Cybersecurity Basics
Cyber Threats
Cybersecurity Practices
Cybersecurity History
100

This term describes the practice of protecting systems, networks, and programs from digital attacks.

What is cybersecurity?

100

This type of attack involves an attacker sending fraudulent communications that appear to come from a reputable source.

What is phishing?

100

This is an update to software that fixes a security vulnerability.

What is a patch?

100
What is a honeypot

A trap to lure hackers

200

This type of software is designed to detect and remove malicious software from a computer.

What is antivirus software?

200

This type of malware encrypts a victim's files and demands payment to restore access.

What is ransomware?

200

If you receive a suspicious email, what steps could you take to make sure that it is a real email?

Check the email address, check for attachments that seem unusual

200

What is ransom ware _____.

Malware that demands Money

300

This is the process of converting information or data into a code to prevent unauthorized access.

What is encryption?

300

What does a hacker or hacking do?

Tries to gain unauthorized access to files

300

This is a security measure that requires users to provide two forms of identification before accessing an account.

What is two-factor authentication?

300

What is an example of a good password

Numbers, letters, special characters

400

Define malware

files to do damage to devices

400

This type of malware disguises itself as legitimate software to trick users into installing it.

What is a Trojan horse?

400

What does cybersecurity involve?

Protecting computers, networks and programs from attacks or damages.

400

What are some recent cybersecurity breaches that you know of

 I Ready

United Healthcare

PowerSchool

500

What is a Firewall?

System to block against malicious traffic 

500

What is Spyware? Where does the information go?

Information sent from your computer to hackers

500

Different types of malware

Virus, Worms, ransomware

500

Name one importance of cybersecurity

protecting sensitive data

Maintaining operational continuity

M
e
n
u