1) You are familiar with many of the cyber security threats that exist, but can you identify them by their definition? Just for fun, see if you can match up the words below with their definition:

Type your responses or you can drag and drop the letter from the blue boxes.

Term Definition (enter A, B, C, etc.)
Malware

Keyloggers
Phishing
P2P
Vishing
SMiShing
A

Fraudsters use unsolicited e-mails and fraudulent websites that closely resemble legitimate business sites to try to trick you into revealing personal or financial information.

B

Fraudsters use telephone technology to make it look like they are calling from a legitimate company and to try to trick you into divulging personal or financial information.

C

Fraudsters use text messaging to alert you to a supposed security threat or problem, trying to trick you into replying with your personal information either by sending a text message or by calling a phone number.

D

File sharing networks that allow users to upload and download music, movies, games, documents, and other computer programs across global networks. These networks are a common way for criminals to distribute computer viruses.

E

Malicious software that performs certain tasks on your computer, typically without your consent. The intention of this software is to disrupt or damage your computer system, which could include giving you unwanted or intrusive advertising or collecting and transmitting your personal information.

F

Malicious software that can record your keystrokes. This software can be hidden in downloads or be secretly installed on public computers.