MALWARE MATCH-UP SPOT THAT SCAM NETWORK KNOW-HOW COMPUTER COMPONENTS 1MB 1MB 1MB 1MB 2MB 2MB 2MB 2MB 3MB 3MB 3MB 3MB 4MB 4MB 4MB 4MB 5MB 5MB 5MB 5MB © 2015 Air Force Association MALWARE MATCH UP for 1MB ILOVEYOU ANSWER: What is… a Virus? MALWARE MATCH UP for 2MB Tracks user’s keyboard strokes, allowing hackers to deduce passwords, personal info, private emails, etc. ANSWER: What is… a keylogger? MALWARE MATCH UP for 3MB Ex-Fannie Mae employee accused of planting _______?________ By Ellen Messmer, Network World January 29, 2009 09:40 AM ET …. Makwana, said to be an Indian citizen and former contract employee at Fannie Mae for three years, was terminated Oct. 24 for changing computer settings without permission from his employer and allegedly hiding malware code in a server that was programmed to become active Jan. 31. …. The malicious script, had it gone off, would have "reduced if not shut down operations" at Fannie Mae for at least a week. "The total damage would include cleaning out and restoring of 4,000 servers, restoring and securing the automation of mortgages, and restoring all data that was erased." ANSWER: What is… a logic/time bomb? Source: http://www.networkworld.com/news/2009/012909-fannie-mae-computer-time-bomb.html MALWARE MATCH UP for 4MB Gamers trust tested as _____?_____ attacks World of Warcraft players By Doug Drinkwater, SC Magazine January 08, 2014 Blizzard, developer of the popular online video game World of Warcraft which has more than seven million subscribers worldwide, was forced to alert users about a new threat this week. Announcing the news on a blog post, the firm detailed how the ____?____ poses as Curse, a genuine add-on for the game which can be downloaded from a fake Curse website. The _____?____ steals both player account data and authenticator passwords when installed. …. ANSWER: What is… a trojan? Source: http://www.scmagazineuk.com/gamers-trust-tested-as-hidden-trojan-attacks-world-of-warcraft-players/article/328402/ MALWARE MATCH UP for 5MB Widget Co.’s CEO, Bob Smith, recently downloaded a ___1__ he thought was a free anti-virus program. The malware installed a ___2___ in the Widget Co. network. The __2__ was later used as a point of entry for a prevalent ____3____, which quickly copied itself on each of Widget Co.’s computers. After they were infected, Widget Co.’s computers were used as part of a ____4____ to launch a ____5_____ attack aimed at shutting down a large banking company’s website. ANSWER: What is… 1. Trojan 2. Backdoor 3. Worm 4. Botnet 5. DDoS SPOT THAT SCAM for 1MB An umbrella term for the methods of manipulating people into giving up personal information ANSWER: What is… Social Engineering? SPOT THAT SCAM for 2MB EMail Celina Gomer <[email protected]> Reply Reply to All Forward Delete SPAM Subj: This is AWESOME! From: No Reply <[email protected]> To: [email protected] Attachments: Vi1eo.wm4 mustRead.doc Mon, June 24, 2013 at 2:16 AM Hey!!! Check outt this cool video! Their r a ton of cool videos on this www.sitegr8coolvideos.com U CAN DOWNLOAD 2! CLICK HERE!!!! cATS chasing lazers FREEMOVIES!!!!!! Above is an example of ___________. ANSWER: What is… phishing? SPOT THAT SCAM for 3MB To prevent this, Jo-Ann uses her hand to cover the ATM keypad when she withdraws money. ANSWER: What is… shoulder surfing? SPOT THAT SCAM for 4MB Celina Gomer <[email protected]> EMail Reply Reply to All Forward Delete SPAM Subj: ATTENTION: Account Expiring Soon! From: No Reply <[email protected]> To: [email protected] Attachments: YourSubscriptionInfo.doc Fri, Feb 7, 2015 at 9:05 AM Dear NetFlix Customer, Your NetFlix subscription will be expiring very soon. To avoid missingout on great movies and TV shows, please visit the link below to renew your payment plan. http://www.nfmny.com www.Netflix.com/payment Sincerely, The Netflix team Above is an example of ___________. ANSWER: What is… spear phishing? SPOT THAT SCAM for 5MB The moral of the Twitter-GoDaddy breach Christopher Null, PC World Jan 31, 2014 ... The hacker got through GoDaddy’s security measures by calling a representative on the phone. The hacker claimed to be Hiroshima and said he was having trouble accessing his account. GoDaddy asked for the last six digits of his credit card number on file as proof of identity, which the hacker miraculously was able to provide. How’d he do that? Again, via a simple phone call…the hacker had also called Paypal’s support staff and used_____?______ to get that representative to tell him the last four digits of the credit card he had on file. (While the details of this conversation have not been published, it isn’t hard to imagine how it must have gone: “Hi, I lost my wallet and don’t know which credit card I have linked to my Paypal account. Can you tell me the last four digits you have on file so I know if I need to change the card on my Paypal account?”) … ANSWER: What is… vishing? http://www.pcworld.com/article/2093240/the-moral-of-the-twitter-godaddy-breach-people-are-the-easiest-thing-to-hack.html NETWORK KNOW-HOW for 1MB Filters incoming data, protecting a network from attacks. ANSWER: What is… a firewall? NETWORK KNOW-HOW for 2MB Manages resources shared by multiple users in a network. ANSWER: What is… a server? NETWORK KNOW-HOW for 3MB Connects multiple devices within the same network. ANSWER: What is… a switch? NETWORK KNOW-HOW for 4MB To access files on a shared drive, Hank’s computer sends a request through a ___1___ to the company’s ___2___. ANSWER: What is… 1. Switch 2. File Server NETWORK KNOW-HOW for 5MB To view an email, Dante’s computer accesses the Internet through the company’s ___1___. Dante decides to print the email, and his request to print is directed through a network___2___ to the company’s ___3__. The ___3___ then commands the printers to perform the print job. ANSWER: What is… 1. Router 2. Switch 3. Printer Server COMPUTER COMPONENTS for 1MB A mouse, a keyboard, a microphone, and a CD are all types of these. ANSWER: What are… input devices? COMPUTER COMPONENTS for 2MB Amy uses several video editing ________ designed specifically for documentary film makers. ANSWER: What are… applications COMPUTER COMPONENTS for 3MB Content stored on this is erased when a computer is shut off. ANSWER: What is… RAM (Random Access Memory)? COMPUTER COMPONENTS for 4MB Connects the CPU and the Operating System so a computer can boot up. ANSWER: What is… the BIOS? COMPUTER COMPONENTS for 5MB This manages a computer’s hardware and software resources, so it can efficiently execute tasks desired by the user. ANSWER: What is… an operating system? FINAL JEOPARDY The first of the Ten Commandments of Computer Ethics. ANSWER: What is… Thou shalt not use a computer to harm other people.
© Copyright 2026 Paperzz