Malicious Software
Information Scams
Surveillance Attacks
Service Lockout
Security Controls
100

This type of Malware pretends to be legitimate software to trick users.

Trojan

100
Victims of this can unknowingly give away private information or access.

Social Engineering

100

This kind of advertising tracks user browsing habits to give them this kind of advertisement.

Targeted Advertisements / Adware

100

This malware locks down a computer until a user pays up.

Ransomware

100

This feature of Windows prevents unauthorized changes to the system via different users.

User Account Control / Group Policy

200

A self-replicating program that spreads by inserting itself into files or programs.

Virus

200

This kind of attack is most commonly in the form of an urgent email asking the user for their personal info. 

Phishing

200

This kind of attack records a user's keystrokes and copies them to another location.

Keylogger

200

This kind of attack floods a network or site with traffic to disrupt server access.

Designated Denial of Service

200

This defends & inspects network traffic; and can block potential threats.

Firewall

300

This kind of Malware makes copies of itself to other connected computers without the knowledge of users.

Worm

300
Victims of this attack provide their information over phone conversation.

Vishing

300

This kind of attack steals, tracks, and monitors a user's computer without their knowledge.

Spyware

300

If a user fails to pay up, their files could be forever ________, keeping the files but without the ability to access them.

Encrypted

300

This requires at least one other method of verification beyond a password.

Two-Factor Authentication

400
You can defend against malicious software intrusion by using one of these, which scans files and prevents them from causing damage.

Anti-virus software

400

This is one of THE MOST COMMON passwords in use by users today.

password123

400

Many companies advertise ________ in order to evade advertising software by fabricating a user's location and identity.

Virtual Private Network (VPN)

400
A Denial of Service is an unintentional phenomenon where users can use the entire ________ of a network or website, causing a disruption of access.
Bandwidth
400

This software comes standard on a certain operating system, and offers an extra layer of protection when performing tasks that could potentially harm the device.

Windows Defender

500

This 2017 cyberattack combined ransomware, a computer worm, and a serious Windows vulnerability to wreak havoc on several countries, causing users to "want to" do the action that gives the attack it's name.

WannaCry

500

Social Engineering takes advantage of a victim's psyche by invoking a sense of _______, using desperation tactics, or offering a reward that is "too good to be true."

Urgency

500

This well-known adware originally posed as a fun, cartoony ape personal assistant, but took user's information without permission.

BonziBuddy

500

This protection method allows the user to "roll-back" their system before an attack happened.

System Restore / Computer Backups
500

This uses different physical traits to identify a verified person, like their face or fingerprints.

Biometric Identification

M
e
n
u