Password Security
Device Security
Internet Safety
Data Protection & Breaches
Malware & Exploits
100

What are some common requirements for passwords when making them?

Minimum Length, Special Characters, Numbers , Capital Letters

100

This type of software helps detect and remove malicious programs from your computer.

Antivirus Software

100

What type of information should you not give out online. (Give an example)

PII - (Anything relating to the user basically, address, name, security questions)

100

What type of data might you find in a breach/leak? (Name One)

Name, phone, email, password, etc

100

This type of software is designed to harm, exploit, or otherwise compromise a computer system.

Malware

200

This risky practice involves using the same password across multiple accounts or systems, making it easier for attackers to compromise multiple services after a single breach.

Password Reuse

200

This security feature acts as a barrier between your device and the internet, filtering incoming and outgoing traffic based on predefined rules.

A Firewall

200

This type of scam tricks people into clicking fake links or giving away personal info, often through email.

Phishing

200

This practice involves converting data such as a message into an unreadable form (cipher text) to protect it during storage or transmission.

Encryption (Not Encoding)

200

This type of malicious software can replicate itself and spread across systems without user interaction.

A worm

300

Name one of the three primary authentication factors used to verify identity.

Something you know, something you have, something you are.

300

This principle ensures users and applications only have the minimum access necessary to perform their tasks.

Least Privilege

300

This term describes the collection of data you leave behind through online activity, which can be used to track or profile you.

Digital Footprint

300

This type of breach occurs when sensitive data is exposed due to misconfigured cloud storage or publicly accessible databases.

(Accidental) Data Exposure

300

This type of malware gives attackers remote control over an infected device, often used in botnets.

Remote Access Trojan (RAT)

400

This authentication protocol, commonly used in enterprise environments, can be vulnerable to ticket replay attacks if not properly secured.

Kerberos

400

This security feature isolates applications from the rest of the system, preventing potentially harmful malware from spreading beyond its container.

Sandboxing
400

This type of phishing attack uses a fake login page on a website that looks similar to an official one, but isn't.

(Example: gogle.com instead of google.com)

Website spoofing or watering hole

400

This type of threat exists when someone, such as an employee, intentionally or unintentionally exposes sensitive data.

Insider Threat

400

This problem occurs when an attacker already gained access to your device, but wants to move to devices beside it in an organization.

Lateral Movement

500

This hash format, used by Windows to store passwords, relies on MD4 and lacks salting.

NTLM/LM

500

This hardware-based security feature stores cryptographic keys and ensures platform integrity by verifying the boot process.

Trusted-Platform-Module (TPM)

500

This attack places a hidden layer over website buttons or forms to trick users into clicking something malicious.

Clickjacking

500

This attack involves moving data slowly over time to avoid detection, often using encrypted channels or covert protocols.

Data Exfiltration Attack.

500

This type of malware constantly changes its code structure to evade signature-based detection tools.

Polymorphic malware

M
e
n
u