Malicious software (malware) that encrypts or locks you out of your computer, device, or files until a ransom is paid
What is ransomware?
Date of birth, phone number, SSN, credit card number, or password
What are things a bad actor wants to steal
Email, text message, phone, social media, and Email
What are the five most common ways people get phished
Attempts to trick a user into sharing personal or sensitive information
What is Phishing?
What “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers?
What is McAfee?
Through what mechanism do phishing attempts come through?
What is email
Three social media sites often experience phishing scams
What is Facebook, Instagram, and Snapchat?
Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding, eight-letter decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?
What is Honeypot?
It sounds like something a hacking hound would do, but which term describes watching for and catching data packets passing through a network’s traffic?
What is Sniffing?
This type of data or information is often captured by hackers during a ransomware attack
What are confidential files?
This is the process of encoding information in a way so that only someone with a key can decode it
What is encryption?
Information including your name, home address, phone number, gender, social security number, etc.
What is personal information?
Things you should not do if you are suspicious of an email
What is click a link or attachment?
Massimiliano Montoro developed a password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story?
What is Cain and Able?
If you receive a phishing email you should
What is report it in Outlook using the "Phish Alert Report" button?
Suspicious sender email addresses, requests for personal information, urgent language, and spelling or grammatical errors
What are Sign to look out for in phishing emails
When walking away from my device, I should ...?
What is clear and close my screen
A phishing technique used by attackers named similarly to a popular MTV show
What is Catfish?
The term used for the moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
What is a breach?
In 2011, this large video game network was hacked, exposing 77 million accounts. Estimated losses were $171 million while the site was down for a month
What is Sony's Playstation Network?
A type of phishing that targets specific individuals or organizations in a business
What is spear phishing?
A piece of malware that often allows a hacker to gain remote access to a computer through a "back door"
What is a trojan horse?
What term is used for a testing environment in a computer system in which new or untested software or coding can be run securely? In a different context, this term refers to a children’s play area.
What is a Sandbox?
What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?
What is LinkedIn?
When an attacker calls a phone number and creates a heightened sense of urgency that makes the victim take actions against their best interests
What is Vishing?