A strong one of these is recommended to be a mix of letters, numbers, and symbols and changed regularly.
What is a password?
An encryption-based Internet security protocol.
What is an SSL, or Secure Sockets Layer?
The acronym that refers to the network of interconnected devices.
What is IoT?
A program designed to detect, thwart, and remove malicious software.
What is anti-virus?
This classic video game character is known for eating dots and avoiding ghosts in mazes.
What is Pac-Man?
This term refers to the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
What is phishing?
What service helps distinguish between humans and bots, thereby enhancing web form security by preventing spam and abuse?
What is reCAPTCHA?
A wireless communication protocol is commonly used in IoT devices and cell phones for short-range communication.
What is bluetooth?
Converting data into a secure format that uses a pair of public and private keys for enhanced security.
What is asymmetric encryption?
Pokémon Red and Blue take place in this region based on a real life location in Japan.
What is Kanto?
The practice of tricking individuals into disclosing sensitive information through deceptive emails or websites.
What is ransomware?
This attack involves manipulating SQL code to view, modify, or delete data, posing one of the oldest threats to internet security.
What is a SQL injection attack?
Smart thermostats, security cameras, video doorbells, smart lights, smart appliances.
What are smart home devices?
Ensures that a business can continue operations even under a cyber attack.
The final boss in Zelda: Breath of the Wild.
Who is Calamity Ganon?
The acronym for the security measure that adds an extra layer of protection beyond passwords, often involving a code sent to a mobile device.
What is 2FA?
This type of attack allows malicious parties to inject harmful scripts into web application codes, potentially gaining access to sensitive customer data.
What is a cross-scripting attack?
Fitness trackers, smart watches, smart rings, glucose monitors, smart glasses.
What is wearable technology?
Regulations requiring businesses to take measures to protect sensitive information.
What is regulatory compliance?
The best selling video game of all time.
What is Minecraft?
This attack involves flooding a network or server with excessive requests from multiple devices to disrupt normal traffic.
What is a DDoS (Distributed Denial of Service) attack?
This regulation, enacted in 2018, mandates strong protection measures for online consumer data, similar to GDPR but specific to California.
What is CCPA? (California Consumer Privacy Act)
A small computer program that performs a specific task.
What is an applet?
The acronym for this 6 step response plan to a cybersecurity incident.
What is CIRP?
A speedrunner completed this game in 4:54. Mr. Choate's best attempt clocks in at 7:13.
What is Super Mario Bros.?