Threats
Vulnerabilities
Consequences
Culture
History
100

What do you call harmful software that can mess up your computer or files?

Malware

100

You use the same password for all your accounts. What kind of vulnerability is this?

weak password/credentials security

100

A type of consequence that involves lawsuits, penalties, or the violation of privacy laws.

Legal Consequences

100

This secret agent is immortalized as one of the most well-known spies in television and film history. Known for his charm, high-tech gadgets, and thrilling missions, he has become a cultural icon. He is frequently portrayed saving the world from various threats. His signature look includes a tuxedo and a martini. Who is this legendary spy?

James Bond

100

In the early 1980s, this term was coined to describe malicious code that replicates and spreads, emerging as personal computers became widespread.

Computer Virus

200

You get a message asking for your game account password, but it’s fake. What kind of trick is this?

phishing

200

Your phone has no password, and someone picks it up and reads your messages. What kind of vulnerability is this?

physical security vulnerability

200

A type of consequence that results in the loss or theft of sensitive information.

Data COnsequences

200

An individual who became an internet personality after being accused by the government of being backed by POGO and infiltrating the Philippine government. This person quickly went viral, becoming the subject of widespread online memes.

Alice Guo

200

In 2021, this bank was at the center of national news, dubbed the Mark Nagoyo Case, when at least 700 account holders lost money through unauthorized transfers. The name 'Mark Nagoyo,' linked to UnionBank accounts, is believed to be a fictitious alias used by the hackers.

BDO

300

Someone sneaks into your social media account without permission and reads your private messages. What kind of threat is this?

Hacking

300

You connect to a free public Wi-Fi without checking if it’s secure, making it easy for others to see your information. What kind of vulnerability is this?

unsecured network usage

300

It is a type of consequence that results in loss of revenue, legal fines, etc.

Financial Consequences

300

A study that analyzed a large number of YouTube videos for cheating footage revealed that this game was the most hacked in 2021, according to NordVPN. With Overwatch ranking second, while Counter-Strike: Global Offensive ranking in third.

Fortnite

300

This infamous virus, known as the Loveletter virus, was the first computer virus in the Philippines and was one of the first major computer worms. Its creator submitted it as a thesis proposing a trojan to steal login details.

Love Bug

400

You accidentally click a suspicious link on a website, and it starts showing you ads and slowing down your device. What type of threat is this?

adware

400

A hacker gets access to your email account because your password was stolen in a data breach. What kind of vulnerability is this?

compromised security

400

A type of consequence that damages the reputation of the business, customer trust, and partnerships.

Reputational Consequences

400

This critically acclaimed series follows a young hacker who becomes involved with an insurrectionary hacker group aiming to bring down corporate America. Lauded for its realistic portrayal of hacking and cybersecurity, it has been recommended by many as one of the best shows in the genre.

Mr. Robot

400

In 2023, this Philippine government agency was attacked by a hacker group called Medusa, compromising 734 GB of files, including member data like addresses and insurance IDs. The hackers demanded $300,000 in ransom, and the stolen information began appearing on the dark web.

PhilHealth

500

You receive a message saying you’ve won a prize, and when you click the link, it locks your device until you pay money to unlock it. What kind of threat is this?

ransomware

500

You don’t update your apps when there’s a new version available, which leaves your device open to attacks.

Unpatched/outdated

500

It results in the disruption of services, rendering the service unoperational.

Operational Consequences

500

This iconic film explores hacking as a way to manipulate the code of a simulated reality, symbolizing technology's power to alter our perception of existence. Widely regarded as one of the most influential movies, its themes of hacking and artificial intelligence continue to resonate today.

The Matrix

500

This early computer virus, recognized as the first ever computer virus, was released in the early 1970s and functioned like a worm, spreading across networks without human intervention.

The Creeper