cyber jeopardy by: theodore maselko. jeopardy terminologypoints of entry protectionfiction5 th...

55
CYBER JEOPARDY By: Theodore Maselko

Upload: julian-bruce

Post on 02-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

CYBER JEOPARDY

By: Theodore Maselko

Page 2: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

JEOPARDYTerminology Points of

EntryProtection Fiction 5th Column

100 100 100 100 100½

200 200 200 200 200½

300 300 300 300 300½400 400 400 400 400½500 500 500 500 500½

Page 3: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½
Page 4: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 100

A type of e-mail message used to advertise for products or services, normally sent in large

numbers.

Page 5: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 100

Answer:

What is Spam?

Page 6: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 200

A program designed to copy itself indefinitely within a computer’s

memory, occasionally has a virus payload.

Page 7: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 200

Answer:

What is a Worm?

Page 8: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 300

A program that not only does its advertised functions, but also adds viruses, worm, or backdoors to a

system.

Page 9: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 300

Answer:

What is a…

TROJAN HORSE

Page 10: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 400

The generic name for a program designed to harm or infiltrate a computer’s operating system.

Examples are viruses, worms, trojan horses.

Page 11: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 400

Answer:

What is Malware?

Page 12: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 500

The program with which hackers or system administrators can examine packets send to and from a certain computer or computers in a given

network.

Page 13: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Terminology 500

Answer:

What is a packet sniffer?

Page 14: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 100

A type of data highway leading into or out of a computer. Every computer has over 65,000 of these. It is not illegal for

an outsider to scan these.

Page 15: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 100

Answer:

What is a port?

Page 16: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 200

Pieces of data send out by a computer when it is connected to the internet.

Thousands may be send in one connection, hundreds of thousands

over the course of a day. They contain all the information the user sends to or

receives from a website.

Page 17: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 200

Answer:

What are packets?

Page 18: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 300

A port opened for the purpose of connecting back into a system without bypassing the security again. Set up by various types of malware, unbeknownst

to the user.

Page 19: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 300

Answer:

What is a backdoor?

Page 20: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 400

The method by which hackers or ill-meaning parties obtain access to a

system through tricking someone who has information allowing access into

releasing the information to them.

Page 21: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 400

Answer:

What is social engineering?

Page 22: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 500

The worst possible program to use for email. Has more holes than a broken

sieve.

Page 23: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Points of Entry 500

Answer:

What is Microsoft Outlook?

Page 24: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 100

A program provided by Microsoft on Windows OSes, acts as a simple

computer integrity protection system, is off by default.

Page 25: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 100

Answer:

What is Windows Firewall?

Page 26: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 200

A program designed to block packets sent by other computers, unless those

packets fit certain criteria set by the program’s user.

Page 27: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 200

Answer:

What is a Firewall?

Page 28: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 300

Mark it as junk, and delete it without opening it.

Page 29: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 300

Answer:

What do you do with spam?

Page 30: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 400

A program for connecting to the internet provided by Windows. Like Outlook, has so many vulnerabilities you can’t see where one lets off and the other

begins.

Page 31: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 400

Answer:

What is Internet Explorer?

Page 32: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 500

The device that attaches to the modem and distributes internet packets

amongst the computers connected to it. Comes with software to manually

block ports.

Page 33: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Protection 500

Answer:

What is a router?

Page 34: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 100

The name of the supercomputer in 2001: A Space Odyssey, by Arthur C. Clarke.

Page 35: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 100

Answer:

What is HAL?

Page 36: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

HELLO

Page 37: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½
Page 38: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 200

The type of computer brains invented by Isaac Asimov for his novels and short

stories.

Page 39: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 200

Answer:

What is a Positronic brain?

Page 40: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 300

The words forming the the acronym HAL from the story 2001: A Space Odyssey,

by Arthur C. Clarke, stand for?

Page 41: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 300

Answer:

What is a Heuristically programmed ALgorithmic Computer? (what a

mouthful)

Page 42: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 400

The author of Around the World in 80 Days.

Page 43: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 400

Answer:

Who is Jules Verne?

Page 44: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 500

The person who is credited with inventing the word “robotics”.

Page 45: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

Fiction 500

Answer:

Who is Isaac Asimov?

Page 46: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 100 ½

The sum of all the points in the Cyber Jeopardy game.

Page 47: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 100 ½

Answer:

What is 7,502 ½?

Page 48: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 200 ½

3.14159265358979

Page 49: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 200 ½

Answer:

What is Pi?

Page 50: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 300 ½

The square root of 625.

Page 51: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 300 ½

Answer:

What is 25?

Page 52: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 400 ½

The last four letters in the pattern

ROYBGIVROYGBIVROYBGIVROYGBIVROY_ _ _ _.

Page 53: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 400 ½

Answer:

What is BGIV?

Page 54: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 500 ½

NOTE: Do NOT look at your keyboard!

The letters midway between “W” and “Y”, “G” and “L”, “~” and “@”.

Page 55: CYBER JEOPARDY By: Theodore Maselko. JEOPARDY TerminologyPoints of Entry ProtectionFiction5 th Column 100 ½ 200 ½ 300 ½ 400 ½ 500 ½

5th Column 500 ½

Answer:

What is “GJ!”?