IoT
Breaches
Malware
Types of Cyber Attacks
Social Engineering Attacks
100

IoT stands for these terms

What is Internet of Things?

100

In 2013 news broke that this major retailer had experienced a data breach during the holiday shopping season that resulted in 110 million people financial information being compromised

What is Target?

100

Infects applications like Microsoft Word, where it executes instructions once opened before transferring back control to the app.

What is a Macro Virus?

100

Any malicious and deliberate attempt by one or more individuals (or organizations) to breach the information system of another organization or individual.

What is a Cyber Attack?

100

This occurs when an unauthorized individual follows authorized individual into an otherwise secure location

What is tailgating?

200

This is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?

What is applying security updates promptly?

200

This gaming community experienced a data breach that affected 77 million accounts and is now known as the worst gaming community breach of all time

What is the PlayStation Network?

200

These programs hide in a useful program to infect your systems. Unlike viruses, these don’t self-replicate but can be used to establish back doors that are exploited by attackers.

What are Trojan horses?

200

An attack that floods your networks, systems, or servers with traffic to exhaust your resources and bandwidth.

What is a Denial-of-service (DoS) attack?

200

A high target attack that focuses on a specific individual using personal information often obtained from victim’s social media accounts or other online activity.

What is spear-phishing?

300

This person invented the term the Internet of Things

Who is Kevin Ashton?

300

This Internet giant was breached and was known as one of the largest data breaches in history which resulted in 3 billion user accounts being compromised

What is Yahoo?

300

It attaches itself to executable code, for example, .exe files, and is installed once the code is opened.

What is a File Infector?

300

An attack that occurs when attackers insert themselves in between a two-party transaction.

What is a Man-In-The-Middle (MitM) attack?

300

Occurs when an attacker fabricates false circumstances to compel a victim into providing access to sensitive data or protected systems

What is pre-texting?

400

The huge number of devices connected to the Internet of Things have to communicate automatically, not via humans.  This is called

What is Machine to Machine (M2M)?

400

This popular rideshare app experienced a data breach that affected not only 57 million customers personal information but 600,000 of their driver’s personal information

What is Uber?

400

Unlike viruses, these don’t attach to a host file, but these self-contained programs can propagate across computers and networks.

What is are worms?

400

Any unwanted software installed in your system(s) without your consent.

What is a Malware (malicious software)?

400

Leaving a malware-infected device, such a USB flash or CD, in a place where someone will likely find it with the hope the person will load it into their computer.

What is baiting?

500

The term IoT first coined in this year

What is 1999?

500

This hotel brand experienced a data breach that resulted in data being stolen from 500 million customers

What is Marriott?

500

Any unwanted software application used by businesses for marketing purposes. They automatically appear as a bar or a pop-up window on your screen.

What is Adware?

500

This refers to the practice of sending fraudulent email communications that appear to originate from a trusted source with the aim of gaining personal information or influencing the target to do something

What is a phishing attack?

500

When an attacker request private information from someone in exchange for something desirable or some type of compensation

What is quid pro quo?

M
e
n
u