General
Computer dangers
Cyber Laws
WiCYS History
Trivia
100

This acronym in a web address indicates that the site uses a secure, encrypted connection to protect data between your browser and the server.

What is HTTPS (HyperText Transfer Protocol Secure)?

100

This type of software is designed to damage, disrupt, or gain unauthorized access to a computer system.

What is Malware?

100

This law in the U.S. requires companies to protect the personal data of children under 13 online.

What is COPPA (Children's Online Privacy Protection Act)?

100

She founded WiCYS in 2013.

Who is Dr. Ambareen Siraji?

100

Attempting to trick someone into revealing personal information via email is called this.

What is Phishing?

200

This is the unique string of numbers assigned to each device connected to the internet.

What is IP address?

200

This device filters network traffic to prevent unauthorized access.

What is Firewall?

200

This U.S. law protects healthcare data and requires strict security standards.

What is HIPAA (Health Insurance Portability and Accountability Act)?

200

She's known as the world's first computer programmer.

Who is Ada Lovelace?

200

Unwanted advertisements that appear on your computer are caused by this type of malware.

What is Adware?

300

This malicious software often disguises itself as a legitimate program to trick users into installing it.

What is Trojan horse?

300

An attack that floods a user with texts or messages to trick them into clicking a malicious link.

What is Smishing?

300

This law provides civil remedies for victims of online harassment, cyberstalking, or threats.

What is Anti-cyberstalking law?

300

U.S Navy rear admiral, "Amazing Grace", helped create COBOL (Common Business-Oriented Language).

Who is Grace Hopper?

300

Hackers who exploit security vulnerabilities to help organizations improve security are called this.

What is Ethical hackers?

400

This is the process of converting data into a coded form to prevent unauthorized access.

What is Encryption?

400

A malware program that activates only when certain conditions are met, like a date or action.

What is Logic bomb?

400

The law that regulates the privacy of student education records in the U.S. is called this.

What is FERPA (Family Educational Rights and Privacy Act)?

400

The first WiCYS conference was held at this U.S university?

What is Tennessee Tech University?

400

Exploiting weak passwords across multiple accounts to gain access is called this type of attack.

What is Credential stuffing?

500

This cryptographic weakness occurs when two different inputs give the same hash value.

What is Collision attack?

500

Malware that changes its code structure automatically to evade antivirus detection.

What is Polymorphic malware?

500

Laws requiring companies to delete user data upon request are referred to by this right.

What is Right to be forgotten?

500

In 2025, WiCYS introduced a new program highlighting women speakers in cybersecurity.

What is the Speakers Spotlight Program?

500

Simple Coding. Write a program or function that takes an array (or list) of numbers as input and returns the largest number in the array in any language.

Answers may vary.

M
e
n
u