Committee & Campaign
Phishing or Legitimate?
Potpourri
Cybercrimes
Computer Security
100

These are the five committee members

Who are Michael, Raquel, Christina, Eric Hill, and Eric Hayes (and Sean...test)

100

This is the most likely type of email when a company requests your sensitive information via email

What is a Phishing email?

100

This cheerful committee member is currently house-hunting in West Seneca

Who is Raquel

100

143 million consumers had their personal information exposed in 2017 by this credit bureau.

What is Equifax

100

This is the process of encoding information in a way so that only someone with a key can decode it.

What is encryption?

200

The committee was charged with implementing ideas generated from this IT event.

What is Fedex Day?

200

This is the most likely type of email when a company contacts you by name and directs you to contact them via phone.

What is legitimate email?

200

This committee member is "allergic" to most condiments.

Who is Eric Hayes

200

In 2016, this ride sharing platform discovered that 600,000 of its drivers' drivers license numbers were exposed.  They didn't make this public until almost a year later.

What is Uber?

200

This kind of technique is designed to fool innocent people into sharing private information like bank account numbers and credit card information.

What is phishing?

300

You would send a canned response to the user and cc' this email address when the phishing email you are contacted about is not a KnowBe4 simulation.

What is phishing@daemen.edu?

300

This is the most likely type of email when the entire email is a hyperlink

What is a phishing email?

300

This committee member at one point played French Horn professionally.

Who is Michael

300

In 2011, this large video game network was hacked, exposing 77 million accounts.  Estimated losses were $171 million while the site was down for a month.

What is Sony's Playstation Network

300

This is a piece of malware that often allows a hacker to gain remote access to a computer through a "back door"

What is a trojan horse?

400

This finishes the catchphrase,  "We can fight cybercrime ______________"

What is "one email at a time"

400

This is the most likely type of email when a company sends you an unsolicited attachment

What is a phishing email

400

This committee member was temporarily a "Mountaineer"

Who is Christina

400

In 2015, this second-largest health insurer in the U.S. said a cyberattack exposed the names, addresses, Social Security numbers, dates of birth and employment histories of up to 78 million customers.

What is Anthem

400

The term used for the moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

What is a breach?

500

This is one of the key objectives of the committee

What is any of the following:

IT Notification

IT Response

Proactive training

Positive Reinforcement

Email review

500

This is the most likely type of email when a company includes hyperlinks matching legitimate URLs

What is a legitimate email?

500

This committee member swam with sharks in Saipan, Northern Mariana Islands

Who is Eric Hill

500

In July of 2019, a hacker crippled this Bronx-based college by encrypting its files remotely.  The hacker demanded $2 million to unencrypt their files.

What is Monroe College

500

This is a form of malware that deliberately prevents you from accessing files on your computer - holding your data hostage.  It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.

What is ransomware?

M
e
n
u