Common Threats
Online Safety
Best Practices
Other
100

This type of attack involves tracking individuals into revealing sensitive information through deceptive messages or emails.

What is phishing?

100

It is a strong defense against unauthorized access to online accounts and is made up of mixed lower- and upper-case letters, symbols, and numbers.

What is a strong password?

100

It is a security feature that adds an extra layer of protection to your account by requiring multiple forms of verification.

What is multi-factor authentication?

100

This is a technique used for protecting computer networks, data, and devices from different kinds of security attacks.

What is Cybersecurity?

200

This software encrypts a victim's data and demands a payment for the decryption key or The data system is locked by the attacker who has injected using the vulnerable points in the network.

What is a Ransomware Attack?

200

This is a security measure that creates a barrier between your network and an untrusted network.

What is a Firewall?

200

It is the most important thing to do before clicking on a hyperlink on a website or in an email.

What is checking the URL?

200

This is the primary source of digital attacks.

What is the Internet?

300

This software often disguises itself as legitimate software and can steal sensitive information.

What is a Trojan?

300

It is an authentication scheme that allows users to access multiple resources in exchange for given login credentials once.

What is Single- Sign-On (SSO)?

300

It is an encryption tool that makes your internet connection secure even on public Wi-Fi.

What is a Virtual Private Network (VPN)?

300

The attacker will insert the malicious code into the system. 

What is SQL Injection Attack?

400

This is referred to as malicious software that will intrude into the system to destroy data that is stored.

What is Malware Attack?

400

Students, teachers and employees should receive this training regularly to help prevent cyberattacks.

What is security awareness training?

400

To prevent malware infections, practice scanning these devices before accessing their files.

What are external devices?

400

It is required to keep your application and operating system up to date to prevent this.

What are vulnerabilities?

500

This will flood the computer system; therefore, it cannot respond to the services requested. 

What is Denial-of -Service Attack?

500

This software helps parents limit and monitor their children's internet access and screen time.

What is parental control software?

500

Your device can be protected from Bluetooth hacking by doing this when it is not in use.

What is disabling your Bluetooth?

500

Closing unused accounts and signing out helps prevent this type of cyber threat.

What is identity theft?

M
e
n
u