Types of attacks
Security Tools
Cyber History
Cyber Stats
100

A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. 

100

This service allows users to remain anonymous, masking their identity/location and encrypts traffic.

What is a VPN?

100

This ex-government employee is famous for leaking classified cybersecurity information from the National Security Agency in 2013.

Who is Edward Snowden?

100

Cybercrime went up 600% due to this ongoing event

What is the Pandemic / COVID-19 / Coronavirus?

200

An independent malware program that self-replicates in order to spread from machine to machine to cause damage.

What is a (computer) worm?

200

You can protect your home PC with this product.

What is a PC firewall, Anti-Virus software, or Anti-SpyWare software?

(Source: http://www.superteachertools.us/jeopardyx/jeopardy-review-game.php?gamefile=17775#.YEMcnJNKjEY)

200

This framework for providing data protection and privacy for those residing within the EU and European Economic Area was put fully in effect in mid-2018.

What is the General Data Protection Regulation (GDPR)?

200

This generation is currently the most impacted by cybercrime.

(Gen Z, Millennials, Boomers, etc)

300

This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).

What is Distributed Denial of Service (DDoS)?

300

This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system.

300

This English cryptanalyst is famous for deciphering encoded messages during World War II and creating standards for artificial intelligence. He is considered by many to be the father of theoretical computing. (Hint: There was a 2014 movie based on his biography.)

Who is Alan Turing?

He helped in World War II by cracking intercepted messages from the German forces. He also created the "Turing test," which examines a machine's ability to display human behavior via artificial intelligence.

(Source: https://www.mycfcu.com/content/docs/ncsam-2019-cybersecurity-awareness-trivia_final_508.pdf)

300

Over the last year, malware on this operating system has gone up by 165%

400

This type of attack targets an organization's top officials or highly-salaried employees (C-level) to reveal sensitive information.

What is Whaling?

400

Companies consider cybersecurity when instructing employees with a policy on BYOD, which is short for this.

400

In 2005, this user-inserted cross-site scripting worm impacted over one million MySpace users within just 20 hours, making it the fastest-spreading virus of all time.

What is Samy (JS.Spacehero)?

400

In this country, over 130 large-scale cyber attacks occur each year.

500

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. 

500

When a URL has this at the beginning, it means that the information entered into the site is encrypted

500

This English writer and mathematician is known for her work on the Analytical Engine and is considered to be one of the first computer programmers.

500
The Pentagon receives approximately this many cybersecurity attack reports every day

(Hint: guess # in millions)