Safe Internet Use
Security Scramble
Social Engineering
Past Presentations
Physical Security
100

What is the term for malicious software that demands payment to unlock your files?

What is ransomware?

100

DROPSASW

What is PASSWORDS?

100

What's it called when someone tricks you into giving up confidential information?

What is Social Engineering?

100

Managing and updating Out of date software, applications, and operating systems that can have vulnerabilities   

What is Patch Management?

100

A term referring to the use of security measures to protect physical assets, personnel, and facilities. What is it?

What is Physical Security?

200

What should you look for in the browser address bar to ensure a site is secure?

What is a padlock icon or "https"?


200

HISNPHIG

What is PHISHING?

200

A scammer calls pretending to be IT and asks for your login. What type of attack is this called?

What is vishing?

200

A model that allows attackers with minimal hacking skills to access advanced phishing tools

What is Phishing as a Service (PhaaS)?

200

A device that records visual footage for security purposes, often used in conjunction with intrusion detection systems.

What are Security Cameras?

300

What should you avoid doing on public WIFI without a VPN?

What is accessing sensitive or financial information?



300

TFMUIALTNIAOTCAEH

What is a MULTI-FACTOR AUTHENTICATION?

300

What's a good practice before sharing sensitive info over the phone?

What is verifying the caller's identity?

300

A type of scam involving a two-dimensional barcode that stores data in a grid of black and white squares, allowing smartphones and cameras to quickly scan and access information.

What are QR Code scams?

300

A device that uses an employee's unique biological characteristics to verify their identity. What is it?

What are Biometrics?
400

What types of websites should you avoid entering personal information on?

What are unsecured (non-HTTPS) websites?



400

MERAOSWNAR

What is RANSOMWARE?

400

What is someone watching over your shoulder to steal information?

What is shoulder surfing?

400

A type of cyberattack against AI systems where malicious instructions are hidden in normal-looking text or data 

What is Prompt Injection?

400

A physical security measure that restricts access to certain areas of a building based on employee role or need-to-know.

What is Access Control?

500

What type of pop-up might tell you your computer is infected and try to get you to install software?

What is scareware or a fake virus alert?



500

LIGTANGITE

What is TAILGATING?

500

A scammer texts you pretending to be a VP in your company. What's this technique called?

What is smishing or executive impersonation?

500

A type of cybersecurity threat that often exhibit sophisticated techniques such as dynamic behavior, fileless attacks and delayed execution to avoid detection and evade traditional security measures.

What are HEAT (Highly Evasive and Adaptive Threats) Attacks?

500

A technique where a person enters a building or area by following someone who is authorized to enter.

What is Tailgaiting?

M
e
n
u