Who Am I?
Don't Click It!
Show Me What You Got
Be a-WARE
Make Me Secure
5

A malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device.

What is a Virus?

5

A name commonly given to unsolicited emails. Essentially unwanted advertising, it’s the email equivalent of physical junk mail delivered through the post.

What is Spam?

5

A program that integrates the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms that can infect equipment through email or internet browsing.

What is Antivirus?

5

A general term for any type of intrusive computer software with malicious intent against the user.

What is Malware?

5

The process of verifying the identity of a user or piece of information and the veracity of the information provided.

What is Authentication?

10

Weaknesses in software programs that can be exploited by hackers to compromise computers.

What is Vulnerability?

10

A type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.

What is Phishing?

10

An authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.

What is Multi Factor Authentication (MFA)?

10

A software that is secretly installed on a user’s device to gather sensitive data and send it outside the network to bad actors.

What is Spyware?

10

A challenge-response test commonly used by websites to verify the user is a real human and not a bot.

What is CAPTCHA?

15

A type of malware that downloads onto a computer disguised as a legitimate program whose name is derived from to Greek mythology.

What is Trojan Horse?

15

A social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information or sending money to cybercriminals.

What is Smishing?

15

A method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found

What is Brute Force Attack?

15

A process of bombarding users with endless ads and pop-up windows and cause a nuisance to the user experience.

What is Adware?

15

A process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm.

What is Encryption?

20

An increasingly popular method of gaining access to unauthorized resources by exploiting human psychology and manipulating users – rather than by breaking in or using technical hacking techniques.

What is Social Engineering?

20

A kind of spyware software that records every keystroke made on a computer’s keyboard.

What is Keylogger?

20

A cyberattack tactic that involves a hacker using a common password to try and break into multiple target accounts.

What is Password Spraying?

20

A malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data.

What is Ransomware?

20

A security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.

What is Firewall?

25

A collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal

What is Botnet?

25

Tricking someone into clicking on one object on a web page while they think they are clicking on another.

What is Clickjacking?

25

An event when an authorized system user, usually an employee or contractor, poses a threat to an organization because they have authorized access to inside information and therefore bypass most perimeter-based security solutions.

What is Insider Threat?

25

A type of malware that uses scare tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus, to trick users into visiting malware-containing websites.

What is Scareware?

25

An isolated environment on a network that mimics end-user operating environments. Sandboxes are used to safely execute suspicious code without risking harm to the host device or network.

What is a Sandbox?

M
e
n
u