Intro to Cybersecurity
Cyber Threats
Cyber Ethics
Online Safety
How Computers Work
Computer Components
Final Jeopardy
100

ALL THE TOOLS WE USE AND ACTIONS WE TAKE TO KEEP COMPUTERS SAFE

WHAT IS CYBERSECURITY?

100

TERM FOR ANY SOFTWARE THAT IS INTENTIONALLY DESIGNED TO CAUSE HARM OR DO ILLEGAL AND UNETHICAL ACTIVITIES

WHAT IS MALWARE?

100

THIS LIST WAS CREATED IN 1992 BY THE COMPUTER ETHICS INSTITUTE TO GUIDE RESPONSIBLE BEHAVIOR ONLINE

WHAT ARE
THE 10 COMMANDMENTS OF COMPUTER ETHICS?

100

THIEVES THAT SIFT THROUGH GARBAGE TO FIND AND ACCESS PERSONAL INFORMATION

WHAT ARE
DUMPSTER DIVERS?

100

THE TOOL FILTERS INCOMING DATA TO PROTECT A NETWORK FROM ATTACK

WHAT IS
A FIREWALL?

100

A MOUSE, A KEYBOARD, AND A MICROPHONE ARE ALL TYPES OF THESE

WHAT ARE
INPUT DEVICES?

100

THIS TYPE OF CYBER THREAT INVOLVES MANIPULATING PEOPLE INTO GIVING UP PERSONAL INFORMATION?

WHAT IS
SOCIAL ENGINEERING?

200

HEALTHCARE, ENERGY, FOOD & AGRICULTURE, AND FINANCIAL SERVICES ARE ALL INDUSTRIAL SYSTEMS VULNERABLE TO CYBERATTACKS

WHAT IS
CRITICAL INFRACTURE?

200

THE NAME FOR MALWARE THAT CAN INFECT AND SPREAD WITHOUT HUMAN ASSISTANCE

WHAT IS A WORM?

200

MANY OF TODAY’S YOUTH HAVE WITNESSED THIS FORM OF INAPPROPRIATE ONLINE BEHAVIOR

WHAT IS CYBERBULLYING?

200

HACKERS CREATE THESE USING STOLEN PERSONAL INFORMATION ON SOCIAL MEDIA

WHAT ARE
DUMMY PROFILES?

200

THIS PIECE OF HARDWARE MANAGES RESOURCES SHARED BY MULTIPLE USERS IN A NETWORK

WHAT IS
A SERVER?

200

CONTENT STORED ON THIS IS ERASED WHEN A COMPUTER IS SHUT OFF

WHAT IS
RAM? (RANDOM ACCESS MEMORY)

300

SMARTPHONES, SMART BULBS, AND BLUETOOTH SPEAKERS ARE ALL EXAMPLES OF THIS

WHAT ARE
IoT DEVICES?

300

A SEEMINGLY LEGITIMATE PROGRAM WITH A HIDDEN MALICIOUS FUNCTION

WHAT IS A TROJAN HORSE?

300

THE TERM FOR COMMONLY ACCEPTED RULES OF HOW TO BEHAVE ONLINE

WHAT IS NETIQUETTE?

300

THIS TERM IS USED FOR A PHOTO OR HEADLINE TAILORED TO GRAB ATTENTION

WHAT IS CLICKBAIT?

300

THIS DEVICE CONTROLS TRAFFIC WITHIN A NETWORK

WHAT IS A SWITCH?

300

THE OS COORDINATES AND CONNECTS THE SYSTEM’S _____ AND _____ RESOURCES SO THINGS PERFORM AND RESPOND PREDICTABLY FOR THE USER

WHAT ARE HARDWARE AND SOFTWARE?

400

HEALTHCARE AND POWER GRIDS ARE EXAMPLES OF THESE SYSTEMS FREQUENTLY TARGETED BY HACKERS

WHAT ARE
CRITICAL INDUSTRIAL SYSTEMS?

400

A COMPROMISED COMPUTER UNDER THE CONTROL OF AN ATTACKER

WHAT IS A ZOMBIE?
(OR BOT)

400

THE CODE OF ACTING RESPONSIBLY WHEN USING COMPUTERS AND MOBILE DEVICES

WHAT IS
CYBER ETHICS?

400

AUTOMATIC UPDATES AND POP-UP BLOCKERS ARE EXAMPLES OF THIS

WHAT ARE BROWSER TOOLS?

400

A SOFTWARE PROGRAM DESIGNED TO PERFORM TASKS TO BENEFIT THE USER

WHAT IS AN APPLICATION?

400

IT CONNECTS THE CPU AND THE OPERATING SYSTEM SO A COMPUTER CAN BOOT UP

WHAT IS
THE BIOS?

500

IDEAL CAREER PATH FOR PROBLEM SOLVERS

WHAT IS
SECURITY ARCHITECT?

500

MALWARE THAT COLLECTS YOUR INFORMATION WITHOUT YOUR KNOWLEDGE OR CONSENT

WHAT IS SPYWARE?

500

EXPERTS WHO EVALUATE CYBERSECURITY THREATS, RISKS, AND PROBLEMS TO GUIDE ORGANIZATIONS IN PROVIDING PROTECTION SOLUTIONS

WHAT ARE
SECURITY CONSULTANTS?

500

THIS URL PREFIX INDICATES THAT A WEBSITE IS SECURE

WHAT IS
HTTPS?

500

DAILY DOUBLE!
THE USER INTERFACE OF A COMPUTER

WHAT IS
AN OPERATING SYSTEM?

500

IT MANAGES ALL THE COMPONENTS IN A COMPUTER SIMULTANEOUSLY

WHAT IS
THE CPU?

M
e
n
u