Refers to any bullying that takes place through use of electronic technology.
What is cyber-bullying?
100
Fraud attempts targeted at specific people based on their membership or affiliation with a the spoofed group
What is Spear-phishing?
100
This leg of the CIA triad keeps data private.
What is Confidentiality?
100
This is a computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
100
Most commonly used operating system. It is user-friendly and used in offices and homes
What is Microsoft Windows?
200
This type if information can contain any of the following: Student ID Number, Date of Birth, Email Address, Mailing Address, Credit Card Information, Social Security Number.
What is "Personally Identifiable Information (PII)"?
200
Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these.
What are things you should look for in an email that may indicate it is a scam?
200
This leg of the CIA triad validates that data remains in it's original state.
What is Integrity?
200
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is deisgned to give hackers access to your computer or files.
What is a Trojan Horse?
200
Often open-source, meaning that anyone can use or modify the operating systems. Many different “flavors” or significantly varied operating systems.
What is Linux?
300
This should be done if you or one of your friends is a victim of cyber-bullying
What is report it to your parents or teacher?
300
Manipulating people into giving up personal information.
What is Social Engineering?
300
This leg of the CIA triad ensures that data is there when you need it
What is Availability?
300
This malware can infect and spread without human assistance
What is a worm?
300
Distantly related to Linux operating systems. Generally more secure than Windows because malware is less likely to target non-Windows systems
What is MAC?
400
This is the person you should share your passwords with.
What is no one?
400
Test every possible combination of letters, numbers, and characters until the password is found
What is Brute force cracking?
400
When thieves sift through garbage for receipts with credit card information, medical forms with social security numbers, or other documents with PII.
What is dumpster diving?
400
Defined as programs that track where you go on the Internet.
What is spyware?
400
Is an environment, such as a
program or operating system
that does not physically exist,
but is created within another
environment
What is a virtual machine (VM)?
500
This icon appears in your browser address bar when the site is secure.
What is a lock?
500
This site can be used to verify if a file or website contains malware.