This type of cyberattack involves tricking individuals into revealing confidential information, such as usernames and passwords.
What is phishing?
This is a secret code that is used to protect access to a computer, account, or other digital resource.
What is a password?
Coolmath Games is free for anyone to use. This is an example of:
What is the public domain?
Ehan stole Aakash's creative work and claimed it was his. This is an example of:
What is plaigarism?
This term refers to the practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.
What is cybersecurity?
a type of cyber attack that involves overwhelming a computer system or network with a flood of traffic from multiple sources, making it unavailable to users.
What is a DDos Attack?
When a URL has this at the beginning, it means that the information entered into the site is encrypted.
What is "https"?
This security practice involves regularly updating software to fix known vulnerabilities.
What is patching?
Saisha was illegally copying DVDs and CDs. This is an example of:
What is piracy?
This is a common term used to describe a worm, digital virus, or other dangerous program.
What is malware?
A type of cyber attack that involves gaining unauthorized access to a computer system or network by exploiting a vulnerability or installing a hidden means of access.
What is a backdoor?
What type of encryption uses uses key pairs for encryption and decryption.
What is asymmetric encryption?
Companies consider cybersecurity when instructing employees with a policy on BYOD, which is short for?
What is Bring Your Own Device?
Sahasra's song is protected legally from being copied or used without my permission. This is an example of:
What is copyright?
Cybercrime went up 600% in this time period.
What is the Covid-19 pandemic
This type of cyber attack is designed to prevent users from accessing their own computer systems or files until a ransom is paid.
What is a ransomware attack?
Method in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
What is Caesar Cipher?
This service allows users to remain anonymous, masking their identity/location and encrypts traffic.
What is a VPN?
Ari's favorite games are available for anyone to use. This is an example of:
What is public domain?
This generation is currently the most impacted by cybercrime.
(Gen Z, Millennials, Boomers, etc)
What are Millennials?
A type of cyber attack where the attacker intercepts communication between two parties to eavesdrop, steal information, or manipulate the conversation.
What is a "man-in-the-middle" attack?
One-way encryption process such that the encrypted value cannot be reverse-engineered to get to the original plain text.
What is hashing?
distributed ledger technology that provides a secure and transparent way to store and transfer data.
What is blockchain?
All of the CITs data is leaked. This is an example of:
Which cybersecurity group is better (Heath or Ehan)?
What is Ehan's grouop