This is what “cybersecurity” protects — your computers, phones, and networks from this.
What are attacks or hackers?
You should never click on suspicious links in this type of fake message pretending to be real.
What is phishing?
This term refers to a person who breaks into systems — sometimes for fun, sometimes for harm.
What is a hacker?
This kind of software helps protect your device by detecting and removing malware.
What is antivirus software?
If you use “password123” as your password, this kind of attack can easily guess it.
What is a brute-force attack?
The practice of using a secret word or phrase to access something securely.
What is a password?
It’s a good idea to change your passwords this often.
What is every few months (or regularly)?
The “ILOVEYOU” email virus first appeared in this decade.
What are the 2000s (specifically 2000)?
These characters (like @, #, and $) make your passwords harder to guess.
What are special characters?
This small device stores data and can spread malware if plugged into an unknown computer.
What is a USB drive (or flash drive)?
This is the process of converting data into a secret code to protect it.
What is encryption?
This type of code locks your files until you pay the attacker.
What is ransomware?
This kind of hacker helps companies find security flaws before bad guys do.
What is a white-hat hacker?
Before downloading a mobile app, it’s important to check this first.
What is the app’s permissions or reviews?
In this kind of scam, someone calls pretending to be tech support to steal your info.
What is vishing (voice phishing)/Social Engineering?
This term describes any software designed to harm your device.
What is malware?
Public Wi-Fi networks can be risky because your data can be this.
What is intercepted or stolen?
This was one of the first major breaches to expose millions of credit cards in 2013.
What is the Target data breach?
When websites show a little lock 🔒 next to the URL, it means the site uses this secure protocol.
What is HTTPS?
This simple rule: “Don’t share what you wouldn’t want public,” applies to this kind of platform.
What are social media sites?
The “CIA Triad” in cybersecurity stands for these three principles.
What are Confidentiality, Integrity, and Availability?
This extra step after your password, often a text or app code, adds another layer of protection.
What is multi-factor authentication (MFA) or two-factor authentication (2FA)?
The group known as “Anonymous” is famous for this type of cyber action.
What are hacktivist attacks (or hacktivism)?
This type of file backup keeps your data safe even if your computer is hacked.
What is a cloud backup or offline backup?
This type of attacks focuses on the weakest link in security, people.
What is Social Engineering?