Prevention methods
Real life cyber attacks
Cyber Security Vocab
Certifications
types of cyber security attacks
100

Having multiple steps to logging in

 2 way authentication

100

A major ransomware attack in 2017 that targeted computers running Windows OS

what is WannaCry

100

The term used to describe a computer programmer who tries to gain unauthorized access into a network or computer systems with malicious intent

What is a Hacker

100

People certified in this are skilled on Trojan,worms and viruses ,sniffers and other ethical hacking terms

What is CEH(Certified Ethical Hackers)

100

What is a standalone malware computer program that replicates itself in order to spread to other computers.

Answer: Worm

200

Going only on websites with HTTPS

avoiding untrusted websites

200

What was hacked in the Target breach of 2013

what is customer data

200

 a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorization of a system entity that invokes the program

What is a Trojan Horse

200

This is top certification if you want to manage,develop,and oversee

What is CISM Certified Information Security Manager.

200

What is a software that aims to gather information about a person or organization, sometimes without their knowledge,

What is a spyware


300

Saving your computer data onto archive file in case of an emergency

data backup

300

Who was hacked by the “Guardians of Peace” in 2014 that leaked confidential data from a film studio

Who is Sony Pictures

300

An attack on trusted and otherwise secure websites, by injecting malicious scripting. Attackers target websites that do not filter user inputs for strings or common characters in a script.

What is Cross-Site Scripting

300

People with these certification are told to have superior technical skills, overall knowledge, and experts in multiple security fields

.What is Security+

300

What is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed and often masks its existence or the existence of other software

rootkit

400

Not going on public wifi

Using VPN to create a secure connection

400

A mysterious group who breached the NSA and auctioned off the data are known as

Who are The Shadow Brokers

400

The process of finding the solution by constantly trying many probable variants of information such as passwords, deciphered keys, etc., in a random fashion

What is a Brute Force Attack

400

People with this certification are serious about their careers in IT.What is CISSP

(Certified information security professional)

400

What is a standalone malware computer program that replicates itself in order to spread to other computers.

Answer: Worm

500

Constantly updating your cyber security methods

Upgrading antivirus software

500

A major data breach of a major consumer credit agency

Equifax

500

A user or a program that has highly sophisticated techniques and intends to pursue them with a malicious intent.

What is an Advanced Persistent Threat

500

This certification is the highest priced certification.

What is GSEC

500

What is a malicious computer program which misleads users of its true intent.

Answer: Trojan horse