Malware
Go Phish
Keys to the Kingdom
Let's Get Social
STV
100
Malware is a combination of these two words.
What is "malicious" and "software"?
100
This tool is used to catch fish.
What is a fishing pole?
100
Permissions used to prevent an account from getting information they are not authorized to see, while making the information available to those who are authorized.
What is access controls?
100
This movie came out in 2010 and follows the story of Mark Zuckerberg and the creation of Facebook.
What is The Social Network?
100
A virus that infected many people around the world in 2009, and also goes by the name H1N1.
What is the Swine Flu?
200
A computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
200
A targeted form of phishing towards an individual or organization that uses specific words or names, making it more difficult to identify the email as a scam.
What is spear phishing?
200
A word or phrase that verifies that you and only you had access to an account.
What is a password?
200
This social media CEO was hacked for the third time in 2016.
Who is Mark Zuckerberg?
200
Although this is a popular saying that you would see inside of a Valentine's Day card, in 2000 this was considered one of the most damaging viruses of all time.
What is ILOVEYOU?
300
A type of malware that is often disguised as legitimate software but is actually malicious.
What is a Trojan?
300
A type of phishing attack that targets the “big fish”, such as senior leaders or other high profile individuals.
What is whaling?
300
Similar in name to a government agency, this is what information security professionals call the Confidentiality, Integrity, and Availability triad.
What is the CIA?
300
This social networking site for professionals was hacked resulting in the breach of 117 million passwords and email accounts.
What is LinkedIn?
300
This virus would replicate and then send itself out to the first 50 people in your address book. The name of this virus may also be considered a girl's first name.
What is the Melissa virus?
400
Type of malware that tracks what you type into your keyboard.
What is a keylogger.
400
The telephone or voice version of phishing, where an attacker could get you to disclose confidential information over the phone.
What is vishing?
400
* * * **Double Jeopardy* * * * * According to our company policies, all team members must have these two identifiers prior to accessing our systems.
What is an username and password?
400
This popular social media app was targeted by Olympic Vision which resulted in company information being stolen and exposed.
What is Snapchat ?
400
In 2013, this ransomware kind of malware was transmitted through email attachments and encrypted a user's files so they could not access them.
What is CryptoLocker?
500
A type of malware, as well as a popular break dancing move.
What is a worm?
500
The texting (SMS) version of phishing, where attackers can send text messages to convince you to disclose confidential information or download malicious files and applications.
What is smishing?
500
An identifier that uniquely tracks actions to individuals.
What is a user ID?
500
Russian Attackers found their way into a Pentagon official's computer by posting a contest for a family vacation on this popular social site.
What is Twitter?
500
This scary virus was built by government enginners in the US with the intention of obstructing nukes from being built in Iran.
What is Stuxnet?