Cyber Threats
Defensive Gear
Internet History
Authentication
"The Code"
100

This common scam uses deceptive emails to lure victims into revealing private info.

What is Phishing?

100

This digital "wall" blocks unauthorized access to your private data.

What is a Firewall?

100

This tech giant, founded in a garage, celebrated its 50th anniversary on April 1, 2026.

What is Apple?

100

Using a fingerprint or facial scan to verify identity is this type of authentication.

What is Biometric?

100

This acronym supports the Confidentiality, Integrity, and Availability triad.

What is CIA?

200

This malware holds your data hostage until a payment is made.

Ransomware?

200

Software that creates a secure, encrypted tunnel over the internet is known as this.

What is a VPN?

200

In 1971, Ray Tomlinson sent the first-ever one of these and introduced the "@" symbol.

What is an Email?

200

This method requires two or more forms of evidence to grant access to an account.

What is MFA or 2FA?

200

This "hidden" process makes digital data unreadable to unauthorized users.

What is Encryption?

300

This type of attack overwhelms a system with traffic to crash it.

What is a DoS/DDoS attack?

300

These professionals are hired to legally find vulnerabilities in a system.

Who are Ethical Hackers?

300

This decade was when the internet first became widely popular with the public.

What are the 1990s?

300

This protocol allows a user to access multiple systems with just one set of credentials.

What is Single Sign-On / SSO?

300

An attack where data is written beyond allocated memory areas is known as this.

What is a Buffer Overflow?

400

Malware that disguises itself as legitimate software to gain remote control is called this.

What is a Trojan Horse?

400

This defense strategy uses overlapping layers of security to protect data.

What is Defense in Depth?

400

Released in 1991, the very first page on the World Wide Web was about this topic.

What is the Web / its own technology?

400

This newer protocol (AAAs) provides more reliable communication than its predecessor, RADIUS.

What is Diameter? While RADIUS is widely used for network access, its reliance on UDP makes it less reliable. Diameter addresses this by utilizing TCP or SCTP (Stream Control Transmission Protocol) to ensure reliable packet delivery. 

400

This 1975 algorithm from IBM became the first Encryption Standard for the U.S.

What is DES?

500

An "On-Path" attack specifically designed to capture 2-step SMS messages is called this.

What is Man-in-the-Mobile / MITMO?

500

This specific type of server provides security, privacy, and web filtering for a network.

What is a Proxy Server?

500

In 1969, the first ARPANET connection crashed after only these two letters were typed.

What are L and O? UCLA student programmer Charley Kline attempted to type "LOGIN" to a computer at the Stanford Research Institute (SRI), but the system crashed after the 'L' and 'O' were received. 

500

This authentication factor is categorized as "something you have" (e.g., a physical key).

What is a Token?

500

Google researchers discovered these two CPU vulnerabilities in January 2018 affecting almost all processors.

What are Spectre and Meltdown?

  • Meltdown (CVE-2017-5754): Primarily impacts Intel processors, breaking the fundamental isolation between user applications and the operating system (kernel).
  • Spectre (CVE-2017-5753 and CVE-2017-5715): Affects Intel, AMD, and ARM processors, tricking applications into leaking sensitive information
M
e
n
u