Phishing Frenzy
Tech Terminology
Cyber History
Name the Attack
Cyber Stats
100

Cyber attackers commonly use this electronic communication method to lure victims

What is email?

100

This term describes the physical components of a computer

What is hardware? 

100

This major social media platform experienced a data breach in 2019, leading to the exposure of millions of user's personal information

What is Facebook? 

100

You receive an email claiming to be from your bank, asking you to click a link and verify your account information. What type of cyber attack is this? 

What is phishing? 

100

According to recent studies, what percentage of respondents cited being distracted as the top reason for failing phishing tests?

5%

15%

30%

45%

What is 45%?

200

What percentage of cyber attacks start with an email?

20%

45%

75%

92%

What is 75%?

200

This type of software helps to protect your computer from viruses and other malicious attacks

What is antivirus?

200

This online marketplace was the target of a major data breach in 2014, exposing the usernames and passwords of millions of users

What is eBay? 

200

You receive a text saying that your account has been compromised and you need to reset your password by clicking a link, but it is a trap. What type of cyber attack is this? 

What is a SMS phishing attack (Smishing) 

200

Approximately how often do cyber attacks occur? One every:

39 seconds 

1.5 minutes

2 hours

2.1 hours

What is 39 seconds?

300

Which global brand is the most impersonated in phishing emails?

What is Microsoft?

300

This term refers to the practice of using social interaction to trick people into revealing personal information 

What is social engineering?

300

Which decade was the first malware created?

What is the 1970s?

300

Your friend tells you they clicked a link in an email and now their computer is asking for money to unlock files. What type of cyber attack is this? 

What is ransomware?

300

What was the total cost of cyber crime in 2023?

20 Million 

750 Million

4 Billion

8 Trillion

What is 8 Trillion? 

400

Clicking on links in phishing emails can lead to this type of malicious software being installed on your device

What is malware? 

400

This common security practice requires users to provide two forms of identification before accessing an account

What is two-factor authentication? 

400

In 2013, this major retailer experienced a data breach where millions of credit and debit card numbers were stolen during the holiday shopping season

What is Target?

400

Your internet connection suddenly slows down because someone from a single system is flooding your network with excessive traffic, making it unusable. What type of cyber attack is this? 

What is a Denial of Service (DoS) attack

400

Approximately what percentage of attacks on insurance companies result in compromised client details?

37%

60%

75%

84%

What is 75%?

500

This term is used to describe an attack that targets specific users

What is spear phishing?

500

This programming language is known for its readability and is often used for web development, data analysis, and artificial intelligence 

What is python? 

500

Which decade was the first antivirus created?

What is the 1980s? 

500

After clicking a link disguised as a legitimate program, your device starts acting strangely and slows down significantly, performing unwanted actions. What kind of cyber attack may have occurred?

What is a Trojan Horse attack? 

500

According to recent studies, this percentage of data breaches is caused by human error

11%

28%

62%

88%

What is 88%?

M
e
n
u