Vocabulary Bowl
Lets Get Social
Hackers Gonna Hack
Grand Theft Data
Its Risky Business
100

Someone who uses the Internet to illegally break into computers.

What is Hackers?

100

An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.

What is phishing?

100

Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.

What is malware?

100

The process of scrambling messages or information in such a way that only authorized parties can read it.

What is encryption?

100

Performing this action after opening an email from an unknown source could compromise your computer.

What is clicking on a link / opening an attachment?
200

The use of authentic-looking emails, often purporting to be from a bank or government agency, to trick you into responding with sensitive personal data.

What is Phishing?

200

Attack that use a false promise to pique a victim’s greed or curiosity. They lure users into a trap that steals their personal information or inflicts their systems with malware.

What is Baiting?

200

The most common type of malware that can execute itself and spread by infecting other programs or files.

What is a virus?

200
This Microsoft tool allows an entire drive or partition to be encrypted.


What is bitlocker?
200

The  purpose  of  this  policy  is  to  outline  the generally acceptable  usesof  computer equipment, information systems, media/devices, and  otherinformation assets,and to delineate the prohibited uses of those items.

What is Acceptable Use Policy

300

Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.

What is Smishing?

300

This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.

What is social engineering?

300

Designed to appear as a legitimate software program to gain access to a system. Once activated following installation, they can execute their malicious functions.

What is a Trojan Horse?

300

**** list password requirements

What is a strong Password?

300

An approved online cloud storage service being used by our employees.

What is Microsoft OneDrive?

400

Short for "voice phishing," it's the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft.

What is Vishing?

400

A technique used to retrieve information from a garbage bin and/or trash can, that could be used to carry out an attack against an organization.

What is dumpster diving?

400

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.

What is ransomware?

400

An average of $4.35 million.

What is the cost of a data breach in 2022?

400

A cyber attack targeting an individual or entity for the purpose of maliciously controlling or disrupting a computing environment to destroy or steal data.

What is a cyber breach?
500

A usually covert program that tracks (or logs) sequential strokes on your keyboard to allow remote hackers to capture your passwords and online banking and credit card information.

What is Keystroke logger?

500

LinkedIn or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.

What is spear phishing?

500

Tracks a user's browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase.

What is Adware?

500

This self-proclaimed whistleblower was able to steal copious amounts of data while being employed by the National Security Agency (NSA) of the USA.

Who is Edward Snowden?
500

If you are leaving your computer unattended you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.

What is Windows button + L key sequence?