A message sent that is disguised as if it's from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information
Phishing
This organization is a part of the government that receives 14% of the national budget. They specialize in attacks and defense
US Military
This company is best known for a symbol that contains red, green, blue, & yellow, and is modeled after a window
Microsoft
IS
Information Systems
When a criminal impersonates another individual or organization with the intent to gather personal information
Spoofing
All OSU students use this company's service when logging in to their ONID accounts
DUO Security
This tech company is best known for their search engine, and have the same logo colors as Microsoft
IT
Information Technology
When someone phishes specifically for high net worth individuals
Whaling
This company, nicknamed Big Blue, is known for its strong analytics, space tech, and cloud computing divisions, and is over 100 years old.
IBM (International Business Machines)
This company started out as a book delivery service, and has since grown into most other industries through their delivery service
AWS (Amazon)
DB
Database
When someone has 1 or 2 pieces of personal info and uses it to try and obtain more info
Spear Phishing
This company is currently teaming up with TSMC to try and buy Intel. The last three letters are "com"
Broadcom
Known for their blue & white logo, this platform helps people find jobs. They also have a certification finding tool.
SQL
Structured Query Language
When someone taps a cable or wire with the intention of passively gaining personal or business information
Sniffing
This is the largest cybersecurity company in the world, based on highest employee count
Cisco
Their acronym is ISACA
Information Systems Audit & Control Association
MIS
Management Information System