Phishing
Strong Passwords
Staying Safe Online
Data Privacy
BUZZ Words
100

This term refers to deceptive emails designed to trick recipients into revealing personal information or clicking malicious links.

What is phishing?

100

This type of character, like # or @, is important to include in a strong password to increase security.

What is a special character?

100

This basic step involves regularly updating your software and apps to protect against security vulnerabilities.

What is software updates?

100

This type of software can help protect against phishing attacks by blocking malicious websites.

What is antivirus software?

100

This term refers to a type of software designed to gain unauthorized access to a computer system.

What is malware?

200

This is a common sign of a phishing email, often containing spelling and grammatical errors.

What are typos?

200

A password that includes your name or birthdate is considered this, making it easy for hackers to guess.

What is weak Password?

200

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

200

This security measure adds an extra layer of protection by requiring two forms of identification.

What is two-factor authentication?

200

This term describes a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge.

What is a botnet?

300

A button that is found in external emails to notify Cybersecurity.

What is a Report Suspicious Button?

300

This is the minimum recommended length for a strong password.

What is 12 characters?

300

A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.

What is a browser? (or web browser)

300

 This is a good habit to develop, involving regular updates to your passwords.

What is changing passwords regularly?

300

This is a type of attack where the attacker sends multiple requests to a server, overwhelming it and causing it to crash.

What is a Distributed Denial of Service (DDoS) attack?

400

This type of phishing uses text messages to lure victims, often referred to as "smishing."

What is SMS phishing?

400

This type of attack uses automated tools to systematically guess a password until the correct one is found.

What is a brute-force attack?

400

The lock icon in the top left of the browser

what is HTTPS?

400

This regulation, implemented in the European Union, aims to protect individuals’ personal data and privacy.

What is the General Data Protection Regulation (GDPR)?

400

This term refers to the practice of protecting systems, networks, and programs from digital attacks.

What is cybersecurity?

500

This is a common tactic used in phishing scams where attackers pretend to be a trusted source, like a bank or service provider.

What is impersonation?

500

Using long passwords or passphrases, combination of uppercase and lowercase letters, numbers and special characters are considered what?

What are best practices for Creating Strong Passwords?

500

This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a Firewall?

500

This type of data is accessable by everyone

What is public data?

500

This advanced persistent threat involves a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period

What is an APT (Advanced Persistent Threat)?

M
e
n
u