Batten Down The Hatches
Types of Threats
Hackers Gonna Hack
Once More Unto the Breach
Current(ish) Events
100

"Sew" this on to update your software.

What is a patch?

100

This is a person who breaks into a computer system for politically or socially motivated purposes.

What is a Hacktivist?

100

This type of malware may masquerade as legitimate software but contain malicious instructions that may harm your computer.

What is a Trojan?

100

This multi-national technology and media conglomerate was purportedly hacked by North Korea to prevent the release of the film "The Interview" which revolved around a plot to kill the country's leader Kim Jong-un.

What is Sony?

100

One of the world's largest casino-hotel chains was recently attacked by a ransomware-as-a-service group called BlackCat. The attack was initiated through social engineering and took about 10 minutes to execute.

What is MGM?

200

This image in the top left or right corner of most web browsers, indicates your connection to a website is "secure".

What is a lock icon?

200

The weakest link in Cybersecurity.

What are humans?

200

This is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.

What is Ransomware?

200

In 2017, hackers accessed the social security numbers, names, birth dates and addresses of 145.5 million Americans by breaching this credit bureau's security.

What is Equifax?

200

Name 4 of the 16 cars that were recently found to have API vulnerabilities.

Acura, BMW, Ferrari, Ford, Genesis, Honda, Hyundai, Infiniti, Jaguar, Kia, Land Rover, Mercedes-Benz, Nissan, Porsche, Rolls Royce, and Toyota

300

Carrying these with you and not properly password protecting them can result in a cybersecurity breach.

What are mobile devices (laptops, cellphones, flash drives, etc.)?

300

This is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is an Insiders Threat?

300

These programs track where you go on the Internet and what you type into your keyboard.

What is Spyware?

300

The company's massive breach experienced by a US retailer was traced back to their HVAC contractor as a point of entry.

What is Target?

300

The FBI recently took down this botnet that had become the malware of choice for dozens of hacking groups.

What is QakBot?

400

This security technology stops eavesdropping with the use of virtual tunnels and encryption.

What is a Virtual Private Network?

400

This term refers to a software vulnerability that is unknown to vendors.

What is a zero day?

400

This malware computer program replicates itself in order to spread to other computers.

What is a Worm?

400

In the biggest cybersecurity breach in history, 3 billion user accounts were affected when this company was hacked.

What is Yahoo!?

400

The Federal Trade Commission charged this company with compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos. 

What is Ring?

500

A general technique used to protect your data from being viewed by unauthorized parties.

What is encryption?

500

Malware is a portmanteau of these two words.

What is Malicious Software?

500

This devastating ransomware attack in 2017 infected over 300,000 computers.

What is WannaCry?

500

This big-box American-based building supply retailer admitted to having 56 million credit card records breached in 2014.

What is Home Depot?

500

A Bartlesville man was sentenced to three years in federal prison followed by three years of supervised release for cyberstalking and  threatening this Oklahoma congressman and his wife.

Who is Kevin Hearn?