Fun facts
Cyber Security
Malware
Cyber Breach
The Enemy
100

two types of network layer firewalls

 what is stateful and stateless?


100

Who invented Cyber Security?

What is Bob Thomas?

100

Defined as programs that track where you go on the Internet and what you type into your keyboard.

What is a spyware?

100

How long does it take to detect a cyber breach?

What is 197 days?

100

Which mobile phone gets hacked the most?

What is Android?

200

_______ attacks requires a carrier file to self-replicate

What is Virus?

200

When did Cyber Security begin?

What is 1988?

200

It is included in a trusted system and frequently offers something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.

What is Trojan Horse?

200

What information is stolen in a data breach?

bank account information, online passwords, driver's license numbers, social security numbers, medical records, online subscriptions, and so on

200

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

300

What is the most hacked website

What is Facebook?

300

The first Cyber Security Software?

What is Reaper?

300

This can appear as unpredictable computer behavior, a lack of reaction to keyboard or mouse operations, crashing or resuming on its own, or running slower than usual.

What is a malware infection?

300

This image in the lower-right corner of your web browser indicates you are on a secure website...

What is lock icon?

300

What do cyber attackers do?

Send emails to a huge number of people requesting sensitive information or persuading them to visit a fake website.

400

_____ uses asymmetric key encryption

PGP (Pretty Good Privacy)

400

What is the main cause of Cyber Security?

What is the lack of security assistance?

400

4 types of dangerous malware include...

What is ransomware, spyware, trojans, and worms?

400

Something you should practice on a regular basis to guarantee that if something goes wrong, you can restore your computer to a previous state.

What is backup your computer or data?

400

These are organized groups supported by foreign countries and dedicated to mapping out internet addresses for spying and possible computer attacks.

What is state sponsored hacking?

500

_____ offers the strongest wireless signal encryption

WPA (Wi-Fi Protected Access)

500

How many Cyber attacks are there per day in the USA?

2,200 every day, which equals to approximately one cyberattack every 39 seconds.

500

What is malware known for?

What is tricking a victim into providing personal data for identity theft

500

The average life cycle of a data breach is about...

What is 11 months?

500

They are well-organized groups of hackers who search for computer weaknesses in order to steal large numbers of financial or credit card accounts for financial benefit.

Who are organized crime groups?