Attacks
What Am I
Defend It
Miscellaneous
100

The art of manipulating people so they give up confidential information.

What is Social Engineering?

100

A mass email sent with official looking logos asking the recipient to perform a series of actions that will provide the sender with access to confidential information.

What is Phishing?

100

Shred it, don't throw it away!

How to defend against Dumpster Diving?

100

A network of physical objects that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data over the internet.

What is "The Internet of Things (IOT)?"

200

An attack that works by exploiting a known bug in software applications.

What is an Application Attack?

200

An email directed at a specific individual asking them to perform a series of actions that will provide the sender with confidential information.

What is Spear Phishing?

200

Create a physical barrier between your screen and prying eyes.

What is Shoulder Surfing?

200

A phishing attack that targets a website that members of an organization frequently visit.

What is a Watering Hole Attack?

300

A malicious action against wireless system information or wireless networks.

What is a Wireless Attack?

300

A highly customized and personalized email directed to a specific person, usually a CEO or CFO, with the intent to manipulate the person to authorize a high-value money transfer.

What is Whaling?

300

Verify the sender address and reply address are the same.

What is a Phishing email?

300

Crockpots, Doorbell Cameras, Door Locks, Smart watch, Farming Equipment, HVAC, and Refrigerators with access to the internet.

What are IOT devices?

400

A method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.

What is a Cryptographic attack?

400

A criminal practice where thieves steal your personal data by spying over your shoulder while using electronic devices in public.

What is Should Surfing?

400

Avoid the "click" reflex and use a pop-up blocker.

What is Scareware?

400

Congratulations! We want to thank you for being a loyal Google user! Your IP address has been randomly selected to receive a FREEE Apple iPhone.

What is Baiting?

500

While on a website a pop-up appeared saying your computer has a virus and encourages you to download a program to fix it.

What is Scareware?

500

A situation where an unauthorized party gains access to a restricted area from an authorized party.

What is Piggybacking?

500

You call your boss while he is on vacation after receiving an email from him. The email asks you to purchase gift cards and mail them to him but he doesn't want you to tell anyone.

What is Impersonation?

500

An infamous dumpster diver who started a wholesale telephone equipment Co. in 1968

Who is Jerry Schneider?