Cybersecurity
Scams
Misc.
Cybersecurity Tech
100

What is a motive for a cybersecurity attack?

Money,Power,Political

100

How can you detect a scam phone call?

If the caller speaks with authority,intimidation,trust, and/or familiarity.

100

What is a lottery scam?

  • You will get an email or text message claiming, “You were randomly selected to win this jackpot!”

  • These are fake - you can never win an online lottery without entering it

  • You will be prompted to click a link where they can take your personal info.

100

What is Voice AI technology?

Anyone here can have their voice cloned and have their voice say anything

200

What is cybersecurity?

Cybersecurity is the practice of protecting sensitive information from digital attacks

200

What is an impersonating family scam?

Scammers will pretend to be your child or grandchild and say they are in desperate need of  a lot of money. They will ask you to wire thousands of dollars to them immediately. These hacks are very common.

200

What is one of the best ways you can keep your online account safe?

Multi-factor Authentication

200

What is deep fake technology?

A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.

300

What are two infamous cybersecurity attacks?

Yahoo! 2016 attack,Election Fraud 2020 just to name a few

300

Describe a government imposter scam

Scammers contact people claiming to be representatives from a well-known government agency. This could include Medicare, the Internal Revenue Service (IRS), or the Social Security Administration (SSA).

300

What is one way you can know that a text is a red flag?

The contact name is long and sketchy,they are asking you to click a link.

300

How much time does it take for someone to clone your voice using voice ai technology?

2 minutes

400

What % of cyber attacks occur due to human error?

80%
400

What is dangerous in Facebook identity theft?

Scammers create profiles that look like somebody you may know, and reach out asking for something such as money, personal information, etc.

400

What is a phishing scam?

Phishing is a type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source – an internet service provider, a bank, or a mortgage company, for example. It asks the consumer to provide personal identifying information. 

400

What is Blockchain?

distributed ledger technology that provides a secure and transparent way to store and transfer data.

500

How much money was lost last year due to cyber crime?

Over 10 billion dollars

500

what are 4 pieces of criteria that go into creating a strong password?

  • At least 8 characters (the longer the better)

  • Use a mix of uppercase letters, lowercase letters, numbers, and special symbols

  • Don’t use common phrases or numbers (Ex: password1 or 12345)

  • Not based on your personal information


    • Birthday

    • Name

    • Hobbies

500

What is Hactivism?

Using hacking techniques for political or social causes

500

What are firewalls?

A firewall is a type of network security system that keeps an eye on and regulates incoming and outgoing network traffic

M
e
n
u