Cyber Threats
Cyber Protection
Hardware
Who (Stakeholders)
Miscellaneous
100

This type of attack tricks users into giving up sensitive information through fake emails.

What is phishing?

100

This tool encrypts your internet connection, especially on public Wi-Fi.

What is a VPN?

100

This system monitors and controls industrial processes.

What is SCADA?

100

This federal agency helps defend critical infrastructure from cyber threats.

What is CISA?

100

This tool scans networks for vulnerabilities and open ports.

What are cyber scan tools?

200

Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays. 

What is Ransomware?

200

This system monitors and controls incoming and outgoing network traffic.

What is a firewall?

200

This device executes control logic in industrial automation.

What a PLC?

200

This organization enforces environmental regulations and may oversee compliance.

What is DEQ?

200

This network segmentation method improves security by isolating traffic.

What is VLAN?

300

This broad term refers to any software designed to harm or exploit systems.

What is malware?

300

This device stores data centrally and allows network access to files.

What is a NAS?

300

This interface allows operators to interact with machines and systems. 

What is an HMI?

300

This federal agency investigates cybercrime.

What is the FBI?
300

This refers to wireless local area networking.

What is WLAN?

400

This attacks manipulates people rather than technology to gain access.

What is social engineering?

400

This type of switch allows configuration, monitoring, and VLAN setup.

What is a managed switch?

400

These devices provide computing resources and services across a network.

What are servers?

400

This person or group is responsible for owning and maintaining the system.

Who is the owner?

400

This describes the difference between information technology systems.

What is IT vs. OT?

500

This type to attack targets third-party vendors to compromise a system.

What is a supply chain attack?

500

This specialized computer is used for designing, controlling, or monitoring industrial systems.

What is an engineering workstation?

500

These are portable devices like phones and/or tablets that can pose security risks.

What are mobile devices?
500

This university may be involved in research or cybersecurity collaboration.

What is BSU?

500

This model divides industrial control systems into hierarchical security levels.

What is the Purdue Model?