Type of malware that encrypts the user's data and demands money (usually in cryptocurrency) for the "key" to unlock it
What is ransomware
Online check/test used by websites to determine if the user performing the actions a human or a bot
What is a captcha/Turing test
1 good practice for creating strong passwords
or bad practice for creating strong passwords
(List one practice for creating a strong password and say if it is good)
What are
using long passwords with multiple words, characters, numbers and symbols
or
Not using personal information, sequential or repetitive characters, common words or phrases, variations of the same weak base
Most common (but not most secure) way that information on computers and mobile devices is protected from unauthorized access
What are PINs and passwords
Browser tool used to block and alter unwanted elements and malicious content from loading
What is an ad blocker
Type of malware that records to users keystrokes and passwords and sends them to an attacker
What is a keylogger
The type of AI that powers models like ChatGPT, Claude, Deepseek, and other online chatbots
What are LLMs (Large language models)
Software tool that prevents reusing credentials by automatically generating, autofilling, and storing login information for websites and apps
Attack that involves tricking the user into compromising important data by impersonating a trustworthy source
What is phishing
Small files stored on you device to track your online activity and remember you across website visits
What are cookies
Type of malware pretends to be benign software but causes damage and runs malicious code once installed
What is a trojan horse
Information that AI companies use to teach artificial intelligence models how to recognize patterns, classify information, and make predictions
Important method that requires different (multiple) forms of verification to prove that the user is who they claim they are
What is 2fa
(two factor verification)
Process of copying important data and files to other locations in case the original copy is lost or destroyed
What are creating backups
An alternate identity/persona often used to hide one's real self and protect personal information online
What are aliases, pseudonyms, alter egos, etc
A vulnerability that is unknown to software maintainers that is often sold exploited in advanced (usually nation state) malware
What is a zero-day
Fake audio or video created by AI to make it look like someone said something they didn't
What is a deepfake
Contact details, such as a (recovery) email addresses or phone numbers, that users add to their accounts to regain access if they are locked out or forget their password
Incident where a company or individual "leaks" often sensitive information due to misconfigured policies or systems
Data breach/leak
Document that explains what data a company collects and how they use it
You often need to agree to it before you sign-up for an online service
Type of malware that specializes in persistence even across operating system updates and reinstalls
What is a Rootkit (or backdoor)
Artificial intelligence model that can accomplish a specific goal on its own with limited supervision and human interaction
What is agentic/(autonomous) AI
The most secure type of authentication often used to protect critical accounts and infrastructure
What are FIDO2/Passkeys/Hardware keys
Process that uses math, various algorithms, and "keys" to protect from unauthorized access by making it indecipherable without the correct key
What is encryption
Tool that creates a secure and encrypted tunnel between your device and a remote server, used to mask your real IP address and location to protect your privacy
What is a VPN