This acronym in a web address indicates that the site uses a secure, encrypted connection to protect data between your browser and the server.
What is HTTPS (HyperText Transfer Protocol Secure)?
This type of software is designed to damage, disrupt, or gain unauthorized access to a computer system.
What is Malware?
This law in the U.S. requires companies to protect the personal data of children under 13 online.
What is COPPA (Children's Online Privacy Protection Act)?
She founded WiCYS in 2013.
Who is Dr. Ambareen Siraji?
Attempting to trick someone into revealing personal information via email is called this.
What is Phishing?
This is the unique string of numbers assigned to each device connected to the internet.
What is IP address?
This device filters network traffic to prevent unauthorized access.
What is Firewall?
This U.S. law protects healthcare data and requires strict security standards.
What is HIPAA (Health Insurance Portability and Accountability Act)?
She's known as the world's first computer programmer.
Who is Ada Lovelace?
Unwanted advertisements that appear on your computer are caused by this type of malware.
What is Adware?
This malicious software often disguises itself as a legitimate program to trick users into installing it.
What is Trojan horse?
An attack that floods a user with texts or messages to trick them into clicking a malicious link.
What is Smishing?
This law provides civil remedies for victims of online harassment, cyberstalking, or threats.
What is Anti-cyberstalking law?
U.S Navy rear admiral, "Amazing Grace", helped create COBOL (Common Business-Oriented Language).
Who is Grace Hopper?
Hackers who exploit security vulnerabilities to help organizations improve security are called this.
What is Ethical hackers?
This is the process of converting data into a coded form to prevent unauthorized access.
What is Encryption?
A malware program that activates only when certain conditions are met, like a date or action.
What is Logic bomb?
The law that regulates the privacy of student education records in the U.S. is called this.
What is FERPA (Family Educational Rights and Privacy Act)?
The first WiCYS conference was held at this U.S university?
What is Tennessee Tech University?
Exploiting weak passwords across multiple accounts to gain access is called this type of attack.
What is Credential stuffing?
This cryptographic weakness occurs when two different inputs give the same hash value.
What is Collision attack?
Malware that changes its code structure automatically to evade antivirus detection.
What is Polymorphic malware?
Laws requiring companies to delete user data upon request are referred to by this right.
What is Right to be forgotten?
In 2025, WiCYS introduced a new program highlighting women speakers in cybersecurity.
What is the Speakers Spotlight Program?
Simple Coding. Write a program or function that takes an array (or list) of numbers as input and returns the largest number in the array in any language.
Answers may vary.