Be Sociable
Phishing
Cyber Breach
Malware
Cyber Facts
100

Facebook and Twitter are two examples of these that are used by attackers to gather information on a target and spread malware.

What are social networking websites?

100

Received from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.

What is an email scam?

100

Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong.

What is backup your computer/data?

100

This is a self-replicating program that sometimes spreads by itself into other executable code or documents

What is a virus?

100

This group is responsible for information security.

Who is everyone?

200

The conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email, or social networks.

What is social engineering?



200

Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these.

What are indicators of phishing?

200

WannaCry and Petya are examples of this attack were the attacker charges money to unencrypt files that are locked by malicious code

What is ransomware?

200

It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screensaver or photograph, but is designed to give hackers access to your computer or files.

What is a Trojan Horse?

200

This type of file transfer facilitates data access and data transfer over a Secure Shell (SSH) data stream

What is SSH file transfer protocol (SFTP)?

300

Following someone into the office because "You forgot your badge" is an example of what type of social engineering attack?

What is piggybacking?

300

The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.

What is vishing?

300

Carrying this with you without it being properly protected and encrypted can result in a cyber security breach. 

Luckily, our EntSys guys are good and can remote wipe.

What are mobile devices?

300

This is a malware type that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to remotely issue system commands and update malware.

What is a backdoor?

300

You'd use this when you're in a hotel to make your connection over the public network more secure.

What is a VPN?

400

The practice or industry of hunting and killing whales for their oil, meat, or whalebone or targeting high-profile end users with  an email that appears as if it's from a trusted source are examples of what?

What is whaling?

400

When you receive an email with a link in it, you are advised to open a separate browser and type (or retrieve from favorites) the URL you already know for the website instead of clicking on the link in the mail.

What is one way to verify a scam email link?

400

This credit bureau had over 145.5 million records affected by its data breach.

Who is Equifax?

400

It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the Internet to pass this information along to third parties without you knowing

What is spyware?

400

Someone watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device is an example of this.

What is shoulder surfing?

500

This is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit

What is a "watering hole" attack?

500

What do you do if you suspect that you clicked on a phishing email?

What is contact IT Support or Information Security?

500

According to the 2018 Verizon Data Breach Investigations Report, 58% of breach victims fall under what category?

Who are small businesses?

500

Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this.

What is a malware infection?

500

This security tool assists in generating and retrieving complex passwords, potentially storing such passwords in an encrypted database or calculating them on demand

What is a password manager?