General
Computer dangers
Internet Safety
WiCYS History
Trivia
100

This acronym in a web address indicates that the site uses a secure, encrypted connection to protect data between your browser and the server.

What is HTTPS (HyperText Transfer Protocol Secure)?

100

This type of software is designed to damage, disrupt, or gain unauthorized access to a computer system.

What is Malware?

100

This kind of password uses letters, numbers, and symbols to stay secure.

What is strong password?

100

She founded WiCYS in 2013.

Who is Dr. Ambareen Siraji?

100

Attempting to trick someone into revealing personal information via email is called this.

What is Phishing?

200

This is the unique string of numbers assigned to each device connected to the internet.

What is IP address?

200

This device filters network traffic to prevent unauthorized access.

What is firewall?

200

Before posting online, you should always check these settings to control who can see your information.

What are privacy settings?

200

She's known as the world's first computer programmer.

Who is Ada Lovelace?

200

Unwanted advertisements that appear on your computer are caused by this type of malware.

What is Adware?

300

This malicious software often disguises itself as a legitimate program to trick users into installing it.

What is Trojan horse?

300

An attack that floods a user with texts or messages to trick them into clicking a malicious link.

What is Smishing?

300

This feature adds an extra step when logging in to keep your account safe.

What is two-factor authentication? 

300

U.S Navy rear admiral, "Amazing Grace", helped create COBOL (Common Business-Oriented Language).

Who is Grace Hopper?

300

Hackers who exploit security vulnerabilities to help organizations improve security are called this.

What is Ethical hackers?

400

This is the process of converting data into a coded form to prevent unauthorized access.

What is Encryption?

400

A malware program that activates only when certain conditions are met, like a date or action.

What is Logic bomb?

400

You should always use this type of connection when working on public Wi-Fi.

What is VPN (Virtual Private Network)?

400

The first WiCYS conference was held at this U.S university?

What is Tennessee Tech University?

400

Exploiting weak passwords across multiple accounts to gain access is called this type of attack.

What is Credential stuffing?

500

This cryptographic weakness occurs when two different inputs give the same hash value.

What is Collision attack?

500

Malware that changes its code structure automatically to evade antivirus detection.

What is Polymorphic malware?

500

This word describes all the information that stays online posts, photos, and accounts.

What is digital footprint?

500

In 2025, WiCYS introduced a new program highlighting women speakers in cybersecurity.

What is the Speakers Spotlight Program?

500

This company suffered one of the largest data breaches in history in 2017, exposing personal information of over 140 million people.

What is Equifax?

M
e
n
u