Secure Yourself
Halloween
Hackers Gonna Hack
Spooky Monsters
Misc.
100

All tech devices should have one of these in order to help protect user information. These should not be shared with anyone. 

What is a password?

100

Who you gonna call? Is a famous phrase from this movie

What is Ghostbusters?

100

These are people who originally tried to gain access into computers for intellectual curiosity, but now have malicious purposes.

Who are hackers?

100

This monster is wrapped in bandages

What is a Mummy?

100

The practice of using two different authentication methods to verify identity.

What is multi-factor authentication (or MFA/2FA)?

200

This is the term used to describe a strong password that uses a combination of numbers and letters.

What is an alphanumeric (password)?

200

The location of Dracula's castle

What is Romania?

200

Hackers make these computer programs so that the program may spread or self-replicate

What is a virus?

200

This ancient creature, sewn together from corpse parts and sparked to life, is both tragic and terrifying.

What is Frankenstein?

200

This type of malware disguises itself as legitimate software to trick users into installing it.

What is a Trojan (or Trojan horse)?

300

Whenever you leave your computer, even for a few minutes, you should perform this action.

What is (to) lock your computer?

300

Stingy Jack, a figure from Irish folklore, is said to have inspired this glowing Halloween decoration.

what is a jack-o’-lantern?

300

These malware programs track where you go on the Internet and what you type into your keyboard.

What is spyware?

300

This monster only comes out during a full moon  

What is a Werewolf?

300

This attack floods a system with traffic to make it unavailable to legitimate users.

What is a DDoS (Distributed Denial of Service) attack?

400

These items can be carried with you. When they're not properly password protected, that can result in a cyber security breach

What are endpoints

400

The average amount people spend on Halloween candy.

What is $100?

400

This type of malware prevents users from accessing their system by locking them out until the user pays the hacker for the key.

What is ransomware?

400

This horned Christmas demon from European folklore punishes naughty children by dragging them away in chains.

Who is Krampus?

400

The principle of giving users only the access rights they need to perform their job.

What is least privilege?

500

This protocol, indicated by a padlock icon in your browser, encrypts data between your computer and a website.

What is https://?

500

The location of the biggest Halloween Parade

What is New York?

500

Strange computer behavior, keyboards not typing or mouses not clicking, computers crashing or restarting on their own

What is a malware infection?

500

This silent figure in a white mask stalks his victims relentlessly in a long-running horror film franchise.

Who is Michael Myers?

500

This attack technique involves an adversary remaining undetected in a network for an extended period to steal data.

What is an APT (Advanced Persistent Threat)?

M
e
n
u