Mixed Bag
Security Scramble
Attacks
Facility Security Management
Data Breaches
100

The month which an annual campaign to raise awareness about the importance of cybersecurity is held

What is October?

100

otitsrrer aactkt

What is terrorist attack?

100

This attack is often introduced to a system through email attachments, software downloads, or operating system vulnerabilities.

What is Malware?

100

This document is a set of written instructions for detecting, responding to, and limiting the effects of an information security event

What is an Incident Response Plan?

100

This federal government agency's "Get Transcript" system was hacked and over 700,000 taxpayers personal information was compromised

What is Internal Revenue Service (IRS)?

200

The email address that you should forward any and all suspicious emails to

what is phishing@upwork.com? 

200

ecyber tyeurics

What is cyber security?

200

This attack typically directs users to visit a website where they are asked to updated personal information, such as passwords or credit cards.

What is a Phishing Attack?

200

This is the collection, analysis, and escalation of incidents and warnings to detect and respond to security threats.

What is Security Monitoring?

200

This web services provider was forced to admit that the personal data of 500 million users had been compromised in a hack dating back to 2014

What is Yahoo!?

300

This is any data the could potentially identify a specific individual

What is Personally Identifiable Information (PII)?

300

vrybiunleaitl

What is vulnerability?

300

This attack makes use of malicious code, disguised as legitimate software, to perform some malicious task on a host system after being executed by the user

What is Trojan Horse? 

300

This software is designed to prevent worms and Trojan horses from accessing a computer. Also, the software removes any malicious code that has already infected a computer. 

What is Virus Protection Software?

300

A malware attack on this retail company exposed the credit and debit card information of 40 million customers who shopped in stores from November - December 2013, this was one of the largest hacks in U.S. retail history 

What is was Target?

400

These beings are commonly considered to be the weakest components in any security system

What are Human Beings?

400

scesac ntcrloo

What is access control?

400

By intercepting the endpoints in an online information exchange (i.e the connection from your smartphone to a website), this attack can obtain information from the end-user and the entity he or she is communicating with 

What is Man in the Middle attack?

400

This technology allows users to log in with a single ID and password to gain access to multiple related, but independent software systems or applications 

What is Single sign-on?

400

In February - March of 2014, this global commerce leader requested that 145 million users change their account passwords due to a breach that compromised encrypted passwords. In this breach hackers gained access to accounts through stolen login credentials. 

What is eBay?

500

This term is defined as "the posture taken to protect people, assets, data, and technology across an entire enterprise"

What is Security?

500

retiycsu eanswsrae

What is security awareness? 

500

This attack is performed by entering code into an input field with the intention of gaining access to sensitive data from a database

What is SQL Injection?

500

Mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form of text that is non-readable to unauthorized parties

What Is Data Encryption?

500

In February 2015 hackers stole up to 80 million records from this healthcare provider through phishing emails sent to employees who were tricked into downloading a Trojan which enabled the attackers to obtain passwords for accessing unencrypted data

What is Anthem?