This type of Malware pretends to be legitimate software to trick users.
Trojan
Social Engineering
This kind of advertising tracks user browsing habits to give them this kind of advertisement.
Targeted Advertisements / Adware
This malware locks down a computer until a user pays up.
Ransomware
This feature of Windows prevents unauthorized changes to the system via different users.
User Account Control / Group Policy
A self-replicating program that spreads by inserting itself into files or programs.
Virus
This kind of attack is most commonly in the form of an urgent email asking the user for their personal info.
Phishing
This kind of attack records a user's keystrokes and copies them to another location.
Keylogger
This kind of attack floods a network or site with traffic to disrupt server access.
Designated Denial of Service
This defends & inspects network traffic; and can block potential threats.
Firewall
This kind of Malware makes copies of itself to other connected computers without the knowledge of users.
Worm
Vishing
This kind of attack steals, tracks, and monitors a user's computer without their knowledge.
Spyware
If a user fails to pay up, their files could be forever ________, keeping the files but without the ability to access them.
Encrypted
This requires at least one other method of verification beyond a password.
Two-Factor Authentication
Anti-virus software
This is one of THE MOST COMMON passwords in use by users today.
password123
Many companies advertise ________ in order to evade advertising software by fabricating a user's location and identity.
Virtual Private Network (VPN)
This software comes standard on a certain operating system, and offers an extra layer of protection when performing tasks that could potentially harm the device.
Windows Defender
This 2017 cyberattack combined ransomware, a computer worm, and a serious Windows vulnerability to wreak havoc on several countries, causing users to "want to" do the action that gives the attack it's name.
WannaCry
Social Engineering takes advantage of a victim's psyche by invoking a sense of _______, using desperation tactics, or offering a reward that is "too good to be true."
Urgency
This well-known adware originally posed as a fun, cartoony ape personal assistant, but took user's information without permission.
BonziBuddy
This protection method allows the user to "roll-back" their system before an attack happened.
This uses different physical traits to identify a verified person, like their face or fingerprints.
Biometric Identification