cybersavants it jeopardy
TRANSCRIPT
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
200
300
400
Final
100
??? ??? ??? ??? ???
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
200
300
400
500
100
Cover YourAAS IoT Gone
“Phishing” “Ware” InfamousViruses
Cloud infrastructure service for accessing, monitoring, and
managing remote datacenter infrastructures
What is Infrastructure as a Service
Automates the configuration, deployment and ongoing
management of applications in the cloud.
What is Platform as a Service
Cloud service in which the back-end of a virtual desktop
infrastructure (VDI) is hosted by a cloud service provider.
What isDesktop as a Service
Software licensing and delivery model in which software is
licensed on a subscription basis and is centrally hosted.
What is Software as a Service
The replication and hosting of physical or virtual servers by a
third-party to provide failover in the event of a man-made or
natural catastrophe.
What is Disaster Recovery as a Service
Mesh network specification for low-power wireless local area
networks (WLANs) that cover a large area.
What is Zigbee
Wireless communications protocol for home automation
What is Z-Wave
DAILY DOUBLE
DAILY DOUBLE
Communication protocols that enable two electronic devices,
one of which is usually a portable device such as a smartphone, to
establish communication by bringing them within 4 cm (2 in)
of each other
What is Near Field Communication
Managed cloud platform that lets connected devices easily and securely interact with cloud
applications and other devices.
Clue – Lambda, S3, Cloudwatch
What is AWS IoT
Allows software developers to programmatically make and
receive phone calls and send and receive text messages using its
web service APIs – CEO Jeff Lawson
What is Twillio
Surveillance software (considered to be either software
or spyware) that has the capability to record every
keystroke you make to a log file, usually encrypted.
What is a Keylogger
Hackers position themselves between the user and the
legitimate website or system
What is a Man-in-the-Middle Phishing
attack
Phishing attempts directed at specific individuals or companies
What is Spear Phishing
Phishing attacks directed specifically at senior executives and other high profile targets
What is Whaling
Where user’s activities are monitored clearly until they log
into a target account like the bank account and establish their
credentials.
What is Session Hijacking
Short for malicious software, it is any software used to disrupt computer operations, gather
sensitive information, gain access to private computer systems, or display unwanted advertising
What is Malware
A type of malware that can be covertly installed on a computer without knowledge or intention
of the user that restricts access to the infected computer system in some way, and demands that the
user pay to restore access
What is Ransomware
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from
their hard drive.
What is Spyware
A form of software that downloads or displays unwanted
ads when a user is online, collects marketing data and other
information without the user's knowledge or redirects search requests to certain advertising
websites.
What is Adware
Malware designed to trick victims into purchasing and
downloading useless and potentially dangerous software.
What is Scareware
Computer worm that caused a denial of service on some
Internet hosts and dramatically slowed down general Internet traffic on January 25, 2003. It
spread rapidly, infecting most of its 75,000 victims within ten
minutes.
What is SQL Slammer
A fast-spreading macro virus that is distributed as an e-mail attachment
that, when opened, disables a number of safeguards in Word 97 or Word
2000, and, if the user has the Microsoft Outlook e-mail program,
causes the virus to be resent to the first 50 people in each of the user's address
books.
What is Melissa
E-mailed virus with an attachment that, when opened, results in the message being re-
sent to everyone in the recipient's Microsoft Outlook address book
and, the loss of every JPEG, MP3, and certain other files on
the recipient's hard disk.
What is the ILOVEYOU
virus
First discovered in May 2000, this malicious computer worm targets software that controls industrial
systems.
What is Stuxnet
A worm that spread through email as what appeared to be a
bounced message.
What is MYDOOM
The most widely accepted approach to IT service
management in the world.
What is ITIL(Information Technology Infrastructure Library)