Types of attacks
Security Tools
Cyber History
Cyber Stats
100

A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. 

100

This service allows users to remain anonymous, masking their identity/location and encrypts traffic.

What is a VPN?

100

This ex-government employee is famous for leaking classified cybersecurity information from the National Security Agency in 2013.

Who is Edward Snowden?

100

Cybercrime went up 600% due to this ongoing event

What is the Pandemic / COVID-19 / Coronavirus?

200

An independent malware program that self-replicates in order to spread from machine to machine to cause damage.

What is a (computer) worm?

200

This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system.

200

This framework for providing data protection and privacy for those residing within the EU and European Economic Area was put fully in effect in mid-2018.

What is the General Data Protection Regulation (GDPR)?

200

This generation is currently the most impacted by cybercrime.

(Gen Z, Millennials, Boomers, etc)

300

This attack uses social engineering techniques to urge a specific target to click on a malicious link or attachment.

What is Spear phishing?

Spear phishers carefully research their targets, so the attack appears to be from trusted senders in the targets’ life. A spear phishing email  Once the victim completes the intended action, the attacker can steal the credentials of a targeted legitimate user and enter a network undetected.

300

Companies consider cybersecurity when instructing employees with a policy on BYOD, which is short for this.

What is Bring Your Own Device?

300

This English cryptanalyst is famous for deciphering encoded messages during World War II and creating standards for artificial intelligence. He is considered by many to be the father of theoretical computing. (Hint: There was a 2014 movie based on his biography.)

Who is Alan Turing?

He helped in World War II by cracking intercepted messages from the German forces. He also created the "Turing test," which examines a machine's ability to display human behavior via artificial intelligence.

(Source: https://www.mycfcu.com/content/docs/ncsam-2019-cybersecurity-awareness-trivia_final_508.pdf)

300

Over the last year, malware on this operating system has gone up by 165%

400

This type of attack targets an organization's top officials or highly-salaried employees (C-level) to reveal sensitive information.

What is Whaling?

400

A group of highly trained individuals that monitor, prevent, detect, investigate, and respond to cyber threats around the clock.

400

In 2005, this user-inserted cross-site scripting worm impacted over one million MySpace users within just 20 hours, making it the fastest-spreading virus of all time.

What is Samy (JS.Spacehero)?

400

In this country, over 130 large-scale cyber attacks occur each year.

500

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. 

500

This Security as a Service application is rapidly replacing traditional anti-virus offerings and is where an organization outsources some of its security operations to a third-party provider to not only detect threats, but also remediate them within an organizations network. 

What is managed detection and response? 

(Also known as MDR)

500

This English writer and mathematician is known for her work on the Analytical Engine and is considered to be one of the first computer programmers.

500
The Pentagon receives approximately this many cybersecurity attack reports every day

(Hint: guess # in millions)

M
e
n
u