The Human Firewall
Malware Mayhem
Netwerk
Crypto & Code
Acronym Soup
100

I'm told I need to stop clicking on things from strangers, but I just love being surprised!

What is Phishing?

100

This software locks up your files until you pay up, but it’s really just asking for a "digital loan."

What is Ransomware?

100

I installed this to keep bad traffic out, but it just sits there silently judging every packet that tries to get in.

What is a Firewall?

100

This makes your data scramble, but unlike your laundry, it's designed to be confusing.

What is Encryption?

100

The internets phone book

What is DNS?
200

What do you call a hacker who impersonates a system admin to get your password, but always forgets their own?

What is an Impersonator?

200

This malicious program is like a guest who pretends to be friendly, but once inside, causes chaos behind your back.  

What is a Trojan Horse?

200

This is what happens when a hacker tries to browse the internet without permission on your network; they are trespassing.

What is Unauthorized Access?

200

This mathematical function is one-way, you can make the fingerprint, but you can't recreate the hand.

What is a Hash Function?

200
List that decides who gets in and what they can do  

What is ACL?

300

This specific attack is so personal, it feels like the attacker knows my dog's name and my favorite pizza topping.

What is Spear Phishing?

300

I accidentally ran an attachment that started sending copies of itself to everyone in my contacts. It was just trying to make friends!

What is a Worm?

300

A hacker found the secret handshake and used it to get into the server room.

What is a Private Key 


or Secret Key?

300

This type of encryption uses the same secret key to both encrypt and decrypt data, making it fast but harder to share securely.

What is Symmetric Encryption? 

300

Where public vulnerability IDs live

What is CVE?

400

This cybersecurity principle focuses on maintaining uninterrupted access to data and services, even during failures or attacks, often supported by redundancy and disaster-recovery planning

What is Availability?

400

This malware waits for a specific date or condition to execute, like a delayed-fuse prank.

What is a Logic Bomb?

400

When a threat actor is actively poking around looking for an open door, they are performing this type of reconnaissance.

What is Scanning or Footprinting?

400

This hashing property means that even a tiny change in input produces a drastically different output, helping protect data integrity.

What is Avalanche effect??

400

Keeps unauthorized devices off the network

What is NAC?

500

This access-management model assigns permissions based on a user’s job function, reducing individual privilege decisions and simplifying administration.

What is Role-Based Access Control (RBAC)?

500

My defense tools can't find it because it lives only in memory. It's the cybersecurity equivalent of a ghost program.

What is Fileless Malware?

500

I set up this separate, segmented environment that looks like a real network, hoping the hackers get stuck in the tar pit.

What is a Honeypot?

500

This technique combines plaintext with a random value before hashing, making it much harder for attackers to use precomputed tables to crack passwords.

What is Salting??????????????????

500

What does NIST CSF stand for

What is National Institute of Standards and Technology Cybersecurity Framework

M
e
n
u