Module 1 Jeopardy Activity

MALWARE
MATCH-UP
SPOT THAT
SCAM
NETWORK
KNOW-HOW
COMPUTER
COMPONENTS
1MB
1MB
1MB
1MB
2MB
2MB
2MB
2MB
3MB
3MB
3MB
3MB
4MB
4MB
4MB
4MB
5MB
5MB
5MB
5MB
© 2015 Air Force Association
MALWARE MATCH UP for 1MB
ILOVEYOU
ANSWER:
What is…
a Virus?
MALWARE MATCH UP for 2MB
Tracks user’s keyboard strokes,
allowing hackers to deduce
passwords, personal info,
private emails, etc.
ANSWER:
What is…
a keylogger?
MALWARE MATCH UP for 3MB
Ex-Fannie Mae employee accused of planting _______?________
By Ellen Messmer, Network World
January 29, 2009 09:40 AM ET
….
Makwana, said to be an Indian citizen and former contract employee at
Fannie Mae for three years, was terminated Oct. 24 for changing computer
settings without permission from his employer and allegedly hiding
malware code in a server that was programmed to become active Jan. 31.
….
The malicious script, had it gone off, would have "reduced if not shut down
operations" at Fannie Mae for at least a week. "The total damage would
include cleaning out and restoring of 4,000 servers, restoring and securing
the automation of mortgages, and restoring all data that was erased."
ANSWER:
What is…
a logic/time bomb?
Source: http://www.networkworld.com/news/2009/012909-fannie-mae-computer-time-bomb.html
MALWARE MATCH UP for 4MB
Gamers trust tested as _____?_____ attacks World of Warcraft players
By Doug Drinkwater, SC Magazine
January 08, 2014
Blizzard, developer of the popular online video game World of Warcraft
which has more than seven million subscribers worldwide, was forced to alert
users about a new threat this week.
Announcing the news on a blog post, the firm detailed how the ____?____
poses as Curse, a genuine add-on for the game which can be downloaded
from a fake Curse website. The _____?____ steals both player account data and
authenticator passwords when installed.
….
ANSWER:
What is…
a trojan?
Source: http://www.scmagazineuk.com/gamers-trust-tested-as-hidden-trojan-attacks-world-of-warcraft-players/article/328402/
MALWARE MATCH UP for 5MB
Widget Co.’s CEO, Bob Smith, recently downloaded a ___1__
he thought was a free anti-virus program. The malware
installed a ___2___ in the Widget Co. network. The __2__ was
later used as a point of entry for a prevalent ____3____, which
quickly copied itself on each of Widget Co.’s computers. After
they were infected, Widget Co.’s computers were used as part
of a ____4____ to launch a ____5_____ attack aimed at shutting
down a large banking company’s website.
ANSWER:
What is…
1. Trojan
2. Backdoor
3. Worm
4. Botnet
5. DDoS
SPOT THAT SCAM for 1MB
An umbrella term for the
methods of manipulating
people into giving up personal
information
ANSWER:
What is…
Social Engineering?
SPOT THAT SCAM for 2MB
EMail
Celina Gomer <[email protected]>
Reply
Reply to All
Forward
Delete
SPAM
Subj: This is AWESOME!
From: No Reply <[email protected]>
To: [email protected]
Attachments:
Vi1eo.wm4
mustRead.doc
Mon, June 24, 2013 at 2:16 AM
Hey!!! Check outt this cool video! Their r a ton of cool videos on this www.sitegr8coolvideos.com
U CAN DOWNLOAD 2! CLICK HERE!!!!
cATS chasing lazers
FREEMOVIES!!!!!!
Above is an example of ___________.
ANSWER:
What is…
phishing?
SPOT THAT SCAM for 3MB
To prevent this, Jo-Ann uses her
hand to cover the ATM keypad
when she withdraws money.
ANSWER:
What is…
shoulder surfing?
SPOT THAT SCAM for 4MB
Celina Gomer <[email protected]>
EMail
Reply
Reply to All
Forward
Delete
SPAM
Subj: ATTENTION: Account Expiring Soon!
From: No Reply <[email protected]>
To: [email protected]
Attachments:
YourSubscriptionInfo.doc
Fri, Feb 7, 2015 at 9:05 AM
Dear NetFlix Customer,
Your NetFlix subscription will be expiring very soon. To avoid missingout on great movies and TV shows,
please visit the link below to renew your payment plan.
http://www.nfmny.com
www.Netflix.com/payment
Sincerely,
The Netflix team
Above is an example of ___________.
ANSWER:
What is…
spear phishing?
SPOT THAT SCAM for 5MB
The moral of the Twitter-GoDaddy breach
Christopher Null, PC World
Jan 31, 2014
...
The hacker got through GoDaddy’s security measures by calling a representative on
the phone. The hacker claimed to be Hiroshima and said he was having trouble
accessing his account. GoDaddy asked for the last six digits of his credit card number
on file as proof of identity, which the hacker miraculously was able to provide.
How’d he do that? Again, via a simple phone call…the hacker had also called Paypal’s
support staff and used_____?______ to get that representative to tell him the last four
digits of the credit card he had on file. (While the details of this conversation have
not been published, it isn’t hard to imagine how it must have gone: “Hi, I lost my
wallet and don’t know which credit card I have linked to my Paypal account. Can you
tell me the last four digits you have on file so I know if I need to change the card on
my Paypal account?”)
…
ANSWER:
What is…
vishing?
http://www.pcworld.com/article/2093240/the-moral-of-the-twitter-godaddy-breach-people-are-the-easiest-thing-to-hack.html
NETWORK KNOW-HOW for 1MB
Filters incoming data,
protecting a network from
attacks.
ANSWER:
What is…
a firewall?
NETWORK KNOW-HOW for 2MB
Manages resources shared by
multiple users in a network.
ANSWER:
What is…
a server?
NETWORK KNOW-HOW for 3MB
Connects multiple devices
within the same network.
ANSWER:
What is…
a switch?
NETWORK KNOW-HOW for 4MB
To access files on a shared
drive, Hank’s computer sends a
request through a ___1___ to
the company’s ___2___.
ANSWER:
What is…
1. Switch
2. File Server
NETWORK KNOW-HOW for 5MB
To view an email, Dante’s computer accesses the
Internet through the company’s ___1___. Dante
decides to print the email, and his request to print
is directed through a network___2___ to the
company’s ___3__. The ___3___ then commands
the printers to perform the print job.
ANSWER:
What is…
1. Router
2. Switch
3. Printer Server
COMPUTER COMPONENTS for 1MB
A mouse, a keyboard, a
microphone, and a CD are all
types of these.
ANSWER:
What are…
input devices?
COMPUTER COMPONENTS for 2MB
Amy uses several video editing
________ designed specifically
for documentary film makers.
ANSWER:
What are…
applications
COMPUTER COMPONENTS for 3MB
Content stored on this is erased
when a computer is shut off.
ANSWER:
What is…
RAM (Random Access Memory)?
COMPUTER COMPONENTS for 4MB
Connects the CPU and the
Operating System so a
computer can boot up.
ANSWER:
What is…
the BIOS?
COMPUTER COMPONENTS for 5MB
This manages a computer’s
hardware and software resources,
so it can efficiently execute tasks
desired by the user.
ANSWER:
What is…
an operating system?
FINAL JEOPARDY
The first of the Ten
Commandments of Computer
Ethics.
ANSWER:
What is…
Thou shalt not use a computer to
harm other people.