Be Sociable
Phishing
Cyber Breach
Malware
Hackers
100
An approach to gain access to information through misrepresentation commonly by impersonation
What is Social Engineering?
100
A scam that tricks you into providing details needed to access an account
What is deceptive phishing?
100
This company was victim to the biggest credit card scam in history and had to pay more than $110 million in damages
Who is Heartland?
100
A form of software that downloads or displays unwanted ads
What is adware?
100
An ethical computer hacker
What is a white hat hacker?
200
An attack the is generally sent via e-mail and seeks to gather information
What is phishing?
200
A scam that directly targets an individual
What is spear phishing?
200
This company was breached through their HVAC system
Who is Target?
200
This malware encrypts your data and holds it ransom for a sum of money
What is ransomware?
200
A loosely associated international network of activists and hacktivists
What is Anonymous?
300
An attack where the attacker promises and item or good to the victim
What is baiting?
300
An attack focused at the CEO or other top Execs in a company
What is a whaling attack?
300
This company had one of the largest data breaches in history with some 145 million user records being stolen
Who is EBay?
300
A toolkit that automates the exploitation of client-side vulnerabilities (Java, Flash, Adobe Reader, etc.)
What is an Exploit Kit?
300
A group that hacks "for the lulz"
What is lulzsec?
400
An attack that focuses on creating a fabricated scenario
What is pretexting?
400
An attack that re-directs victims to a bogus site even if the victim has typed the correct web address
What is pharming?
400
This attack is sometimes used to hide a data breach that is occuring
What is a DDoS attack?
400
This virus created by two Filipino programmers was written in VBS and created havoc in early 2000
What is the ILOVEYOU virus?
400
Known as Captain Crunch
Who is John Draper?
500
An attack that involves an attacker following an employee into a restricted area
What is tailgating?
500
This type of authentication requires a user to provide 2 pieces of informaiton
What is 2 factor authentication?
500
This company stored credentials in their source code and ultimately destroyed many peoples lives as a result
Who is Ashley Madison?
500
A set of software tools that enable an unauthorized user remote access without being detected
What is a rootkit?
500
Considered the worlds most famous hacker
Who is Kevin Mitnick?
Continue
ESC
Reveal Correct Response
Spacebar
M
e
n
u
Team 1
0
+
-
Information Security
No teams
1 team
2 teams
3 teams
4 teams
5 teams
6 teams
7 teams
8 teams
9 teams
10 teams
Custom
Press
F11
Select menu option
View > Enter Fullscreen
for full-screen mode
Edit
•
Print
•
Download
•
Embed
•
JeopardyLabs