SlideShare a Scribd company logo
Trivia Game
2
Final Round
500
400
300
200
100
Cyber Stats
500
400
300
200
100
Cyber History
500
400
300
200
100
Types of
Cyber Attacks
500
400
300
200
100
Device Security
500
400
300
200
100
#BeCyberSmart:
Online Safety
National Cybersecurity Awareness Month
Trivia Game
3
Back to game boardAfter each answer appears, please return to Game Board.
Answer: No. Once an image (or any information) is posted on the internet, it
is virtually impossible to remove it from circulation. Taking it off of your social
media page will help, but there is no guarantee that others have not already
seen it and/or downloaded it to their own machines.
You post a picture of you and your best friend to your favorite social
media platform. She doesn’t feel comfortable with the image, so you
agree to take it down. Will this ensure that no one else sees the picture?
#BeCyberSmart: Online Safety - 100
4
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Do NOT click the link! Check the sender’s address and search the
document for spelling/grammar mistakes. If you notice anything suspicious, the
email is likely a scam. Even if it seems legitimate, navigate to the site yourself rather
than clicking any links.
You receive an email from an online shopping site claiming that you were
incorrectly charged for your last purchase and are due a refund. The email
asks you to click a link where you will submit the necessary information.
What should you do?
#BeCyberSmart: Online Safety - 200
5
Back to game boardAfter each answer appears, please return to Game Board.
Answer: It depends. In general, it is never safe to transmit PII (Personally Identifiable Information),
especially financial information, over a public network. If you find yourself in a situation where
you may need to do so, first consider all your options, including using your mobile data or a VPN
(Virtual Private Network) to help protect your browsing.
You’ve just settled into your new hotel room when you realize you need to
transfer some funds from your savings account to your checking account.
In order to do this, you will need to connect your laptop to the hotel’s
public Wi-Fi and log in to your online bank. Should you risk it?
#BeCyberSmart: Online Safety - 300
6
Back to game boardAfter each answer appears, please return to Game Board.
Answer(s):
• Turn off Wi-Fi and Bluetooth when not using them. These technologies leave you open to remote attacks.
• Make sure the network is legitimate. Hackers love to create fake networks that mimic real ones, enticing
unsuspecting users to log on.
• Don’t connect. Though perhaps drastic, one near-certain way to circumvent the dangers of public Wi-Fi is
simply to avoid using it whenever possible.
You have a long commute. Thankfully, your train just installed public Wi-Fi. Now you can
listen to your favorite music or podcast. However, when you check for social media
updates around lunch, you find that your account has been hacked. What steps could you
take to prevent your mobile device or laptop data from being compromised in the future?
#BeCyberSmart: Online Safety - 400
7
Back to game boardAfter each answer appears, please return to Game Board.
Answer(s):
• Use a password manager. These are apps, devices, or cloud services that store your
passwords in an encrypted vault that can only be unlocked with a single master
password.
• Use a “password pattern.” This is simply a pattern (recognizable only to you) that you
can use to help remember your passwords.
Passwords often have complex requirements, and most online citizens will
need to remember numerous different passwords to access their internet
services. What is a way to help you keep track of all these different passwords?
#BeCyberSmart: Online Safety - 500
8
After each answer appears, please return to Game Board. Back to game board
Answer: 1 & 3. While it is helpful for passwords to have some level of personal relevance, anything
concrete or publicly-available (high schools, birthdates, pets’ names, etc.) can be easily researched and
guessed by an attacker. Storing your passwords physically or in a text-document is also ill-advised, as
someone could gain access to the copy.
Which of the following are strong password practices? (Choose all that apply.)
1. Passwords should contain a mixture of upper and lower case letters, numbers, and special characters.
2. Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you can remember
them more easily.
3. You should immediately change your password in the case of a known data breach.
4. You should store your passwords on paper or in a text document, giving you a backup in the event that
you forget them.
Device Security - 100
9
Back to game boardAfter each answer appears, please return to Game Board.
Answer: False. Although updates can occasionally cause problems, they also contain
vital patches to help protect your machine against attackers. Keep your machine up-
to-date and install new patches as soon as possible. Don’t click, “Remind me later,”
twelve times.
True or false: Automatically updating your machine poses a significant
security concern, as it could install unwanted programs/features that
disrupt your network or harm your computer.
Device Security - 200
10
Back to game boardAfter each answer appears, please return to Game Board.
Answer: False. Almost all consumer devices, especially cell phones and tablets,
are simply miniature computers. They contain important data (contacts,
financial information, calendars) and require protection like any other device.
True or false: Although they operate similarly to computers, most
mobile devices (cell phones, tablets, etc.) are not full computers
and do not require software, such as anti-virus, to be secure.
Device Security - 300
11
Back to game boardAfter each answer appears, please return to Game Board.
Answer: All of them. Yes, even the toaster – possibly.
• Tablet
• Security camera
• Pacemaker
• Baby monitor
• GPS
• Toaster
• Thermostat
Which of the following devices could potentially be exploited by an attacker?
• Desktop computer
• Laptop computer
• Cell phone
• Television
• Refrigerator
• Digital assistant
• Remote-controlled keys
Device Security - 400
12
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Multi-Factor Authentication (MFA). MFA greatly increases the
security of access control. Even if a password is learned or an ID is stolen, it
will not be enough to compromise a system. Many online services allow MFA
options, such as requiring a one-time login code as well as a password.
What is the method of access control by which users must
present multiple, separate pieces of identification, such as a
password and keycard, in order to access a system?
Device Security - 500
13
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Phishing – a type of social engineering that often
manipulates human impulses, such as greed, fear, or the
desire to help others.
A scammer creates a fake email and sends it to thousands of
people, hoping some of them will click on a link and give up
their personal information. What is this type of attack called?
Types of Cyber Attacks - 100
14
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Malware. This stands for “malicious software,”
and refers to a large variety of software-based attacks.
What is the term for harmful software that seeks
to damage or exploit the machines that run it?
Types of Cyber Attacks - 200
15
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Spoofing. This kind of attack can come in many forms (email, GPS, caller
ID), but is most commonly known with regards to fake and malicious wireless
networks. Before logging onto a public network, be sure it is the correct one.
An attacker goes to a local coffee shop and creates a wireless network
using the shop’s name, hoping unsuspecting customers will log on.
What is this type of attack called?
Types of Cyber Attacks - 300
16
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Shoulder surfing. It is important to remember that not all cyber attacks
require the direct manipulation of technology. Attackers can often obtain
important information by simply observing people, asking questions, or piecing
together dissociated facts to learn or guess something private.
You bring your laptop to a local restaurant. Without your knowledge,
the customer at the table behind you watches you log in to your
email, thereby learning your username and password. What is this
type of attack called?
Types of Cyber Attacks - 400
17
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Ransomware. This type of attack has grown more common in recent
years, especially against institutions that need to recover their data as soon as
possible, such as medical facilities.
After clicking an advertisement on an unsecure website, your computer
freezes. A message appears, demanding you pay a certain amount of
money to unlock your computer. What is this type of attack called?
Types of Cyber Attacks - 500
18
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Bill Gates.
This entrepreneur is widely-known for his contributions to
the personal computer industry. He founded the Microsoft
Corporation in 1975, with his business partner Paul Allen.
Cyber History - 100
19
Back to game boardAfter each answer appears, please return to Game Board.
Answer: The Department of Homeland Security. Specifically, the Cybersecurity
and Infrastructure Security Agency (CISA), which is responsible for protecting
the Nation’s critical infrastructure from physical and cyber threats.
Which United States federal agency has been tasked with
improving national cybersecurity and protecting the nation’s
critical infrastructure?
Cyber History - 200
20
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Alan Turing. Turing helped the Allies by cracking intercepted messages
from the German forces, gleaning information that was crucial to an Allied victory.
He also created the “Turing test,” which examines a machine’s ability to display
human behavior à la artificial intelligence.
This English cryptanalyst is famous for deciphering encoded messages during
World War II and creating standards for artificial intelligence. He is considered by
many to be the father of theoretical computing. (Hint: There was a 2014 movie
based on his biography.)
Cyber History - 300
21
Back to game boardAfter each answer appears, please return to Game Board.
Answer(s): Ada Lovelace worked alongside Charles Babbage in
the 1840s to publish the first computer-based algorithm.
This English writer and mathematician is known for her work
on the Analytical Engine and is considered to be one of the
first computer programmers.
Cyber History - 400
22
Back to game boardAfter each answer appears, please return to Game Board.
Answer: WannaCry. This ransomware attack propagated through an exploit called
EternalBlue, which took advantage of older Windows systems. Targeted machines
had their data involuntarily encrypted, with a demand of Bitcoin payment for the
release thereof.
In May 2017, this worldwide cyber attack used ransomware to exploit
approximately 400,000 unpatched machines, resulting in damages
totaling to over $4,000,000,000 (4 billion USD).
Cyber History - 500
23
Back to game boardAfter each answer appears, please return to Game Board.
Answer: Over 10 million.
Approximately how many attempted cyber attacks are
reported to the Pentagon every day? (Closest answer wins.)
Cyber Stats- 100
24
Back to game boardAfter each answer appears, please return to Game Board.
Answer: 310,000.
How many unfilled cybersecurity jobs are there in the United States
alone? (Closest answer wins.)
Cyber Stats- 200
25
Back to game boardAfter each answer appears, please return to Game Board.
Answer: 1.8 Million.
Globally, how many unfilled cybersecurity positions are
there estimated to be by 2022? (Closest answer wins.)
Cyber Stats- 300
26
Back to game boardAfter each answer appears, please return to Game Board.
Answer: $1.6 Million USD.
What is the estimated cost of a successful phishing attack on a
single small or medium-sized business? (Closest answer wins.)
Cyber Stats- 400
27
Back to game boardAfter each answer appears, please return to Game Board.
Answer: $2 Trillion USD.
What is the estimated global cost of cybercrime by the
end of 2019? (Closest answer wins).
Cyber Stats- 500
28
Back to game board
Answer: Connect with confidence!
(This is called a Caesar cipher; since the key is 13, each letter
is replaced with the letter 13 places down the alphabet.)
Solve this cryptogram:
Bonus Trivia
Visit https://niccs.us-cert.gov/national-cybersecurity-awareness-
month-2019 to download the NCSAM 2019 toolkit
Thanks for playing!

More Related Content

What's hot

Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
Sudhanshu Mishra
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manish Mudhliyar
 
Password hacking
Password hackingPassword hacking
Password hacking
Abhay pal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Umang Patel
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
Joemer Mabagos
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
Akhilesh Patel
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
Yury Chemerkin
 
Internet hacked google search
Internet hacked   google searchInternet hacked   google search
Internet hacked google search
Gordon Kraft
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
NAWAZ KHAN
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
ABHAY PATHAK
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
Klaus Drosch
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 

What's hot (20)

Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Internet hacked google search
Internet hacked   google searchInternet hacked   google search
Internet hacked google search
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
New internet security
New internet securityNew internet security
New internet security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 

Similar to Ncsam 2019-cybersecurity-awareness-trivia final-508

Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Jeff Zahn
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
NorthCoastHDI
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
William Mann
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
WorldTrade3
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The Internet
Helen Dixon
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
The TNS Group
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
smeech
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 

Similar to Ncsam 2019-cybersecurity-awareness-trivia final-508 (20)

Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The Internet
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Recently uploaded

This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!
briannedpegg
 
My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".
AlejandroGuarnGutirr
 
All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'
Dave Boyle
 
My storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabersMy storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabers
AlejandroGuarnGutirr
 
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdfIn Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
Boudoir Photography by Your Hollywood Portrait
 
Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789
vickyvikas51556
 
哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样
哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样
哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样
tc73868
 
Portfolio of my work as my passion and skills
Portfolio of my work as my passion and skillsPortfolio of my work as my passion and skills
Portfolio of my work as my passion and skills
waljorylypil626
 
一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理
一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理
一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理
taqyea
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
zeyhe
 
FinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvn
FinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvnFinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvn
FinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvn
abbieharman
 
➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
homgo
 
FinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptxFinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptx
abbieharman
 
Heart Touching Romantic Love Shayari In English with Images
Heart Touching Romantic Love Shayari In English with ImagesHeart Touching Romantic Love Shayari In English with Images
Heart Touching Romantic Love Shayari In English with Images
Short Good Quotes
 
Fashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureAFashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureA
julierjefferies8888
 
一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理
40fortunate
 
Codes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptxCodes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptx
ZackSpencer3
 
Tibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AITibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AI
Todd Tibbetts
 
Dino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV AdvertisingDino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV Advertising
Alessandro Occhipinti
 

Recently uploaded (20)

This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!
 
My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".
 
All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'
 
My storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabersMy storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabers
 
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdfIn Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
 
Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789
 
哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样
哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样
哪里购买美国乔治城大学毕业证硕士学位证书原版一模一样
 
Portfolio of my work as my passion and skills
Portfolio of my work as my passion and skillsPortfolio of my work as my passion and skills
Portfolio of my work as my passion and skills
 
一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理
一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理
一比一原版美国加州大学圣地亚哥分校毕业证(ucsd毕业证书)如何办理
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
 
FinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvn
FinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvnFinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvn
FinalA1LessonPlanMaking.docxdvdnlskdnvsldkvnsdkvn
 
➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Matka Guessing Satta Matka Kalyan panel Chart Indian Matka ...
 
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
 
FinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptxFinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptx
 
Heart Touching Romantic Love Shayari In English with Images
Heart Touching Romantic Love Shayari In English with ImagesHeart Touching Romantic Love Shayari In English with Images
Heart Touching Romantic Love Shayari In English with Images
 
Fashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureAFashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureA
 
一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理
 
Codes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptxCodes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptx
 
Tibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AITibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AI
 
Dino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV AdvertisingDino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV Advertising
 

Ncsam 2019-cybersecurity-awareness-trivia final-508

  • 2. 2 Final Round 500 400 300 200 100 Cyber Stats 500 400 300 200 100 Cyber History 500 400 300 200 100 Types of Cyber Attacks 500 400 300 200 100 Device Security 500 400 300 200 100 #BeCyberSmart: Online Safety National Cybersecurity Awareness Month Trivia Game
  • 3. 3 Back to game boardAfter each answer appears, please return to Game Board. Answer: No. Once an image (or any information) is posted on the internet, it is virtually impossible to remove it from circulation. Taking it off of your social media page will help, but there is no guarantee that others have not already seen it and/or downloaded it to their own machines. You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture? #BeCyberSmart: Online Safety - 100
  • 4. 4 Back to game boardAfter each answer appears, please return to Game Board. Answer: Do NOT click the link! Check the sender’s address and search the document for spelling/grammar mistakes. If you notice anything suspicious, the email is likely a scam. Even if it seems legitimate, navigate to the site yourself rather than clicking any links. You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do? #BeCyberSmart: Online Safety - 200
  • 5. 5 Back to game boardAfter each answer appears, please return to Game Board. Answer: It depends. In general, it is never safe to transmit PII (Personally Identifiable Information), especially financial information, over a public network. If you find yourself in a situation where you may need to do so, first consider all your options, including using your mobile data or a VPN (Virtual Private Network) to help protect your browsing. You’ve just settled into your new hotel room when you realize you need to transfer some funds from your savings account to your checking account. In order to do this, you will need to connect your laptop to the hotel’s public Wi-Fi and log in to your online bank. Should you risk it? #BeCyberSmart: Online Safety - 300
  • 6. 6 Back to game boardAfter each answer appears, please return to Game Board. Answer(s): • Turn off Wi-Fi and Bluetooth when not using them. These technologies leave you open to remote attacks. • Make sure the network is legitimate. Hackers love to create fake networks that mimic real ones, enticing unsuspecting users to log on. • Don’t connect. Though perhaps drastic, one near-certain way to circumvent the dangers of public Wi-Fi is simply to avoid using it whenever possible. You have a long commute. Thankfully, your train just installed public Wi-Fi. Now you can listen to your favorite music or podcast. However, when you check for social media updates around lunch, you find that your account has been hacked. What steps could you take to prevent your mobile device or laptop data from being compromised in the future? #BeCyberSmart: Online Safety - 400
  • 7. 7 Back to game boardAfter each answer appears, please return to Game Board. Answer(s): • Use a password manager. These are apps, devices, or cloud services that store your passwords in an encrypted vault that can only be unlocked with a single master password. • Use a “password pattern.” This is simply a pattern (recognizable only to you) that you can use to help remember your passwords. Passwords often have complex requirements, and most online citizens will need to remember numerous different passwords to access their internet services. What is a way to help you keep track of all these different passwords? #BeCyberSmart: Online Safety - 500
  • 8. 8 After each answer appears, please return to Game Board. Back to game board Answer: 1 & 3. While it is helpful for passwords to have some level of personal relevance, anything concrete or publicly-available (high schools, birthdates, pets’ names, etc.) can be easily researched and guessed by an attacker. Storing your passwords physically or in a text-document is also ill-advised, as someone could gain access to the copy. Which of the following are strong password practices? (Choose all that apply.) 1. Passwords should contain a mixture of upper and lower case letters, numbers, and special characters. 2. Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you can remember them more easily. 3. You should immediately change your password in the case of a known data breach. 4. You should store your passwords on paper or in a text document, giving you a backup in the event that you forget them. Device Security - 100
  • 9. 9 Back to game boardAfter each answer appears, please return to Game Board. Answer: False. Although updates can occasionally cause problems, they also contain vital patches to help protect your machine against attackers. Keep your machine up- to-date and install new patches as soon as possible. Don’t click, “Remind me later,” twelve times. True or false: Automatically updating your machine poses a significant security concern, as it could install unwanted programs/features that disrupt your network or harm your computer. Device Security - 200
  • 10. 10 Back to game boardAfter each answer appears, please return to Game Board. Answer: False. Almost all consumer devices, especially cell phones and tablets, are simply miniature computers. They contain important data (contacts, financial information, calendars) and require protection like any other device. True or false: Although they operate similarly to computers, most mobile devices (cell phones, tablets, etc.) are not full computers and do not require software, such as anti-virus, to be secure. Device Security - 300
  • 11. 11 Back to game boardAfter each answer appears, please return to Game Board. Answer: All of them. Yes, even the toaster – possibly. • Tablet • Security camera • Pacemaker • Baby monitor • GPS • Toaster • Thermostat Which of the following devices could potentially be exploited by an attacker? • Desktop computer • Laptop computer • Cell phone • Television • Refrigerator • Digital assistant • Remote-controlled keys Device Security - 400
  • 12. 12 Back to game boardAfter each answer appears, please return to Game Board. Answer: Multi-Factor Authentication (MFA). MFA greatly increases the security of access control. Even if a password is learned or an ID is stolen, it will not be enough to compromise a system. Many online services allow MFA options, such as requiring a one-time login code as well as a password. What is the method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system? Device Security - 500
  • 13. 13 Back to game boardAfter each answer appears, please return to Game Board. Answer: Phishing – a type of social engineering that often manipulates human impulses, such as greed, fear, or the desire to help others. A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. What is this type of attack called? Types of Cyber Attacks - 100
  • 14. 14 Back to game boardAfter each answer appears, please return to Game Board. Answer: Malware. This stands for “malicious software,” and refers to a large variety of software-based attacks. What is the term for harmful software that seeks to damage or exploit the machines that run it? Types of Cyber Attacks - 200
  • 15. 15 Back to game boardAfter each answer appears, please return to Game Board. Answer: Spoofing. This kind of attack can come in many forms (email, GPS, caller ID), but is most commonly known with regards to fake and malicious wireless networks. Before logging onto a public network, be sure it is the correct one. An attacker goes to a local coffee shop and creates a wireless network using the shop’s name, hoping unsuspecting customers will log on. What is this type of attack called? Types of Cyber Attacks - 300
  • 16. 16 Back to game boardAfter each answer appears, please return to Game Board. Answer: Shoulder surfing. It is important to remember that not all cyber attacks require the direct manipulation of technology. Attackers can often obtain important information by simply observing people, asking questions, or piecing together dissociated facts to learn or guess something private. You bring your laptop to a local restaurant. Without your knowledge, the customer at the table behind you watches you log in to your email, thereby learning your username and password. What is this type of attack called? Types of Cyber Attacks - 400
  • 17. 17 Back to game boardAfter each answer appears, please return to Game Board. Answer: Ransomware. This type of attack has grown more common in recent years, especially against institutions that need to recover their data as soon as possible, such as medical facilities. After clicking an advertisement on an unsecure website, your computer freezes. A message appears, demanding you pay a certain amount of money to unlock your computer. What is this type of attack called? Types of Cyber Attacks - 500
  • 18. 18 Back to game boardAfter each answer appears, please return to Game Board. Answer: Bill Gates. This entrepreneur is widely-known for his contributions to the personal computer industry. He founded the Microsoft Corporation in 1975, with his business partner Paul Allen. Cyber History - 100
  • 19. 19 Back to game boardAfter each answer appears, please return to Game Board. Answer: The Department of Homeland Security. Specifically, the Cybersecurity and Infrastructure Security Agency (CISA), which is responsible for protecting the Nation’s critical infrastructure from physical and cyber threats. Which United States federal agency has been tasked with improving national cybersecurity and protecting the nation’s critical infrastructure? Cyber History - 200
  • 20. 20 Back to game boardAfter each answer appears, please return to Game Board. Answer: Alan Turing. Turing helped the Allies by cracking intercepted messages from the German forces, gleaning information that was crucial to an Allied victory. He also created the “Turing test,” which examines a machine’s ability to display human behavior à la artificial intelligence. This English cryptanalyst is famous for deciphering encoded messages during World War II and creating standards for artificial intelligence. He is considered by many to be the father of theoretical computing. (Hint: There was a 2014 movie based on his biography.) Cyber History - 300
  • 21. 21 Back to game boardAfter each answer appears, please return to Game Board. Answer(s): Ada Lovelace worked alongside Charles Babbage in the 1840s to publish the first computer-based algorithm. This English writer and mathematician is known for her work on the Analytical Engine and is considered to be one of the first computer programmers. Cyber History - 400
  • 22. 22 Back to game boardAfter each answer appears, please return to Game Board. Answer: WannaCry. This ransomware attack propagated through an exploit called EternalBlue, which took advantage of older Windows systems. Targeted machines had their data involuntarily encrypted, with a demand of Bitcoin payment for the release thereof. In May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over $4,000,000,000 (4 billion USD). Cyber History - 500
  • 23. 23 Back to game boardAfter each answer appears, please return to Game Board. Answer: Over 10 million. Approximately how many attempted cyber attacks are reported to the Pentagon every day? (Closest answer wins.) Cyber Stats- 100
  • 24. 24 Back to game boardAfter each answer appears, please return to Game Board. Answer: 310,000. How many unfilled cybersecurity jobs are there in the United States alone? (Closest answer wins.) Cyber Stats- 200
  • 25. 25 Back to game boardAfter each answer appears, please return to Game Board. Answer: 1.8 Million. Globally, how many unfilled cybersecurity positions are there estimated to be by 2022? (Closest answer wins.) Cyber Stats- 300
  • 26. 26 Back to game boardAfter each answer appears, please return to Game Board. Answer: $1.6 Million USD. What is the estimated cost of a successful phishing attack on a single small or medium-sized business? (Closest answer wins.) Cyber Stats- 400
  • 27. 27 Back to game boardAfter each answer appears, please return to Game Board. Answer: $2 Trillion USD. What is the estimated global cost of cybercrime by the end of 2019? (Closest answer wins). Cyber Stats- 500
  • 28. 28 Back to game board Answer: Connect with confidence! (This is called a Caesar cipher; since the key is 13, each letter is replaced with the letter 13 places down the alphabet.) Solve this cryptogram: Bonus Trivia
  • 29. Visit https://niccs.us-cert.gov/national-cybersecurity-awareness- month-2019 to download the NCSAM 2019 toolkit Thanks for playing!

Editor's Notes

  1. Use a password manager – The apps can help you meet complex password criteria, alert you to duplicate password use, and remind you to change password regularly after security breaches Use a password pattern - For example, you might replace every other “a” with @, or increment the number portion of your password by a certain amount each time you make a new one. Just be sure to choose something that others cannot easily guess, or it will defeat the purpose.
  2. The Internet of Things (IoT) consists of all devices transferring information over the internet. As network technology becomes more and more integrated into everyday life (Smart TVs, Smart refrigerators, digital assistants, etc.) the number of potential entrances for an attacker increases.
  3. Greed – e.g. click this link to receive a free device Fear – e.g. reset your password now or your account will be deleted Desire to help others – e.g. donate to this charity/send money to another person
  4. Exact answer: 313,735 according to CyberSeek https://www.cyberseek.org/heatmap.html
  5. According to (ISC)2 study – 1.8 million by 2022 https://www.isc2.org/News-and-Events/Press-Room/Posts/2017/02/13/Cybersecurity-Workforce-Shortage-Continues-to-Grow-Worldwide
  6. Presenter’s Note: The shapes in the code refers to the corresponding shape of part of the grid or X. The symbols with the dot refers the 2nd letter in that shaped space. So the first letter is a “U” (top center of the grid), 2nd letter is a “Y” (right side of the X shape), and the 3rd letter has a dot which means it’s the 2nd letter in the top left corner of the grid.