When who you are is stolen
What is identity theft
"The Interview" was the cause of this attack?
What is the Sony Attack
Going through the trash
What is dumpster diving
Sony Attack Hackers
Who are the Guardians of Peace
The card that connects a computer to a network
What is the NIC (network interface card)
To obtain sensitive information such as usernames, passwords, and other information
What is phishing
This worm almost caused a complete meltdown
What is Stuxnet
Most popular attacks using emails, texts, SMS and other means to trick the victim to act
What is phishing
David Smith is known for authoring this virus named after a stripper he met
What is the Melissa Virus
Named after a wall to hold back fire or in this case, bad addresses and attackers
What is a firewall
The use of computer networks to gain illicit access to confidential information...aka -- stealing information
What is cyber espionage
This attack makes you want to shed a tear
What is WannaCry
Following someone into secure facilities
What is known as tailgating or piggybacking
Jailbreaker of the Sony Playstation 3
Who is George Hotz
A device that forwards packets between computer networks
What is a router
Attacks directed at senior executives
What is known as whaling
Ongoing cyber attacks using a Remote Access Tool
What is Operation Shady RAT
Attackers create a fake identity and use it to manipulate the other employees to give up information about themselves
What is pretexting
Kevin David Mitnick
Who is known as the number one hacker in the world
A device that modulates the analog signal to a digital signal
What is a MODEM
Locking a computer and demanding money or a payment to unlock the system
What is ransomware
A perfect virus for Valentine's Day
What is the I love you virus
Nontechnical kid of intrusion that relies heavily on human interaction
What is social engineering
This group hacked HB Gary Federal
Who is Anonymous
The computer that routes traffic from a workstation to the outside network (compound word)
What is a gateway