CYBERSECURITY
Cybersecurity Rapid Fire Round
Missing the festive party games? Here’s one for January. 1 to 5... Your cybersecurity knowledge needs work 6 to 10... Good basic knowledge 11 to 16... Excellent 17 to 20... You’re either in the Secret Service or a total cybersecurity Guru
Note: Just in case anyone takes the quiz super seriously, the examples are provided for reference, and fun – these are not official dictionary definitions.
DDoS Distributed Denial of Service An example is when a website is continually bombarded with traffic, flooded with attacks, and fails to function or operate. BEC Business Email Compromise When an employee is tricked into an action, such as transferring funds, based on a response to what looks like a legitimate request. Pharming The fraudulent practice of luring internet users to a bogus website that looks legitimate, in order to obtain personal information such as passwords, account numbers. Rootkit Pretty much a bad actor’s toolkit – a collection of computer software that enables an unauthorised user to gain control of a computer system without being detected. Malware “Malicious” and “Software” Anything we hate – pop ups, blackmail, worms, spyware, ransomware, adware. Sometimes referred to as scareware.
inserted into a software system that will set off a malicious function when specified conditions are met. Think disgruntled programming employees sending everyone employee salary information, or Friday 13th delights. APT Advanced Persistent Threat Large co-ordinated computer savvy criminal gangs conducting sophisticated attacks on high-value targets. Allegedly often state-sponsored. RAT Remote Access Trojan A remote rogue agent takes over your computer/desktop, without your knowledge, and accesses your apps and files and information. Keylogger A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information. Stalkerware As the name suggests – malware that can track someone’s online and offline (think phone trackers, hidden cameras) activity. Used by very bad actors
Logic Bomb Code intentionally
46
Powered by FlippingBook