Phishing
Malware and Malware Types
Defense Strategies
100

An attempt to trick a victim into revealing critical information usually via email

What is phishing?

100

Software designed to cause damage to computer systems

What is malware?

100

A recommended password management tip is to use one of these for each account

What is a unique password?

200

This type of phishing targets a specific person or organization to gain access to particular data they're trying to steal

What is spear phishing?

200

A self-replicating program that spreads without user interaction. It's goal is to reach as many systems as possible.

What is a worm?

200

This two-step method adds a second layer of login security

What is two-factor authentication?

300

A phishing attempt using a phone call

What is vishing?

300

A program that disguises itself as a legitimate program while secretly running malicious tasks in the background

What is a trojan?

300

This type of software helps detect and remove malware

What is antivirus software?

400

An attack where black hats create their own URLs and use those instead of legitimate URLs to get you to go to malicious pages

What is pharming?

400

Malware that locks your files and demands payment for a decryption key

What is ransomware?

400

This practice involves keeping software up to date

What is updating/patching software?

500

When a black hat misspells a URL. This technique is a rare occurrence because many companies register every possible misspelling of their website name to ensure they all go to the same authentic website.

What is typosquatting?

500

Malware with advanced capabilities that allow it to change its code and appear with each infection to avoid detection from antivirus software

What is polymorphic malware?

500

Employees should regularly receive this type of training to prevent phishing

What is Cybersecurity Awareness Training?