We're Under Attack
Secure the Fort
Acronym Soup
Let's Go Phishing
I Smell Popcorn
100

This type of malware locks users out of their systems until a ransom is paid.

What is Ransomware?

100

It acts as a barrier to control incoming and outgoing internet traffic.

What is a Firewall?

100

VPN

What is Virtual Private Network?

100

A social engineering attack that uses mobile text messages requesting a person to take immediate action by clicking a link.

What is Smishing?

100

This TV series follows Elliot, a cybersecurity engineer with a troubled personal life who becomes involved with an underground hacking group aiming to dismantle major corporations.

What is Mr. Robot?

200

A type of attack that uses human psychology to trick individuals into providing sensitive information.

What is Social Engineering?

200

The process of converting plain text into an unreadable format using a mathematical algorithm and a secret key.

What is Encryption?
200

SSO

What is Single Sign On?

200

A caller pretending to be a bank official claiming fraudulent activity on your account and asking for your account details to "verify" them.

What is Vishing?

200

This series that ran from 2011 - 2019, explored the dark side of technology, frequently touching on privacy breaches, identity theft, and the ethical implications of new technologies.

What is Black Mirror?

300

This type of attack overwhelms a website, application or system with volumes of fraudulent traffic making the system unavailable.

What is DoS or DDoS?

300

The principle in which a user is given the minimum levels of access needed to perform their job.

What is Least Privilege?

300

MFA

What is Multi-Factor Authentication?

300

An attacker impersonating a senior leadership member asking for a money transfer or to review a document.

What is Whaling?

300

The actress who played Angela Bennet in the movie, The Net, released in 1995, about a computer programmer who stumbled upon government secrets.

Who is Sandra Bullock?

400

A malicious program disguised as a legitimate software to steal data, create a backdoor, or install other malware.

What is a Trojan/Trojan Horse?

400

This symbol on a website indicates an encrypted, secure connection between the user's computer and the web server.

What is a Padlock?

400

GDPR

What is General Data Protection Regulation?

400

It involves tricking individuals into scanning a Quick Response code that will direct to a malware infected website. 

What is Quishing?

400

This 1983 film follows a high school student who inadvertently hacks into a military supercomputer, almost triggering a global catastrophe.

What is WarGames?

M
e
n
u