Protecting Your Biz
Attacks
Protection
Name the Hackers
100

Protects the network by controlling what traffic is allowed in, as well as allowed out

What is the Firewall
100

Destroys data and can slow down a computer

What is a Virus

100

Hardware or software that prevents hackers from accessing your personal or company data

What is a Firewall

100

These attackers make political statements, or create fear, by causing physical or psychological damage to the victim(s)

What are Terrorists 

200
A conceptual outline of the stages of an information systems attack

What is a Kill Chain

200

A self-replicating pieces of software that travel to new computers without any intervention or knowledge of the user

What are Worms

200
A program that scans a computer for malicious software and deletes it

What is an Antivirus Program

200

An internet-based conflict that involves the penetration of information systems of other nations

What is cyberwarfare 
300

The process of probing a computer, server, or other network host for open ports

What is Port Scanning

300

Used in security attacks as infected machines that carry out a DDoS attack

What are Zombies

300

Monitors online activities and collects personal information without permission

What is Spyware

300

These type of attackers make political statements in order to create an awareness of issues that are important to them

What are Hacktivists 

400

A tool used to gather information about data flowing through a network

What is a NetFlow

400

The purpose is to gain privileged access to a device while concealing itself

What is a rootkit
400

Connect to a specific wireless network by the way of a network identifier

Service Set Identifier (SSID)

400

These attackers father intelligence or commit sabotage on specific goals on behalf of their government

What are State-Sponsored Attackers
500

This attack disrupts services by simply overwhelming servers and network device with bogus traffic

What is a DDoS attack

500

An attack in which the primary goal is to prevent the target server from being able to handle additional requests

What is a DoS Attack

500

This tool provides a list of open ports on network devices

What is Nmap

500

Discovering weaknesses of networks and systems to improve their security level is the motivation behind this type of attacker 

What is a White Hat Attacker
M
e
n
u