Mixed Bag
Security Scramble
Attacks
Facility Security Management
Data Breaches
100
The month which an annual campaign to raise awareness about the importance of cybersecurity is held.
What is October?
100
otitsrrer aactkt
What is Terrorist Attack?
100
This is most often introduced to a system through email attachments, software downloads or operating system vulnerabilities.
What is Malware?
100
This plan is a set of written instructions for detecting, responding to and limiting the effects of an information security event.
What is an Incident Response Plan?
100
This government agency's "Get Transcript" system was hacked and over 700,000 taxpayers personal information was compromised.
Who is the Internal Revenue Service (IRS)?
200
The email address that you should forward any and all suspicious emails to.
What is SPAM@advance-auto.com?
200
ecybr tyeurics
What is Cyber Security?
200
This attack will typically direct the user to visit a website where they are asked to update personal information, such as password or credit card.
What is a Phishing Attack?
200
This is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions.
What is Security Monitoring?
200
This web services provider was forced to admit that the personal data of some 500 million users had been compromised in a hack dating back to 2014, one of the largest ever cyber security incidents.
Who is Yahoo!?
300
This is any data that could potentially identify a specific individual.
What is Personally identifiable information (PII)?
300
vrybiunleaitl
What is Vulnerability?
300
An example is you received an email message stating that you are a winner and need to claim your prize.
What is Phishing (Scam)?
300
This software is designed to prevent viruses, worms and Trojan horses from getting onto a computer as well as remove any malicious software code that has already infected a computer.
What is Virus Protection Software?
300
The malware attack on this retail company exposed 40 million customers’ credit and debit card information from people who shopped in stores from Nov. 27 to Dec. 15, 2013 and was one of the largest hacks in U.S. retail history.
Who was Target?
400
They are commonly considered to be the weakest components in any security system.
What are human beings?
400
scesac ntcrloo
What is Access Control?
400
By intercepting the endpoints in an online information exchange (i.e. the connection from your smartphone to a website), this attack can obtain information from the end user and the entity he or she is communicating with.
What is the Man in the Middle attack?
400
This is a property of access control of multiple related, but independent software systems. With this property a user logs in with a single ID and password to gain access to a connected system or systems without using different usernames or passwords.
What is Single sign-on?
400
Between February and March of 2014, this global commerce leader requested that 145 million users change their account passwords due to a breach that compromised encrypted passwords along with other personal information. Hackers gained access to accounts through stolen login credentials.
Who is eBay?
500
It can be defined as ‘the posture taken to protect people, assets, data and technology across an entire enterprise.’
What is Security?
500
retiycsu eanswsrae
What is Security Awareness?
500
This type of access-denial attack prevents legitimate users from accessing files without a decryption key.
What is a Ransomware Attack?
500
This refers to mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form that is non-readable to unauthorized parties.
What is Data Encryption?
500
In February of 2015, hackers broke into this healthcare provider's servers and stole up to 80 million records. The attack began with phishing emails sent to five employees who were tricked into downloading a Trojan with keylogger software that enabled the attackers to obtain passwords for accessing the unencrypted data.
Who is Anthem?