Guess That Attack!
In the Real World!!
How to Protect Yourself?
100

Getting an email saying you won a sweepstakes and to click a link to collect your prize

What is phishing?

100

In 2014, Yahoo became the victim of one of the biggest data breaches in history when approximately 500 million accounts were hacked by a state-sponsored actor. Some speculate it involved a tricked Yahoo employee who clicked a malicious link

what is phishing?

100

Preventing a phishing attack...

What is read emails carefully/ know the signs?


200

Bob gets fired from YummyFuture and to get back at them makes sure to remember how their systems before leaving

what is insider threat?

200

In 2013, Adobe, one of the world’s leading software developers, confirmed a cyber attack had compromised huge amounts of user data. Attackers targeted individuals with emails that appear legitimate

What is Spear-phishing?

200

Preventing malware attacks....

what is checking for reliable sites/being weary of downloads?

300

Sophia gets an email from her HR rep but its not actually them and they want her to tell them her password :(

what is identity-based?

300

The Estonia Cyber Attack, which occurred in 2007, is significant for being one of the first large-scale cyber attacks targeting a nation's critical infrastructure. It overloaded the Estonian government, banking, media, and other critical websites with ‘zombie computers’

what is DDoS?

300

Preventing social engineering attacks...

what is not trusting everything on the internet/ double checking sources?

400

Multiple machines have been hacked and are transmitting a lot of signals to block a company's workflow

What is DDoS?

400

The WannaCry attack exploited a vulnerability in Windows called EternalBlue, which had been leaked by a hacker group a month prior. Microsoft had already released a security patch to address this vulnerability, but many users hadn't installed it. So the vulnerability was taken advantage of

what is Malware/ransomware?

400

Preventing supply chain attack...

What is be cautious with third-party vendors/open source code?