IoT stands for these terms
What is Internet of Things?
In 2013 news broke that this major retailer had experienced a data breach during the holiday shopping season that resulted in 110 million people financial information being compromised
What is Target?
Infects applications like Microsoft Word, where it executes instructions once opened before transferring back control to the app.
What is a Macro Virus?
Any malicious and deliberate attempt by one or more individuals (or organizations) to breach the information system of another organization or individual.
What is a Cyber Attack?
This occurs when an unauthorized individual follows authorized individual into an otherwise secure location
What is tailgating?
This is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
What is applying security updates promptly?
This gaming community experienced a data breach that affected 77 million accounts and is now known as the worst gaming community breach of all time
What is the PlayStation Network?
These programs hide in a useful program to infect your systems. Unlike viruses, these don’t self-replicate but can be used to establish back doors that are exploited by attackers.
What are Trojan horses?
An attack that floods your networks, systems, or servers with traffic to exhaust your resources and bandwidth.
What is a Denial-of-service (DoS) attack?
A high target attack that focuses on a specific individual using personal information often obtained from victim’s social media accounts or other online activity.
What is spear-phishing?
This person invented the term the Internet of Things
Who is Kevin Ashton?
This Internet giant was breached and was known as one of the largest data breaches in history which resulted in 3 billion user accounts being compromised
What is Yahoo?
It attaches itself to executable code, for example, .exe files, and is installed once the code is opened.
What is a File Infector?
An attack that occurs when attackers insert themselves in between a two-party transaction.
What is a Man-In-The-Middle (MitM) attack?
Occurs when an attacker fabricates false circumstances to compel a victim into providing access to sensitive data or protected systems
What is pre-texting?
The huge number of devices connected to the Internet of Things have to communicate automatically, not via humans. This is called
What is Machine to Machine (M2M)?
This popular rideshare app experienced a data breach that affected not only 57 million customers personal information but 600,000 of their driver’s personal information
What is Uber?
Unlike viruses, these don’t attach to a host file, but these self-contained programs can propagate across computers and networks.
What is are worms?
Any unwanted software installed in your system(s) without your consent.
What is a Malware (malicious software)?
Leaving a malware-infected device, such a USB flash or CD, in a place where someone will likely find it with the hope the person will load it into their computer.
What is baiting?
The term IoT first coined in this year
What is 1999?
This hotel brand experienced a data breach that resulted in data being stolen from 500 million customers
What is Marriott?
Any unwanted software application used by businesses for marketing purposes. They automatically appear as a bar or a pop-up window on your screen.
What is Adware?
This refers to the practice of sending fraudulent email communications that appear to originate from a trusted source with the aim of gaining personal information or influencing the target to do something
What is a phishing attack?
When an attacker request private information from someone in exchange for something desirable or some type of compensation
What is quid pro quo?