Halloween🎃
Malware🧛‍♀️
Security Concerns👻
Security Best Practices🕵🏿
100

Where did real mummies originate?

What is Ancient Egypt?

100

This malware misleads users of its true intent by disguising itself as a standard program

What is a Trojan?

100

Sending malicious or fraudulent emails pretending to be from someone else in order to gain access to data, such as personal information and passwords

What is phishing?



100

A combination of "tricky" characters to secure your account or device that no one else knows

What is a Password?

200

Halloween is the second most commercial holiday in the United States. Which holiday is No. 1?

What is Christmas?
200

A type of malware that tries to extort money from the victim.

What is ransomware?

200

When a "hacker" snoops on data or phone conversations

What is Eavesdropping/wiretapping?

200

The "properties" of secure information are depicted by what model?

What is the CIA Triad/Triangle/Model?

300

Which story originated the Headless Horseman?

What is The Legend of Sleepy Hollow?

300

A sneaky type of malware that secretly records your online activities and personal information.

What is Spyware?

300

A common attack where a person will attempt to figure out a password or other credentials to gain access to a
host.

What is Impersonation?

300

Contain updates for system or application files that fixes bugs or security problems

What is a Patch?

400

What is the least popular Halloween candy?

What is Candy Corn?

400

This malware secretly installs itself on your device and displays unwanted advertisements and pop-ups

What is Adware?

400

Getting users to reveal confidential information or obtaining unauthorized physical access to a resource.

What is Social Engineering?

400

Designing systems without single points of failure

What is Fault tolerance?

500

Who wrote the horror book Frankenstein?

Who is Mary Shelley?

500

Malware that records all the user’s keystrokes on the keyboard, typically storing the gathered information and sending it to the attacker, who is seeking sensitive information like usernames, passwords, or credit card details.

What is a Keylogger?

500

Combing through an organization's or an individual's refuse ("trash") to try to find useful documents.

What is Dumpster Diving?

500

The principle of allowing users as little access to a system as possible for them to complete their tasks

What is the principle of least privilege?



M
e
n
u