CIA Triad & Basics
Malware & Attacks
Network & Protocols
Tools & Best Practices
Fun Facts/Stats
100

The three goals of cybersecurity remembered by the acronym CIA.

What are Confidentiality, Integrity, and Availability?

100

The general name for bad software that harms devices or steals info

What is Malware?

100

Rules computers use to talk over the internet (examples: HTTP, SMTP, TCP/IP).

What are Protocols?

100

Use this to make it more difficult for unauthorized users to gain access to your accounts by requiring a password and an additional verification method

What is Multi-Factor Authentication (MFA) or Two-Factor Authentication (2FA)?

100

On average, how quickly can an unprotected networked computer be compromised once connected to the internet?

What is 20 minutes?

200

The CIA goal that ensures information isn't changed without permission.

What is Integrity?

200

The general name for fake emails used to trick people into sharing personal information

What is Phishing?

200

Secure protocol used for encrypted web traffic — look for "https://" and a padlock.

What is TLS/SSL (HTTPS)?

200

Use this specifically when using public Wi-Fi to create a private connection?

What is a Virtual Private Network (VPN)?

200

According to the BJS, what percent of people reported someone stole personally-identifiable information? 

What is 22%

300

A student stores their research paper in a shared cloud folder but accidentally leaves the folder set to “Anyone with the link can view.” This is an example of which CIA Triad element?

What is Confidentiality?

300

Malware that spreads by itself across networks without needing a host file.

What is a Worm?

300

Device that forwards packets across networks.

What is a Router?

300

Another word for a "fix" or "solution" for a security issue

Hint: bandage

What is a Patch?

300

The National Security Alliance 2004 estimate for percent of home PCs infected with spyware

What is 80%?

400

On the day of an online test, the school’s learning platform goes down because the server is overloaded. Students can’t access the test when scheduled. This is an example of which CIA element?

What is Availability?

400

The name of the attack that involves registering a URL based on a legitimate website but with a small typo 

What is Typosquatting?

400

Local network that connects devices in a small area like a home or school.

What is a LAN (Local Area Network)?

400

A barrier that blocks unauthorized access to and from a network or system

What is a Firewall?

400

The algorithm used to check numbers like many credit card numbers

What is the Luhn algorithm/formula?

500

Checksums and the Luhn formula are part of this CIA element.

What is Integrity?

500

The difference between a Trojan horse and a honeypot

What is Trojan horses fight innocent/good people, while honeypots trap bad actors/malicious hackers?

500

The most recommended wi-fi security today

Wi-Fi-Protected Access (WPA) Versions 2 and 3

aka WPA2 and WPA3

500

Name any hint that a message might be social engineering.

What are

-random offers

-poor writing

-unknown sender/portraying as someone else

-threatening content

-strange sense of urgency

-(Any others)

500

The name of the update that added many security features to Windows XP Pro in the early 2000s

What is Service Pack 2 (SP2)?

M
e
n
u