Malware Types
Identifying Phishing
Cyber Identity Safety
Now What?
Cybersecurity..NOT!
100

This type of malware disguises itself as legitimate software but performs harmful activities once installed

What is a Trojan horse?

100

This type of phishing targets high-level executives within an organization.

What is whaling?

100

This term refers to the act of using someone else's personal information without their consent, often for fraudulent purposes.

What is identity theft?

100

This is the first action you should take if you suspect your identity has been stolen   

What is to gather evidence of the identity theft?

100

This year marks the founding of the American College of Cardiology.

What is 1949?

200

This malicious software encrypts files on a victim's computer, demanding payment for the decryption key

What is ransomware?

200

This type of phishing involves phone calls where the attacker pretends to be from a reputable company to gather personal information

What is vishing (voice phishing)?

200

To protect your online identity, you should use a unique password for each account. This type of password is known as what?

What is a strong password?

200

After gathering evidence, you should do this with your financial institutions to protect your accounts.

What is to notify your banks and credit card companies?

200

The ACC publishes this peer-reviewed journal, which is one of the most respected in the field of cardiology.

What is the Journal of the American College of Cardiology (JACC)?

300

This type of malware replicates itself to spread to other computers and networks

What is a worm?

300

Before clicking a link in an email, you should do this to see where it leads

What is hover your mouse over the link?

300

Using this tool can help you create and store complex passwords securely.

What is a password manager?

300

Filing this report with local authorities can help document the identity theft and may be necessary for further action.

What is a police report?

300

The ACC has a dedicated program to educate healthcare professionals about the importance of managing this chronic condition, which is a major risk factor for heart disease.

What is hypertension?

400

This type of malware that attaches itself to legitimate programs or files. It replicates and spreads to other systems when the infected file is shared or executed

What is a virus?

400

This term refers to the act of impersonating a legitimate source in order to gain unauthorized access or information.

What is spoofing?

400

Sharing personal information on social media can make you vulnerable to this type of cyber threat.

What is social engineering?

400

Contacting this agency allows you to place a fraud alert on your credit report and monitor for any suspicious activity.

What is a credit bureau (Experian, TransUnion, or Equifax)?

400

The heart is commonly recognized as a symbol of this important concept.

What is Love and Affection, Compassion, Kindness Passion, Desire, Life and Vitality Health, Wellness 

500

This malware that secretly monitors and collects information about a user’s activities without their knowledge, often used to steal sensitive data like passwords or credit card information.

What is Spyware?

500

This type of phishing occurs through text messages instead of emails

What is smishing?

500

When setting up an online account, this method adds an extra layer of security by requiring a second form of verification.

What is two-factor authentication (2FA)?

500

This federal agency provides resources and assistance for victims of identity theft

What is the Federal Trade Commission (FTC)?

500

In what year was the first ACC meeting that occurred in New York.

What is 1951?