Intro to Computers
Financial Systems
Viruses & Malware
Hacker
Hybrid Threats
100

An electronic device that executes the instructions in a program. 

What is a computer?

100

A medium of exchange for goods and services. 

What is currency?
100

Fraudulent practice of sending emails to targets by pretending to be reputable senders. 

What is “Phishing”?
100

A person who creates and modifies computer software/hardware.

What is a Hacker?

100

The act or practice of spying. 

What is Espionage?

200

Sends orders to other parts of the computer.

What is the CPU/Central Processing Unit?

200

Part ownership in a company.

What are stocks?

200

Allows you or others to have a remote session on your computer.

What is Remote Desktop (RDP)?

200

The most notorious device used to generate tones to get free calls.

What is a Blue Box?

200

Intentional use of computers to access personal information for personal gain. 

What is Cyber Espionage?
300

The most common type of memory found in computers/printers.

What is RAM/Random Access Memory?

300

Risk transfer from an individual to a company.

What is insurance?

300

Software that is unwanted and causes damage/compromises confidentiality. 

What is Malware?

300

Hackers that explore phone systems.

What are Phone Phreakers?

300

To gain access to valuable government and business data and exploit other nations. 

What is the goal of Nation-State Hacking?

400

Packets, Routers, Switches. 

What are the parts that make the Internet work?

400

You can expect the stock will increase in value.

What is  “Calls Option”?

400

Cyber rung that used malware called DNSChanger to infect around 4 million computers. 

What is Operation Ghost Click?

400

Process of gaining information through leveraging good intentions, knowledge, and social systems.

What is Social Engineering? 
400

Methodology of hacking used by a foreign government.

What is Advanced Persistent Threat (APT)?

500

He predicted that processing speeds would double every two years.

Who is Gordon Moore?

500

Agreements to exchange currencies at a future date. 

What are “Forward Currency Contracts”?

500

This brought the internet to near collapse for several days in 1988.

What is the Morris Worm?

500

Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks.

What are the 5 Phases of Hacking Process?

500
Quality over quantity, Brute Force Attacks.

What are “Chinese Tactics” for Nation-State Hacking?

M
e
n
u