Fills the servers with traffic, causing the servers to start running slower until it's eventually unusable?
What is DDoS
A defense measure in every computer, tablet, phone, and every electronic.
What is Firewall
Company that offers a range of cloud-based security solutions and services.
What is Symantec Cloud Services
In this role, you’re the company’s point person for security, ensuring that data remains secure against unauthorized access and cyberattacks.
What is Information Security Specialist
A computer worm targeting the Windows operating system that was first discovered in November 2008.
What is Conficker 2009
The attacker encrypts your important files with something to freeze them, and will only give them back if the victim pays a sum of money?
What is Ransomware
an app/software that protects you from virus'
What is Antivirus
Company that provides support and solutions for technology security. They offer products and services to protect individuals and businesses from cyber threats.
What is McAfee
In this role, you’re typically put in charge of the day-to-day operations of an organization’s cybersecurity systems.
What is Security Systems Administrator
An email worm that filled your computer with malware, often disguised as a love letter.
What is ILOVEYOU Virus (aka love bug virus)
Spies into your device taking your info without the knowledge of the user?
What is Spyware
A way to hide your IP, or make it seam like you're from another place.
What is VPN
A company that offers ML-powered NGFW capabilities as a fully-managed cloud-native service on AWS.
What is Palo Alto
Retrieve information from computers and other digital devices to discover how an unauthorized person accessed a system or to gather evidence for legal purposes.
What is Digital Forensic Examiner
A worm that exploited a vulnerability discovered by Riley Hassell.
What is Code Red Worm
A malicious software hidden inside of another seemingly legit software.
What is Trojan
Someone who can infiltrate your software and attack your files.
What is Hacker
A cloud-native security-as-a-service company that offers comprehensive security solutions for data-in-motion.
What is Privafy
You assess your organization’s technology for potential issues with security, efficiency, and compliance.
What is IT Auditor
Malware that steals banking credentials using keylogger functionality and web injection scripts, but infected computers also become part of a botnet used to communicate with other infected computers using peer-to-peer protocols.
What is GameOver Zeus
A scare that cyber attackers use to make you give them your information.
What is Spoofing
When someone gets into your device and begins to leak your info/data.
What is Data Breach
A leading provider of people-centric compliance and security solutions. They help organizations mitigate critical security and compliance risks by offering an integrated, cloud-based suite of solutions.
What is Proofpoint
You help businesses identify their security weaknesses before malicious hackers can do the same. You do this by attempting to breach computer networks with the company’s permission.
What is Penetration Tester
Mydoom was a computer worm that targeted computers running Microsoft Windows. It also became the fastest spreading email worm.
What is Mydoom