Cybersecurity
Cyber Safe
Cyber Attacks
Cyber Crime
Phishing Emails
100

This type of security separates your private information from the public Internet, while filtering malware, virus, and worms.

What's a firewall?

100

What's the first step of being Cyber Safe?

Install cybersecurity systems.

100

Malicous Software

What's is Malware?

100

Any illegal action involving a computer or network.

What is Cybercrime?

100

What's the easiest warning sign of a fake email?

The email is poorly written or misspelt.
200

This cybersecurity systems protects the confidentiality, integrity, and availability of information throughout its life cycle.

What is Data Security?
200

One of the best ways to keep personal information safe online.

Never share online.

200

This cyberattack locks a victim's device, system, or network until they pay a fee back to the cybercriminal.

What is ransomware?

200

The criminal act of gaining unauthorized access to data in a computer or network

What is hacking?

200
Real businesses and corporations will never do what in an email?
Ask for personnel information. 
300

Encryption, multi-factor authentication, authorization, and filtration are what?

Common cybersecurity methods and processes.
300

Staying caught up on better cybersecurity systems requires what?

Updating systems daily.

300

This cyberattack seeks to overwhelm a system with fraudulent traffic to crash it or make it so slow its inoperable.

What's a Denial-of-Service(DoS) attack?

300
There are over ______ cyber attacks every day.
2,200 cyber attacks every day.
300

How are suspicious files and links a warning sign in a fake email?

Files could contain malware, viruses, and worms.

Links could bring you to a fake website.

400

The policy of giving a user the least amount of access and privilege in a computer system to prevent costly human error.

What is Zero Trust?

400

What percentage of digital breaches are a result of human error?

95% of digital breaches are a result of human error.
400

Social Engineering, known as "human hacking",  consists of scams and phishing emails. What percentage of cyber attacks involve social engineering?

98% of cyber attacks.

400

How many cyber criminals are caught and prosecuted?

Only 20% of cyber criminals face charges, as they are virtually invisible.
400

An fake email sent to a target to manipulate them is sending sensitive information, or money back.

What is Phishing?

500

This cybersecurity protects network access points like computers, devices, and smart appliances.

What is Endpoint Security?

500

Consisting of at least 14 characters, and containing uppercase, lowercase, numbers, and symbols.

What's a strong password?

500

This cyberattack is a self-replicating program that spreads itself from computer to computer delivering malware without human interaction.

What is a computer worm?

500

Meant as a prank, who unleashed the first cyber attack ever?

Bob Thomas 

500

What's the first warning sign of a fake email?

The email is from a public domain like "@gmail.com". 

M
e
n
u