Let's get Social
Malicious Activity
Attacks
100

LinkedIn, Instagram, and Hinge are examples of ?

What are social media sites.

100

The process of scrambling messages or information in such a way that only authorized parties with a special "key" can read it.

Encryption

100

Short for malicious software?

What is... Malware

200

The use of electronic communication to send messages intimidating or threatening in nature. Resulting social cruelty or harrassment

What is... cyber bullying

200

Identifying weakness in computer systems or networks, exploiting its weaknesses to gain access. 


What is...  hacking

200

Unsolicited emails sent to many addresses. 

Ex.You receive an email from a Nigerian prince asking you to give him your bank account information so he can transfer one million dollars he has in an account that he must transfer somewhere to retrieve... what type of email am I?

What is... a phishing email

300

numbers, uppercase and lowercase letters, and special characters make a what?

What is a good password

300

A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.

Ransomware

300

What occurs every 38 seconds?

What is... a cyber attack 

400

Irreversible traces of your online activity left behind after every online interaction you have.

What is... digital footprint

400

A type of malware that is self-replicating and designed to spread from host to host and infect the most machines possible

What is... a Virus

400

The conscious manipulation of people to obtain information --that may take the form of impersonation via telephone, in person, or email.

What is... social engineering

500

This image in the upper left-hand corner of your web browser indicates you are on a secure website.

What is... lock icon

500

A program that records every key struck on a keyboard and sends that information to an attacker.

What is... a keylogger

M
e
n
u