloud Computing Platform that is also the name of a famous rain forest.

What is AWS - or Amazon Web Services

300

A claim that there is a "problem" with your account, or a request to "verify your identity", update personal information such as password, credit card, social security or bank account numbers.

What are examples of a phishing email?

300

Carried with you and not properly password protected can result in a cyber security breach.

What are mobile devices, such as laptops, cell phones, and flash drives?

300

Both are programs that self-replicate (can download automatically), but only this one requires you to do something, such as click on an email link, to actually activate it.

What is a virus?

300

Length of Twelve or greater that consists of  upper- and lower-case letters, numbers, special characters such as #$%&?, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.

What are guidelines to follow to make sure your passwords are difficult for a hacker to steal?

400

A type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

What is a phishing attack?

400

The most commonly used type of email attack or a popular water sport in  Hawaii

What is Spear Phishing?

400

Cybercriminals can access your home network though your router and harness the power of these appliances and other "things"

What is The Internet of Things  (IoT) — all those appliances and devices that connect to the internet and to each other on your home network 

400
Defined as programs that track where you go on the Internet and what you type into your keyboard.
What is spyware?
400

Equifax, Target, Facebook, Marriot, LinkedIn, Anthem Inc.

What are examples of the major data breaches?

500

An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.

What is social engineering?

500

Technology used to ensure that only senders who are approved by the owner of a domain can send messages as that domain.

What is a type of Email Authentication?

500

A Zombie network that remotely controls your computing devices.

What is a Botnet?

500
Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this.
What is a malware infection?
500

The US Department of Justice called him the “most wanted computer criminal in US history"

Who is Kevin Mitnick?

M
e
n
u